SCL Event Report: Foundations of IT Law Programme – Module 5: Risk, Cyber-threat and Computer Misuse
Laura Bruin reports on the fifth module in SCL’s Foundation of IT Law, which took place on 2 July 2014…
Laura Bruin reports on the fifth module in SCL’s Foundation of IT Law, which took place on 2 July 2014…
Inspired by the recent call to change eBay passwords, Mark Weston reflects on the remedies available to users, and the absence of real remedies…
Read More… from Pass the Word: What recourse do consumers have when their passwords are compromised?
The National Crime Agency has announced details of what it describes an unprecedented UK operation to aid the global strike against Blackshades malware…
Claire Andrews and Lucy Dillon report on the SCL KM Group meeting of 25 February 2014…
Sarah Pearce, Jonny McDonald and Katy Whitfield take a close look at the interface between apps and privacy, wondering whether it is time for privacy regulation to really bite….
Read More… from Is 2014 the Year UK Privacy Law Catches up with Mobile App Developers?
The Legal Software Suppliers Association has issued a warning to law firms, especially those still dependent on Microsoft Windows XP, to be vigilant against cyber threats and to keep technology up to date…
Gareth Dickson explains what the recent CJEU ruling really means, as the Court clarifies when a computer program is not a ‘computer program’. Gareth goes on to consider the practical implications of the limited guidance given by the Court….
Read More… from Game Over for Excessive TPM?: The Nintendo Ruling
According to a Curia press release, the ECJ has ruled that circumventing a protection system of a games console may, in certain circumstances, be lawful and that the manufacturer of the console is protected against circumvention only in the case where the protection measures seek to prevent illegal use of games…
Read More… from ECJ Judgment on Circumvention of Games Console Protection
Kuan Hon examines the best approach to take when applying data protection rules in a cloud computing context. She argues that the current EU focus on location is inappropriate and that logical control is what counts….
Read More… from Cloud Computing: Geography or Technology – Virtualisation and Control
This is a selection of predictions for 2014 from expert IT lawyers. We also asked about surprises and IT law expectations that never were fulfilled. For the full set of predictions, see our online ‘Predictions 2014’ blog….