<rss xmlns:a10="http://www.w3.org/2005/Atom" version="2.0" xmlns:authors="https://www.rpclegal.com/people/" xmlns:media="http://search.yahoo.com/mrss/" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Data &amp; cyber publications</title><link>https://www.rpclegal.com/rss/data-cyber-pub/</link><description>RPC Data &amp; Privacy RSS feed</description><language>en</language><item><guid isPermaLink="false">{8E079E40-1675-497E-A0D9-DBE32E36CF0C}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/cyber-bytes-issue-79/</link><title>Cyber_Bytes - Issue 79</title><description><![CDATA[<p style="margin-left: 0cm;"><strong>RPC Cyber app: Breach counsel at your fingertips </strong></p>
<p>As cyber-attacks and follow-on litigation continue to be a board-level issue for organisations worldwide, the RPC Cyber_ App provides a one-stop-shop resource for cyber breach assistance and pre-breach preparedness. As well as information about RPC's cyber-related expertise, the app also contains guidance on prevention against common incidents and access to our ongoing cyber market insights.</p>
<p>RPC Cyber_ can be downloaded for free from the <strong><a href="https://sites-rpc.vuturevx.com/e/dek60r5rqj0ofg/c6a96b5a-7ad3-4833-9b3a-84e40b911323">Apple Store</a></strong> or <strong><a href="https://sites-rpc.vuturevx.com/e/desesojsfqhcq/c6a96b5a-7ad3-4833-9b3a-84e40b911323">Google Play Store</a></strong>.</p>
<p />
<p><strong>Information Commissioner Backs Cyber Security and Resilience Bill: Calls for Clear Secondary Legislation, Proactive Oversight and Adequate Resourcing</strong></p>
<p>On 23 December 2025, the Information Commissioner issued his response to the Cyber Security and Resilience (Network and Information Systems) Bill, expressing broad support for the reforms to bolster the UK’s cyber defences. The Bill significantly broadens its remit beyond operators of essential services and relevant digital service providers to include relevant managed service providers and designated critical suppliers, reflecting the interconnected nature of modern digital supply chains.</p>
<p>For certain key areas of infrastructure, the Bill signals a shift from a reactive approach to a proactive, risk‑based oversight, backed by enhanced powers: wider information‑gathering, strengthened information‑sharing gateways with safeguards across regulators and government, new regulatory enforcement powers, and an expanded cost‑recovery framework to fund day‑to‑day supervision, inspections and enforcement.</p>
<p>At the same time, the Commissioner underscores that key operational details will be set through secondary legislation, including thresholds for what constitutes a “significant impact” for incident reporting, baseline security and resilience requirements, criteria and duties for “critical suppliers”, the application of penalties, and further enhancements to information‑gathering to support risk prioritisation.</p>
<p>Read more from the ICO <strong><a href="https://sites-rpc.vuturevx.com/e/geiap8t4majdva/c6a96b5a-7ad3-4833-9b3a-84e40b911323">here</a></strong>.</p>
<p />
<p><strong>Data (Use and Access) Act 2025: key changes in force from 5 February 2026</strong></p>
<p>Most of the privacy‑related provisions of the Data (Use and Access) Act 2025 (DUAA) are now in force, through the DUAA (Commencement No. 6 and Transitional and Saving Provisions) Regulations 2026 (SI 2026/82). The bulk of the data protection and privacy reforms under Part 5 of the DUAA take effect from 5 February 2026, amending the UK GDPR and the Data Protection Act 2018.</p>
<p>The commencement regulations also contain important transitional provisions. Existing time limits for responding to data subject requests continue to apply where a controller received the request before section 76 DUAA came into force, and the pre‑existing penalty notice regime will continue to govern cases where the ICO issued a notice of intent before the new penalty provisions (section 101) commence. Organisations will need to factor these transitional rules into their handling of ongoing requests, complaints and investigations.</p>
<p>Section 103 DUAA 2025, together with Schedule 10, will introduce a new statutory requirement for controllers to establish and operate internal processes for handling privacy complaints from data subjects. Section 103 and Schedule 10 are scheduled to commence in June 2026.</p>
<p>With the main DUAA privacy provisions now in force, organisations subject to UK GDPR and the DPA 2018 should:</p>
<ul style="list-style-type: disc;">
    <li>review and update their data protection compliance frameworks (including lawful bases, transparency wording, data subject rights handling, automated decision‑making and international transfers);</li>
    <li>assess and, where necessary, enhance governance and record‑keeping to reflect the ICO’s strengthened information‑gathering and enforcement powers; and</li>
    <li>begin work on formalising privacy complaint‑handling processes ahead of the June 2026 commencement of section 103.</li>
</ul>
<p>To access the statutory instrument bringing these provisions into force, click <strong><a href="https://sites-rpc.vuturevx.com/e/zge6eqs9cvy32qg/c6a96b5a-7ad3-4833-9b3a-84e40b911323">here</a> </strong>and to read more about the commencement update by Practical Law click <strong><a href="https://sites-rpc.vuturevx.com/e/1fuowocbemsfpg/c6a96b5a-7ad3-4833-9b3a-84e40b911323">here</a></strong>.</p>
<p />
<p><strong>ICO reprimands GP for sending 23 years of medical records to their insurer</strong></p>
<p>The ICO has issued a reprimand to Staines Health Group, an NHS GP surgery, after it disclosed an excessive amount of a terminally ill patient’s medical history to their insurance company. The insurer had requested five years of records, via the patient, to support an insurance claim. However, the practice sent 23 years of medical records directly to the insurer. The patient believes the unnecessary disclosure of historic medical information contributed to a reduced pay‑out on their claim.</p>
<p>The ICO found that the incident stemmed from basic governance failures, including the absence of clear written procedures for handling insurance‑related information requests and a lack of regular refresher data protection training for staff. In response, the surgery completed a significant event report, introduced written guidance and sign‑off processes for insurance requests, updated staff training, and placed the responsible staff member under supervision following a warning.</p>
<p>The ICO is using the reprimand to remind organisations of the need for clear processes, quality assurance checks before sharing personal data externally, and up‑to‑date training when handling particularly sensitive health information.</p>
<p>Click <strong><a href="https://sites-rpc.vuturevx.com/e/g8ee0o1xfdjc5gg/c6a96b5a-7ad3-4833-9b3a-84e40b911323">here</a> </strong>to read the ICO news.</p>
<p />
<p><strong>Government Cyber Action Plan: central direction, accountability and skills to “Defend as One”</strong></p>
<p>On 6 January 2026, the UK Government published its Government Cyber Action Plan, setting out a strong, centralised model to secure public services so they are “trustworthy and resilient”. Led by a newly formed Government Cyber Unit within DSIT and supported by the Government Cyber Coordination Centre (GC3) and NCSC, the plan prioritises four strategic objectives:</p>
<ul style="list-style-type: disc;">
    <li>better visibility of cyber and digital resilience risk;</li>
    <li>addressing severe and complex risks that cannot be managed by a single organisation;</li>
    <li>improving responsiveness to fast‑moving events;</li>
    <li>rapidly increasing government‑wide resilience.</li>
</ul>
<p>A phased implementation runs to 2029, with near‑term deliverables including the Government Cyber Incident Response Plan, expanded detection and incident learning capabilities, a pipeline of shared services and support, and a new Government Cyber Profession to attract, upskill and retain talent.</p>
<p>For public bodies, the plan means clearer expectations, mandatory policies and standards, and greater central support, but also firmer assurance and reporting. Departments will be held to documented risk appetites, annual strategy reviews and regular exercising of incident response and restoration plans, with GC3 coordinating cross‑government response and operating a single incident repository to embed lessons learned.</p>
<p>For suppliers and managed service providers, security requirements will be embedded more consistently into contracts and regulators will pursue a “Defend as One” approach to threat detection, vulnerability management and information sharing. In practice, organisations should accelerate secure‑by‑design adoption, tackle legacy risks, prepare for post‑quantum cryptography, strengthen SOC/detection capabilities, and harden supplier oversight and contractual flow‑downs.</p>
<p>Access the Action Plan through gov.uk <strong><a href="https://sites-rpc.vuturevx.com/e/pdkmvibildmggiw/c6a96b5a-7ad3-4833-9b3a-84e40b911323">here</a></strong>.</p>
<p />
<p><strong>Pro-Russia hacktivist activity continues to target UK organisations</strong></p>
<p>The NCSC has issued fresh warnings that Russian-aligned hacktivist groups are continuing to target UK organisations, particularly local authorities and operators of critical national infrastructure, with disruptive denial of service (DoS) and distributed denial of service (DDoS) attacks. Groups such as NoName057(16), active since March 2022, are conducting ideologically motivated operations against entities in NATO states and other European countries perceived as hostile to Russian interests. Although these attacks are often technically simple, the NCSC notes that successful disruption can have significant operational impact by taking websites and online services offline, including those supporting operational technologies.</p>
<p>In response, the NCSC is urging all organisations to review and harden their DDoS defences. Recommended actions include:</p>
<ul style="list-style-type: disc;">
    <li>understanding where services are vulnerable to resource exhaustion (and which suppliers are responsible);</li>
    <li>ensuring upstream protections are in place with ISPs, DDoS mitigation providers and content delivery networks;</li>
    <li>building services so they can scale rapidly under load; and</li>
    <li>having clear, tested response plans that allow for graceful degradation while maintaining administrative access.</li>
</ul>
<p />
<p>The NCSC also stresses the importance of regular testing and monitoring so organisations can detect and respond quickly when attacks begin. Access the NSCS's core <a href="https://sites-rpc.vuturevx.com/e/p8eowcfpbslhta/c6a96b5a-7ad3-4833-9b3a-84e40b911323">DoS guidance</a> and <a href="https://sites-rpc.vuturevx.com/e/8ckk2ijyhooyq/c6a96b5a-7ad3-4833-9b3a-84e40b911323">heightened cyber threat collection</a>.</p>
<p>To read more from NCSC, click <strong><a href="https://sites-rpc.vuturevx.com/e/be6wstzk6jbcq/c6a96b5a-7ad3-4833-9b3a-84e40b911323">here</a></strong>.</p>]]></description><pubDate>Mon, 23 Feb 2026 12:09:00 Z</pubDate><category>Data and privacy</category><authors:names>Richard Breavington, Daniel Guilfoyle, Rachel Ford, Ian Dinning, Christopher Ashton, Elizabeth Zang, Emanuele Santella , Lauren Kerr</authors:names><enclosure url="https://www.rpclegal.com/-/media/rpc/images/thinking-tiles/wide/301136-website-perspective-tiles-final-wide-715x370px_03_tech-media-and-telecoms_1479965309.jpg?rev=90c8954e27284fb9aa1cd4880b3da014&amp;hash=2EE8DB6F22FB54F74DB0B5A026068801" type="image/jpeg" medium="image" /><content:encoded><![CDATA[<p style="margin-left: 0cm;"><strong>RPC Cyber app: Breach counsel at your fingertips </strong></p>
<p>As cyber-attacks and follow-on litigation continue to be a board-level issue for organisations worldwide, the RPC Cyber_ App provides a one-stop-shop resource for cyber breach assistance and pre-breach preparedness. As well as information about RPC's cyber-related expertise, the app also contains guidance on prevention against common incidents and access to our ongoing cyber market insights.</p>
<p>RPC Cyber_ can be downloaded for free from the <strong><a href="https://sites-rpc.vuturevx.com/e/dek60r5rqj0ofg/c6a96b5a-7ad3-4833-9b3a-84e40b911323">Apple Store</a></strong> or <strong><a href="https://sites-rpc.vuturevx.com/e/desesojsfqhcq/c6a96b5a-7ad3-4833-9b3a-84e40b911323">Google Play Store</a></strong>.</p>
<p />
<p><strong>Information Commissioner Backs Cyber Security and Resilience Bill: Calls for Clear Secondary Legislation, Proactive Oversight and Adequate Resourcing</strong></p>
<p>On 23 December 2025, the Information Commissioner issued his response to the Cyber Security and Resilience (Network and Information Systems) Bill, expressing broad support for the reforms to bolster the UK’s cyber defences. The Bill significantly broadens its remit beyond operators of essential services and relevant digital service providers to include relevant managed service providers and designated critical suppliers, reflecting the interconnected nature of modern digital supply chains.</p>
<p>For certain key areas of infrastructure, the Bill signals a shift from a reactive approach to a proactive, risk‑based oversight, backed by enhanced powers: wider information‑gathering, strengthened information‑sharing gateways with safeguards across regulators and government, new regulatory enforcement powers, and an expanded cost‑recovery framework to fund day‑to‑day supervision, inspections and enforcement.</p>
<p>At the same time, the Commissioner underscores that key operational details will be set through secondary legislation, including thresholds for what constitutes a “significant impact” for incident reporting, baseline security and resilience requirements, criteria and duties for “critical suppliers”, the application of penalties, and further enhancements to information‑gathering to support risk prioritisation.</p>
<p>Read more from the ICO <strong><a href="https://sites-rpc.vuturevx.com/e/geiap8t4majdva/c6a96b5a-7ad3-4833-9b3a-84e40b911323">here</a></strong>.</p>
<p />
<p><strong>Data (Use and Access) Act 2025: key changes in force from 5 February 2026</strong></p>
<p>Most of the privacy‑related provisions of the Data (Use and Access) Act 2025 (DUAA) are now in force, through the DUAA (Commencement No. 6 and Transitional and Saving Provisions) Regulations 2026 (SI 2026/82). The bulk of the data protection and privacy reforms under Part 5 of the DUAA take effect from 5 February 2026, amending the UK GDPR and the Data Protection Act 2018.</p>
<p>The commencement regulations also contain important transitional provisions. Existing time limits for responding to data subject requests continue to apply where a controller received the request before section 76 DUAA came into force, and the pre‑existing penalty notice regime will continue to govern cases where the ICO issued a notice of intent before the new penalty provisions (section 101) commence. Organisations will need to factor these transitional rules into their handling of ongoing requests, complaints and investigations.</p>
<p>Section 103 DUAA 2025, together with Schedule 10, will introduce a new statutory requirement for controllers to establish and operate internal processes for handling privacy complaints from data subjects. Section 103 and Schedule 10 are scheduled to commence in June 2026.</p>
<p>With the main DUAA privacy provisions now in force, organisations subject to UK GDPR and the DPA 2018 should:</p>
<ul style="list-style-type: disc;">
    <li>review and update their data protection compliance frameworks (including lawful bases, transparency wording, data subject rights handling, automated decision‑making and international transfers);</li>
    <li>assess and, where necessary, enhance governance and record‑keeping to reflect the ICO’s strengthened information‑gathering and enforcement powers; and</li>
    <li>begin work on formalising privacy complaint‑handling processes ahead of the June 2026 commencement of section 103.</li>
</ul>
<p>To access the statutory instrument bringing these provisions into force, click <strong><a href="https://sites-rpc.vuturevx.com/e/zge6eqs9cvy32qg/c6a96b5a-7ad3-4833-9b3a-84e40b911323">here</a> </strong>and to read more about the commencement update by Practical Law click <strong><a href="https://sites-rpc.vuturevx.com/e/1fuowocbemsfpg/c6a96b5a-7ad3-4833-9b3a-84e40b911323">here</a></strong>.</p>
<p />
<p><strong>ICO reprimands GP for sending 23 years of medical records to their insurer</strong></p>
<p>The ICO has issued a reprimand to Staines Health Group, an NHS GP surgery, after it disclosed an excessive amount of a terminally ill patient’s medical history to their insurance company. The insurer had requested five years of records, via the patient, to support an insurance claim. However, the practice sent 23 years of medical records directly to the insurer. The patient believes the unnecessary disclosure of historic medical information contributed to a reduced pay‑out on their claim.</p>
<p>The ICO found that the incident stemmed from basic governance failures, including the absence of clear written procedures for handling insurance‑related information requests and a lack of regular refresher data protection training for staff. In response, the surgery completed a significant event report, introduced written guidance and sign‑off processes for insurance requests, updated staff training, and placed the responsible staff member under supervision following a warning.</p>
<p>The ICO is using the reprimand to remind organisations of the need for clear processes, quality assurance checks before sharing personal data externally, and up‑to‑date training when handling particularly sensitive health information.</p>
<p>Click <strong><a href="https://sites-rpc.vuturevx.com/e/g8ee0o1xfdjc5gg/c6a96b5a-7ad3-4833-9b3a-84e40b911323">here</a> </strong>to read the ICO news.</p>
<p />
<p><strong>Government Cyber Action Plan: central direction, accountability and skills to “Defend as One”</strong></p>
<p>On 6 January 2026, the UK Government published its Government Cyber Action Plan, setting out a strong, centralised model to secure public services so they are “trustworthy and resilient”. Led by a newly formed Government Cyber Unit within DSIT and supported by the Government Cyber Coordination Centre (GC3) and NCSC, the plan prioritises four strategic objectives:</p>
<ul style="list-style-type: disc;">
    <li>better visibility of cyber and digital resilience risk;</li>
    <li>addressing severe and complex risks that cannot be managed by a single organisation;</li>
    <li>improving responsiveness to fast‑moving events;</li>
    <li>rapidly increasing government‑wide resilience.</li>
</ul>
<p>A phased implementation runs to 2029, with near‑term deliverables including the Government Cyber Incident Response Plan, expanded detection and incident learning capabilities, a pipeline of shared services and support, and a new Government Cyber Profession to attract, upskill and retain talent.</p>
<p>For public bodies, the plan means clearer expectations, mandatory policies and standards, and greater central support, but also firmer assurance and reporting. Departments will be held to documented risk appetites, annual strategy reviews and regular exercising of incident response and restoration plans, with GC3 coordinating cross‑government response and operating a single incident repository to embed lessons learned.</p>
<p>For suppliers and managed service providers, security requirements will be embedded more consistently into contracts and regulators will pursue a “Defend as One” approach to threat detection, vulnerability management and information sharing. In practice, organisations should accelerate secure‑by‑design adoption, tackle legacy risks, prepare for post‑quantum cryptography, strengthen SOC/detection capabilities, and harden supplier oversight and contractual flow‑downs.</p>
<p>Access the Action Plan through gov.uk <strong><a href="https://sites-rpc.vuturevx.com/e/pdkmvibildmggiw/c6a96b5a-7ad3-4833-9b3a-84e40b911323">here</a></strong>.</p>
<p />
<p><strong>Pro-Russia hacktivist activity continues to target UK organisations</strong></p>
<p>The NCSC has issued fresh warnings that Russian-aligned hacktivist groups are continuing to target UK organisations, particularly local authorities and operators of critical national infrastructure, with disruptive denial of service (DoS) and distributed denial of service (DDoS) attacks. Groups such as NoName057(16), active since March 2022, are conducting ideologically motivated operations against entities in NATO states and other European countries perceived as hostile to Russian interests. Although these attacks are often technically simple, the NCSC notes that successful disruption can have significant operational impact by taking websites and online services offline, including those supporting operational technologies.</p>
<p>In response, the NCSC is urging all organisations to review and harden their DDoS defences. Recommended actions include:</p>
