Data Leakage in UK Law

Legislation
See all results
Books & Journal Articles
  • View analysis of personal information leakage and privacy protection in big data era—based on Q method
    • No. 74-5, September 2022
    • Aslib Journal of Information Management
    • 0000
    Purpose: In the era of big data, people are more likely to pay attention to privacy protection with facing the risk of personal information leakage while enjoying the convenience brought by big dat...
  • Human factors in information leakage: mitigation strategies for information sharing integrity
    • No. 119-6, July 2019
    • Industrial Management & Data Systems
    • 1242-1267
    Purpose: The purpose of this paper is to explore the human factors triggering information leakage and investigate how companies mitigate insider threat for information sharing integrity. Design/me...
    ... ... Its latest issue of information leakage in 2016shows that among the data leaks logged, 38.2 percent of the cases were triggered byexternal attacks, while 61.8 percent were caused by internal offenders (InfoWatch, ... ...
  • Let me in the cloud: analysis of the benefit and risk assessment of cloud platform
    • No. 20-1, December 2012
    • Journal of Financial Crime
    • 6-24
    Purpose: The purpose of this paper is to critically examine the vulnerabilities of the cloud platform affecting businesses trading on the internet. It aims to examine the appropriateness of the clo...
    ... ... the public and private sectors)undertaken to examine theirprivacy,and data security concerns associated with the cloud platform. Views of those who ... Data loss and leakage (73.5 per cent) were voted as the topthreat to cloud computing by ... ...
  • Private attribute inference from Facebook’s public text metadata: a case study of Korean users
    • No. 117-8, September 2017
    • Industrial Management & Data Systems
    • 1687-1706
    Purpose: As the number of users on social network services (SNSs) continues to increase at a remarkable rate, privacy and security issues are consistently arising. Although users may not want to di...
    ... ... to infer undisc losed personal attributes of users based o nly on the data" available on their publicprofiles on Facebook.Design/methodology/approach \xE2" ... users is available.Practical implications –A private attribute leakage alarm system based on the inference model would behelpful for users not ... ...
See all results
Law Firm Commentaries
  • OWASP Releases The Results Of Its Privacy Risks Project
    • Mondaq UK
    ... ... Web application vulnerabilities Operator-sided data leakage Insufficient data breach response Insufficient deletion of ... ...
  • How To Balance Risk In Cloud Contracts By Adopting Best Practice
    • Mondaq United Kingdom
    ... ... service provider that offers a standardised public cloud service with data centres in the cheapest location will not wish to be drawn into any ... in place adequate measures to ensure data security and avoid data leakage or loss ... Documented management systems, processes and resources ... ...
  • Out Of The Office But Not Out Of The Woods
    • Mondaq United Kingdom
    ... ... £500,000 which the ICO can impose on organisations breaching their data protection obligations and the subsequent reputational damage caused) - ... data being stored at any one time? Is there potential for data leakage? How secure are the devices that will be used? What will happen to ... ...
  • UK Privacy Regulator Publishes Report Critical Of Adtech And Real Time Bidding
    • Mondaq UK
    ... ... Report") criticizing the online advertising industry's handling of data and concluding that standard industry practices are non-compliant with ... fair processing; and Contract-only approaches to preventing data leakage from invitations to bid are insufficient. What Comes Next ... While ... ...
See all results

VLEX uses login cookies to provide you with a better browsing experience. If you click on 'Accept' or continue browsing this site we consider that you accept our cookie policy. ACCEPT