cyber alert
Laurence Eastham reviews a new book from Peter Warren and Michael Streeter cyber alert: How the World is Under Attack from a New Form of Crime (ISBN 1-904132-62-6, Vision Publishing £10.99)….
Laurence Eastham reviews a new book from Peter Warren and Michael Streeter cyber alert: How the World is Under Attack from a New Form of Crime (ISBN 1-904132-62-6, Vision Publishing £10.99)….
Two things of interest happened in Parliament on the 5th April. The first was the Prime Minister’s announcement of the date of the 2005 general election; the second was the first reading of Derek Wyatt MP’s Computer Misuse Act 1990 (Amendment) Bill, a ten minute rule bill which seeks (as its name would suggest) to amend the Computer Misuse Act 1990 (CMA). Whilst it would be fair to say that the former was perhaps the higher profile of the two, to many IT lawyers the latter is of equal importance and Shelley Hill examines the Bill’s proposals….
Richard Stephens is the new Chairman of SCL . He is the first person to act alone as Chairman after years where SCL has had a joint leadership. Richard Stephens had previously been an SCL Trustee. He is currently operating the Law Office of Richard Stephens, where he is able to apply his specialisms of…
Robert Unslow explains why e-filing is inevitable and suggests ways to make its advance more welcome. He also calls on SCL members to join the debate on e-filing….
David Blunt QC and Michael Taylor of 4 Pump Court examine the use of termination clauses and focus on the material, the irremediable and other types of breach….
Clive Freedman reviews the steps which can be taken to improve the chances of a mediation of an IT dispute being successful, following the IT Disputes Group meeting on 29 September at which this topic was discussed. Part 1 of this article was published in the February/March 2004 edition of the magazine….
Read More… from Mediation of IT Disputes: Avoiding Pitfalls (Part 2)
Mark Turner and Dominic Callaghan condense the new government model contracts and guidance and highlight the key points….
Read More… from New Contract Guidance for Government IT Projects
Michael Gilbert examines outsourcing in India and the tax breaks that enhance its appeal….
Business acquisitions typically involve the up-front review of target-related information, sometimes by several potential buyers. The information reviewed during such ‘due diligence’ exercise may include customer data and employee files, which are likely to constitute ‘personal data’ under EU data privacy rules. The need for effective compliance with EU data privacy rules in the context of business transfers is often neglected, exposing both sellers and potential buyers to possible private claims and/or public sanctions. Wim Nauwelaerts takes a look at how EU data privacy law impacts on the preparatory stage of mergers and acquisitions….
Read More… from Mergers & Acquisitions In Europe: Diligence is Due When Disclosing Personal Data
Sandra Potter, Phil Farrelly and Adam Todhunter highlight the dangers of the easy access that is the inevitable companion of wireless technology….