<ul style="list-style-type: disc;">
    <li>understanding where services are vulnerable to resource exhaustion (and which suppliers are responsible);</li>
    <li>ensuring upstream protections are in place with ISPs, DDoS mitigation providers and content delivery networks;</li>
    <li>building services so they can scale rapidly under load; and</li>
    <li>having clear, tested response plans that allow for graceful degradation while maintaining administrative access.</li>
</ul>
<p />
<p>The NCSC also stresses the importance of regular testing and monitoring so organisations can detect and respond quickly when attacks begin. Access the NSCS's core <a href="https://sites-rpc.vuturevx.com/e/p8eowcfpbslhta/c6a96b5a-7ad3-4833-9b3a-84e40b911323">DoS guidance</a> and <a href="https://sites-rpc.vuturevx.com/e/8ckk2ijyhooyq/c6a96b5a-7ad3-4833-9b3a-84e40b911323">heightened cyber threat collection</a>.</p>
<p>To read more from NCSC, click <strong><a href="https://sites-rpc.vuturevx.com/e/be6wstzk6jbcq/c6a96b5a-7ad3-4833-9b3a-84e40b911323">here</a></strong>.</p>]]></content:encoded></item><item><guid isPermaLink="false">{5B908F83-94D3-4B4D-A52F-7BB2AB704A67}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/cyber-bytes-issue-78/</link><title>Cyber_Bytes - Issue 78</title><description><![CDATA[<p><strong>RPC Cyber app: Breach counsel at your fingertips </strong></p>
<p>As cyber-attacks and follow-on litigation continue to be a board-level issue for organisations worldwide, the RPC Cyber_ App provides a one-stop-shop resource for cyber breach assistance and pre-breach preparedness. As well as information about RPC's cyber-related expertise, the app also contains guidance on prevention against common incidents and access to our ongoing cyber market insights.</p>
<p>RPC Cyber_ can be downloaded for free from the <strong><a href="https://sites-rpc.vuturevx.com/e/rke28ftxrb0bja/aea8d938-b0ff-418c-b15e-7e277f621312">Apple Store</a></strong> or <strong><a href="https://sites-rpc.vuturevx.com/e/yleqkefxcixebbw/aea8d938-b0ff-418c-b15e-7e277f621312">Google Play Store</a></strong>.</p>
<p><img alt="" width="1" height="1" src="file:///C:/Users/lb13/AppData/Local/Temp/msohtmlclip1/01/clip_image001.gif" style="border-width: 0px; border-style: solid;" /><strong>Cyber Security and Resilience Bill Introduced to UK Parliament: Strengthening the Digital Backbone</strong></p>
<p>On 12 November 2025, the UK government introduced the Cyber Security and Resilience Bill to Parliament. The Bill aims to fortify national defences against cyberattacks by updating the Network and Information Systems Regulations 2018 so that they are more consistent with the European NIS2.</p>
<p>Key changes:</p>
<ul style="list-style-type: disc;">
    <li>Expanded scope to include medium and large IT service providers, data centres and their third-party suppliers;</li>
    <li>Increased security controls required when managing essential services and smart energy systems;</li>
    <li>Reporting obligations are stricter, in particular, notifiable incidents must be reported to the effected organisation's regulator and the National Cyber Security Centre within 24 hours, followed by a full report within 72 hours;</li>
    <li>Enhanced penalties introduced through higher and turnover-based maximums for serious breaches.</li>
</ul>
<p>Regulated organisations will face stricter compliance obligations, increased reporting requirements, and greater scrutiny of supply chain security.  </p>
<p>The Cyber Security and Resilience Bill is expected to pass within the next year, but organisations should actively monitor its progress and prepare for compliance through early engagement.</p>
<p>Read more through the House of Commons Library <strong><a href="https://sites-rpc.vuturevx.com/e/pkcn2oqikngm8g/aea8d938-b0ff-418c-b15e-7e277f621312">here</a></strong>.</p>
<p><img alt="" width="1" height="1" src="file:///C:/Users/lb13/AppData/Local/Temp/msohtmlclip1/01/clip_image001.gif" style="border-width: 0px; border-style: solid;" /><strong>EU Digital Omnibus Package: A New Era for Data and AI Regulation</strong></p>
<p>On 19 November, the European Commission published its Digital Omnibus Package ('the Package'), proposing updates to key legislation, including:</p>
<ul style="list-style-type: disc;">
    <li>GDPR</li>
    <li>ePrivacy Directive</li>
    <li>Data Governance Act, and</li>
    <li>AI Act.</li>
</ul>
<p>The Package signals a shift in the EU’s approach to data and artificial intelligence regulation, by aiming to harmonise compliance standards, reduce administrative burdens, and support innovation in risk management and cyber resilience.</p>
<p>Notable proposed reforms include:</p>
<ol>
    <li>a narrowed definition of personal data, which clarifies that information is not personal data for an organisation if that organisation has no realistic way to identify the person to whom it relates;</li>
    <li>streamlined data subject access request processes, with new powers to refuse or charge for excessive or non-genuine requests;</li>
    <li>breach notification thresholds to data protection authorities (Article 33 GDPR) being raised to align with Article 34 GDPR, requiring notification only where incidents are likely to result in a 'high risk' to individuals; and</li>
    <li>establishment of a single-entry notification system to centralise reporting obligations to regulators across multiple EU regulations, including the GDPR, NIS 2, DORA, CER and eIDAS.</li>
</ol>
<p>For AI, the Package expands legitimate interest grounds as a legal basis under the GDPR where personal data processing is necessary for the controller's interest in the context of the development and operation of AI. It also proposes the introduction of regulatory sandboxes, aimed at enabling businesses to innovate under regulatory oversight.</p>
<p>Click <strong><a href="https://sites-rpc.vuturevx.com/e/rwkm1xx0slvgja/aea8d938-b0ff-418c-b15e-7e277f621312">here</a></strong> and <strong><a href="https://sites-rpc.vuturevx.com/e/cyuclpakkw8imtw/aea8d938-b0ff-418c-b15e-7e277f621312">here</a></strong> to read the proposals by the European Commission.</p>
<p><img alt="" width="1" height="1" src="file:///C:/Users/lb13/AppData/Local/Temp/msohtmlclip1/01/clip_image001.gif" style="border-width: 0px; border-style: solid;" /><strong>British Security Minister Proposes with National Security Exemptions to Ransomware Payment Ban</strong></p>
<p>On 2 September, the UK Government proposed a ransomware payment ban for public sector and critical national infrastructure organisations, as well as obligations for other businesses to notify the Government of any intention to pay a ransom demand.  </p>
<p>However, British Security Minister Dan Jarvis has recently proposed a 'national security exemption' to the ban. The legislative proposal is still pending agreement across the Government, but Dan Jarvis has acknowledged that the ban may have series consequences for UK businesses, stating “that’s why we’re looking very carefully at national security exemptions, because we don’t want people to be facing an invidious choice between a hospital shutting down or going to jail.”</p>
<p>Click <strong><a href="https://sites-rpc.vuturevx.com/e/hkgkiuvfrdudlw/aea8d938-b0ff-418c-b15e-7e277f621312">here</a></strong> to read more by Infosecurity Magazine.</p>
<p><img alt="" width="1" height="1" src="file:///C:/Users/lb13/AppData/Local/Temp/msohtmlclip1/01/clip_image001.gif" style="border-width: 0px; border-style: solid;" /><strong>The Post Office data breach</strong></p>
<p>On 3 December, the ICO issued a reprimand to the Post Office following an “entirely preventable” data breach that disclosed personal information about 502 people involved in the Horizon IT scandal. The incident arose when an unredacted legal settlement document (containing names, home addresses and postmaster status) was mistakenly published on the Post Office’s corporate website for almost two months.</p>
<p>The ICO found the Post Office had failed to implement appropriate technical and organisational measures, highlighting the absence of documented policies and quality assurance for web publication and insufficient staff training, including no specific guidance on information sensitivity or publishing practices.</p>
<p>You can read the news on the ICO website <strong><a href="https://sites-rpc.vuturevx.com/e/svueecpr5op3mqw/aea8d938-b0ff-418c-b15e-7e277f621312">here</a></strong>.</p>
<p><img alt="" width="1" height="1" src="file:///C:/Users/lb13/AppData/Local/Temp/msohtmlclip1/01/clip_image001.gif" style="border-width: 0px; border-style: solid;" /><strong>ICO right of access guidance: what it is, key principles and what it means for businesses</strong></p>
<p>The ICO has recently published guidance on how organisations must handle data subject access requests (DSARs) under the UK GDPR and Data Protection Act 2018.</p>
<p>Key principles include: accountability in being able to justify decisions; reasonable and proportionate searches; and careful application of exemptions. The guidance explains when and how exemptions may apply. These include to protect the rights of others, legal professional privilege, management forecasting, negotiations with the requester or where disclosure would prejudice crime/taxation functions. The guidance also explains when a “neither confirm nor deny” response may be used. It sets out specific approaches for third‑party data, children’s requests and special categories of information in health, education and social work. It also covers handling information in emails and archives, deleted data, unstructured manual records held by public authorities, and enforcement risks.</p>
<p>The practical implications for businesses are an increased need to prepare and to standardise DSAR response capability. This includes: the establishment of policies on applying exemptions, third‑party redaction, and format/secure delivery; maintenance of logs and evidence of decisions; and ensuring information management (naming, retention and deletion) supports timely, accurate responses.</p>
<p>Read the detailed ICO guidance <strong><a href="https://sites-rpc.vuturevx.com/e/dpkgm2ffyl1msag/aea8d938-b0ff-418c-b15e-7e277f621312">here</a></strong>.</p>
<p><img alt="" width="1" height="1" src="file:///C:/Users/lb13/AppData/Local/Temp/msohtmlclip1/01/clip_image001.gif" style="border-width: 0px; border-style: solid;" /><strong>The European Commission clarifies ‘important’ and ‘critical’ product categories under the Cyber Resilience Act</strong></p>
<p>The European Commission has published an Implementing Regulation relating to the Cyber Resilience Act (CRA). The regulation provides a non-exhaustive list of products with digital elements whose core functionality matches the technical description of specific important or critical products.</p>
<p>Manufacturers of in-scope products must implement the CRA’s cybersecurity requirements proportionately, undertake a comprehensive cybersecurity risk assessment and evidence how requirements are implemented, tested and assured. Where a product’s core functionality meets an 'important' or 'critical' category, stricter conformity routes apply, including mandatory third‑party assessment or certification in some cases.</p>
<p>Click <strong><a href="https://sites-rpc.vuturevx.com/e/eukudxafxikukqq/aea8d938-b0ff-418c-b15e-7e277f621312">here</a></strong> to access the implementing regulation.</p>
<p> </p>]]></description><pubDate>Mon, 22 Dec 2025 13:29:00 Z</pubDate><category>Data and privacy</category><authors:names>Richard Breavington, Daniel Guilfoyle, Rachel Ford, Ian Dinning, Christopher Ashton, Elizabeth Zang, Emanuele Santella , Lauren Kerr</authors:names><enclosure url="https://www.rpclegal.com/-/media/rpc/images/thinking-tiles/wide/301136-website-perspective-tiles-final-wide-715x370px_03_tech-media-and-telecoms_1479965309.jpg?rev=90c8954e27284fb9aa1cd4880b3da014&amp;hash=2EE8DB6F22FB54F74DB0B5A026068801" type="image/jpeg" medium="image" /><content:encoded><![CDATA[<p><strong>RPC Cyber app: Breach counsel at your fingertips </strong></p>
<p>As cyber-attacks and follow-on litigation continue to be a board-level issue for organisations worldwide, the RPC Cyber_ App provides a one-stop-shop resource for cyber breach assistance and pre-breach preparedness. As well as information about RPC's cyber-related expertise, the app also contains guidance on prevention against common incidents and access to our ongoing cyber market insights.</p>
<p>RPC Cyber_ can be downloaded for free from the <strong><a href="https://sites-rpc.vuturevx.com/e/rke28ftxrb0bja/aea8d938-b0ff-418c-b15e-7e277f621312">Apple Store</a></strong> or <strong><a href="https://sites-rpc.vuturevx.com/e/yleqkefxcixebbw/aea8d938-b0ff-418c-b15e-7e277f621312">Google Play Store</a></strong>.</p>
<p><img alt="" width="1" height="1" src="file:///C:/Users/lb13/AppData/Local/Temp/msohtmlclip1/01/clip_image001.gif" style="border-width: 0px; border-style: solid;" /><strong>Cyber Security and Resilience Bill Introduced to UK Parliament: Strengthening the Digital Backbone</strong></p>
<p>On 12 November 2025, the UK government introduced the Cyber Security and Resilience Bill to Parliament. The Bill aims to fortify national defences against cyberattacks by updating the Network and Information Systems Regulations 2018 so that they are more consistent with the European NIS2.</p>
<p>Key changes:</p>
<ul style="list-style-type: disc;">
    <li>Expanded scope to include medium and large IT service providers, data centres and their third-party suppliers;</li>
    <li>Increased security controls required when managing essential services and smart energy systems;</li>
    <li>Reporting obligations are stricter, in particular, notifiable incidents must be reported to the effected organisation's regulator and the National Cyber Security Centre within 24 hours, followed by a full report within 72 hours;</li>
    <li>Enhanced penalties introduced through higher and turnover-based maximums for serious breaches.</li>
</ul>
<p>Regulated organisations will face stricter compliance obligations, increased reporting requirements, and greater scrutiny of supply chain security.  </p>
<p>The Cyber Security and Resilience Bill is expected to pass within the next year, but organisations should actively monitor its progress and prepare for compliance through early engagement.</p>
<p>Read more through the House of Commons Library <strong><a href="https://sites-rpc.vuturevx.com/e/pkcn2oqikngm8g/aea8d938-b0ff-418c-b15e-7e277f621312">here</a></strong>.</p>
<p><img alt="" width="1" height="1" src="file:///C:/Users/lb13/AppData/Local/Temp/msohtmlclip1/01/clip_image001.gif" style="border-width: 0px; border-style: solid;" /><strong>EU Digital Omnibus Package: A New Era for Data and AI Regulation</strong></p>
<p>On 19 November, the European Commission published its Digital Omnibus Package ('the Package'), proposing updates to key legislation, including:</p>
<ul style="list-style-type: disc;">
    <li>GDPR</li>
    <li>ePrivacy Directive</li>
    <li>Data Governance Act, and</li>
    <li>AI Act.</li>
</ul>
<p>The Package signals a shift in the EU’s approach to data and artificial intelligence regulation, by aiming to harmonise compliance standards, reduce administrative burdens, and support innovation in risk management and cyber resilience.</p>
<p>Notable proposed reforms include:</p>
<ol>
    <li>a narrowed definition of personal data, which clarifies that information is not personal data for an organisation if that organisation has no realistic way to identify the person to whom it relates;</li>
    <li>streamlined data subject access request processes, with new powers to refuse or charge for excessive or non-genuine requests;</li>
    <li>breach notification thresholds to data protection authorities (Article 33 GDPR) being raised to align with Article 34 GDPR, requiring notification only where incidents are likely to result in a 'high risk' to individuals; and</li>
    <li>establishment of a single-entry notification system to centralise reporting obligations to regulators across multiple EU regulations, including the GDPR, NIS 2, DORA, CER and eIDAS.</li>
</ol>
<p>For AI, the Package expands legitimate interest grounds as a legal basis under the GDPR where personal data processing is necessary for the controller's interest in the context of the development and operation of AI. It also proposes the introduction of regulatory sandboxes, aimed at enabling businesses to innovate under regulatory oversight.</p>
<p>Click <strong><a href="https://sites-rpc.vuturevx.com/e/rwkm1xx0slvgja/aea8d938-b0ff-418c-b15e-7e277f621312">here</a></strong> and <strong><a href="https://sites-rpc.vuturevx.com/e/cyuclpakkw8imtw/aea8d938-b0ff-418c-b15e-7e277f621312">here</a></strong> to read the proposals by the European Commission.</p>
<p><img alt="" width="1" height="1" src="file:///C:/Users/lb13/AppData/Local/Temp/msohtmlclip1/01/clip_image001.gif" style="border-width: 0px; border-style: solid;" /><strong>British Security Minister Proposes with National Security Exemptions to Ransomware Payment Ban</strong></p>
<p>On 2 September, the UK Government proposed a ransomware payment ban for public sector and critical national infrastructure organisations, as well as obligations for other businesses to notify the Government of any intention to pay a ransom demand.  </p>
<p>However, British Security Minister Dan Jarvis has recently proposed a 'national security exemption' to the ban. The legislative proposal is still pending agreement across the Government, but Dan Jarvis has acknowledged that the ban may have series consequences for UK businesses, stating “that’s why we’re looking very carefully at national security exemptions, because we don’t want people to be facing an invidious choice between a hospital shutting down or going to jail.”</p>
<p>Click <strong><a href="https://sites-rpc.vuturevx.com/e/hkgkiuvfrdudlw/aea8d938-b0ff-418c-b15e-7e277f621312">here</a></strong> to read more by Infosecurity Magazine.</p>
<p><img alt="" width="1" height="1" src="file:///C:/Users/lb13/AppData/Local/Temp/msohtmlclip1/01/clip_image001.gif" style="border-width: 0px; border-style: solid;" /><strong>The Post Office data breach</strong></p>
<p>On 3 December, the ICO issued a reprimand to the Post Office following an “entirely preventable” data breach that disclosed personal information about 502 people involved in the Horizon IT scandal. The incident arose when an unredacted legal settlement document (containing names, home addresses and postmaster status) was mistakenly published on the Post Office’s corporate website for almost two months.</p>
<p>The ICO found the Post Office had failed to implement appropriate technical and organisational measures, highlighting the absence of documented policies and quality assurance for web publication and insufficient staff training, including no specific guidance on information sensitivity or publishing practices.</p>
<p>You can read the news on the ICO website <strong><a href="https://sites-rpc.vuturevx.com/e/svueecpr5op3mqw/aea8d938-b0ff-418c-b15e-7e277f621312">here</a></strong>.</p>
<p><img alt="" width="1" height="1" src="file:///C:/Users/lb13/AppData/Local/Temp/msohtmlclip1/01/clip_image001.gif" style="border-width: 0px; border-style: solid;" /><strong>ICO right of access guidance: what it is, key principles and what it means for businesses</strong></p>
<p>The ICO has recently published guidance on how organisations must handle data subject access requests (DSARs) under the UK GDPR and Data Protection Act 2018.</p>
<p>Key principles include: accountability in being able to justify decisions; reasonable and proportionate searches; and careful application of exemptions. The guidance explains when and how exemptions may apply. These include to protect the rights of others, legal professional privilege, management forecasting, negotiations with the requester or where disclosure would prejudice crime/taxation functions. The guidance also explains when a “neither confirm nor deny” response may be used. It sets out specific approaches for third‑party data, children’s requests and special categories of information in health, education and social work. It also covers handling information in emails and archives, deleted data, unstructured manual records held by public authorities, and enforcement risks.</p>
<p>The practical implications for businesses are an increased need to prepare and to standardise DSAR response capability. This includes: the establishment of policies on applying exemptions, third‑party redaction, and format/secure delivery; maintenance of logs and evidence of decisions; and ensuring information management (naming, retention and deletion) supports timely, accurate responses.</p>
<p>Read the detailed ICO guidance <strong><a href="https://sites-rpc.vuturevx.com/e/dpkgm2ffyl1msag/aea8d938-b0ff-418c-b15e-7e277f621312">here</a></strong>.</p>
<p><img alt="" width="1" height="1" src="file:///C:/Users/lb13/AppData/Local/Temp/msohtmlclip1/01/clip_image001.gif" style="border-width: 0px; border-style: solid;" /><strong>The European Commission clarifies ‘important’ and ‘critical’ product categories under the Cyber Resilience Act</strong></p>
