Infrastructure Security in UK Law

Leading Cases
  • Attorney General v Prince Ernest Augustus of Hanover
    • House of Lords
    • 05 Dic 1956

    So it is that I conceive it to be my right and duty to examine every word of a Statute in its context and I use "context" in its widest sense which I have already indicated as including not only other enacting provisions of the same statute, but its preamble, the existing state of the law, other statutes in pari materia, and the mischief which I can, by those and other legitimate means, discern the statute was intended to remedy.

  • R v Clarke (Terry)
    • Court of Appeal (Criminal Division)
    • 04 Nov 1996

    It is urged on behalf of the appellant that this is not the case in which this Court should raise the tariff for this type of offence. In those circumstances, despite everything that has been said helpfully on behalf of the appellant by Miss Agnew, we do not think that a sentence of three years was a moment too long in respect of this offence.

  • CTB v News Group Newspapers Ltd and Another
    • Queen's Bench Division
    • 23 May 2011

    It is obvious that if the purpose of this injunction were to preserve a secret, it would have failed in its purpose. But in so far as its purpose is to prevent intrusion or harassment, it has not failed. The fact that tens of thousands of people have named the claimant on the internet confirms that the claimant and his family need protection from intrusion into their private and family life.

See all results
Legislation
  • Space Industry Act 2018
    • UK Non-devolved
    • 1 de Enero de 2018
    ...... (f) (f) the interests of national security; . (g) (g) any international obligations of the United Kingdom; . (h) ... (a) (a) safety systems, . (b) (b) facilities or infrastructure (including facilities or infrastructure relating to ground control, ......
  • Energy Act 2011
    • UK Non-devolved
    • 1 de Enero de 2011
    ...... to energy consumption, efficiency and tariffs; for increasing the security of energy supplies; about access to upstream petroleum infrastructure and ......
  • Infrastructure Act 2015
    • UK Non-devolved
    • 1 de Enero de 2015
    ...... (1) In section 100 of the Anti-terrorism, Crime and Security Act 2001 (jurisdiction of transport police)-. . . (a) in subsection (2)(b), after "personal injury" insert "or damage to property", and. . . (b) ......
  • The Secretaries of State for Health and Social Care and for Housing, Communities and Local Government and Transfer of Functions (Commonhold Land) Order 2018
    • UK Non-devolved
    • 1 de Enero de 2018
    ...... (l) column (1) of the table in Schedule 1 to the Infrastructure Planning (Applications: Prescribed Forms and Procedure) Regulations 2009 ... (p) regulations 9A(1) and (4) and 10(1)(c) and (2) of the Social Security (Information-sharing in relation to Welfare Services etc) Regulations 2012 ......
See all results
Books & Journal Articles
  • Enhanced authentication and key exchange for end to end security in mobile commerce using wireless public key infrastructure
    • Núm. 48-1, Febrero 2020
    • Information Discovery and Delivery
    • 14-22
    Purpose: The purpose of the study is to develop a secure, efficient, and enhanced user authentication mechanism to achieve reliable and authenticated connection. In online transactions, users and r...
  • Arms Limiting and Force Adjusting Arrangements in the Northern Cap Area
    • Núm. 7-1, Marzo 1972
    • Cooperation and Conflict
    The author starts out by delineating the existing system of unilateral arms control measures which is observed by Norway. He distinguishes between unilateral formal measures on the one hand and sem...
    ......&Expires=1634373987&Signature=LVI0RPk50POjKAIMx7lUXo7mMfQ%3D&x-amz-security... ad- justment regulations as part of the security infrastructure of the post-cold war Europe. Thus the Norwegian constraints would ......
  • Arms Limiting and Force Adjusting Arrangements in the Northern Gap Area
    • Núm. 7-2, Julio 1972
    • Cooperation and Conflict
    The author starts out by delineating the existing system of unilateral arms control measures which is observed by Norway. He distinguishes between unilateral formal measures on the one hand and sem...
    ......&Expires=1634373987&Signature=7TRfXPLuMbhHE6dgsjLjsWGdJtc%3D&x-amz-security... ad- justment regulations as part of the security infrastructure of the post-cold war Europe. Thus the Norwegian constraints would ......
  • Trusting records: is Blockchain technology the answer?
    • Núm. 26-2, Julio 2016
    • Records Management Journal
    • 110-139
    Purpose: The purpose of this paper is to explore the value of Blockchain technology as a solution to creating and preserving trustworthy digital records, presenting some of the limitations, risks a...
    ...... in the present and near term, assuming proper securityarchitecture and infrastructure management controls. It does not, however, guarantee ......
See all results
Law Firm Commentaries
See all results

VLEX uses login cookies to provide you with a better browsing experience. If you click on 'Accept' or continue browsing this site we consider that you accept our cookie policy. ACCEPT