This presentation explores the risk facing all charities and businesses if adequate thought is not given to the protection and security of one of its most treasured assets, its website.
The EU’s General Data Protection Regulation (GDPR) is the most significant change to consumer privacy laws in decades and the enforcement date is approximately 1 month away. The standards for data collection and use in the EU will significantly differ from those in the United States. This session will breakdown the differences and discuss methods for compliance going forward.
PRESENTER
Gary Kibel, Partner, Davis & Gilbert LLP @GaryKibel
As a follow up to our recent GDPR event, we have compiled a few frequently asked questions and answers to help you further understand what is expected when GDPR is introduced on the 25th May 2018.
EXPERT WEBINAR: GDPR One Year Later — What Can We Learn from Investigations a...Feroot
Join James Tumbridge, a lawyer with the specialist law firm Venner Shipley and one of the authors of the UK Data Protection Act 2018, and Ivan Tsarynny, CEO & Founder of Feroot Privacy, to discuss the unique data protection laws of EU jurisdictions and the potential impact regulations can have on your business operations, expansion plans and governance structure.
Topics for discussion include:
- Lessons learned from the courts, regulator inquiries and fines over the past year
- How to stay informed of current privacy regulations by learning about those who have been impacted already
- Significant trends in GDPR behaviours
- An overview of jurisdictional regulations & how to best prepare
- Key issues to keep in mind for governance, corporate structures and domiciles in data protection terms
[CB20] Law Enforcement Access to Transborder Data: Global Reach of the Propos...CODE BLUE
The increasingly sophisticated realm of crime involves challenges related to digital evidence, and employing such evidence in court, as well as actors, actions, or substantial effects that are wholly or in some part located or have been carried out in different jurisdictions. Access to relevant evidence is essential both for the conviction of criminals and for the protection of those wrongly accused. However, due to the decentralised nature of cyberspace, the targeted evidence may be residing in multiple jurisdictions at once or it may be impossible to identify the location at all at a given time (e.g. in the case of cloud computing).
This presentation examines a range of traditional and novel tools aimed at ensuring law enforcement agencies’ cross-border access to evidence such as the Mutual Legal Assistance framework, and the initiatives in the European Union (notably the e-Evidence proposal), Council of Europe (the Budapest Convention) and in the United States. The discussion then moves on to relevant principles of international law such as territorial sovereignty, and seeks to examine the possible global reach and effect on other regions of the EU e-Evidence proposal.
The EU’s General Data Protection Regulation (GDPR) is the most significant change to consumer privacy laws in decades and the enforcement date is approximately 1 month away. The standards for data collection and use in the EU will significantly differ from those in the United States. This session will breakdown the differences and discuss methods for compliance going forward.
PRESENTER
Gary Kibel, Partner, Davis & Gilbert LLP @GaryKibel
As a follow up to our recent GDPR event, we have compiled a few frequently asked questions and answers to help you further understand what is expected when GDPR is introduced on the 25th May 2018.
EXPERT WEBINAR: GDPR One Year Later — What Can We Learn from Investigations a...Feroot
Join James Tumbridge, a lawyer with the specialist law firm Venner Shipley and one of the authors of the UK Data Protection Act 2018, and Ivan Tsarynny, CEO & Founder of Feroot Privacy, to discuss the unique data protection laws of EU jurisdictions and the potential impact regulations can have on your business operations, expansion plans and governance structure.
Topics for discussion include:
- Lessons learned from the courts, regulator inquiries and fines over the past year
- How to stay informed of current privacy regulations by learning about those who have been impacted already
- Significant trends in GDPR behaviours
- An overview of jurisdictional regulations & how to best prepare
- Key issues to keep in mind for governance, corporate structures and domiciles in data protection terms
[CB20] Law Enforcement Access to Transborder Data: Global Reach of the Propos...CODE BLUE
The increasingly sophisticated realm of crime involves challenges related to digital evidence, and employing such evidence in court, as well as actors, actions, or substantial effects that are wholly or in some part located or have been carried out in different jurisdictions. Access to relevant evidence is essential both for the conviction of criminals and for the protection of those wrongly accused. However, due to the decentralised nature of cyberspace, the targeted evidence may be residing in multiple jurisdictions at once or it may be impossible to identify the location at all at a given time (e.g. in the case of cloud computing).
This presentation examines a range of traditional and novel tools aimed at ensuring law enforcement agencies’ cross-border access to evidence such as the Mutual Legal Assistance framework, and the initiatives in the European Union (notably the e-Evidence proposal), Council of Europe (the Budapest Convention) and in the United States. The discussion then moves on to relevant principles of international law such as territorial sovereignty, and seeks to examine the possible global reach and effect on other regions of the EU e-Evidence proposal.