<p>The European Commission has published an Implementing Regulation relating to the Cyber Resilience Act (CRA). The regulation provides a non-exhaustive list of products with digital elements whose core functionality matches the technical description of specific important or critical products.</p>
<p>Manufacturers of in-scope products must implement the CRA’s cybersecurity requirements proportionately, undertake a comprehensive cybersecurity risk assessment and evidence how requirements are implemented, tested and assured. Where a product’s core functionality meets an 'important' or 'critical' category, stricter conformity routes apply, including mandatory third‑party assessment or certification in some cases.</p>
<p>Click <strong><a href="https://sites-rpc.vuturevx.com/e/eukudxafxikukqq/aea8d938-b0ff-418c-b15e-7e277f621312">here</a></strong> to access the implementing regulation.</p>
<p> </p>]]></content:encoded></item><item><guid isPermaLink="false">{38FBBFF5-A2F3-4461-9108-6BF7B9300F0C}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/highlights-from-the-ico-dppc-2025/</link><title>It's a wrap! Highlights from the ICO DPPC 2025</title><description><![CDATA[The ICO held its annual Data Protection Practitioners' Conference (DPPC) on 14 October. With a packed agenda, eminent speakers and over 7,000 data protection professionals in attendance, it was one of the highlights of the privacy lawyer's year. Here we set out the key messages we took away from the conference.]]></description><pubDate>Tue, 25 Nov 2025 08:48:00 Z</pubDate><category>Data and privacy</category><authors:names>Cavan Fabris</authors:names><enclosure url="https://www.rpclegal.com/-/media/rpc/redesign-images/thinking-tiles/wide/data-and-cyber-1---thinking-tile-wide.jpg?rev=4b6dbfd0eb224470bc21a554b4cb58fd&amp;hash=7E983E679A0FF006CFC9E5543A132D05" type="image/jpeg" medium="image" /><content:encoded><![CDATA[<p><strong>Agility and certainty</strong></p>
<p>It was no surprise that the impact of AI was high in the agenda with John Edwards, in his keynote, calling the current pace of technological development unprecedented and that we must all adapt to change with agility. To assist businesses to do so, Edwards confirmed that the ICO is working hard to produce clear and useful guidance upfront. Focus will be on guidance for international transfers and automated decision-making, with complaints and recognised legitimate interests following thereafter. In addition to guidance, the ICO will be using all the regulatory tools available to them (eg audits, fines, reprimands and criminal prosecutions) to enforce the law.</p>
<p />
<p>Similarly, Edwards affirmed that the ICO will remain agile itself and pivot between trends that require scrutiny. The changes to the governance structure set in place by the Data (Use and Access) Act 2025 are expected to have little outward impact. In addition, the ICO is actively looking at using AI and automation to support its own processes. </p>
<p />
<p>The other keynote speaker, Ivana Bartoletti (Vice President and Chief AI Governance and Privacy Officer at Wipro) put forward that privacy professionals must be courageous and level-headed, standing between the business teams' extensive expectations of AI and the real risks it presents. She emphasised the importance of building a shared vocabulary of key privacy principles across multiple areas of a business (eg HR, IT etc) and having a global attitude towards governance. </p>
<p />
<p><strong>Focus on cybersecurity</strong></p>
<p>In the wake of multiple high-profile cyber breaches, there was a clear focus throughout the day on cyber security and organisations' response to breaches. Edwards reiterated that DPOs should be working closely with IT security teams to implement fundamental protections (technical and organisational) to reduce this risk. In particular, social engineering was highlighted, with a panel devoted to exploring the rise of social engineering and practical steps to prevent it. These included implementing deepfake detection systems and training, not assigning blame to encourage early detection, and working to safeguard the individual rather than just systems and processes. </p>
<p />
<p><strong>People-first approach</strong></p>
<p>A key theme running through the various speeches and sessions was the prioritisation of people and the impact of data protection on individuals' lives. Edwards called on organisations to keep people at the heart of change and development. For example, responding to data breaches with empathy and avoiding nuisance calls, especially to vulnerable people. One of the seminars later in the day carried on this theme with a presentation on the real stories behind complaints and how organisations can reduce bureaucratic process and improve the culture of complaints. </p>
<p />
<p><strong>Our thoughts</strong></p>
<p>The impression of the ICO we took away is very much of a nimble and progressive regulator who is keen to engage with companies but who will not hesitate to use the tools available to it to secure outcomes. The ICO <em>is</em> pro-innovation and pro-business, but does not want organisations to forget that they deal with real people who can suffer harm if privacy is not protected. This message is not new but has certainly been prioritised in the context of the rise of AI and cyber threats that can have damaging consequences for individuals if the right guardrails are not implemented. Privacy professionals have an increasingly important role in holding their teams to account and protecting public trust in their business.</p>]]></content:encoded></item><item><guid isPermaLink="false">{CB165B59-0948-4C53-8F8F-F9F828F92C20}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/cyber-bytes-issue-77/</link><title>Cyber_Bytes - Issue 77</title><description><![CDATA[<p><strong>RPC Cyber app: Breach counsel at your fingertips </strong></p>
<p>As cyber-attacks and follow-on litigation continue to be a board-level issue for organisations worldwide, the RPC Cyber_ App provides a one-stop-shop resource for cyber breach assistance and pre-breach preparedness. As well as information about RPC's cyber-related expertise, the app also contains guidance on prevention against common incidents and access to our ongoing cyber market insights.</p>
<p>RPC Cyber_ can be downloaded for free from the <strong><a href="https://sites-rpc.vuturevx.com/e/7r0k0xwzojodmg/abebe84a-fe94-493e-a4d3-4a405eb3862d">Apple Store</a></strong> or <strong><a href="https://sites-rpc.vuturevx.com/e/tusgqg2rsfcnda/abebe84a-fe94-493e-a4d3-4a405eb3862d">Google Play Store</a></strong>.</p>
<p><strong>UK government urges business leaders to prioritise cyber security amid rising threat</strong></p>
<p>In a ministerial letter dated 13 October 2025, addressed to CEOs and Chairs across the country, senior ministers and security officials highlight that cyber incidents are "growing more intense, frequent, sophisticated".  The letter warns of the risks this poses to economic and national security and encourages organisations to strengthen their resilience by:</p>
<ul style="margin-top: 0cm; list-style-type: disc;">
    <li>embedding cyber security into board-level decision-making and adopting recognised frameworks such as the Cyber Governance Code of Practice;</li>
    <li>registering for the National Cyber Security Centre’s Early Warning service; and</li>
    <li>requiring Cyber Essentials certification within their supply chains.</li>
</ul>
<p>The letter cites that over 90% of company boards now recognise cyber security as a critical priority. However, it is important to convert this awareness into practical action and these measures are intended to help companies address vulnerabilities and improve their ability to prevent, detect, and respond to cyber risks.</p>
<p>You can read more by clicking <strong><a href="https://sites-rpc.vuturevx.com/e/irk2zlls9ft87ow/abebe84a-fe94-493e-a4d3-4a405eb3862d">here</a></strong> for the Ministerial letter on the government website.</p>
<p><strong>ENISA Threat Landscape 2025: Ransomware, Phishing, and AI Shape Europe’s Cyber Risk</strong></p>
<p>The European Union Agency for Cybersecurity (ENISA) has released its annual Threat Landscape report which provides an overview of the evolving cyber risks facing organisations across Europe.</p>
<p>The report sets out that ransomware continues to be at the core of cyber intrusion activity. The report found that 96.3% of cybercrime activities targeting EU organisations included ransomware, with key target sectors being the manufacturing sector and digital infrastructure and services.  Attackers are increasingly professionalising their operations, employing double extortion tactics and targeting critical infrastructure sectors. Ransomware groups are not only seeking financial gain but also widespread operational disruption.</p>
<p>Phishing is identified as the primary method for initial compromise, accounting for 60% of observed cases.  The report also notes that attackers are increasingly leveraging phishing-as-a-service platforms. This allows less technically skilled actors to launch large-scale campaigns, which significantly raises the threat level. Furthermore, AI is being used to enhance the credibility and scale of campaigns. Phishing remains a persistent challenge due to its adaptability and effectiveness in bypassing organisational defences.</p>
<p>Overall, cyber risks are becoming more complex and interconnected, with ransomware, phishing, and AI-driven attacks at the forefront. Organisations are encouraged to remain vigilant and protect themselves from these persisting threats, for example, by taking a pro-active approach to assessing their operational and technical architecture, engaging in breach-readiness planning prior to a breach occurring and having cyber insurance in place to ensure they have access to a panel of specialist advisors, as well as support in meeting incident response costs, should they suffer a cyber incident.</p>
<p>Click <strong><a href="https://sites-rpc.vuturevx.com/email_handler.aspx?sid=abebe84a-fe94-493e-a4d3-4a405eb3862d&redirect=https%3a%2f%2fwww.enisa.europa.eu%2fsites%2fdefault%2ffiles%2f2025-10%2fENISA%2520Threat%2520Landscape%25202025.pdf&checksum=17937AE5">here</a></strong> to read the report by ENISA.</p>
<p><strong>ICO issues practical cyber security tips for small businesses</strong></p>
<p>The ICO has published new guidance to help small businesses strengthen their cyber security and better protect personal data. With government figures estimating 7.7 million cyber crimes against UK businesses over the past year, the ICO has urged organisations to review their security measures to ensure they are fit for purpose. The guidance highlights a range of practical steps, such as regularly backing up data, using strong and unique passwords, enabling multi-factor authentication, and limiting access to sensitive information. Businesses are also advised to dispose of old data and IT equipment securely, install and update anti-virus software, and ensure Wi-Fi connections are secure, especially when working remotely or using public networks.</p>
<p>Staff training is recommended to help employees spot suspicious emails and phishing attempts and to encourage caution when sharing screens or sending bulk emails. Organisations are reminded to lock devices when unattended and to suspend system access for staff who leave or are absent for extended periods. Safely removing personal data that is no longer necessary also reduces the risk in the event of a cyber-attack or breach.</p>
<p>These measures can make a meaningful impact in protecting both organisations and their customers from the potential effects of cyber incidents.</p>
<p>You can read the ICO guidance <strong><a href="https://sites-rpc.vuturevx.com/e/g5emrx7rkn2tp1w/abebe84a-fe94-493e-a4d3-4a405eb3862d">here</a></strong>. </p>
<p><span></span><strong>Jaguar Land Rover: Government steps in with £1.5bn loan guarantee as supply chain reels</strong></p>
<p>The fallout from the recent ransomware incident involving Jaguar Land Rover (JLR) continues to reverberate across the UK’s automotive sector. This has prompted intervention from the UK Government, who have announced a £1.5bn loan guarantee for JLR, aiming to safeguard thousands of jobs and support the supply chain.</p>
<p>The emergency measure will provide JLR with liquidity over the next five years. JLR, which employs 34,000 directly in the UK and supports around 120,000 jobs through its extensive supply chain, was forced to halt production after the ransomware incident took place in early September. The government is reportedly considering further measures, including the potential purchase of car components from struggling suppliers, to be sold back to JLR once production resumes.</p>
<p>It has been well reported that JLR did not have cyber insurance in place at the time of the attack.  JLR’s experience is likely to prompt renewed scrutiny of cyber risk management throughout the sector. Industry experts have noted that while cyber insurance uptake has increased across the FTSE 100, coverage remains patchy, with many firms weighing the cost against perceived risk. It is important for organisations to understand that cyber insurance can play an important part in providing financial and practical support in the event of a cyber incident.</p>
<p>As the automotive industry grapples with the ongoing consequences of the incident, the importance of robust cyber defences and effective risk transfer mechanisms has never been clearer. The UK Government’s intervention may offer a lifeline, but the episode serves as a stark warning of the cyber risks facing UK manufacturing.</p>
<p>Click <strong><a href="https://sites-rpc.vuturevx.com/e/qd0antcl7szbhw/abebe84a-fe94-493e-a4d3-4a405eb3862d">here</a></strong> to read more on this article by the Financial Times.</p>
<p><strong>Harrods shows incident response capability when it suffers second cyber incident in six months</strong></p>
<p>Harrods has found itself in the midst of a serious cyber incident once again, with personal data belonging to approximately 430,000 shoppers being stolen as part of a breach suffered by an undisclosed third-party supplier. The attack, discovered late September, is not linked to the earlier Scattered Spider incident that targeted Harrods in May, nor to the recent Salesloft Drift, Salesforce breach affecting other retailers.</p>
<p>Harrods has emphasised that the breach impacted only a small proportion of its customer base, as most clients favour in-store shopping over online transactions. No account passwords or payment details were accessed. The retailer has informed all affected customers and notified the relevant authorities, including the National Cyber Security Centre and the Metropolitan Police Cyber Crime unit.</p>
<p>Whilst Harrods' appears to have responded well to the incident – through clear incident steps, prompt notification and defined follow-up actions, the fact that its customers are being placed at risk for a second time demonstrates the importance of not just maintaining good practice in respect of internal processes but also being alert to any suppliers' processes. Even if an organisation has adequate security standards in place to protect its systems from a direct cyber attack, they can still be affected by security issues elsewhere in the supply chain.</p>
<p>You can read more <strong><a href="https://sites-rpc.vuturevx.com/e/vneiu5wvxc5ifq/abebe84a-fe94-493e-a4d3-4a405eb3862d">here</a></strong> through this article on computerweekly.</p>
<p><strong>Surging demand for Generative AI insurance: Businesses seek protection as risks and adoption accelerate</strong></p>
<p>A new report from Geneva Association, an international association which serves as a think tank for the global insurance industry, indicates that more than 90% of businesses worldwide are actively seeking insurance cover for risks associated with Generative AI (Gen AI).</p>
<p>As adoption of Gen AI accelerates, organisations recognise that traditional insurance policies may not sufficiently address the unique exposures created by AI, particularly as incidents involving defective outputs, biased recommendations or data breaches can have far-reaching consequences.</p>
<p>GenAI solutions are often sourced from third-party vendors. This reliance on third parties means that if an external AI product fails (whether through malfunction, inaccurate outputs, or operational disruption), the resulting losses are outside the control of an organisation, but may not be recoverable from the vendor, leaving the organisation potentially exposed. Traditional insurance policies may not fully cover all losses arising from Gen AI failure. With 71% of respondents to the Geneva Association report confirming they have already implemented Gen AI and two-thirds of businesses being willing to pay at least 10% higher premiums for such protections, this is an area of insurance that could potentially develop quickly.</p>
<p>By way of example, Hiscox have already updated their Tech PI wording to provide "<em>explicit cover for those who use, build and advise on artificial intelligence</em>", whilst AXA XL has created a Generative AI endorsement that can be added on to its cyber policies, which "<em>extends cover for specific risks that businesses may encounter when building out their own Gen AI model</em>". By proactively assessing exposures, securing appropriate insurance, and embedding strong governance, businesses can innovate more confidently.</p>
<p>You can read more in the Geneva Association’s report <strong><a href="https://sites-rpc.vuturevx.com/e/mduoramorgz3ng/abebe84a-fe94-493e-a4d3-4a405eb3862d">here</a></strong> through their press release.</p>
<p><strong>Capita fined £14 Million over 2023 cyber-attack that exposed data of 6.6 Million people</strong></p>
<p>Capita, a leading UK outsourcing provider, has been fined £14 million by the ICO after a cyber incident in March 2023, which resulted in the exposure of personal data belonging to 6.6 million individuals.  Although Capita’s systems raised a high-priority security alert within ten minutes, the company failed to quarantine the infected device for 58 hours—well beyond its target response time of one hour. The stolen data included financial records, criminal background checks, and special category data such as details of race, religion, sexual orientation and health status.</p>
<p>The ICO found that the company’s security operations centre was understaffed, its systems contained known vulnerabilities, and its cyber defences were not adequately tested. The fine was reduced from an initial £45 million after the company demonstrated improvements to its cyber security and cooperated with authorities, including the National Cyber Security Centre, and offered support to affected individuals.</p>
<p>Cyber security experts have emphasised the dangers of delayed responses to such incidents, with a call for greater investment in detection, containment, and recovery capabilities. The regulator’s message is clear: every organisation, regardless of size, should take decisive action to safeguard personal data and respond swiftly to cyber threats.</p>
<p>You can read more <strong><a href="https://sites-rpc.vuturevx.com/e/4zecuciaxwftpiw/abebe84a-fe94-493e-a4d3-4a405eb3862d">here</a></strong> through this ICO statement.</p>
<p> </p>]]></description><pubDate>Fri, 14 Nov 2025 13:53:00 Z</pubDate><category>Data and privacy</category><authors:names>Richard Breavington, Daniel Guilfoyle, Rachel Ford, Ian Dinning, Christopher Ashton, Elizabeth Zang, Emanuele Santella , Lauren Kerr</authors:names><enclosure url="https://www.rpclegal.com/-/media/rpc/images/thinking-tiles/wide/301136-website-perspective-tiles-final-wide-715x370px_03_tech-media-and-telecoms_1479965309.jpg?rev=90c8954e27284fb9aa1cd4880b3da014&amp;hash=2EE8DB6F22FB54F74DB0B5A026068801" type="image/jpeg" medium="image" /><content:encoded><![CDATA[<p><strong>RPC Cyber app: Breach counsel at your fingertips </strong></p>
<p>As cyber-attacks and follow-on litigation continue to be a board-level issue for organisations worldwide, the RPC Cyber_ App provides a one-stop-shop resource for cyber breach assistance and pre-breach preparedness. As well as information about RPC's cyber-related expertise, the app also contains guidance on prevention against common incidents and access to our ongoing cyber market insights.</p>
<p>RPC Cyber_ can be downloaded for free from the <strong><a href="https://sites-rpc.vuturevx.com/e/7r0k0xwzojodmg/abebe84a-fe94-493e-a4d3-4a405eb3862d">Apple Store</a></strong> or <strong><a href="https://sites-rpc.vuturevx.com/e/tusgqg2rsfcnda/abebe84a-fe94-493e-a4d3-4a405eb3862d">Google Play Store</a></strong>.</p>
<p><strong>UK government urges business leaders to prioritise cyber security amid rising threat</strong></p>
<p>In a ministerial letter dated 13 October 2025, addressed to CEOs and Chairs across the country, senior ministers and security officials highlight that cyber incidents are "growing more intense, frequent, sophisticated".  The letter warns of the risks this poses to economic and national security and encourages organisations to strengthen their resilience by:</p>
