Data Security in UK Law
Nichols Plc's Trade Mark Application (No.2241892)
By granting registration of a semi-descriptive or indeed a nearly-but-not-quite-completely descriptive mark one is placing a powerful weapon in powerful hands. Moreover it must not be forgotten that the monopoly extends to confusingly similar marks. In any marginal case defendants, SMEs particularly, are likely to back off when they receive a letter before action. It is cheaper and more certain to do that than stand and fight, even if in principle they have a defence.
Data Protection Act 2018
...... (a) (a) point (b) (employment, social security and social protection); . (b) (b) point (g) (substantial public interest); . (c) (c) point (h) (health and social care); . (d) (d) point (i) ......
- Data Protection Tribunal (National Security Appeals) Rules 2000
- Data Protection Tribunal (National Security Appeals) (Telecommunications) Rules 2000
Investigatory Powers Act 2016
...... interference and the acquisition and retention of communications data, bulk personal datasets and other information; to make provision about the ... to make further provision about investigatory powers and national security; to amend sections 3 and 5 of the Intelligence Services Act 1994; and for ......
Social-media-based risk communication for data co-security on the cloud
Purpose: Cloud computing has disrupted the information technology (IT) industry. Associated benefits such as flexibility, payment on an on-demand basis and the lack of no need for IT staff are amon...
Data flows and national security: a conceptual framework to assess restrictions on data flows under GATS security exception
Purpose: The paper aims to explore the national security implications of a potential for a World Trade Organization (WTO) dispute on data flow restrictions. It proposes a basic conceptual framework...
Empirical assessment of mobile device users’ information security behavior towards data breach. Leveraging protection motivation theory
Purpose: The purpose of this paper is to investigate the information security behavior of mobile device users in the context of data breach. Much of the previous research done in user information s...
Fraud and corruption risk in business Mastercourse: Dr Stephen Hill is the managing director of snowdrop consulting, a company specialising in fraud risk management, prevention/awareness and data security. He is a trustee director of the ICAEW fraud advisory panel and chairs the cybercrime working group. Here, he explains what the course is about.
...This one-day course will offer attendees a full understanding of the threats posed by various types of fraud, how to recognise where the threats may be and how to respond to them. It is aimed at financial staff, from book-keepers to finance directors......
Virgin Media suffers Data Security Breach
Virgin Media is reportedly one of the latest UK companies to suffer a data security breach. On 5 March 2020, it published a statement on its website explaining that one of its databases had been ac...
Data Security Ignoring the PCI Data Security Standard Could Cost You!
Is compliance with payment card data security standards being ignored? The recent £500,000 fine, levied by the UK Information Commissioner on DSG, the owner of Currys PC World and Dixons Travel sto...
Personal data security for pension scheme trustees
Cybersecurity and protection of personal data are increasingly to the forefront of concerns for pension trustees. The European General Data Protection Regulation (GDPR), applicable in the UK from 2...
ICO Stresses Importance of Encryption for Data Security
On August 28, 2013, on the UK Information Commissioner’s Office’s (“ICO’s”) blog, Simon Rice, Technology Group Manager for the ICO, discussed the importance of encryption as a data security measure...