6 Lesson GDPR Booklet from Varonis to help stay get compliant and stay compliant.
-Locate your sensitive data
-Prevent data breaches
-Rapidly alert to suspicious behavior
-Build long-term data Security
[CB20] Life After Privacy Shield – Will Data Transfer Laws Stop the World Doi...CODE BLUE
This presentation will look at the history of the Schrems litigation and the recent ECJ case decision referred from Ireland. My film here gives some background https://bit.ly/pshielddead. This has been called the most significant litigation in the history of data transfer and involved an Austrian law student succeeding against the might of both Facebook and the US government. It’s a gripping story and one that I’ve followed for more than 6 years now but it has important lessons for global business.
The talk will also look into the political difficulties facing data transfer from the EU to the US. We’ll then look at some additional questions posed by the judgment and the current political climate:
- Will Trump build bridges?
- How will this be resolved?
- What does this mean for other jurisdictions including Russia and China?
- What does this mean for Japan?
- Can national security and data protection ever survive together?
- Why has data transfer become so political?
- How can corporations in Japan minimise their risk?
USA and Europe (EU) do have a different way of looking into privacy. This PPT is about who is responsible and what kind of rules are in place. This is a A Medved Consultants LLC Presentation. This may not be considered as a legal advice.
iStart feature: Protect and serve how safe is your personal data?Hayden McCall
The revelations of the Heartbleed vulnerability in April and the recent implementation of Australia’s new privacy regime in March have put data breaches firmly back in the limelight. Clare Coulson finds out more...
EU GDPR Lesson 1 - What is the GDPR? Why do we need it?
EU GDPR Lesson 2 - Data Protection by Design and by Default
EU GDPR Lesson 3 - The Right To Be Forgotten
EU GDPR Lesson 4 - Who Does the EU GDPR Apply?
EU GDPR Lesson 5 - What Happens if I Don’t Comply with the EU GDPR?
EU GDPR Lesson 6 - Next Steps - How to Get There?
Over the past few years of monitoring the development of the EU General Data Protection Regulation (GDPR) and its effects on technology, we’ve distilled the parts of the regulation that most affect your business into this practical guide.
European Data Protection and Social NetworkingDavid Erdos
These slides explore significant issues arising under data protection for both users and platforms as a result of the publication of third party personal data on such sites. Although the GDPR’s new wording of the household exemption could potentially exclude non-intrusive processing (e.g. sharing innocuous pictures taken in public), the Court of Justice of the EU (CJEU) is increasingly insistent that users acquire responsibilities when the publish such data to an indeterminate number. In principle, most EU Data Protection Authorities (DPAs) accept this although others including the UK and Irish have been very resistant. Many users could therefore have weighty data protection obligations here, although if contributing to a collective public debate they may be covered by the journalistic/special expression derogation and in any case there is a need for a balance with freedom of expression. CJEU ʻjoint controllerʼ case law also points to social networking sites have their own duties here, a proposition which has been backed by Working Party, the UK DPA and the UK courts. Whilst the e-Commerce ʻhostʼ shield should significantly limit ex ante responsibility here, this must be tempered by the ʻduty of careʼ which is inherent in being a ʻcontrollerʼ under data protection. In sum, data protection in principle remains central to the regulation of ʻonline harmsʼ here although ensuring effective and well-balanced regulation in practice remains a formidable challenge.
See further:
“Intermediary Publishers and European data protection: Delimiting the ambit of responsibility for third-party rights through a synthetic interpretation of the EU acquis”, International Journal of Law and Information Technology (Vol. 26(3), pp. 189-225) (2018) - https://academic.oup.com/ijlit/article/26/3/189/5033541
“Beyond ʻHaving a Domesticʼ? Regulatory Interpretation of European Data Protection Law and Individual Publication”, Computer Law and Security Review (Vol. 33 (3), pp. 275-297) (2017) - Pre-print https://www.repository.cam.ac.uk/handle/1810/263883
Are you ready for the General Data Protection Regulation?
VILT has compiled this Frequently Asked Questions document. Read about what it is and how we can help.
This presentation focuses to the rising prominence of insurance considerations—and more particularly—to legal aspects of insurance as it relates to cybersecurity and privacy.
The presentation defines "Cyber and Privacy Insurance” and organizes such insurance into four main types of cyber insurance coverage: data breach and privacy management coverage, multimedia liability coverage, extortion liability coverage, and network security liability coverage. With these definitions, the presentation then gives snapshot of how the Cyber Insurance Market Is Maturing, its participants, costs, and related attributes.
Consideration is given to the importance of defined terms, before launching into difficulties that providers and users have relative to measuring, modeling, and pricing cyber insurance risk. Particular attention is given to the language of “claims” and how to navigate through associated risk/cost analyses and cost structures.
Additionally, general considerations, pre-conditions, cost of compliance, business interruption, governing board oversight and related issues are brought together is a cohesive manner.
What is GDPR, the EU’s new facts protection law? What is the GDPR? Europe’s new information privateness and safety regulation consist of heaps of pages’ really worth of new necessities for companies around the world. This GDPR summary can help you understand the law and determine what components of it follow to you. The General information Protection Regulation (GDPR) is the toughest privacy and safety regulation in the world.