<ul style="margin-top: 0cm; list-style-type: disc;">
    <li>embedding cyber security into board-level decision-making and adopting recognised frameworks such as the Cyber Governance Code of Practice;</li>
    <li>registering for the National Cyber Security Centre’s Early Warning service; and</li>
    <li>requiring Cyber Essentials certification within their supply chains.</li>
</ul>
<p>The letter cites that over 90% of company boards now recognise cyber security as a critical priority. However, it is important to convert this awareness into practical action and these measures are intended to help companies address vulnerabilities and improve their ability to prevent, detect, and respond to cyber risks.</p>
<p>You can read more by clicking <strong><a href="https://sites-rpc.vuturevx.com/e/irk2zlls9ft87ow/abebe84a-fe94-493e-a4d3-4a405eb3862d">here</a></strong> for the Ministerial letter on the government website.</p>
<p><strong>ENISA Threat Landscape 2025: Ransomware, Phishing, and AI Shape Europe’s Cyber Risk</strong></p>
<p>The European Union Agency for Cybersecurity (ENISA) has released its annual Threat Landscape report which provides an overview of the evolving cyber risks facing organisations across Europe.</p>
<p>The report sets out that ransomware continues to be at the core of cyber intrusion activity. The report found that 96.3% of cybercrime activities targeting EU organisations included ransomware, with key target sectors being the manufacturing sector and digital infrastructure and services.  Attackers are increasingly professionalising their operations, employing double extortion tactics and targeting critical infrastructure sectors. Ransomware groups are not only seeking financial gain but also widespread operational disruption.</p>
<p>Phishing is identified as the primary method for initial compromise, accounting for 60% of observed cases.  The report also notes that attackers are increasingly leveraging phishing-as-a-service platforms. This allows less technically skilled actors to launch large-scale campaigns, which significantly raises the threat level. Furthermore, AI is being used to enhance the credibility and scale of campaigns. Phishing remains a persistent challenge due to its adaptability and effectiveness in bypassing organisational defences.</p>
<p>Overall, cyber risks are becoming more complex and interconnected, with ransomware, phishing, and AI-driven attacks at the forefront. Organisations are encouraged to remain vigilant and protect themselves from these persisting threats, for example, by taking a pro-active approach to assessing their operational and technical architecture, engaging in breach-readiness planning prior to a breach occurring and having cyber insurance in place to ensure they have access to a panel of specialist advisors, as well as support in meeting incident response costs, should they suffer a cyber incident.</p>
<p>Click <strong><a href="https://sites-rpc.vuturevx.com/email_handler.aspx?sid=abebe84a-fe94-493e-a4d3-4a405eb3862d&redirect=https%3a%2f%2fwww.enisa.europa.eu%2fsites%2fdefault%2ffiles%2f2025-10%2fENISA%2520Threat%2520Landscape%25202025.pdf&checksum=17937AE5">here</a></strong> to read the report by ENISA.</p>
<p><strong>ICO issues practical cyber security tips for small businesses</strong></p>
<p>The ICO has published new guidance to help small businesses strengthen their cyber security and better protect personal data. With government figures estimating 7.7 million cyber crimes against UK businesses over the past year, the ICO has urged organisations to review their security measures to ensure they are fit for purpose. The guidance highlights a range of practical steps, such as regularly backing up data, using strong and unique passwords, enabling multi-factor authentication, and limiting access to sensitive information. Businesses are also advised to dispose of old data and IT equipment securely, install and update anti-virus software, and ensure Wi-Fi connections are secure, especially when working remotely or using public networks.</p>
<p>Staff training is recommended to help employees spot suspicious emails and phishing attempts and to encourage caution when sharing screens or sending bulk emails. Organisations are reminded to lock devices when unattended and to suspend system access for staff who leave or are absent for extended periods. Safely removing personal data that is no longer necessary also reduces the risk in the event of a cyber-attack or breach.</p>
<p>These measures can make a meaningful impact in protecting both organisations and their customers from the potential effects of cyber incidents.</p>
<p>You can read the ICO guidance <strong><a href="https://sites-rpc.vuturevx.com/e/g5emrx7rkn2tp1w/abebe84a-fe94-493e-a4d3-4a405eb3862d">here</a></strong>. </p>
<p><span></span><strong>Jaguar Land Rover: Government steps in with £1.5bn loan guarantee as supply chain reels</strong></p>
<p>The fallout from the recent ransomware incident involving Jaguar Land Rover (JLR) continues to reverberate across the UK’s automotive sector. This has prompted intervention from the UK Government, who have announced a £1.5bn loan guarantee for JLR, aiming to safeguard thousands of jobs and support the supply chain.</p>
<p>The emergency measure will provide JLR with liquidity over the next five years. JLR, which employs 34,000 directly in the UK and supports around 120,000 jobs through its extensive supply chain, was forced to halt production after the ransomware incident took place in early September. The government is reportedly considering further measures, including the potential purchase of car components from struggling suppliers, to be sold back to JLR once production resumes.</p>
<p>It has been well reported that JLR did not have cyber insurance in place at the time of the attack.  JLR’s experience is likely to prompt renewed scrutiny of cyber risk management throughout the sector. Industry experts have noted that while cyber insurance uptake has increased across the FTSE 100, coverage remains patchy, with many firms weighing the cost against perceived risk. It is important for organisations to understand that cyber insurance can play an important part in providing financial and practical support in the event of a cyber incident.</p>
<p>As the automotive industry grapples with the ongoing consequences of the incident, the importance of robust cyber defences and effective risk transfer mechanisms has never been clearer. The UK Government’s intervention may offer a lifeline, but the episode serves as a stark warning of the cyber risks facing UK manufacturing.</p>
<p>Click <strong><a href="https://sites-rpc.vuturevx.com/e/qd0antcl7szbhw/abebe84a-fe94-493e-a4d3-4a405eb3862d">here</a></strong> to read more on this article by the Financial Times.</p>
<p><strong>Harrods shows incident response capability when it suffers second cyber incident in six months</strong></p>
<p>Harrods has found itself in the midst of a serious cyber incident once again, with personal data belonging to approximately 430,000 shoppers being stolen as part of a breach suffered by an undisclosed third-party supplier. The attack, discovered late September, is not linked to the earlier Scattered Spider incident that targeted Harrods in May, nor to the recent Salesloft Drift, Salesforce breach affecting other retailers.</p>
<p>Harrods has emphasised that the breach impacted only a small proportion of its customer base, as most clients favour in-store shopping over online transactions. No account passwords or payment details were accessed. The retailer has informed all affected customers and notified the relevant authorities, including the National Cyber Security Centre and the Metropolitan Police Cyber Crime unit.</p>
<p>Whilst Harrods' appears to have responded well to the incident – through clear incident steps, prompt notification and defined follow-up actions, the fact that its customers are being placed at risk for a second time demonstrates the importance of not just maintaining good practice in respect of internal processes but also being alert to any suppliers' processes. Even if an organisation has adequate security standards in place to protect its systems from a direct cyber attack, they can still be affected by security issues elsewhere in the supply chain.</p>
<p>You can read more <strong><a href="https://sites-rpc.vuturevx.com/e/vneiu5wvxc5ifq/abebe84a-fe94-493e-a4d3-4a405eb3862d">here</a></strong> through this article on computerweekly.</p>
<p><strong>Surging demand for Generative AI insurance: Businesses seek protection as risks and adoption accelerate</strong></p>
<p>A new report from Geneva Association, an international association which serves as a think tank for the global insurance industry, indicates that more than 90% of businesses worldwide are actively seeking insurance cover for risks associated with Generative AI (Gen AI).</p>
<p>As adoption of Gen AI accelerates, organisations recognise that traditional insurance policies may not sufficiently address the unique exposures created by AI, particularly as incidents involving defective outputs, biased recommendations or data breaches can have far-reaching consequences.</p>
<p>GenAI solutions are often sourced from third-party vendors. This reliance on third parties means that if an external AI product fails (whether through malfunction, inaccurate outputs, or operational disruption), the resulting losses are outside the control of an organisation, but may not be recoverable from the vendor, leaving the organisation potentially exposed. Traditional insurance policies may not fully cover all losses arising from Gen AI failure. With 71% of respondents to the Geneva Association report confirming they have already implemented Gen AI and two-thirds of businesses being willing to pay at least 10% higher premiums for such protections, this is an area of insurance that could potentially develop quickly.</p>
<p>By way of example, Hiscox have already updated their Tech PI wording to provide "<em>explicit cover for those who use, build and advise on artificial intelligence</em>", whilst AXA XL has created a Generative AI endorsement that can be added on to its cyber policies, which "<em>extends cover for specific risks that businesses may encounter when building out their own Gen AI model</em>". By proactively assessing exposures, securing appropriate insurance, and embedding strong governance, businesses can innovate more confidently.</p>
<p>You can read more in the Geneva Association’s report <strong><a href="https://sites-rpc.vuturevx.com/e/mduoramorgz3ng/abebe84a-fe94-493e-a4d3-4a405eb3862d">here</a></strong> through their press release.</p>
<p><strong>Capita fined £14 Million over 2023 cyber-attack that exposed data of 6.6 Million people</strong></p>
<p>Capita, a leading UK outsourcing provider, has been fined £14 million by the ICO after a cyber incident in March 2023, which resulted in the exposure of personal data belonging to 6.6 million individuals.  Although Capita’s systems raised a high-priority security alert within ten minutes, the company failed to quarantine the infected device for 58 hours—well beyond its target response time of one hour. The stolen data included financial records, criminal background checks, and special category data such as details of race, religion, sexual orientation and health status.</p>
<p>The ICO found that the company’s security operations centre was understaffed, its systems contained known vulnerabilities, and its cyber defences were not adequately tested. The fine was reduced from an initial £45 million after the company demonstrated improvements to its cyber security and cooperated with authorities, including the National Cyber Security Centre, and offered support to affected individuals.</p>
<p>Cyber security experts have emphasised the dangers of delayed responses to such incidents, with a call for greater investment in detection, containment, and recovery capabilities. The regulator’s message is clear: every organisation, regardless of size, should take decisive action to safeguard personal data and respond swiftly to cyber threats.</p>
<p>You can read more <strong><a href="https://sites-rpc.vuturevx.com/e/4zecuciaxwftpiw/abebe84a-fe94-493e-a4d3-4a405eb3862d">here</a></strong> through this ICO statement.</p>
<p> </p>]]></content:encoded></item><item><guid isPermaLink="false">{3D6600DC-2738-407F-B890-D230B5C5FB02}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/cyber-bytes-issue-76/</link><title>Cyber_Bytes - Issue 76</title><description><![CDATA[<p><strong>RPC Cyber app: Breach counsel at your fingertips</strong></p>
<p>As cyber-attacks and follow-on litigation continue to be a board-level issue for organisations worldwide, the RPCCyber_ App provides a one-stop-shop resource for cyber breach assistance and pre-breach preparedness. As well as information about RPC's cyber-related expertise, the app also contains guidance on prevention against common incidents and access to our ongoing cyber market insights.</p>
<p>RPCCyber_ can be downloaded for free from the <strong><a href="https://sites-rpc.vuturevx.com/e/aoeu3tz5xt83jaq">Apple Store</a></strong> or <strong><a href="https://sites-rpc.vuturevx.com/e/uekwjazovbdegcq">Google Play Store</a></strong>.</p>
<p><strong>Judgment Alert: Farley & Ors v Paymaster (1836) Ltd (t/a Equiniti) [2025] EWCA Civ 1117 (22 August 2025)</strong></p>
<p>On 22 August 2025, the Court of Appeal handed down judgment in the case of <em>Michael Farley v Paymaster (1836) Limited trading as Equiniti </em>[2025] EWCA Civ 1117.</p>
<p>This is a potentially significant case for data subject litigation claims. It challenges existing case law regarding the need for claimants to demonstrate that a minimum threshold of seriousness has been met to claim compensation for breaches of the UK GDPR, and provides guidance on what constitutes “non-material damage” under Art 82, UK GDPR.</p>
<p>The administrator of the Sussex Police pension scheme sent annual benefit statements containing personal data to over 750 out-of-date residential addresses. As a result, claimants reported experiencing "anxiety, alarm, distress, and embarrassment", fearing their personal information may have been accessed by unknown third parties. The affected individuals sought compensation.</p>
<p>The Court of Appeal concluded that there is no minimum threshold of seriousness for a successful data subject claim under the UK GDPR. Allegations of “were not essential for such claims either. Loss recoverable in data subject claims “includes” but is not limited to distress and a successful claim can be made in respect of “annoyance or irritation caused by fear of third-party misuse”.</p>
<p>The Court of Appeal did clarify that losses based on distress or irritation would need to be “well-founded” and based on more than a “purely hypothetical risk”. However, overall, the judgment is beneficial for data subject claimants and provides some potential ammunition for claimants in data subject litigation.</p>
<p>Click <a href="https://www.bailii.org/cgi-bin/format.cgi?doc=/ew/cases/EWCA/Civ/2025/1117.html&query=(title:(+Equiniti+))">here</a> to read the judgment.</p>
<p><strong>Jaguar Land Rover's cyber-attack: Automative supply chain to a halt </strong></p>
<p>As widely reported, Jaguar Land Rover (<strong>JLR</strong>), one of the UK’s largest automotive manufacturers, has recently been affected by a significant cyber incident. This has forced the company to suspend operations across multiple British factories for nearly three weeks. The incident, first discovered on 1 September, prompted JLR to deliberately shut down its IT systems to contain the breach.</p>
<p>The prolonged incident has caused severe economic repercussions across the supply chain. JLR is reportedly losing up to £50 million per week due to suspended production. Hundreds of suppliers, many operating under “just-in-time” manufacturing principles, have faced immediate disruption. Some companies have reconfigured production with reports of reduced or zero pay for workers while others have begun redundancies. The interconnected nature of the automotive sector means that a severe incident can destabilise the entire supply network, with smaller businesses and their workforces facing immediate threats. The scale of disruption has prompted calls for the UK Government's intervention, including furlough support for affected workers.</p>
<p>This incident has highlighted the financial toll on businesses targeted by a cyber-attack and their partners. The fragility and vulnerability of the automotive supply chains during this incident calls will inevitably be the subject of further consideration as the fallout from the incident continues. In addition, experts warn that such attacks could become more frequent and severe, especially amid global tensions. Government and industry collaboration is therefore important to tackle escalating threats of cyber-attacks.</p>
<p>You can read more <a href="https://www.wired.com/story/jlr-jaguar-land-rover-cyberattack-supply-chain-disaster/">here</a> from Wired.</p>
<p><strong>Innovation at speed: Are businesses still addressing Cyber Risks?</strong></p>
<p>According to Unisys' report published last month, organisations are accelerating their adoption of Cloud-based and AI tools, with 78% planning to increase AI investment in the coming years. However, the report found that business leaders did not appear to be investing in cyber security measures at the same rate.</p>
<p>Despite the surge in new technologies, 85% of organisations admit their cyber strategies are “too reactive”, leaving them exposed to well-known threats. Many organisations are prioritising investment in new technologies such as AI over strengthening defences against established cyber threats, as well as emerging risks.</p>
<p>Unisys reports a disconnect in the assessment of risks and investment priorities within companies. 63% of the executives who responded to the study believe security protocols hinder data analysis, compared to 35% of IT leaders. Similar conclusions were drawn in respect of Cloud services as 68% of business executives see cloud security as an impediment to innovation versus 37% of IT leaders.</p>
<p>This divergence has a potential impact on the adoption of security measures.  For example, Unisys observed identity-based attacks being a major concern for IT professionals. However, fewer than half of organisations had prioritised identity-verification technologies as a security mechanism.</p>
<p>You can read more about Unisys' report <a href="https://www.ciodive.com/news/proactive-cyber-defense-artificial-intelligence-unisys/758552/?utm_source=slipcase&utm_medium=affiliate&utm_campaign=slipcase">here</a> and <a href="https://www.unisys.com/cp/unisys-cloud-insights-report-2025/">here</a>.</p>
<p><strong>ICO launches consultation on UK GDPR recognised legitimate interest guidance</strong></p>
<p>On 21 August 2025, the Information Commissioner's Office (ICO) launched a consultation on its draft guidance regarding "recognised legitimate interests" as a new lawful basis for processing personal data under The Data (Use and Access) Act 2025 (DUA).</p>
<p>A "recognised legitimate interests" is a specified purpose for handling personal data that is in the public interest, separate from the existing "legitimate interests" lawful basis set out in the UK GDPR. Under this new lawful basis, the processing must meet one of five pre-approved purposes that are the public interest:</p>
<ul>
    <li>Disclosure to a controller that requires the personal data to carry out a public interest task or to exercise its official authority where the controller has requested that data</li>
    <li>Safeguarding national security, protecting public security and defence purposes</li>
    <li>Responding to an emergency defined in the Civil Contingencies Act 2004</li>
    <li>Detecting, investigating or preventing crime, or apprehending or prosecuting offenders</li>
    <li>Safeguarding vulnerable individuals</li>
</ul>
<p>The ICO's guidance on "recognised legitimate interest" aims to inform and support large organisations and data protection officers in the application of amendments made by DUA by providing details on this new legal basis for processing, including the benefits of using it and how it differs from the existing "legitimate interests" lawful basis.  Its introduction will require organisations to review and update their data governance frameworks to the extent that they intend to rely on the new basis.</p>
<p>The ICO invites feedback to help finalise guidance and address queries through the consultation open until 30 October 2025.</p>
<p>You can access the survey <a href="https://citizen-space.ico.org.uk/regulatory-policy/consultation-recognised-legitimate-interest/">here</a> and the draft guidance <a href="https://ico.org.uk/for-organisations/recognised-legitimate-interest-guidance/">here</a>.</p>
<p><strong>Cyber insurance tipped as commercial brokers’ biggest opportunity</strong></p>
