Y2K Revisited

Historical events have always influenced the law and legal practice, which by their nature must adapt to societal and technological changes. For this 50th Anniversary edition of the magazine, we revisit a time when computers were just becoming a fundamental part of everyday life, and how the Y2K Bug (and especially the reaction and response…

Read More… from Y2K Revisited

Cyber Crime in Transition: Threat impact and investigation strategies

 As 2023 starts to draw to a close, it is an appropriate time to take stock of the Cyber landscape as it is and more specifically, threat actors that have been prevalent over the past year. With lower barriers to entry and an expansive risk environment, the cost of cyber-crime has reached £6.6 billion, surpassing…

Read More… from Cyber Crime in Transition: Threat impact and investigation strategies

BOOK REVIEW: Vulnerability and Data Protection Law

In the GDPR, the term “vulnerable” appears once. Recital 75 says that the risk to the rights and freedoms of natural persons may result from personal data processing of vulnerable natural persons in particular children, which could lead to physical, material, or non-material damage. What does “vulnerable” mean? Who is a vulnerable natural person, how…

Read More… from BOOK REVIEW: Vulnerability and Data Protection Law