A simple, beautiful guide to understanding GDPR (General Data Protection Regulation).
All businesses in the UK and EU need to comply with GDPR by the 25th of May 2018 or risk hefty fines.
Use this free, visual guide to understand how you need to comply.
We'll be looking at what your customers' rights are, privacy by design, breach notifications, data security and more.
Finally, we'll give you a GDPR action checklist so you can take right steps to comply with the legislation in time.
Linking Data: The Legal Implications - SemTech2010mleyden
To date most of the focus on the Semantic Web has, quite rightly, been focused on the enabling technologies. However, as the technologies are becoming more mainstream, and as ever increasing volumes of Linked Data is produced, the implications of linking this data becomes more of an issue. This presentation highlights some of the current thinking as to the possible legal implications of linking data while discussing some solutions that are emerging.
Marketing data management | The new way to think about your dataLaurence
Organisations are at a place where opportunity beckons but, all too often, the gesture is obscured by the confusion that surrounds data compliance. Instead of seeing the benefits that can be found in the regulations, such as the General Data Protection Regulation (GDPR), that are being introduced, companies take a retracted view that turns inward, seeing only where these policies cause hindrance rather than the value they can add.
Legal & General Surveying Services have published an article in their magazine Perspective on The General Data Protection Regulation (GDPR), due April of next year, which will govern how businesses process individuals’ data across all EU member countries, eventually replacing the UK’s Data Protection Act.
[Privacy Webinar Slides] Global Enforcement PrioritiesTrustArc
To watch the full on-demand webinar recording please visit: https://info.truste.com/WB-2016-05-19-Insight-Series-Global-Privacy-Enforcement-Priorities_RegPage-OnDemand.html
As the scope of EU law extends its reach globally, we are also seeing greater international regulatory co-operation. Whether it’s the FTC, the FCC or European DPAs - global privacy regulators are taking steps to prioritize and address top concerns that affect everyone on a global scale.
In this on-demand webinar the speakers will:
• Review the latest case law and enforcement actions from the last 12 months
• Address the impact of the rise of activism and the role of individuals like Max Schrems who have forced legal changes
• Provide their perspectives on future outcomes and how to keep your company out of the regulatory spotlight
Register to watch this on-demand webinar now to to learn how to keep your company out of the regulatory spotlight: https://info.truste.com/WB-2016-05-19-Insight-Series-Global-Privacy-Enforcement-Priorities_RegPage-OnDemand.html
6 Lesson GDPR Booklet from Varonis to help stay get compliant and stay compliant.
-Locate your sensitive data
-Prevent data breaches
-Rapidly alert to suspicious behavior
-Build long-term data Security
[CB20] Life After Privacy Shield – Will Data Transfer Laws Stop the World Doi...CODE BLUE
This presentation will look at the history of the Schrems litigation and the recent ECJ case decision referred from Ireland. My film here gives some background https://bit.ly/pshielddead. This has been called the most significant litigation in the history of data transfer and involved an Austrian law student succeeding against the might of both Facebook and the US government. It’s a gripping story and one that I’ve followed for more than 6 years now but it has important lessons for global business.
The talk will also look into the political difficulties facing data transfer from the EU to the US. We’ll then look at some additional questions posed by the judgment and the current political climate:
- Will Trump build bridges?
- How will this be resolved?
- What does this mean for other jurisdictions including Russia and China?
- What does this mean for Japan?
- Can national security and data protection ever survive together?
- Why has data transfer become so political?
- How can corporations in Japan minimise their risk?
USA and Europe (EU) do have a different way of looking into privacy. This PPT is about who is responsible and what kind of rules are in place. This is a A Medved Consultants LLC Presentation. This may not be considered as a legal advice.
iStart feature: Protect and serve how safe is your personal data?Hayden McCall
The revelations of the Heartbleed vulnerability in April and the recent implementation of Australia’s new privacy regime in March have put data breaches firmly back in the limelight. Clare Coulson finds out more...
EU GDPR Lesson 1 - What is the GDPR? Why do we need it?
EU GDPR Lesson 2 - Data Protection by Design and by Default
EU GDPR Lesson 3 - The Right To Be Forgotten
EU GDPR Lesson 4 - Who Does the EU GDPR Apply?
EU GDPR Lesson 5 - What Happens if I Don’t Comply with the EU GDPR?
EU GDPR Lesson 6 - Next Steps - How to Get There?
Over the past few years of monitoring the development of the EU General Data Protection Regulation (GDPR) and its effects on technology, we’ve distilled the parts of the regulation that most affect your business into this practical guide.
