BS7799 – Why is it important?
And why, asks Ian Mann of ECSC (e-commerce security consultants) is an IT security consultant contributing to a law publication?…
And why, asks Ian Mann of ECSC (e-commerce security consultants) is an IT security consultant contributing to a law publication?…
It was generally assumed that data which did not identify individuals fell outside the scope of the Data Protection Act 1998 and therefore the restrictions imposed on the use of “personal data” did not apply. However, recent legal guidance issued by the UK Information Commissioner has thrown this into doubt. Partner Nigel Wildish and assistant Marcus Turle, of the IT & E-commerce group at City law firm Field Fisher Waterhouse, discuss why data controllers may have to rethink how anonymous data are handled….
From his herd he culls, For slaughter, from the fairest of his bulls. Only the quote is from Dryden, the article is from Jeremy Warner of the University of Strathclyde. He undertakes an in-depth study of the development of the principle….
Last April the Performance and Innovation Unit, one of Whitehall’s most influential bodies, produced a report entitled “Privacy and data-sharing, the way forward for public services” (PIU report). The report took two years to write and its aim was to provide a ‘new strategic approach’ to the use of personal data held by the public sector. But there are some significant limitations in the report, not least poor analysis of the legal issues. Sarah Williams of Masons feels that questions remain about how the exchange of information can be justified and what the implications for privacy rights will be….
Read More… from Privacy and Data Sharing Implications of E-government: An Analysis of the PIU Report
In the wake of the offshore outsourcing phenomenon, Peter Hall, Bill Jones, Kevin Lowe and Patrick Brodie, partners at Wragge & Co LLP, look at the various structures that might be considered. The article looks especially at India and the special considerations, and tax breaks, which apply there….
Read More… from Offshore Outsourcing – Learning From Experience
Kit Burden explains why IT security matters, or should matter….
Read More… from What Every Technology Lawyer Needs to Know about IT Security
In internet commerce[1] where technology risks such as systems failure or attacks are particularly accentuated and the “risk turnaround time” is much faster, the need to design and develop a proactive and structured legal protection regime has become a corporate imperative. Zaid Hamzah points the way forward in designing and developing a legal risk management system in Internet commerce at both the strategic as well as the operational level that would protect enterprises from legal problems that might flow from information security risks….
Read More… from Legal Aspects of Information Security Management
Professor Ewan McKendrick gave a lecture to the SCL London Group on 22 September covering certain developments in contract law as they affect IT lawyers. This is the edited text of that lecture. SCL is grateful to him, both for granting permission for the text to be made available on the Web site and for the considerable work involved in converting that text into this form. SCL is also grateful to Wordwave for its transcription of the lecture….
Eduardo Ustaran considers the required safeguards in contracts concerning transfer of data abroad…
Read More… from Transferring data through model contracts: original clauses v alternative clauses
Catherine Colston looks at the problems with database information retrieval and suggests a way forward….