<p>Cyber insurance has emerged as the commercial insurance product with the greatest growth potential, according to a recent UK broker survey, securing 53.6% of the votes. Market reports indicate that cyber insurance premiums rose by approximately 68% in 2023, reflecting increased demand and evolving risks.</p>
<p>The frequency and severity of cyber incidents are driving demand, with the UK Government’s Cyber Security Breaches Survey 2023 reporting that 32% of businesses experienced a cyber breach or attack in the past year, with average costs exceeding £15,000 for medium and large firms. Brokers are expanding their cyber insurance offerings, and 75% identified cyber insurance as their biggest portfolio growth opportunity in 2024. </p>
<p>These trends highlight the importance of proactive cyber risk management and specialist insurance advice. As the market matures, brokers are increasingly called upon to interpret complex policy wordings and exclusions. Meanwhile legal advisers play a crucial role in supporting regulatory compliance and incident response. Collaboration between brokers, insurers, and legal professionals will be essential to ensure clients are equipped to manage cyber risks and benefit from comprehensive insurance protection.</p>
<p>Click <a href="https://www.insurancetimes.co.uk/news/cyber-insurance-tipped-as-commercial-brokers-biggest-opportunity/1456195.article">here</a> to read more about cyber insurance market trends.</p>
<p><strong>Ransomware Group Exploits Hybrid Cloud Gaps, Gains Full Azure Control in Enterprise Attacks </strong></p>
<p>Recent reporting by SecurityWeek details how sophisticated ransomware groups are targeting hybrid cloud environments, exploiting gaps between on-premises infrastructure and cloud platforms, such as Microsoft Azure. Attackers are leveraging compromised credentials, misconfigured identity management systems, and insufficient network segmentation to escalate privileges and gain full administrative control over Azure tenants. Once inside, threat actors can deploy ransomware, exfiltrate sensitive data, and disrupt critical business operations across both cloud and on-premises resources.</p>
<p>The risks associated with these attacks are significant for organisations relying on hybrid cloud models. Beyond immediate operational disruption and financial loss, compromised Azure environments can expose confidential client information, intellectual property, and regulated data to unauthorised access. The complexity of hybrid architectures can make it challenging to detect lateral movement and respond swiftly, increasing the likelihood of prolonged exposure and greater impact.</p>
<p>From a legal and regulatory perspective, such incidents may trigger mandatory breach notification requirements under the UK GDPR and other data protection regimes if personal data is affected. Organisations must also consider contractual obligations to clients and third parties.</p>
<p>Click <a href="https://www.securityweek.com/ransomware-group-exploits-hybrid-cloud-gaps-gains-full-azure-control-in-enterprise-attacks/">here</a> to read the full SecurityWeek article.</p>]]></description><pubDate>Wed, 24 Sep 2025 12:11:00 +0100</pubDate><category>Data and privacy</category><authors:names>Richard Breavington, Daniel Guilfoyle, Rachel Ford, Ian Dinning, Christopher Ashton, Elizabeth Zang, Emanuele Santella , Lauren Kerr</authors:names><enclosure url="https://www.rpclegal.com/-/media/rpc/redesign-images/thinking-tiles/wide/data-and-cyber-2---thinking-tile-wide.jpg?rev=8f262369de1c46c6bef3c74e0d2b51c9&amp;hash=3379AF5F3FF6F6CC5ECB36CC0235B10B" type="image/jpeg" medium="image" /><content:encoded><![CDATA[<p><strong>RPC Cyber app: Breach counsel at your fingertips</strong></p>
<p>As cyber-attacks and follow-on litigation continue to be a board-level issue for organisations worldwide, the RPCCyber_ App provides a one-stop-shop resource for cyber breach assistance and pre-breach preparedness. As well as information about RPC's cyber-related expertise, the app also contains guidance on prevention against common incidents and access to our ongoing cyber market insights.</p>
<p>RPCCyber_ can be downloaded for free from the <strong><a href="https://sites-rpc.vuturevx.com/e/aoeu3tz5xt83jaq">Apple Store</a></strong> or <strong><a href="https://sites-rpc.vuturevx.com/e/uekwjazovbdegcq">Google Play Store</a></strong>.</p>
<p><strong>Judgment Alert: Farley & Ors v Paymaster (1836) Ltd (t/a Equiniti) [2025] EWCA Civ 1117 (22 August 2025)</strong></p>
<p>On 22 August 2025, the Court of Appeal handed down judgment in the case of <em>Michael Farley v Paymaster (1836) Limited trading as Equiniti </em>[2025] EWCA Civ 1117.</p>
<p>This is a potentially significant case for data subject litigation claims. It challenges existing case law regarding the need for claimants to demonstrate that a minimum threshold of seriousness has been met to claim compensation for breaches of the UK GDPR, and provides guidance on what constitutes “non-material damage” under Art 82, UK GDPR.</p>
<p>The administrator of the Sussex Police pension scheme sent annual benefit statements containing personal data to over 750 out-of-date residential addresses. As a result, claimants reported experiencing "anxiety, alarm, distress, and embarrassment", fearing their personal information may have been accessed by unknown third parties. The affected individuals sought compensation.</p>
<p>The Court of Appeal concluded that there is no minimum threshold of seriousness for a successful data subject claim under the UK GDPR. Allegations of “were not essential for such claims either. Loss recoverable in data subject claims “includes” but is not limited to distress and a successful claim can be made in respect of “annoyance or irritation caused by fear of third-party misuse”.</p>
<p>The Court of Appeal did clarify that losses based on distress or irritation would need to be “well-founded” and based on more than a “purely hypothetical risk”. However, overall, the judgment is beneficial for data subject claimants and provides some potential ammunition for claimants in data subject litigation.</p>
<p>Click <a href="https://www.bailii.org/cgi-bin/format.cgi?doc=/ew/cases/EWCA/Civ/2025/1117.html&query=(title:(+Equiniti+))">here</a> to read the judgment.</p>
<p><strong>Jaguar Land Rover's cyber-attack: Automative supply chain to a halt </strong></p>
<p>As widely reported, Jaguar Land Rover (<strong>JLR</strong>), one of the UK’s largest automotive manufacturers, has recently been affected by a significant cyber incident. This has forced the company to suspend operations across multiple British factories for nearly three weeks. The incident, first discovered on 1 September, prompted JLR to deliberately shut down its IT systems to contain the breach.</p>
<p>The prolonged incident has caused severe economic repercussions across the supply chain. JLR is reportedly losing up to £50 million per week due to suspended production. Hundreds of suppliers, many operating under “just-in-time” manufacturing principles, have faced immediate disruption. Some companies have reconfigured production with reports of reduced or zero pay for workers while others have begun redundancies. The interconnected nature of the automotive sector means that a severe incident can destabilise the entire supply network, with smaller businesses and their workforces facing immediate threats. The scale of disruption has prompted calls for the UK Government's intervention, including furlough support for affected workers.</p>
<p>This incident has highlighted the financial toll on businesses targeted by a cyber-attack and their partners. The fragility and vulnerability of the automotive supply chains during this incident calls will inevitably be the subject of further consideration as the fallout from the incident continues. In addition, experts warn that such attacks could become more frequent and severe, especially amid global tensions. Government and industry collaboration is therefore important to tackle escalating threats of cyber-attacks.</p>
<p>You can read more <a href="https://www.wired.com/story/jlr-jaguar-land-rover-cyberattack-supply-chain-disaster/">here</a> from Wired.</p>
<p><strong>Innovation at speed: Are businesses still addressing Cyber Risks?</strong></p>
<p>According to Unisys' report published last month, organisations are accelerating their adoption of Cloud-based and AI tools, with 78% planning to increase AI investment in the coming years. However, the report found that business leaders did not appear to be investing in cyber security measures at the same rate.</p>
<p>Despite the surge in new technologies, 85% of organisations admit their cyber strategies are “too reactive”, leaving them exposed to well-known threats. Many organisations are prioritising investment in new technologies such as AI over strengthening defences against established cyber threats, as well as emerging risks.</p>
<p>Unisys reports a disconnect in the assessment of risks and investment priorities within companies. 63% of the executives who responded to the study believe security protocols hinder data analysis, compared to 35% of IT leaders. Similar conclusions were drawn in respect of Cloud services as 68% of business executives see cloud security as an impediment to innovation versus 37% of IT leaders.</p>
<p>This divergence has a potential impact on the adoption of security measures.  For example, Unisys observed identity-based attacks being a major concern for IT professionals. However, fewer than half of organisations had prioritised identity-verification technologies as a security mechanism.</p>
<p>You can read more about Unisys' report <a href="https://www.ciodive.com/news/proactive-cyber-defense-artificial-intelligence-unisys/758552/?utm_source=slipcase&utm_medium=affiliate&utm_campaign=slipcase">here</a> and <a href="https://www.unisys.com/cp/unisys-cloud-insights-report-2025/">here</a>.</p>
<p><strong>ICO launches consultation on UK GDPR recognised legitimate interest guidance</strong></p>
<p>On 21 August 2025, the Information Commissioner's Office (ICO) launched a consultation on its draft guidance regarding "recognised legitimate interests" as a new lawful basis for processing personal data under The Data (Use and Access) Act 2025 (DUA).</p>
<p>A "recognised legitimate interests" is a specified purpose for handling personal data that is in the public interest, separate from the existing "legitimate interests" lawful basis set out in the UK GDPR. Under this new lawful basis, the processing must meet one of five pre-approved purposes that are the public interest:</p>
<ul>
    <li>Disclosure to a controller that requires the personal data to carry out a public interest task or to exercise its official authority where the controller has requested that data</li>
    <li>Safeguarding national security, protecting public security and defence purposes</li>
    <li>Responding to an emergency defined in the Civil Contingencies Act 2004</li>
    <li>Detecting, investigating or preventing crime, or apprehending or prosecuting offenders</li>
    <li>Safeguarding vulnerable individuals</li>
</ul>
<p>The ICO's guidance on "recognised legitimate interest" aims to inform and support large organisations and data protection officers in the application of amendments made by DUA by providing details on this new legal basis for processing, including the benefits of using it and how it differs from the existing "legitimate interests" lawful basis.  Its introduction will require organisations to review and update their data governance frameworks to the extent that they intend to rely on the new basis.</p>
<p>The ICO invites feedback to help finalise guidance and address queries through the consultation open until 30 October 2025.</p>
<p>You can access the survey <a href="https://citizen-space.ico.org.uk/regulatory-policy/consultation-recognised-legitimate-interest/">here</a> and the draft guidance <a href="https://ico.org.uk/for-organisations/recognised-legitimate-interest-guidance/">here</a>.</p>
<p><strong>Cyber insurance tipped as commercial brokers’ biggest opportunity</strong></p>
<p>Cyber insurance has emerged as the commercial insurance product with the greatest growth potential, according to a recent UK broker survey, securing 53.6% of the votes. Market reports indicate that cyber insurance premiums rose by approximately 68% in 2023, reflecting increased demand and evolving risks.</p>
<p>The frequency and severity of cyber incidents are driving demand, with the UK Government’s Cyber Security Breaches Survey 2023 reporting that 32% of businesses experienced a cyber breach or attack in the past year, with average costs exceeding £15,000 for medium and large firms. Brokers are expanding their cyber insurance offerings, and 75% identified cyber insurance as their biggest portfolio growth opportunity in 2024. </p>
<p>These trends highlight the importance of proactive cyber risk management and specialist insurance advice. As the market matures, brokers are increasingly called upon to interpret complex policy wordings and exclusions. Meanwhile legal advisers play a crucial role in supporting regulatory compliance and incident response. Collaboration between brokers, insurers, and legal professionals will be essential to ensure clients are equipped to manage cyber risks and benefit from comprehensive insurance protection.</p>
<p>Click <a href="https://www.insurancetimes.co.uk/news/cyber-insurance-tipped-as-commercial-brokers-biggest-opportunity/1456195.article">here</a> to read more about cyber insurance market trends.</p>
<p><strong>Ransomware Group Exploits Hybrid Cloud Gaps, Gains Full Azure Control in Enterprise Attacks </strong></p>
<p>Recent reporting by SecurityWeek details how sophisticated ransomware groups are targeting hybrid cloud environments, exploiting gaps between on-premises infrastructure and cloud platforms, such as Microsoft Azure. Attackers are leveraging compromised credentials, misconfigured identity management systems, and insufficient network segmentation to escalate privileges and gain full administrative control over Azure tenants. Once inside, threat actors can deploy ransomware, exfiltrate sensitive data, and disrupt critical business operations across both cloud and on-premises resources.</p>
<p>The risks associated with these attacks are significant for organisations relying on hybrid cloud models. Beyond immediate operational disruption and financial loss, compromised Azure environments can expose confidential client information, intellectual property, and regulated data to unauthorised access. The complexity of hybrid architectures can make it challenging to detect lateral movement and respond swiftly, increasing the likelihood of prolonged exposure and greater impact.</p>
<p>From a legal and regulatory perspective, such incidents may trigger mandatory breach notification requirements under the UK GDPR and other data protection regimes if personal data is affected. Organisations must also consider contractual obligations to clients and third parties.</p>
<p>Click <a href="https://www.securityweek.com/ransomware-group-exploits-hybrid-cloud-gaps-gains-full-azure-control-in-enterprise-attacks/">here</a> to read the full SecurityWeek article.</p>]]></content:encoded></item><item><guid isPermaLink="false">{F170EBB8-03D1-4136-B6AE-DE9DC441307D}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/cyber-bytes-issue-75/</link><title>Cyber_Bytes - Issue 75</title><description><![CDATA[<p><strong>New App - RPCCyber_ </strong></p>
<p>As cyber-attacks and follow-on litigation continue to be a board-level issue for organisations worldwide, the RPCCyber_ App provides a one-stop-shop resource for cyber breach assistance and pre-breach preparedness. As well as information about RPC's cyber-related expertise, the app also contains guidance on prevention against common incidents and access to our ongoing cyber market insights.</p>
<p>RPCCyber_ can be downloaded for free from the <strong><a href="https://sites-rpc.vuturevx.com/e/aoeu3tz5xt83jaq">Apple Store</a></strong> or <strong><a href="https://sites-rpc.vuturevx.com/e/uekwjazovbdegcq">Google Play Store</a></strong>.</p>
<h4>Data (Use and Access) Act 2025 comes into force</h4>
<p>The much-anticipated Data (Use and Access) Act 2025 (<strong>the Act</strong>) received Royal Assent on 19 June 2025. The Act is broad, and it includes provisions to enable the growth of digital verification services, new Smart Data schemes like Open Banking and a new National Underground Asset Register. Designed to streamline compliance and support innovation, the Act updates core provisions of the UK GDPR, Data Protection Act 2018, and PECR.</p>
<p>The Act's main provisions relate to:</p>
<ul style="list-style-type: disc;">
    <li>Automated Decision-Making</li>
    <li>Subject Access Requests</li>
    <li>Children’s Data Protection</li>
    <li>Scientific Research and Broad Consent</li>
    <li>Recognised Legitimate Interests</li>
    <li>International Data Transfers</li>
    <li>Internal Complaint Handling</li>
    <li>Cookies and PECR Enforcement</li>
    <li>Law Enforcement and Intelligence Processing</li>
</ul>
<p>One of the Act's most notable changes is to rules around automated decision-making (ADM) about individuals which produce legal or similarly significant effects. The previous restrictions on solely automated decisions under Article 22, UK GDPR has been updated. Under the new rules, these decisions are permitted in some circumstances, provided that appropriate safeguards are in place.</p>
<p>The Act has also made significant changes to the legitimate interests basis for processing personal data, implementing a new lawful basis for data processing where it is necessary and connected to a "recognised legitimate interest". Such interests include defence, emergency response, crime and security. This makes it easier for organisations to make a case that data has been processed based on a legitimate interest ground.</p>
<p>You can read Government's summary of the changes to UK’s data protection and privacy legislation in the Data (Use and Access) Act 2025 <strong><a href="https://sites-rpc.vuturevx.com/e/leaoad68msyida">here</a></strong>.</p>
<h4>AI risks leaving UK businesses exposed to liability</h4>
<p>In a recent interview by Law 360, Richard Breavington – partner in the Cyber and Data Privacy team at RPC – commented on the legal risks potentially faced by businesses when implementing and relying upon AI agents.  Speaking about the risk of liability for losses caused to clients as a result of malfunctioning AI-based agents provided by third parties, Richard was quoted as saying:</p>
<p>"You've got this position where, actually, it's not your fault, necessarily, you're relying on a bit of new software that's cutting edge… But, if there's a problem, you're going to end up with liability and…unable to completely recoup that liability."</p>
<p>In addition to commenting on the potential for recovering from AI agent providers in respect of liability to third parties, the article also considers some of the potential challenges around insuring those liabilities under traditional lines of insurance.</p>
<p>The net result of these considerations is that businesses could face potential liabilities that are both difficult to recover in full from the party responsible and also not straightforward to insure.  "I don't think this is something that has been fully recognised" is the concluding quote.</p>
<p>Click <strong><a href="https://sites-rpc.vuturevx.com/e/nukgle5msm55iq">here</a></strong> to read the article on Law 360.</p>
<h4>US Cyber premiums drop</h4>
<p>For the first time since records began in 2015, U.S. cyber insurance premiums declined in 2024. According to Insurance Business America, direct written premiums dropped by 2.3% in 2024, falling just below $7.1 billion. This marks a significant moment in the evolution of the cyber insurance sector, indicating the market is entering a new, more mature phase. Importantly, the decline in premium volume does not reflect a diminished demand for cyber coverage.</p>
<p>This mirrors the trends seen in the UK, particularly in relation to premiums for larger companies. Having experienced a significant spike in premiums in 2020, they are now frequently seeing rates remain the same or reduced at renewal. In fact, in the first quarter of 2025, prices dropped 7% on primary layer insurance in the UK, which makes taking out cover more accessible for small and medium sized businesses.</p>
<p>However, as recent attacks in retail demonstrate, decreased premiums are not a sign of a reducing demand or necessity for cyber insurance. Data suggests that ransomware claims were up by one-third in the first quarter of 2025 compared to the fourth quarter of 2024. Moreover, organisations of all sizes can be vulnerable to ransomware and social engineering attacks, so it is as important as ever to hedge appropriately against these risks by investigating the need for cyber insurance. Or, if already in place, considering the scope of coverage that their policy offers.</p>