European Data Protection and Social NetworkingDavid Erdos
These slides explore significant issues arising under data protection for both users and platforms as a result of the publication of third party personal data on such sites. Although the GDPR’s new wording of the household exemption could potentially exclude non-intrusive processing (e.g. sharing innocuous pictures taken in public), the Court of Justice of the EU (CJEU) is increasingly insistent that users acquire responsibilities when the publish such data to an indeterminate number. In principle, most EU Data Protection Authorities (DPAs) accept this although others including the UK and Irish have been very resistant. Many users could therefore have weighty data protection obligations here, although if contributing to a collective public debate they may be covered by the journalistic/special expression derogation and in any case there is a need for a balance with freedom of expression. CJEU ʻjoint controllerʼ case law also points to social networking sites have their own duties here, a proposition which has been backed by Working Party, the UK DPA and the UK courts. Whilst the e-Commerce ʻhostʼ shield should significantly limit ex ante responsibility here, this must be tempered by the ʻduty of careʼ which is inherent in being a ʻcontrollerʼ under data protection. In sum, data protection in principle remains central to the regulation of ʻonline harmsʼ here although ensuring effective and well-balanced regulation in practice remains a formidable challenge.
See further:
“Intermediary Publishers and European data protection: Delimiting the ambit of responsibility for third-party rights through a synthetic interpretation of the EU acquis”, International Journal of Law and Information Technology (Vol. 26(3), pp. 189-225) (2018) - https://academic.oup.com/ijlit/article/26/3/189/5033541
“Beyond ʻHaving a Domesticʼ? Regulatory Interpretation of European Data Protection Law and Individual Publication”, Computer Law and Security Review (Vol. 33 (3), pp. 275-297) (2017) - Pre-print https://www.repository.cam.ac.uk/handle/1810/263883
Are you ready for the General Data Protection Regulation?
VILT has compiled this Frequently Asked Questions document. Read about what it is and how we can help.
This presentation focuses to the rising prominence of insurance considerations—and more particularly—to legal aspects of insurance as it relates to cybersecurity and privacy.
The presentation defines "Cyber and Privacy Insurance” and organizes such insurance into four main types of cyber insurance coverage: data breach and privacy management coverage, multimedia liability coverage, extortion liability coverage, and network security liability coverage. With these definitions, the presentation then gives snapshot of how the Cyber Insurance Market Is Maturing, its participants, costs, and related attributes.
Consideration is given to the importance of defined terms, before launching into difficulties that providers and users have relative to measuring, modeling, and pricing cyber insurance risk. Particular attention is given to the language of “claims” and how to navigate through associated risk/cost analyses and cost structures.
Additionally, general considerations, pre-conditions, cost of compliance, business interruption, governing board oversight and related issues are brought together is a cohesive manner.
What is GDPR, the EU’s new facts protection law? What is the GDPR? Europe’s new information privateness and safety regulation consist of heaps of pages’ really worth of new necessities for companies around the world. This GDPR summary can help you understand the law and determine what components of it follow to you. The General information Protection Regulation (GDPR) is the toughest privacy and safety regulation in the world.
A simple, beautiful guide to understanding GDPR (General Data Protection Regulation).
All businesses in the UK and EU need to comply with GDPR by the 25th of May 2018 or risk hefty fines.
Use this free, visual guide to understand how you need to comply.
We'll be looking at what your customers' rights are, privacy by design, breach notifications, data security and more.
Finally, we'll give you a GDPR action checklist so you can take right steps to comply with the legislation in time.
Linking Data: The Legal Implications - SemTech2010mleyden
To date most of the focus on the Semantic Web has, quite rightly, been focused on the enabling technologies. However, as the technologies are becoming more mainstream, and as ever increasing volumes of Linked Data is produced, the implications of linking this data becomes more of an issue. This presentation highlights some of the current thinking as to the possible legal implications of linking data while discussing some solutions that are emerging.
Marketing data management | The new way to think about your dataLaurence
Organisations are at a place where opportunity beckons but, all too often, the gesture is obscured by the confusion that surrounds data compliance. Instead of seeing the benefits that can be found in the regulations, such as the General Data Protection Regulation (GDPR), that are being introduced, companies take a retracted view that turns inward, seeing only where these policies cause hindrance rather than the value they can add.
Legal & General Surveying Services have published an article in their magazine Perspective on The General Data Protection Regulation (GDPR), due April of next year, which will govern how businesses process individuals’ data across all EU member countries, eventually replacing the UK’s Data Protection Act.
[Privacy Webinar Slides] Global Enforcement PrioritiesTrustArc
To watch the full on-demand webinar recording please visit: https://info.truste.com/WB-2016-05-19-Insight-Series-Global-Privacy-Enforcement-Priorities_RegPage-OnDemand.html
As the scope of EU law extends its reach globally, we are also seeing greater international regulatory co-operation. Whether it’s the FTC, the FCC or European DPAs - global privacy regulators are taking steps to prioritize and address top concerns that affect everyone on a global scale.
