Information Technology and Data Protection in UK Law

Leading Cases
  • R (Daly) v Secretary of State for the Home Department
    • House of Lords
    • 23 May 2001

    First, the doctrine of proportionality may require the reviewing court to assess the balance which the decision maker has struck, not merely whether it is within the range of rational or reasonable decisions. Secondly, the proportionality test may go further than the traditional grounds of review inasmuch as it may require attention to be directed to the relative weight accorded to interests and considerations.

  • Berkeley v Secretary of State for the Environment Transport and the Regions and Another
    • House of Lords
    • 06 Jul 2000

    Although section 288(5)(b), in providing that the court "may" quash an ultra vires planning decision, clearly confers a discretion upon the court, I doubt whether, consistently with its obligations under European law, the court may exercise that discretion to uphold a planning permission which has been granted contrary to the provisions of the Directive.

  • Aerotel Ltd v Telco Holdings Ltd; Macrossan's Patent Application (No.0314464.9)
    • Court of Appeal (Civil Division)
    • 27 Oct 2006

    data-paragraph-id="964791db51">data-sentence-id="633fe69b68" quote="false" data-paragraph-id="964791db51">Ask whether the invention as defined in the claim makes a technical contribution to the known art—if no, Art.52(2) applies.data-sentence-id="260cb235a2" quote="false" data-paragraph-id="964791db51"> A possible clarification (at least by way of exclusion) of this approach is to add the rider that novel or inventive purely excluded matter does not count as a "technical contribution".

  • Seager v Copydex Ltd
    • Court of Appeal (Civil Division)
    • 18 Abr 1967

    It depends on the broad principle of equity that he who has received information in confidence shall not take unfair advantage of it. He must not make use of it to the prejudice of him who gave it without obtaining his consent. He should go to the public source and get it: or, at any rate, not be in a better position than if he had gone to the public source. He should not get a start over others by using the information which he received in confidence.

  • Campbell v MGN Ltd
    • House of Lords
    • 06 May 2004

    data-paragraph-id="948d1073f0">data-sentence-id="10f47cb22f" quote="false" data-paragraph-id="948d1073f0"> Accordingly, in deciding what was the ambit of an individual's 'private life' in particular circumstances courts need to be on guard against using as a touchstone a test which brings into account considerations which should more properly be considered at the later stage of proportionality.data-sentence-id="4f314445a8" quote="false" data-paragraph-id="948d1073f0"> Essentially the touchstone of private life is whether in respect of the disclosed facts the person in question had a reasonable expectation of privacy.

  • Attorney General v Guardian Newspapers Ltd and Others (No. 2)
    • House of Lords
    • 13 Oct 1988

    I start with the broad general principle (which I do not intend in any way to be definitive) that a duty of confidence arises when confidential information comes to the knowledge of a person (the confidant) in circumstances where he has notice, or is held to have agreed, that the information is confidential, with the effect that it would be just in all the circumstances that he should be precluded from disclosing the information to others.

  • A v B Plc and Another
    • Court of Appeal (Civil Division)
    • 11 Mar 2002

    The court is able to achieve this by absorbing the rights which articles 8 and 10 protect into the long-established action for breach of confidence. This involves giving a new strength and breadth to the action so that it accommodates the requirements of those articles.