<p>You can read more from Insurance Business <strong><a href="https://sites-rpc.vuturevx.com/e/jfkmoyijauarsfw">here</a></strong> and from Marsh <strong><a href="https://sites-rpc.vuturevx.com/e/dey07k1nhsxppg">here</a></strong>.</p>
<h4>Judgment Alert: Raine v JD Wetherspoon Plc [2025] EWHC 1593 (KB)</h4>
<p>The High Court has recently clarified legal principles surrounding the misuse of private information, breach of confidence and data protection.</p>
<p>The case arose from an incident in which the Claimant, a former employee of JD Wetherspoon Plc (<strong>Wetherspoon</strong>), was targeted by her abusive ex-partner. Posing as a police officer, he successfully obtained the Claimant’s mother’s mobile phone number from pub staff, who disclosed the information in breach of the company’s own confidentiality policies. The number had been stored in a locked personnel file marked "Strictly Private and Confidential". This deception led to further harassment, exacerbating the Claimant’s pre-existing psychological conditions.</p>
<p>Bright J rejected Wetherspoon's argument that the Claimant's mother's mobile phone number did not constitute the Claimant's information or that she had no reasonable expectation of privacy in it. The judge dismissed JD Wetherspoon’s appeals in full, upholding the initial rulings for the Claimant's arguments of misuse of private information and breach of confidence. The High Court also found that the previous judge was wrong to reject the Claimant's Data Protection Act 2018 (DPA 2018) and UK General Data Protection Regulation (UK GDPR) claims. The court held that disclosure of information can constitute "processing" even if the disclosure is oral.</p>
<p>The Court upheld £4,500 in damages and a full recovery of the claimant's legal success fee for the exacerbation of the Claimant's existing psychological conditions.</p>
<p>Click <strong><a href="https://sites-rpc.vuturevx.com/e/g3kwkasouwymoig">here</a></strong> to read the judgment.</p>
<h4>UK Government Responds to New Measures to Target Ransomware Attacks</h4>
<p>The UK Government has released its response to the contributions received during its public consultation on its proposed ransomware legislation.</p>
<p>There were three proposals on which the Government requested insight:</p>
<p>(i) a ban on ransomware payments for all public sector bodies and operators of critical national infrastructure;</p>
<p>(ii) a ransomware payment prevention regime; and</p>
<p>(iii) a mandatory incident reporting regime.</p>
<p>There was widespread support for both the targeted ransomware ban, and the mandatory incident reporting regime with the two proposals garnering approval from almost 72% and 63% of participants respectively.</p>
<p>Despite the strong support for both proposals, commentators had concerns over about the scope and implementation of these proposals. Respondents emphasised that the success of these proposals would turn on the availability of sector-specific accessible guidance to support implementation and to reduce the administrative burden on SMEs. They also requested clarity over the inclusion of supply chains within the targeted ban and the inclusion of individuals within the reporting regime.</p>
<p>In contrast, the wider ransomware payment prevent regime received a mixed response with only 47% of respondents in favour.</p>
<p>The primary concern was that it would redirect and concentrate ransomware attacks to those outside of the regime, rather than reducing the number of attacks. There was also doubt about the Government's claims that the regime would enable law enforcement to intervene and investigate ransomware threats.</p>
<p>The Government has confirmed that it will continue to work with industry to refine its proposals and resolve concerns over the proposals' scope and implementation.</p>
<p>You can read the Government's consultation outcome <strong><a href="https://sites-rpc.vuturevx.com/e/kkuoycw8ugnoia">here</a></strong>.</p>]]></description><pubDate>Mon, 04 Aug 2025 16:05:00 +0100</pubDate><category>Data and privacy</category><authors:names>Richard Breavington, Daniel Guilfoyle, Rachel Ford, Ian Dinning, Christopher Ashton, Elizabeth Zang, Emanuele Santella , Lauren Kerr</authors:names><enclosure url="https://www.rpclegal.com/-/media/rpc/redesign-images/thinking-tiles/wide/data-and-cyber-2---thinking-tile-wide.jpg?rev=8f262369de1c46c6bef3c74e0d2b51c9&amp;hash=3379AF5F3FF6F6CC5ECB36CC0235B10B" type="image/jpeg" medium="image" /><content:encoded><![CDATA[<p><strong>New App - RPCCyber_ </strong></p>
<p>As cyber-attacks and follow-on litigation continue to be a board-level issue for organisations worldwide, the RPCCyber_ App provides a one-stop-shop resource for cyber breach assistance and pre-breach preparedness. As well as information about RPC's cyber-related expertise, the app also contains guidance on prevention against common incidents and access to our ongoing cyber market insights.</p>
<p>RPCCyber_ can be downloaded for free from the <strong><a href="https://sites-rpc.vuturevx.com/e/aoeu3tz5xt83jaq">Apple Store</a></strong> or <strong><a href="https://sites-rpc.vuturevx.com/e/uekwjazovbdegcq">Google Play Store</a></strong>.</p>
<h4>Data (Use and Access) Act 2025 comes into force</h4>
<p>The much-anticipated Data (Use and Access) Act 2025 (<strong>the Act</strong>) received Royal Assent on 19 June 2025. The Act is broad, and it includes provisions to enable the growth of digital verification services, new Smart Data schemes like Open Banking and a new National Underground Asset Register. Designed to streamline compliance and support innovation, the Act updates core provisions of the UK GDPR, Data Protection Act 2018, and PECR.</p>
<p>The Act's main provisions relate to:</p>
<ul style="list-style-type: disc;">
    <li>Automated Decision-Making</li>
    <li>Subject Access Requests</li>
    <li>Children’s Data Protection</li>
    <li>Scientific Research and Broad Consent</li>
    <li>Recognised Legitimate Interests</li>
    <li>International Data Transfers</li>
    <li>Internal Complaint Handling</li>
    <li>Cookies and PECR Enforcement</li>
    <li>Law Enforcement and Intelligence Processing</li>
</ul>
<p>One of the Act's most notable changes is to rules around automated decision-making (ADM) about individuals which produce legal or similarly significant effects. The previous restrictions on solely automated decisions under Article 22, UK GDPR has been updated. Under the new rules, these decisions are permitted in some circumstances, provided that appropriate safeguards are in place.</p>
<p>The Act has also made significant changes to the legitimate interests basis for processing personal data, implementing a new lawful basis for data processing where it is necessary and connected to a "recognised legitimate interest". Such interests include defence, emergency response, crime and security. This makes it easier for organisations to make a case that data has been processed based on a legitimate interest ground.</p>
<p>You can read Government's summary of the changes to UK’s data protection and privacy legislation in the Data (Use and Access) Act 2025 <strong><a href="https://sites-rpc.vuturevx.com/e/leaoad68msyida">here</a></strong>.</p>
<h4>AI risks leaving UK businesses exposed to liability</h4>
<p>In a recent interview by Law 360, Richard Breavington – partner in the Cyber and Data Privacy team at RPC – commented on the legal risks potentially faced by businesses when implementing and relying upon AI agents.  Speaking about the risk of liability for losses caused to clients as a result of malfunctioning AI-based agents provided by third parties, Richard was quoted as saying:</p>
<p>"You've got this position where, actually, it's not your fault, necessarily, you're relying on a bit of new software that's cutting edge… But, if there's a problem, you're going to end up with liability and…unable to completely recoup that liability."</p>
<p>In addition to commenting on the potential for recovering from AI agent providers in respect of liability to third parties, the article also considers some of the potential challenges around insuring those liabilities under traditional lines of insurance.</p>
<p>The net result of these considerations is that businesses could face potential liabilities that are both difficult to recover in full from the party responsible and also not straightforward to insure.  "I don't think this is something that has been fully recognised" is the concluding quote.</p>
<p>Click <strong><a href="https://sites-rpc.vuturevx.com/e/nukgle5msm55iq">here</a></strong> to read the article on Law 360.</p>
<h4>US Cyber premiums drop</h4>
<p>For the first time since records began in 2015, U.S. cyber insurance premiums declined in 2024. According to Insurance Business America, direct written premiums dropped by 2.3% in 2024, falling just below $7.1 billion. This marks a significant moment in the evolution of the cyber insurance sector, indicating the market is entering a new, more mature phase. Importantly, the decline in premium volume does not reflect a diminished demand for cyber coverage.</p>
<p>This mirrors the trends seen in the UK, particularly in relation to premiums for larger companies. Having experienced a significant spike in premiums in 2020, they are now frequently seeing rates remain the same or reduced at renewal. In fact, in the first quarter of 2025, prices dropped 7% on primary layer insurance in the UK, which makes taking out cover more accessible for small and medium sized businesses.</p>
<p>However, as recent attacks in retail demonstrate, decreased premiums are not a sign of a reducing demand or necessity for cyber insurance. Data suggests that ransomware claims were up by one-third in the first quarter of 2025 compared to the fourth quarter of 2024. Moreover, organisations of all sizes can be vulnerable to ransomware and social engineering attacks, so it is as important as ever to hedge appropriately against these risks by investigating the need for cyber insurance. Or, if already in place, considering the scope of coverage that their policy offers.</p>
<p>You can read more from Insurance Business <strong><a href="https://sites-rpc.vuturevx.com/e/jfkmoyijauarsfw">here</a></strong> and from Marsh <strong><a href="https://sites-rpc.vuturevx.com/e/dey07k1nhsxppg">here</a></strong>.</p>
<h4>Judgment Alert: Raine v JD Wetherspoon Plc [2025] EWHC 1593 (KB)</h4>
<p>The High Court has recently clarified legal principles surrounding the misuse of private information, breach of confidence and data protection.</p>
<p>The case arose from an incident in which the Claimant, a former employee of JD Wetherspoon Plc (<strong>Wetherspoon</strong>), was targeted by her abusive ex-partner. Posing as a police officer, he successfully obtained the Claimant’s mother’s mobile phone number from pub staff, who disclosed the information in breach of the company’s own confidentiality policies. The number had been stored in a locked personnel file marked "Strictly Private and Confidential". This deception led to further harassment, exacerbating the Claimant’s pre-existing psychological conditions.</p>
<p>Bright J rejected Wetherspoon's argument that the Claimant's mother's mobile phone number did not constitute the Claimant's information or that she had no reasonable expectation of privacy in it. The judge dismissed JD Wetherspoon’s appeals in full, upholding the initial rulings for the Claimant's arguments of misuse of private information and breach of confidence. The High Court also found that the previous judge was wrong to reject the Claimant's Data Protection Act 2018 (DPA 2018) and UK General Data Protection Regulation (UK GDPR) claims. The court held that disclosure of information can constitute "processing" even if the disclosure is oral.</p>
<p>The Court upheld £4,500 in damages and a full recovery of the claimant's legal success fee for the exacerbation of the Claimant's existing psychological conditions.</p>
<p>Click <strong><a href="https://sites-rpc.vuturevx.com/e/g3kwkasouwymoig">here</a></strong> to read the judgment.</p>
<h4>UK Government Responds to New Measures to Target Ransomware Attacks</h4>
<p>The UK Government has released its response to the contributions received during its public consultation on its proposed ransomware legislation.</p>
<p>There were three proposals on which the Government requested insight:</p>
<p>(i) a ban on ransomware payments for all public sector bodies and operators of critical national infrastructure;</p>
<p>(ii) a ransomware payment prevention regime; and</p>
<p>(iii) a mandatory incident reporting regime.</p>
<p>There was widespread support for both the targeted ransomware ban, and the mandatory incident reporting regime with the two proposals garnering approval from almost 72% and 63% of participants respectively.</p>
<p>Despite the strong support for both proposals, commentators had concerns over about the scope and implementation of these proposals. Respondents emphasised that the success of these proposals would turn on the availability of sector-specific accessible guidance to support implementation and to reduce the administrative burden on SMEs. They also requested clarity over the inclusion of supply chains within the targeted ban and the inclusion of individuals within the reporting regime.</p>
<p>In contrast, the wider ransomware payment prevent regime received a mixed response with only 47% of respondents in favour.</p>
<p>The primary concern was that it would redirect and concentrate ransomware attacks to those outside of the regime, rather than reducing the number of attacks. There was also doubt about the Government's claims that the regime would enable law enforcement to intervene and investigate ransomware threats.</p>
<p>The Government has confirmed that it will continue to work with industry to refine its proposals and resolve concerns over the proposals' scope and implementation.</p>
<p>You can read the Government's consultation outcome <strong><a href="https://sites-rpc.vuturevx.com/e/kkuoycw8ugnoia">here</a></strong>.</p>]]></content:encoded></item><item><guid isPermaLink="false">{1095F807-98C2-4945-A13A-622D1B14B5F2}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/eu-uk-data-adequacy-renewal-proceed-with-caution/</link><title>EU-UK data adequacy renewal - proceed with caution</title><description><![CDATA[The EU-UK draft adequacy renewal was published last week. Partner Cavan Fabris and trainee Sophie Hudson from our Cyber & Data Privacy team have summarised the key takeaways below.]]></description><pubDate>Mon, 28 Jul 2025 16:09:00 +0100</pubDate><category>Data and privacy</category><authors:names>Cavan Fabris, Sophie Hudson</authors:names><enclosure url="https://www.rpclegal.com/-/media/rpc/redesign-images/thinking-tiles/wide/data-and-cyber-1---thinking-tile-wide.jpg?rev=4b6dbfd0eb224470bc21a554b4cb58fd&amp;hash=7E983E679A0FF006CFC9E5543A132D05" type="image/jpeg" medium="image" /><content:encoded><![CDATA[<p class="Tabletextleft">The European Commission's Draft Renewal of EU adequacy decision for the UK under the GDPR, published 22 July 2025, has reaffirmed that organisations based in the EU have a valid mechanism for transferring EU personal data to the UK. It is a welcome development for UK businesses that operate in the EU and for all organisations relying on cross-border data flows.</p>
<p class="Tabletextleft">However, this renewal comes with clear caveats. The EU’s adequacy framework is built on the principle of “essential equivalence.” This means the UK must maintain data protection standards that closely match those of the EU’s GDPR. The adequacy decision is not permanent and may change as the UK's regulatory landscape evolves.</p>
<p class="Tabletextleft">Click <a href="https://commission.europa.eu/law/law-topic/data-protection/international-dimension-data-protection/adequacy-decisions_en"><strong>here</strong></a> to read Draft Renewal of EU adequacy decision for the UK under the GDPR in full.</p>
<p><strong><span>Key Takeaways:</span></strong></p>
<p style="margin-left: 40px;"><strong><span>1. </span></strong><strong>Adequacy is conditional:</strong></p>
<p><strong> </strong>The European Commission must monitor developments in the UK on an ongoing basis to ensure that the UK continues to provide an equivalent level of data protection.  The EU reviews adequacy decisions at least every four years, meaning that the decision will be reviewed come again in 2029. The UK’s future adequacy is not a permanent guarantee.</p>
<p style="margin-left: 40px;"><strong><span>2. Legislative changes trigger reassessment:</span></strong></p>
<p><span> Any reforms to the UK GDPR or Data (Use and Access) Act that weaken individual rights, reduce regulatory oversight, or dilute safeguards may put the UK's ongoing adequacy at risk. In particular, the Draft closely assesses the recently enacted Data (Use and Access) Act and its compliance. Continued adherence to the European Convention of Human Rights and submission to the jurisdiction of the European Court of Human Rights is also required. </span></p>
<p><span>The Commission noted that the following areas should be monitored closely to ensure ongoing adequacy:</span></p>
<ul>
    <li><strong>Automated decision-making</strong>: Safeguards ensuring transparency and human intervention should remain robust.</li>
    <li>Processing special categories of personal data: The UK's data protection framework continues to provide specific safeguards where special categories of data are involved, though this will be monitored.</li>
    <li><strong>Purpose limitation</strong>: The UK should continue to require that data is processed for a specific purpose and subsequently used only insofar as this is not incompatible with the original purpose of the processing.</li>
    <li><strong>International transfers</strong>: The UK must ensure onward transfers only go to jurisdictions with strong protections. If that were to change, this would undermine the level of protection currently guaranteed to personal data transferred from the EU to the United Kingdom. This will be closely monitored by the Commission.</li>
</ul>
<p><span>      <strong>3.   Oversight, Enforcement, and Data Subject Rights</strong></span></p>
<p><span></span>The independence and effectiveness of the UK’s data protection authority (soon to be the Information Commission) remain under scrutiny. The EU will watch closely to ensure individuals retain effective means to challenge misuse of their data and seek redress.</p>
<p>The UK’s exclusion from the EU’s consistency and cooperation mechanisms post-Brexit may create challenges for harmonised enforcement and interpretation.</p>
<p><strong><span>Next steps</span></strong></p>
<p><span>The message is clear. Ongoing adequacy requires regulatory alignment and a commitment to high data protection standards, particularly in light of the changing regulatory landscape. UK regulators must tread a careful line between allowing innovation but ensuring ongoing adequacy. Businesses should remain abreast with how these changes might impact their daily functions and should not be complacent that future adequacy is guaranteed. </span></p>
<p><span></span>Assess your cross-border data transfer mechanisms and be prepared to implement alternatives if the adequacy status changes. Seek legal advice if you process EU personal data or rely on cross-border data flows.</p>]]></content:encoded></item><item><guid isPermaLink="false">{7D707809-3044-424C-801C-EC177D12CBDA}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/data-dispatch-june-2025/</link><title>Data Dispatch - June 2025</title><description><![CDATA[<p style="text-align: left;">Please do feel free to forward on the publication to your colleagues or, better still, recommend that they <a href="https://sites-rpc.vuturevx.com/5/8/landing-pages/subscribe-data-digest.asp">subscribe</a> to receive the publication directly.</p>
<p style="text-align: left;">If there are any issues on which you'd like more information (or if you have any questions or feedback), please do let us know or get in touch with your usual contact at RPC.</p>
<h3 style="text-align: left;">Key developments </h3>
<p style="text-align: left;"><strong>ICO's new AI and biometrics strategy</strong></p>
<p style="text-align: left;">On 5 June 2025, the UK Information Commissioner’s Office (ICO) published its updated AI and Biometrics Strategy, including its regulatory priorities for 2025–26. Entitled “Preventing harm, promoting trust”, the strategy aims to foster responsible innovation by clarifying how AI and biometric technologies—including automated decision-making (ADM) systems, facial recognition, and AI foundation models—can be deployed lawfully and transparently, while addressing public concerns around fairness and accountability.</p>
<p style="text-align: left;">In the strategy, the ICO identifies three cross-cutting areas of regulatory concern:</p>
<ul>
    <li style="text-align: left;">Transparency and explainability: Individuals must be informed when AI is used and how it affects them. However, across ADM, facial recognition, and generative AI, research shows that opacity remains a significant issue, undermining public trust.</li>