In this on-demand webinar the speakers will:
• Review the latest case law and enforcement actions from the last 12 months
• Address the impact of the rise of activism and the role of individuals like Max Schrems who have forced legal changes
• Provide their perspectives on future outcomes and how to keep your company out of the regulatory spotlight
Register to watch this on-demand webinar now to to learn how to keep your company out of the regulatory spotlight: https://info.truste.com/WB-2016-05-19-Insight-Series-Global-Privacy-Enforcement-Priorities_RegPage-OnDemand.html
2016 was an important year for privacy on many fronts. From Privacy Shield to the imminent arrival of a new U.S. president; from Brexit to ongoing breach law developments; and from FCC changes for ISPs to the upcoming arrival of GDPR—there wasn’t a single dull moment. In this eLunch, Winston’s Privacy & Data Security Practice Chair Liisa Thomas and Partner Rob Newman looked back at 2016 and discussed what to expect in the privacy world in 2017 and beyond.
The Unseen Enemy - Protecting the Brand, the Assets and the Customers BDO_Consulting
Michael Barba and Jeff Hall discuss the most pressing cyber-threats facing retailers and what companies can do in the event of a cyber breach, data loss or claim. Mr. Barba is a managing director and Mr. Hall is a senior manager with BDO Consulting.
How your nonprofit can avoid data breaches and ensure privacyTechSoup Canada
Increasingly, nonprofits hold large quantities of digital assets (such as donor information, grant application details, financial records, etc.). Organizations of all sizes and industries are being targeted by cyber criminals. Cyber-attacks will often devastate an organization’s operations and have significant financial, legal and reputational consequences.
In this webinar, Imran Ahmad of Miller Thomson, LLP will explain how implementing best practices from a pre-breach standpoint can go a long way to mitigate the negative consequences of a cyber-attack.
What you will learn:
- what the cyber threat landscape looks like
- how to ensure privacy of your digital assets
- steps to take in the aftermath of a cyber-attack
The Countdown is on: Key Things to Know About the GDPRCase IQ
The EU’s General Data Protection Regulation (GDPR) comes into effect on May 25th. This powerful legislation strengthens data privacy laws in Europe and has implications for companies all over the world that store, process or transfer the information of the EU’s citizens.
Failure to comply with the regulation can expose a company to fines based on global revenue and reputation damage, yet many companies are struggling to comply in time.
Join information security expert and CEO/Founder of AsTech Consulting, Greg Reber, as he walks participants through a plan for GDPR compliance.
All levels of society rely upon information technology systems. Network operations are pervasive and impact nearly every aspect of our society. The desire of companies to collect, use, store, and secure information about customers, employees, and other individuals is a requirement of the new economy. It is no wonder that the prevalence of electronic communications and a growing dependency on cyber structures and operations also create potential vulnerabilities to cyberattacks. It is critical to preserve information systems and address and prevent weaknesses in cyber protection efforts. This webinar examines the means for companies to reach data goals ethically, efficiently and legally. Best practices and model comprehensive privacy and cybersecurity policies are discussed. And, data breach response and related litigation, including class action litigation issues and fiduciary duty violations under corporate law, are discussed.
To view the accompanying webinar, go to:
https://www.financialpoise.com/financial-poise-webinars/data-privacy-compliance-2020/
Your focus to date is likely to have been on your organisation’s use of personal data. However, it is really important that you don’t forget your contracts – specifically any data processing contracts that you have (or should have) in place with a data processor, such as a payment processor or payroll service.
Social Media and Your Staff by Brian Miller and Jean Boyle, solicitors at Sto...Brian Miller, Solicitor
Brian Miller and Jean Boyle, solicitors at Stone King take you through the legal implication of using social media and how to ensure your staff are aware of the consequences of using it in your organisation.
Brian Miller, a solicitor and partner at Stone King LLP, goes through the new changes in the law as of 1 October 2015 which all businesses and organisations who deal with consumers need to know to ensure they are legally compliant.
Cloud computing is now ubiquitous in all areas of commerce and the third sector and is easy to set up, use and cheap to buy.
But should you just press the button and install, or are there more things to think about?
Brian Miller, solicitor and partner at Stone King LLP, takes a look at the important issues to consider before getting into bed with a cloud provider.
Brian Miller, solicitor and partner at Stone King LLP and Lauren Mitchum, trainee solicitor, provide a useful guide to ensuring your website is compliant with the law in all aspects, including advice on domain names, website content, disability discrimination, online terms, display of mandatory information, the impact of the Consumer Contracts Regulations, privacy policies and cookies, online advertising and the processing of payments
Are you concerned about whether your use of CCTV, whether in the classroom or workplace, is legal? Do you know what information people are legally entitled to request, if you use it? Kate Grimley Evans, solicitor at Stone King LLP, takes you through the basics of how to use CCTV legally and where to look for further advice.
Data Protection and the Cloud (Part 2) by Brian Miller Solicitor and Vicki Bo...Brian Miller, Solicitor
In a more detailed look at data protection, Vicki Bowles takes a look at the new draft EU Data Protection Regulation, disclosure and BYOD (Bring Your Own Device).
