What do we want to look like when we’re 50?
The SCL Chair, Mark O’Conor, discusses SCL’s strategic objectives for the next five years and looks forward to the Society’s 50th anniversary…
The SCL Chair, Mark O’Conor, discusses SCL’s strategic objectives for the next five years and looks forward to the Society’s 50th anniversary…
The Department of Digital, Culture, Media & Sport clarifies how it will implement the EU NIS Directive in May 2018…
Read More… from Implementation of EU NIS Directive: consultation response & NCSC guidance published
Darren Grayson Chng, our Singapore International Associate Editor, reports on an amended Cybersecurity Bill, just introduced to the Singapore Parliament….
In her predictions, Jane Seager focuses on her specialised field – domain names…
Kuan Hon has carefully analysed the Article 29 Working Party Guidelines on personal breach notification under the GDPR. Note that the article covers the version that was put out for consultation in November 2017, and that the final version may differ…
Read More… from Personal Breach Notification Guidelines Analysed
These are the predictions of a range of experts in tech law, technology for lawyers. Some are light-hearted and some are highly perceptive; some are a bit of both; all in alphabetical order…
Following on from a widely welcomed presentation at SCL’s Sextech, Porn and the Law event in October, Pandora Blake offers a fuller analysis of the dangers and difficulties that come with the introduction of age verification in accordance with the Digital Economy Act 2017…
Phoebe Whitlock was present when Microsoft’s Brad Smith gave the Geneva Lecture in November and promoted the view that cybersecurity needs to be a cause for our time. She reports and reflects on the event….
Phoebe Whitlock reviews the UK’s cybercrime strategies and suggest areas for improvement…
Stuart Young believes that cyber-security must jostle for pole in the race for a successful driverless future and that collaboration is key…
Read More… from Driverless Vehicles and Collaboration in Cyber-security