    <li style="text-align: left;">Bias and discrimination: The ICO is particularly concerned about the risk of structural bias being replicated or amplified through unrepresentative training data. This risk is especially acute in unproven AI systems such as emotion recognition tools used in recruitment.</li>
    <li style="text-align: left;">Rights and redress: Individuals must have accessible mechanisms to challenge and rectify decisions made by AI systems, particularly where such decisions result in significant harm. Accuracy, appropriate safeguards, and effective redress mechanisms are essential to maintaining public confidence.</li>
</ul>
<p style="text-align: left;">The ICO’s plan of action for 2025–26 reflects this ambition. It will update its existing guidance on ADM and profiling, and commence the development of a statutory Code of Practice on AI and ADM to support compliance with data protection principles. This guidance will also need to take into account recent changes introduced by the new Data (Use and Access) Act that allow for ADM in a wider range of situations if appropriate safeguards are in place. The ICO also intends to enhance oversight in high-risk sectors, including the use of ADM in recruitment processes. It will examine how developers of AI foundation models address privacy and safety concerns during training. Looking ahead, the ICO will take a proactive approach to emerging AI risks, including assessing the data protection implications of agentic AI and setting a high threshold for the lawful use of AI systems that infer subjective traits, intentions, or emotions.</p>
<p style="text-align: left;"><a href="https://ico.org.uk/about-the-ico/our-information/our-strategies-and-plans/artificial-intelligence-and-biometrics-strategy/">(ICO AI and Biometrics Strategy)</a></p>
<h3 style="text-align: left;">Enforcement Actions</h3>
<p style="text-align: left;"><strong>German privacy regulator imposes major fines (EUR 45 million) on Vodafone</strong></p>
<p style="text-align: left;">In June 2025, Vodafone’s German subsidiary, Vodafone GmbH, faced fines that sum up to EUR 45 million by the German Federal Privacy Regulator due to infringements of privacy law (GDPR). Some headlines even referred to it as the “highest fine ever imposed in Germany” which is not fully accurate as it comprises two independent actions of 1.) EUR 15 million and 2.) EUR 30 million, thus each still falling short of the EUR 35 million fine imposed on Swedish retailer H&M in 2020. Nevertheless, it shows again that even large organisations with a major budget for privacy compliance and long-established processes need to continuously review and evaluate their compliance efforts in particular with regard to supply chain management and technical interfaces.</p>
<p style="text-align: left;"><strong>The Ruling and Imposed Fines</strong></p>
<p style="text-align: left;"><strong> </strong>The actual actions against Vodafone are due to incidents involving fraudulent activities by employees in independent partner agencies. These employees brokered contracts with customers on behalf of Vodafone, leading to fictitious contracts or unauthorised contract changes, causing financial harm to customers. Additionally, Vodafone exhibited security deficiencies in the authentication process for its online portal 'MeinVodafone' and the Vodafone Hotline, which exposed eSIM profiles to unauthorised third parties.</p>
<p style="text-align: left;">The German Federal Commissioner for Data Protection and Freedom of Information (BfDI), Prof. Dr. Louisa Specht-Riemenschneider, imposed two fines totaling EUR 45 million on Vodafone GmbH:</p>
<ul>
    <li style="text-align: left;">EUR 15 million: For failing to adequately review and monitor partner agencies, violating Article 28(1) sentence 1 of the GDPR.</li>
    <li style="text-align: left;">EUR 30 million: For security deficiencies in the authentication process, violating Article 32(1) of the GDPR.</li>
</ul>
<p style="text-align: left;">Additionally, the BfDI issued a warning to Vodafone regarding vulnerabilities in certain distribution systems.</p>
<p style="text-align: left;"><strong>What are the reasons for the BfDI's Decisions?</strong></p>
<p style="text-align: left;">The BfDI's decisions were driven by serious concerns about data protection and security lapses within Vodafone. The regulator identified that Vodafone did not sufficiently oversee its supply chain, namely the independent partner agencies, leading to fraudulent activities. Moreover, the shortcomings in the authentication processes posed significant risks, allowing unauthorised access to sensitive eSIM profiles.</p>
<p style="text-align: left;"><strong>Vodafone's Reaction to the Decisions</strong></p>
<p style="text-align: left;">Vodafone has responded proactively to the BfDI's decisions by improving and, in some cases, completely replacing its processes and systems to eliminate future risks. The company has revised its procedures for selecting and auditing partner agencies and terminated relationships with fraudulent partners. Additionally, Vodafone has donated several million euros to organisations promoting data protection, media competence, digital literacy, and combating cyberbullying.</p>
<p style="text-align: left;">The BfDI in its press release explicitly acknowledged Vodafone’s efforts to cooperate with the regulator and to mitigate the risks it created for the customers. The regulator made it quite clear that the fines could have been substantially higher if Vodafone had been less cooperative.</p>
<p style="text-align: left;"><strong>What others can learn from the Vodafone decisions</strong></p>
<p style="text-align: left;"><strong> </strong>While Vodafone accepted the fines, other companies should learn from it in order to avoid similar financial and reputational damage:</p>
<ul>
    <li style="text-align: left;">Companies should prioritise investments in modernising and consolidating IT systems to avoid security incidents and potential sanctions. The risk that an issue can create for the rights of the data subject determines the required level of protective measures and not the cost of the measures.</li>
    <li style="text-align: left;">Adequate oversight of the supply chain / data processors is crucial for actual compliance. Regulators as well as courts expect not only formal papertrail audits but documentation of actual checks and active oversight up to the weakest link in the chain of data processors.</li>
    <li style="text-align: left;">Proactive cooperation and transparency towards regulatory bodies can mitigate penalties.</li>
</ul>
<p style="text-align: left;"><em><strong>Contributed by Matthias Orthwein, SKW Schwarz Rechtsanwaelte, Munich (Germany)</strong></em></p>
<p style="text-align: left;"><strong>23andMe fined £2.31 million for failing to protect users' genetic data</strong></p>
<p style="text-align: left;"><strong> </strong>On 17 June 2025, the Information Commissioner's Office (ICO) announced a £2.31 million fine against genetic testing company 23andMe for failing to implement adequate security measures to protect the personal data of over 155,000 UK users following a major cyber attack in 2023. The ICO carried out their investigation alongside the Canadian data protection regulator.</p>
<p style="text-align: left;">The 2023 attack which exploited users' login credentials resulted in hackers accessing UK users' personal data, including names, addresses, family histories and other healthcare information. The ICO investigation found 23andMe to be in breach of UK data protection laws having failed to take the necessary basic steps to protect user data. The company had not implemented any multi-factor authentication or password protocols, their security systems were weak and unable to detect or manage cyber threats, and they had not proactively responded to obvious warning signs.</p>
<p style="text-align: left;">The ICO also found 23andMe's response to the breach to be inadequate. The cyber attack began in April 2023 but the company had failed to detect the breach and had then dismissed a report of data theft as a hoax. 23andMe had only launched a substantive investigation in October 2023.</p>
<p style="text-align: left;">The ICO received 12 consumer complaints to the ICO expressing concerns over personal data being exploited by malicious actors. In its report, the ICO recommends steps businesses should take to protect themselves against cyber attacks, in particular multi-factor authentication, vulnerability scanning, and security patching.</p>
<p style="text-align: left;">(<a href="https://ico.org.uk/about-the-ico/media-centre/news-and-blogs/2025/06/23andme-fined-for-failing-to-protect-uk-users-genetic-data/">ICO News</a>)</p>
<h3 style="text-align: left;">Need to know</h3>
<p style="text-align: left;"><strong>The EU proposes simplifying GDPR for smaller companies</strong></p>
<p style="text-align: left;">On 21 May 2025, the European Commission published a proposal to extend certain GDPR exemptions previously available only to small and medium-sized enterprises (SMEs) to small mid-cap (SMC) enterprises.</p>
<p style="text-align: left;">The proposal seeks to amend Article 30(5) of the GDPR by extending the exemption from the obligation to maintain Records of Processing Activities (ROPA) to SMCs. SMCs are defined as organisations with fewer than 750 employees, an annual turnover not exceeding €150 million, and a balance sheet total not exceeding €129 million.</p>
<p style="text-align: left;">This change is intended to support enterprises that have grown beyond SME status, by allowing them to adopt a more simplified compliance approach. The Commission previously acknowledged that the existing ROPA obligations could be overly burdensome for such organisations.</p>
<p style="text-align: left;">The proposal also includes other changes to take into account the specific needs of SMCs in developing codes of conduct and certification mechanisms.</p>
<p style="text-align: left;">The proposal will now move through the EU’s legislative process, during which it may be further amended by the European Parliament or the Council.</p>
<p style="text-align: left;">(<a href="https://single-market-economy.ec.europa.eu/document/download/d88a75de-b620-4d8b-b85b-1656a9ba6b8a_en?filename=Proposal%20for%20a%20Regulation%20-%20Small%20mid-caps.pdf">EU Commission proposal</a>)</p>
<p style="text-align: left;"><strong>CBPR certification: A New Option for Cross-Border Data Governance</strong></p>
<p style="text-align: left;">On 2 June 2025, the Global Cross Border Privacy Rules (CBPR) and Privacy Recognition for Processors (PRP) certification systems officially launched, marking a significant development in international data protection. Evolving from the APEC CBPR framework—originally established to facilitate responsible data transfers among Asia-Pacific economies—the Global CBPR framework aims to provide a scalable and interoperable mechanism for enabling secure data flows across jurisdictions. While CBPR certification does not in itself guarantee compliance with the data protection laws of participating jurisdictions, it is recognised in some jurisdictions—such as Singapore and Japan—as a valid mechanism for facilitating lawful international data transfers under local law.</p>
<p style="text-align: left;">Unlike its predecessor, which was limited to APEC members, the Global CBPR system is open to any jurisdiction. As of June 2025, nine countries have joined as founding members: Australia, Canada, Japan, Mexico, the Philippines, South Korea, Singapore, Chinese Taipei, and the United States. Its core objective is to establish a common baseline for privacy protections, enabling businesses to transfer data across borders while demonstrating compliance with internationally recognised principles. Certification is voluntary and based on an independent assessment by an approved Accountability Agent.</p>
<p style="text-align: left;">The United Kingdom became the first Associate member of the Global CBPR Forum in 2023. Although Associate members do not yet issue certifications domestically, the UK's early engagement reflects strong support for global cooperation on trusted data flows.</p>
<p style="text-align: left;">The Global CBPR framework is not currently recognised as equivalent to the EU or UK GDPR. However, the Forum is considering material updates to the assessment criteria pursuant to which an organisation is to be certified—many of which reflect principles already embedded in the GDPR, such as breach notification, sensitive data handling, consent withdrawal, and records of processing. This suggests a growing alignment with high-standard privacy regimes and may support greater interoperability over time.</p>
<p style="text-align: left;">In the near term, UK businesses cannot yet obtain Global CBPR certification through a UK-based process, as full participation awaits further developments in the UK’s membership status. However, the Global CBPR framework may already serve as a practical reference point when assessing the adequacy of safeguards for international data transfers. Furthermore, as more jurisdictions adopt or align with the framework, it may become a credible and practical mechanism for ensuring robust data protection and demonstrating compliance with legal requirements across multiple jurisdictions</p>
<p style="text-align: left;">(<a href="https://www.globalcbpr.org/">Global CBPR</a>)</p>
<p style="text-align: left;">(<a href="https://www.gov.uk/government/news/uk-gets-new-status-in-global-data-privacy-certification-programme">UK government’s announcement in 2023</a>)</p>
<h3 style="text-align: left;">Other important developments</h3>
<p style="text-align: left;"><strong>Data (Use and Access) Bill Update</strong></p>
<p style="text-align: left;">On 19 June 2025 the Data (Use and Access) Bill received Royal Assent. The new law introduces targeted business-friendly changes to the UK GDPR. The ICO has also published <a href="https://ico.org.uk/about-the-ico/media-centre/news-and-blogs/2025/06/uk-organisations-stand-to-benefit-from-new-data-protection-laws/#:~:text=The%20DUAA%20received%20Royal%20Assent,and%20data%20privacy%20for%20individuals.">guidance</a> to explain the impact of the new law on organisations.</p>]]></description><pubDate>Fri, 27 Jun 2025 13:52:00 +0100</pubDate><category>Data and privacy</category><authors:names>Jon Bartley, Helen Yost, Amy Blackburn, Kiran Dhoot</authors:names><enclosure url="https://www.rpclegal.com/-/media/rpc/redesign-images/thinking-tiles/wide/tech-media-1---thinking-tile-wide.jpg?rev=ee4cf7f6fb8048c5b8fbba82117fa558&amp;hash=B2A6FCC6F2975DF2B5BF91ABB37D548D" type="image/jpeg" medium="image" /><content:encoded><![CDATA[<p style="text-align: left;">Please do feel free to forward on the publication to your colleagues or, better still, recommend that they <a href="https://sites-rpc.vuturevx.com/5/8/landing-pages/subscribe-data-digest.asp">subscribe</a> to receive the publication directly.</p>
<p style="text-align: left;">If there are any issues on which you'd like more information (or if you have any questions or feedback), please do let us know or get in touch with your usual contact at RPC.</p>
<h3 style="text-align: left;">Key developments </h3>
<p style="text-align: left;"><strong>ICO's new AI and biometrics strategy</strong></p>
<p style="text-align: left;">On 5 June 2025, the UK Information Commissioner’s Office (ICO) published its updated AI and Biometrics Strategy, including its regulatory priorities for 2025–26. Entitled “Preventing harm, promoting trust”, the strategy aims to foster responsible innovation by clarifying how AI and biometric technologies—including automated decision-making (ADM) systems, facial recognition, and AI foundation models—can be deployed lawfully and transparently, while addressing public concerns around fairness and accountability.</p>
<p style="text-align: left;">In the strategy, the ICO identifies three cross-cutting areas of regulatory concern:</p>
<ul>
    <li style="text-align: left;">Transparency and explainability: Individuals must be informed when AI is used and how it affects them. However, across ADM, facial recognition, and generative AI, research shows that opacity remains a significant issue, undermining public trust.</li>
    <li style="text-align: left;">Bias and discrimination: The ICO is particularly concerned about the risk of structural bias being replicated or amplified through unrepresentative training data. This risk is especially acute in unproven AI systems such as emotion recognition tools used in recruitment.</li>
    <li style="text-align: left;">Rights and redress: Individuals must have accessible mechanisms to challenge and rectify decisions made by AI systems, particularly where such decisions result in significant harm. Accuracy, appropriate safeguards, and effective redress mechanisms are essential to maintaining public confidence.</li>
</ul>
<p style="text-align: left;">The ICO’s plan of action for 2025–26 reflects this ambition. It will update its existing guidance on ADM and profiling, and commence the development of a statutory Code of Practice on AI and ADM to support compliance with data protection principles. This guidance will also need to take into account recent changes introduced by the new Data (Use and Access) Act that allow for ADM in a wider range of situations if appropriate safeguards are in place. The ICO also intends to enhance oversight in high-risk sectors, including the use of ADM in recruitment processes. It will examine how developers of AI foundation models address privacy and safety concerns during training. Looking ahead, the ICO will take a proactive approach to emerging AI risks, including assessing the data protection implications of agentic AI and setting a high threshold for the lawful use of AI systems that infer subjective traits, intentions, or emotions.</p>
<p style="text-align: left;"><a href="https://ico.org.uk/about-the-ico/our-information/our-strategies-and-plans/artificial-intelligence-and-biometrics-strategy/">(ICO AI and Biometrics Strategy)</a></p>
<h3 style="text-align: left;">Enforcement Actions</h3>
<p style="text-align: left;"><strong>German privacy regulator imposes major fines (EUR 45 million) on Vodafone</strong></p>
<p style="text-align: left;">In June 2025, Vodafone’s German subsidiary, Vodafone GmbH, faced fines that sum up to EUR 45 million by the German Federal Privacy Regulator due to infringements of privacy law (GDPR). Some headlines even referred to it as the “highest fine ever imposed in Germany” which is not fully accurate as it comprises two independent actions of 1.) EUR 15 million and 2.) EUR 30 million, thus each still falling short of the EUR 35 million fine imposed on Swedish retailer H&M in 2020. Nevertheless, it shows again that even large organisations with a major budget for privacy compliance and long-established processes need to continuously review and evaluate their compliance efforts in particular with regard to supply chain management and technical interfaces.</p>
<p style="text-align: left;"><strong>The Ruling and Imposed Fines</strong></p>
<p style="text-align: left;"><strong> </strong>The actual actions against Vodafone are due to incidents involving fraudulent activities by employees in independent partner agencies. These employees brokered contracts with customers on behalf of Vodafone, leading to fictitious contracts or unauthorised contract changes, causing financial harm to customers. Additionally, Vodafone exhibited security deficiencies in the authentication process for its online portal 'MeinVodafone' and the Vodafone Hotline, which exposed eSIM profiles to unauthorised third parties.</p>
<p style="text-align: left;">The German Federal Commissioner for Data Protection and Freedom of Information (BfDI), Prof. Dr. Louisa Specht-Riemenschneider, imposed two fines totaling EUR 45 million on Vodafone GmbH:</p>
<ul>
    <li style="text-align: left;">EUR 15 million: For failing to adequately review and monitor partner agencies, violating Article 28(1) sentence 1 of the GDPR.</li>
    <li style="text-align: left;">EUR 30 million: For security deficiencies in the authentication process, violating Article 32(1) of the GDPR.</li>
</ul>
<p style="text-align: left;">Additionally, the BfDI issued a warning to Vodafone regarding vulnerabilities in certain distribution systems.</p>
<p style="text-align: left;"><strong>What are the reasons for the BfDI's Decisions?</strong></p>
<p style="text-align: left;">The BfDI's decisions were driven by serious concerns about data protection and security lapses within Vodafone. The regulator identified that Vodafone did not sufficiently oversee its supply chain, namely the independent partner agencies, leading to fraudulent activities. Moreover, the shortcomings in the authentication processes posed significant risks, allowing unauthorised access to sensitive eSIM profiles.</p>
<p style="text-align: left;"><strong>Vodafone's Reaction to the Decisions</strong></p>