Brian Miller then covers ISO certification, how to check whether your vendor’s systems are secure, how US Safe Harbor worked in practice, how it will do so with the new Privacy Shield and the various certification/accreditation systems for cloud computing vendors.
Data Protection in the Age of BYOD and Social Media by Vicki Bowles (Barrister)Brian Miller, Solicitor
In this brief Part 2 introduction to all things data protection, Vicki Bowles looks at issues such as disclosure, BYOD (Bring Your Own Device) and the impact of social media.
Have you lost control of your brand since the arrival of social media? Are people abusing your good name? Is all lost or is there still a way to protect a brand's reputation? Brian Miller of solicitors Stone King takes a look at some of the ways you can effectively stop others from damaging your name and goodwill on social media.
What All Organisations Need to Know About Data Protection and Cloud Computing...Brian Miller, Solicitor
Solicitor Brian Miller and barrister Vicki Bowles explore the legal and security aspects of data protection and putting your data in the cloud. This is part one (basic) of a two part course on data protection and cloud computing.
Brian Miller, solicitor and partner at Stone King LLP takes you through from scratch how to create your profile (see separate video presentation entitled 'Creating Your LinkedIn Profile'*) and network successfully on social media network, LinkedIn.
Feel free to download to receive all of the notes to the presentation.
* on YouTube at http://youtu.be/AIBc9pogk2M
An Introduction to Intellectual Property by Brian Miller, Trademark Lawyer an...Brian Miller, Solicitor
A whistlestop tour to protecting your brand and intellectual property by registration of trademarks, design rights and domain names and the consequences of not doing so. Includes guidance on how to deal with cybersquatters, copyright and its exceptions, how to register trade marks, design rights and patents, use of databases and website compliance.
Protecting your IP and Data Trustee Responsibilities by Brian Miller (Solici...Brian Miller, Solicitor
From Ethics to Fraud. These slides focus on concerns about internet fraud and data protection faced by charities and other not-for-profit organisations. Session 2 of the 23rd Catholic Charity Conference. Chair - Richard Maitland, Sarasins, Melanie Roberts.Sarasins, Brian Miller, Stone King and Vicky Bowles, Stone King.
How to Prevent Your Organisation’s IP from Being Stolen by Brian Miller Solic...Brian Miller, Solicitor
A whistle stop tour on copyright, trade marks, design rights, patents, website compliance, data security and putting your data in the cloud, presented by IP lawyer Brian Miller, Solicitor.
A "File Trademark" is a legal term referring to the registration of a unique symbol, logo, or name used to identify and distinguish products or services. This process provides legal protection, granting exclusive rights to the trademark owner, and helps prevent unauthorized use by competitors.
Visit Now: https://www.tumblr.com/trademark-quick/751620857551634432/ensure-legal-protection-file-your-trademark-with?source=share
NATURE, ORIGIN AND DEVELOPMENT OF INTERNATIONAL LAW.pptxanvithaav
These slides helps the student of international law to understand what is the nature of international law? and how international law was originated and developed?.
The slides was well structured along with the highlighted points for better understanding .
Responsibilities of the office bearers while registering multi-state cooperat...Finlaw Consultancy Pvt Ltd
Introduction-
The process of register multi-state cooperative society in India is governed by the Multi-State Co-operative Societies Act, 2002. This process requires the office bearers to undertake several crucial responsibilities to ensure compliance with legal and regulatory frameworks. The key office bearers typically include the President, Secretary, and Treasurer, along with other elected members of the managing committee. Their responsibilities encompass administrative, legal, and financial duties essential for the successful registration and operation of the society.
In 2020, the Ministry of Home Affairs established a committee led by Prof. (Dr.) Ranbir Singh, former Vice Chancellor of National Law University (NLU), Delhi. This committee was tasked with reviewing the three codes of criminal law. The primary objective of the committee was to propose comprehensive reforms to the country’s criminal laws in a manner that is both principled and effective.
The committee’s focus was on ensuring the safety and security of individuals, communities, and the nation as a whole. Throughout its deliberations, the committee aimed to uphold constitutional values such as justice, dignity, and the intrinsic value of each individual. Their goal was to recommend amendments to the criminal laws that align with these values and priorities.
Subsequently, in February, the committee successfully submitted its recommendations regarding amendments to the criminal law. These recommendations are intended to serve as a foundation for enhancing the current legal framework, promoting safety and security, and upholding the constitutional principles of justice, dignity, and the inherent worth of every individual.
Car Accident Injury Do I Have a Case....Knowyourright
Every year, thousands of Minnesotans are injured in car accidents. These injuries can be severe – even life-changing. Under Minnesota law, you can pursue compensation through a personal injury lawsuit.
WINDING UP of COMPANY, Modes of DissolutionKHURRAMWALI
Winding up, also known as liquidation, refers to the legal and financial process of dissolving a company. It involves ceasing operations, selling assets, settling debts, and ultimately removing the company from the official business registry.
