European Commission publishes EU Cybersecurity Taxonomy The European Commission has recently published a revision of its cybersecurity taxonomy guidelines. The taxonomy aims to provide a clear definition of the cybersecurity context, its domains of application, research and knowledge. It proposes a high level set of definitions and categorisation domains so that they can be used…
Cybersecurity for Lawyers: 3 – Your website
In another of our series of “Back to Basics” articles, adapted from the Cybersecurity for Lawyers wiki he has recently started, Neil Brown explains how to ensure your website is secure….
Reflections on 2019: Convergence, Incursion and Contradictions
Kicking off our Predictions, Reflections and Resolutions in earnest, Anna Cook and Vik Khurana of Bristows reflect on how technology has featured in society in 2019, touching on announcements by tech companies, investigations by regulators and pitches by political leaders….
Read More… from Reflections on 2019: Convergence, Incursion and Contradictions
FSB reports on financial stability implications of BigTech and cloud services
Cloud services report concludes that there do not appear to be immediate financial stability risks arising from the use of cloud services by financial institutions….
Read More… from FSB reports on financial stability implications of BigTech and cloud services
Key Takeaways from the SCL Outsourcing Masterclass – Wednesday 20 November 2019, London
A summary of the key learning outcomes from the recent SCL Outsourcing Masterclass from Rebecca Andersen, Max Harris, Martha Crnkovic, Neelum Dass, and Ralph Giles….
Farming: Computer law’s new (rather old) frontier
Dr Fernando Barrio reveals a crop of IP, data and privacy issues associated with new techniques in agricultural production….
Read More… from Farming: Computer law’s new (rather old) frontier
ICO consults on right of access guidance
Comments requested by 12 February 2020…
Pseudonymisation best practices and techniques: ENISA publishes recommendations
Report explores the basic concepts of pseudonymisation, as well as technical solutions that can support implementation in practice….
Read More… from Pseudonymisation best practices and techniques: ENISA publishes recommendations
Cybersecurity for Lawyers: 2 – Using Wifi at home and aboard
In the second of our series of “Back to Basics” articles, adapted from the Cybersecurity for Lawyers wiki he has recently started, Neil Brown gives some practical tips on using wi-fi when out and about and setting it up in-house….
Read More… from Cybersecurity for Lawyers: 2 – Using Wifi at home and aboard
This week’s Techlaw News Round-Up
Update on proposed E-privacy Regulation The Transport, Telecommunications and Energy Council of the EU recently discussed the draft E-Privacy Regulation. The draft regulation is subject to concerns about issues such as the role of the European Data Protection Board, preventing child abuse imagery, protecting terminal equipment information, data retention and interaction with new technologies. These…