See all results
Legislation
  • Data Protection Act 2018
    • UK Non-devolved
    • 1 de Enero de 2018
    ...... Act to make provision for the regulation of the processing of information relating to individuals; to make provision in connection with the ... that is a Research Council for the purposes of the Science and Technology Act 1965;(iv) an institution that is a research institution for the ......
  • Investigatory Powers Act 2016
    • UK Non-devolved
    • 1 de Enero de 2016
    ...... acquisition and retention of communications data, bulk personal datasets and other information; to ... 1 . General privacy protections Part 1 . General privacy protections . Overview ...) (g) information about the work of the Technology Advisory Panel, . (h) (h) information about the ......
  • The Payment Services Regulations 2009
    • UK Non-devolved
    • 1 de Enero de 2009
    ...... PART 5 . INFORMATION REQUIREMENTS FOR PAYMENT SERVICES . Application ... estimated, on the basis of historical data and to the satisfaction of the Authority, to be ... the meanings given in the Consumer Protection (Distance Selling) Regulations 2000  36 . . ... (iv) information technology; . (v) communication network provision; and . ......
  • The Public Contracts Regulations 2015
    • UK Non-devolved
    • 1 de Enero de 2015
    ...... specification in the field of information and communication technology laid down in ... planning, architecture and engineering or data processing, a plan or design selected by a jury ... contracts;(h) for civil defence, civil protection, and danger prevention services that are provided ......
See all results
Books & Journal Articles
  • The benefits and challenges of general data protection regulation for the information technology sector
    • Núm. 21-5, Agosto 2019
    • Digital Policy, Regulation and Governance
    • 510-524
    Purpose: The implementation of European data protection is a challenge for businesses and has imposed legal, technical and organizational changes for companies. This study aims to explore the benef...
  • “The margin between the edge of the world and infinite possibility”. Blockchain, GDPR and information governance
    • Núm. 29-1/2, Marzo 2019
    • Records Management Journal
    • 240-257
    Purpose: This paper aims to explore a paradoxical situation, asking whether it is possible to reconcile the immutable ledger known as blockchain with the requirements of the General Data Protection...
    ...... in with the requirements of the General Data Protection Regulations (GDPR), and morebroadly ... positi ve feature of blockchain technology fr om the perspective of trusted exchanges of ......
  • A comprehensive concept map for adequate protection and effective management of personal information in networked Chinese services
    • Núm. 33-6, Noviembre 2015
    • The Electronic Library
    • 1047-1064
    Purpose: – This paper aims to develop a comprehensive concept map to guide adequate protection and effective management of personal information in the provision of networked services in China throu...
    ...... information in networked Chinese services Xiaomi An Key Laboratory of Data Engineering and Knowledge Engineering of the Ministry of Education, and ... of China, Beijing, China, and School of Business Information Technology and Logistics, RMIT University, Melbourne, Australia Shuyang Sun, Yu Dong ......
  • Semantic Disclosure Control: semantics meets data privacy
    • Núm. 42-3, Junio 2018
    • Online Information Review
    • 290-303
    Purpose: To overcome the limitations of purely statistical approaches to data protection, the purpose of this paper is to propose Semantic Disclosure Control (SeDC): an inherently semantic privacy ...
    ...... purely statistical approaches to data protection, the purpose of this paper is to propose Semantic ... and intuitive notions of privacy and information disclosure than purely statistical meth ods. As a ... Web Intelligence and Intelligent Agent Technology – Workshops , Lyon , pp. 253-256. Anandan, ......
See all results
Law Firm Commentaries
  • Information Commissioner's Office: Guidance On Artificial Intelligence And Data Protection
    • Mondaq UK
  • Senior MP Calls for Regulatory Crackdown on Banks’ IT Systems: 3 Things You Can do to Prepare
    • JD Supra United Kingdom
    The recent cyberattack on Tesco Bank’s IT systems has prompted Rt Hon. Andrew Tyrie MP, Chairman of the Treasury Committee, to call on regulators to take action against vulnerable bank IT systems...
    ...... access, risk management expectations, data access provisions and expectations around exit ... the principles in the new General Data Protection Regulation (GDPR) coming into force in by 25th ... the provisions of the Network and Information Security Directive (NISD) which will apply to ......
  • Responding to a Cyber Breach
    • JD Supra United Kingdom
    It has been six weeks since the GDPR came into force, and as the consent and sign-up emails slowly stop flooding into our inboxes, the attention has started to shift from GDPR readiness and complia...
    ...... a mandatory obligation to report a personal data security breach to regulators, and potentially ......
  • 10 steps to better cybersecurity -‘Intellectual Values seminar series #1’ video
    • JD Supra United Kingdom
    Last month we hosted our annual ‘Intellectual Values’ seminar in London which this year focused on the ‘connected world’. Sarah Turner, an IP partner in our Tech Hub, gave a talk on the steps compa...
    ...... Delay is the enemy of protection. Nobody is safe as rogue players target all types of business for their money, personal data and intellectual property. Accept that you will ... There is also lots of useful information publicly available to benchmark what your company ......
See all results

VLEX uses login cookies to provide you with a better browsing experience. If you click on 'Accept' or continue browsing this site we consider that you accept our cookie policy. ACCEPT