Here's a breakdown of the key aspects of winding up:
Reasons for Winding Up:
Insolvency: This is the most common reason, where the company cannot pay its debts. Creditors may initiate a compulsory winding up to recover their dues.
Voluntary Closure: The owners may decide to close the company due to reasons like reaching business goals, facing losses, or merging with another company.
Deadlock: If shareholders or directors cannot agree on how to run the company, a court may order a winding up.
Types of Winding Up:
Voluntary Winding Up: This is initiated by the company's shareholders through a resolution passed by a majority vote. There are two main types:
Members' Voluntary Winding Up: The company is solvent (has enough assets to pay off its debts) and shareholders will receive any remaining assets after debts are settled.
Creditors' Voluntary Winding Up: The company is insolvent and creditors will be prioritized in receiving payment from the sale of assets.
Compulsory Winding Up: This is initiated by a court order, typically at the request of creditors, government agencies, or even by the company itself if it's insolvent.
Process of Winding Up:
Appointment of Liquidator: A qualified professional is appointed to oversee the winding-up process. They are responsible for selling assets, paying off debts, and distributing any remaining funds.
Cease Trading: The company stops its regular business operations.
Notification of Creditors: Creditors are informed about the winding up and invited to submit their claims.
Sale of Assets: The company's assets are sold to generate cash to pay off creditors.
Payment of Debts: Creditors are paid according to a set order of priority, with secured creditors receiving payment before unsecured creditors.
Distribution to Shareholders: If there are any remaining funds after all debts are settled, they are distributed to shareholders according to their ownership stake.
Dissolution: Once all claims are settled and distributions made, the company is officially dissolved and removed from the business register.
Impact of Winding Up:
Employees: Employees will likely lose their jobs during the winding-up process.
Creditors: Creditors may not recover their debts in full, especially if the company is insolvent.
Shareholders: Shareholders may not receive any payout if the company's debts exceed its assets.
Winding up is a complex legal and financial process that can have significant consequences for all parties involved. It's important to seek professional legal and financial advice when considering winding up a company.
ALL EYES ON RAFAH BUT WHY Explain more.pdf46adnanshahzad
All eyes on Rafah: But why?. The Rafah border crossing, a crucial point between Egypt and the Gaza Strip, often finds itself at the center of global attention. As we explore the significance of Rafah, we’ll uncover why all eyes are on Rafah and the complexities surrounding this pivotal region.
INTRODUCTION
What makes Rafah so significant that it captures global attention? The phrase ‘All eyes are on Rafah’ resonates not just with those in the region but with people worldwide who recognize its strategic, humanitarian, and political importance. In this guide, we will delve into the factors that make Rafah a focal point for international interest, examining its historical context, humanitarian challenges, and political dimensions.
How to Obtain Permanent Residency in the NetherlandsBridgeWest.eu
You can rely on our assistance if you are ready to apply for permanent residency. Find out more at: https://immigration-netherlands.com/obtain-a-permanent-residence-permit-in-the-netherlands/.
2. LEGAL IMPLICATIONS OF A CYBER ATTACK
Introduction
Charities fourth most likely category of organisation to fail to
protect other’s data (behind health, local government and
education)
- in six months to March 2015, charities suffered 53 data breaches
- more than double amount in same period previous year
3. LEGAL IMPLICATIONS OF A CYBER ATTACK
Introduction
Wannacrypt virus affected
- up to 150 countries worldwide
- 48 NHS trusts, 13 NHS bodies
Elizabeth Denham, Information Commissioner, 18 January 2017:
“We’re going to have to change how we think about
data protection”.
4. SETTING THE SCENE
•Charity : Permeable Trust
•Helps disadvantaged school leavers
•Information collected
–the data subject’s
•age
•sex
•school
•ethnicity
•any health issues
– donor’s
• contact details
• bank account/credit card details
5. THE ATTACK
• Hackers from Russia break through firewall
• Website created using Wordpress, designed by
webdesigner EzyPage
• Personal details passed to junk mail sender
• Bank account/credit card details of donors
available on dark web
6. THE ATTACK
• Spoofed email sent in name of CEO
• Some employees open attachment
• Malware script locks down computer systems
• Message on screen: ransom of $5,000 in
bitcoins to unlock files
7. THE ATTACK
• Some contractors and volunteers receive email
at their own personal email address
• Own laptops and home computers become
infected
• Unable to use their own computers
• Some pay ransom: only half of data and
programs restored
8. QUESTIONS
1. What action (if any) can the Trust take against:
a. hosting company, iHost?
b. the web designer, EzyPage?
c. its outsourced IT company, CharityWare?
2. What action (if any) can data subjects take, namely:
a. school leavers?
b. donors?
9. QUESTIONS
3. Can contractors and volunteers do anything?
4. What losses might the Trust suffer in terms of
5. What steps can the Trust take to protect itself from claims
and fines in the future?
10. QUESTION 1: WHAT ACTION CAN THE
KING’S TRUST TAKE AGAINST:
a) The hosting company, iHost?
• hosting agreement requiring iHost to:
• “take appropriate technical and organisational
measures against accidental loss and unauthorised
access to data” (Data Protection Act, 7th Principle)
iHost ought to bear some responsibility
• if mail filtering outsourced
o iHost could legitimately argue done all it could
o Much will turn on agreement
11. QUESTION 1: WHAT ACTION CAN THE
KING’S TRUST TAKE AGAINST:
b) The Web Designer, EzyPage?
• Plugging known holes part of a
developer’s role?
• EzyPage may argue Wordpress’
responsibility
12. QUESTION 1: WHAT ACTION CAN THE
KING’S TRUST TAKE AGAINST:
• Look at contract terms:
o implied term under contract law to
exercise reasonable care and skill
o Failure = breach of contract
13. QUESTION 1: WHAT ACTION CAN THE
KING’S TRUST TAKE AGAINST:
c) The IT contractor, CharityWare
(“CW”)
• Trust dependent on CW selection
• Cause of action lies, dependent upon:
o any express contract terms
o whether attack preventable using
industry standard filtering software
o any implied duty to do so (as
before: SGSA, unless excluded)
14. QUESTION 2: WHAT ACTIONS CAN
AFFECTED DATA SUBJECTS TAKE AGAINST
THE TRUST?
a) School Leavers
Must show some kind of
detriment
Trust could find itself on wrong
end of a class action:
if average value of claim £1K
and 1,000 leavers =>
£1,000,000 claim
sensitive personal data:
aggravated damages
15. QUESTION 2: WHAT ACTIONS CAN
AFFECTED DATA SUBJECTS TAKE AGAINST
THE TRUST?
b) Donors
Claim similar to school leavers
Will have had to:
onotify bank/card company
omay need to change phone
number(s)
otake other remedial action
Depending on number, value of
claims potentially high
16. COULD THE DATA SUBJECTS TAKE ACTION
AGAINST IHOST?
a) Current Law
iHost = data processor
No direct action possible against data
processor
b) General Data Protection Regulation
Data subjects able to bring action
against processors
Subject to fines/other enforcement
measures from data protection
regulator
17. QUESTION 3: CONTRACTORS AND
VOLUNTEERS: WHERE DO THEY STAND?
Data subjects in Trust’s HR database
Losses happened as a result of a failure by Trust
=> breach of contract if anything about data loss
importance of limiting liability
contractors and/or volunteers to consider claims
18. QUESTION 4: WHAT OTHER LOSSES MIGHT
THE TRUST SUFFER?
a) Duty to Report
Charity must:
a) file a serious incident report (SIR)
with the Charities Commission
b) if breach sufficiently serious, notify
the ICO:
“serious”?
where either > 1,000 records
involved and/or
sensitive personal data has
been compromised
19. QUESTION 4: WHAT OTHER LOSSES MIGHT
THE TRUST SUFFER?
b) Fines and Penalties
Under Data Protection Act
-fine of up to £500K
-other sanctions
Under the GDPR,
o€20 million or
o4% of global annual turnover,
whichever greater
Data subjects can also bring civil
claims
Recent Fines by ICO (All) *
2014: 9 fines, totalling £668,500
2015: 18 fines, totalling >£2m
2016: 21 fines totalling >£2m
2017 (Charities alone) 11 fines (so far),
£138K
* IT Governance website
20. QUESTION 4: WHAT OTHER LOSSES MIGHT
THE TRUST SUFFER?
c. Damage to Reputation
Consequences of data breach:
• TalkTalk
• British Pregnancy Advisory Service
=> severe impact on a charity’s continued ability to
operate:
current donors
potential donors
21. QUESTION 5: HOW CAN TRUST PROTECT
ITSELF IN THE FUTURE?
a)Secure Your Data
b)Cyber Liability Insurance
c)Limit liability in Contracts
22. FURTHER INFORMATION
ICO Guide of Information Security
ICO’s Guide on Notifying Data Security Breaches
ICO Security Breach Notification Form
Thirteen Charities Fined in 2017 for Data Breaches
Cyber Liability Insurance Sample of Summary Cover
Sample Premiums for Cyber Liability Insurance
Data Protection Damages to Rise Exponentially
23. For further information about intellectual property, please see the
following articles by the presenter on Stone King’s website:
Ransomware: the cybercrime crippling businesses
How Can Charities Protect their Data in the Cloud
Ten Questions You Should Ask Your Cloud Provider
A Guide to the Consumer Rights Act
Brian Miller
Partner
IP, IT & Commercial
Stone King LLP
brianmiller@stoneking.co.uk
@theitsolicitor
brianmillersolicitor
BrianMillerSolicitor
+44 (0) 207 324 1523