<p style="text-align: left;">Vodafone has responded proactively to the BfDI's decisions by improving and, in some cases, completely replacing its processes and systems to eliminate future risks. The company has revised its procedures for selecting and auditing partner agencies and terminated relationships with fraudulent partners. Additionally, Vodafone has donated several million euros to organisations promoting data protection, media competence, digital literacy, and combating cyberbullying.</p>
<p style="text-align: left;">The BfDI in its press release explicitly acknowledged Vodafone’s efforts to cooperate with the regulator and to mitigate the risks it created for the customers. The regulator made it quite clear that the fines could have been substantially higher if Vodafone had been less cooperative.</p>
<p style="text-align: left;"><strong>What others can learn from the Vodafone decisions</strong></p>
<p style="text-align: left;"><strong> </strong>While Vodafone accepted the fines, other companies should learn from it in order to avoid similar financial and reputational damage:</p>
<ul>
    <li style="text-align: left;">Companies should prioritise investments in modernising and consolidating IT systems to avoid security incidents and potential sanctions. The risk that an issue can create for the rights of the data subject determines the required level of protective measures and not the cost of the measures.</li>
    <li style="text-align: left;">Adequate oversight of the supply chain / data processors is crucial for actual compliance. Regulators as well as courts expect not only formal papertrail audits but documentation of actual checks and active oversight up to the weakest link in the chain of data processors.</li>
    <li style="text-align: left;">Proactive cooperation and transparency towards regulatory bodies can mitigate penalties.</li>
</ul>
<p style="text-align: left;"><em><strong>Contributed by Matthias Orthwein, SKW Schwarz Rechtsanwaelte, Munich (Germany)</strong></em></p>
<p style="text-align: left;"><strong>23andMe fined £2.31 million for failing to protect users' genetic data</strong></p>
<p style="text-align: left;"><strong> </strong>On 17 June 2025, the Information Commissioner's Office (ICO) announced a £2.31 million fine against genetic testing company 23andMe for failing to implement adequate security measures to protect the personal data of over 155,000 UK users following a major cyber attack in 2023. The ICO carried out their investigation alongside the Canadian data protection regulator.</p>
<p style="text-align: left;">The 2023 attack which exploited users' login credentials resulted in hackers accessing UK users' personal data, including names, addresses, family histories and other healthcare information. The ICO investigation found 23andMe to be in breach of UK data protection laws having failed to take the necessary basic steps to protect user data. The company had not implemented any multi-factor authentication or password protocols, their security systems were weak and unable to detect or manage cyber threats, and they had not proactively responded to obvious warning signs.</p>
<p style="text-align: left;">The ICO also found 23andMe's response to the breach to be inadequate. The cyber attack began in April 2023 but the company had failed to detect the breach and had then dismissed a report of data theft as a hoax. 23andMe had only launched a substantive investigation in October 2023.</p>
<p style="text-align: left;">The ICO received 12 consumer complaints to the ICO expressing concerns over personal data being exploited by malicious actors. In its report, the ICO recommends steps businesses should take to protect themselves against cyber attacks, in particular multi-factor authentication, vulnerability scanning, and security patching.</p>
<p style="text-align: left;">(<a href="https://ico.org.uk/about-the-ico/media-centre/news-and-blogs/2025/06/23andme-fined-for-failing-to-protect-uk-users-genetic-data/">ICO News</a>)</p>
<h3 style="text-align: left;">Need to know</h3>
<p style="text-align: left;"><strong>The EU proposes simplifying GDPR for smaller companies</strong></p>
<p style="text-align: left;">On 21 May 2025, the European Commission published a proposal to extend certain GDPR exemptions previously available only to small and medium-sized enterprises (SMEs) to small mid-cap (SMC) enterprises.</p>
<p style="text-align: left;">The proposal seeks to amend Article 30(5) of the GDPR by extending the exemption from the obligation to maintain Records of Processing Activities (ROPA) to SMCs. SMCs are defined as organisations with fewer than 750 employees, an annual turnover not exceeding €150 million, and a balance sheet total not exceeding €129 million.</p>
<p style="text-align: left;">This change is intended to support enterprises that have grown beyond SME status, by allowing them to adopt a more simplified compliance approach. The Commission previously acknowledged that the existing ROPA obligations could be overly burdensome for such organisations.</p>
<p style="text-align: left;">The proposal also includes other changes to take into account the specific needs of SMCs in developing codes of conduct and certification mechanisms.</p>
<p style="text-align: left;">The proposal will now move through the EU’s legislative process, during which it may be further amended by the European Parliament or the Council.</p>
<p style="text-align: left;">(<a href="https://single-market-economy.ec.europa.eu/document/download/d88a75de-b620-4d8b-b85b-1656a9ba6b8a_en?filename=Proposal%20for%20a%20Regulation%20-%20Small%20mid-caps.pdf">EU Commission proposal</a>)</p>
<p style="text-align: left;"><strong>CBPR certification: A New Option for Cross-Border Data Governance</strong></p>
<p style="text-align: left;">On 2 June 2025, the Global Cross Border Privacy Rules (CBPR) and Privacy Recognition for Processors (PRP) certification systems officially launched, marking a significant development in international data protection. Evolving from the APEC CBPR framework—originally established to facilitate responsible data transfers among Asia-Pacific economies—the Global CBPR framework aims to provide a scalable and interoperable mechanism for enabling secure data flows across jurisdictions. While CBPR certification does not in itself guarantee compliance with the data protection laws of participating jurisdictions, it is recognised in some jurisdictions—such as Singapore and Japan—as a valid mechanism for facilitating lawful international data transfers under local law.</p>
<p style="text-align: left;">Unlike its predecessor, which was limited to APEC members, the Global CBPR system is open to any jurisdiction. As of June 2025, nine countries have joined as founding members: Australia, Canada, Japan, Mexico, the Philippines, South Korea, Singapore, Chinese Taipei, and the United States. Its core objective is to establish a common baseline for privacy protections, enabling businesses to transfer data across borders while demonstrating compliance with internationally recognised principles. Certification is voluntary and based on an independent assessment by an approved Accountability Agent.</p>
<p style="text-align: left;">The United Kingdom became the first Associate member of the Global CBPR Forum in 2023. Although Associate members do not yet issue certifications domestically, the UK's early engagement reflects strong support for global cooperation on trusted data flows.</p>
<p style="text-align: left;">The Global CBPR framework is not currently recognised as equivalent to the EU or UK GDPR. However, the Forum is considering material updates to the assessment criteria pursuant to which an organisation is to be certified—many of which reflect principles already embedded in the GDPR, such as breach notification, sensitive data handling, consent withdrawal, and records of processing. This suggests a growing alignment with high-standard privacy regimes and may support greater interoperability over time.</p>
<p style="text-align: left;">In the near term, UK businesses cannot yet obtain Global CBPR certification through a UK-based process, as full participation awaits further developments in the UK’s membership status. However, the Global CBPR framework may already serve as a practical reference point when assessing the adequacy of safeguards for international data transfers. Furthermore, as more jurisdictions adopt or align with the framework, it may become a credible and practical mechanism for ensuring robust data protection and demonstrating compliance with legal requirements across multiple jurisdictions</p>
<p style="text-align: left;">(<a href="https://www.globalcbpr.org/">Global CBPR</a>)</p>
<p style="text-align: left;">(<a href="https://www.gov.uk/government/news/uk-gets-new-status-in-global-data-privacy-certification-programme">UK government’s announcement in 2023</a>)</p>
<h3 style="text-align: left;">Other important developments</h3>
<p style="text-align: left;"><strong>Data (Use and Access) Bill Update</strong></p>
<p style="text-align: left;">On 19 June 2025 the Data (Use and Access) Bill received Royal Assent. The new law introduces targeted business-friendly changes to the UK GDPR. The ICO has also published <a href="https://ico.org.uk/about-the-ico/media-centre/news-and-blogs/2025/06/uk-organisations-stand-to-benefit-from-new-data-protection-laws/#:~:text=The%20DUAA%20received%20Royal%20Assent,and%20data%20privacy%20for%20individuals.">guidance</a> to explain the impact of the new law on organisations.</p>]]></content:encoded></item><item><guid isPermaLink="false">{3F09CC21-DAE3-43B1-A48F-0875F47D1AA3}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/cyber-bytes-issue-74/</link><title>Cyber_Bytes - Issue 74</title><description><![CDATA[<h3 style="color: #000000; background-color: #ffffff; margin-right: 0px; margin-bottom: 20px; margin-left: 0px; padding: 0px; text-align: left;"><span>RPC Cyber App: Breach Counsel at Your Fingertips </span></h3>
<p>As cyber-attacks and follow-on litigation continue to be a board-level issue for organisations worldwide, the RPCCyber_ App provides a one-stop-shop resource for cyber breach assistance and pre-breach preparedness. As well as information about RPC's cyber-related expertise, the app also contains guidance on prevention against common incidents and access to our ongoing cyber market insights.</p>
<p>RPCCyber_ can be downloaded for free from the<span> <strong><a href="https://apps.apple.com/gb/app/rpc-cyber/id6478118376">Apple Store</a></strong> or <strong><a href="https://apps.apple.com/gb/app/rpc-cyber/id6478118376">Google Play Store</a></strong>.</span></p>
<h3><span><strong>UK government ransom ban – what does this mean for insurance?</strong></span></h3>
<p>RPC's Head of Cyber & Tech Insurance, Richard Breavington, was recently featured in <em>Insurance Business</em>' article on the UK government's proposed ransom ban and what it means for insurance.</p>
<p>The government has proposed legislation that would ban all public sector bodies and critical national infrastructure – including the NHS, local councils, and schools – from making ransomware payments. The aim is to make these entities less attractive targets for criminals; this would expand the current ban on ransom payments by government departments.</p>
<p>Speaking on how such a ban could impact organisations, Richard said: “If the option to pay a ransom is removed, the potential impact could be significantly greater because organisations are unlikely to be able to restore data unless backups are available or the data can otherwise be replaced from non-affected sources.”</p>
<p>For cyber insurers, a ransom ban would need to be factored into planning at both the underwriting and claims stages. For instance, there is a possibility that multiple insured organisations could be successfully attacked at the same time and be unable to pay a ransom.</p>
<p>Richard commented: “Insurers are developing various strategies to deal with this – including sophisticated modelling, asking questions upfront about supply chains to monitor exposure across insureds – and reinsurance. However, it remains a key concern in this area.”</p>
<p><strong>Click </strong><span><a href="https://www.insurancebusinessmag.com/uk/news/cyber/uk-government-ransom-ban--what-does-this-mean-for-insurance-533012.aspx"><strong>here</strong></a></span><strong> to read more from Insurance Business and </strong><span><a href="https://www.gov.uk/government/consultations/ransomware-proposals-to-increase-incident-reporting-and-reduce-payments-to-criminals/ransomware-legislative-proposals-reducing-payments-to-cyber-criminals-and-increasing-incident-reporting-accessible"><strong>here</strong></a></span><strong> to read the GOV.UK consultation.</strong></p>
<h3><span><strong>DPP Law Ltd faces a £60,000 penalty notice</strong></span></h3>
<p>The ICO required DPP Law Ltd (DPP) to pay a £60,000 fine after finding that they had infringed Articles 5(1)(f), 32(1), 32(2), and 33(1) of the UK GDPR.<br />
<br />
These articles cover:</p>
<ul>
    <li>
    <p>Article 5(1)(f): Ensuring data is processed securely.</p>
    </li>
    <li>
    <p>Article 32(1) and (2): Implementing appropriate technical and organisational measures to ensure a level of security appropriate to the risk.</p>
    </li>
    <li>
    <p>Article 33(1): Notifying the Information Commissioner of a personal data breach without undue delay and, where feasible, within 72 hours.</p>
    </li>
</ul>
<p>DPP’s email server had stopped working and staff had no access to DPP’s IT network. DPP’s in-house IT manager established that all files across its servers had been corrupted. DPP’s external IT supplier believed that DPP had suffered a ransomware incident, despite not receiving any ransom demands.</p>
<p>The ICO determined that, by neglecting to undertake an assessment of the risks posed to data subjects as a result of the lack of availability of personal data, DPP did not notify the Commissioner until 43 days after the Cyber Incident, which was well-beyond the 72-hour reporting deadline. Furthermore, DPP demonstrated a lack of understanding of its obligation to notify the Commissioner of a personal data breach by not appreciating that lack of availability constituted a personal data breach.</p>
<p>The finding that DPP did not have appropriate technical and organisational security measures in place at the time of the incident provides a further precedent as to what that crucial standard actually looks like in practice.  Not for the first time, the lack of MFA in place was a factor in deciding that the standard had not been met.</p>
<p>The incident led to the exfiltration and dark web publication of personal data belonging to 791 individuals, including clients and expert witnesses. This included highly sensitive information relating to court proceedings and DPP’s legal advice to its clients.</p>
<p><strong>Read the decision from the ICO </strong><a href="https://ico.org.uk/media2/pr4bg5hq/dpp-law-ltd-monetary-penalty-notice.pdf"><strong><span>here</span></strong></a>.</p>
<h3><span><strong>ICO issues notice of intent to fine 23andMe £4.59mn for data breach</strong></span></h3>
<p>On 24 March 2025, the UK Information Commissioner's Office (ICO) issued a Notice of Intent to fine 23andMe £4.9m in relation to a data breach that was reported in October 2023.</p>
<p>23andMe is a biotechnology company offering direct-to-consumer genetic testing services. Consequently, the company holds sensitive personal data for its customers.</p>
<p>The October 2023 data breach involved a hacker who claimed to have stolen DNA information from 23andMe customers, and subsequently, published the data of over 1 million customers as proof. It was later confirmed that the hacker had gained access to the personal data of 6.9 million customers in total.</p>
<p>The ICO launched an investigation into 23andMe with the intention to (i) identify the information implicated in the incident and any potential harms involved, (ii) examine whether adequate safeguards were in place, and (iii) assess whether 23andMe provided the required notifications to the ICO and affected data subjects. Given that the ICO had deemed 23andMe to be a custodian of sensitive information, the threshold for breaching its obligations was lowered.</p>
<p>This decision demonstrates the importance of identifying the sensitivity of the information held by an organisation and incorporating the appropriate technical and organisational measures to protect that information.</p>
<p><strong>Click </strong><a href="https://ico.org.uk/about-the-ico/media-centre/news-and-blogs/2025/05/ico-calls-for-protections-for-23andme-customer-data/"><strong><span>here</span></strong></a><strong> to read the latest statement from the ICO.</strong></p>
<h3><span><strong>The high stakes of cybersecurity issues in retail</strong></span></h3>
<p>Between 22 and 29 April 2025 three major retailers – Marks & Spencer, Harrods and the Co-Op – suffered cyber-attacks.</p>
<p>The effects of an incident on high profile retailers can be broad-ranging.  M&S had to pause all online transactions, and experienced widespread in-store disruptions. It has been confirmed that this single attack has resulted in the loss of more than £650m in the company's stock market value. The Co-Op, meanwhile, has been able to recover at a faster pace than M&S, who appear to have had their systems more comprehensively compromised. This might have been because the Co-Op's IT team discovered the incident while it was happening and made the decision to pull the plug on their systems during the attack, meaning threat actors were unsuccessful in deploying ransomware.</p>
<p>Cyber crime should be a cause for concern for all organisations. The number of "nationally significant" cyber attacks in the last 8 months has doubled compared to the same period a year ago.</p>
<p>In a recent speech, Cabinet Minister Pat McFadden has emphasised that cybersecurity can no longer be viewed as a luxury but must become "an absolute necessity" for organisations. </p>
<p>A further point of interest on which we are starting to see comment is the extent to which these recent significant cyber losses could affect the cyber insurance market.  They provide a clear demonstration of the potential for rapid multi-limit losses.</p>
<p><strong>Click </strong><span><a href="https://www.bbc.co.uk/news/articles/cwy382w9eglo"><strong>here</strong></a></span><strong> and </strong><span><a href="https://www.bbc.co.uk/news/articles/cpqe213vw3po"><strong>here</strong></a></span><strong> to read more from the BBC.</strong></p>
<h3><span><strong>Main challenges of EU AI Act-GDPR interplay identified by Member States</strong></span></h3>
<p>On 14 March 2025, representatives from the EU Member States gathered to discuss and identify the compliance challenges that arise from the interplay between the EU AI Act and the EU GDPR.</p>
<p>The representatives have raised concerns surrounding the potential for conflicting legal requirements, inconsistent national governance approaches, and the need for legal advice to minimise the compliance burden.</p>
<p>The potential for conflict is created by the differing regulatory approaches underpinning the two pieces of legislation. The EU GDPR aims to protect personal data from a fundamental rights perspective, while the EU AI Act is primarily a piece of product safety legislation and protects personal data through targeted requirements based on risk levels.</p>
<p>This divergence could lead to contradictory outcomes where an AI system may be compliant with one piece of legislation, but not the other. It was stressed during the March discussion that the two laws must be interpreted and enforced coherently, and not viewed as distinct entities.</p>
<p>Additionally, the representatives called for the creation of joint task forces and technical working groups to create consistent interpretation of these laws across the EU Member States. The goal would be to create a uniform regulatory environment across the EU to reduce the administrative and financial cost of compliance.</p>
<p>The representatives emphasised the need for clear guidelines on how the two laws should interact, and how key concepts should be interpreted and applied. Currently, the Commission and European Data Protection Board are developing guidelines.</p>
<p><strong>Click </strong><span><a href="https://sites-rpc.vuturevx.com/e/muqitq890dqfea/d8fc9cb9-0c64-45a0-a799-2eab3d75d70e"><strong>here</strong></a></span><strong> to read more on MLex.</strong></p>
<h3><span><strong>RPC at London Tech Week – 12 June 2025</strong></span></h3>
<p>Finally, join us on 12 June as we uncover the opportunities, challenges, and innovative solutions shaping the tech industry, presented by an exceptional line-up of experts. We'll be covering everything from how businesses can harness AI ethically for competitive growth to how tech is being used within organisations to bridge generational divides and unlock innovation. We'll also be sharing and celebrating the stories of inspiring women in the sector and looking at how tech and the use of tech has changed over the last decade and what the future looks like in terms of tech use in the media & entertainment, retail & consumer and other industries.</p>
<p><strong>Find out more and register your place </strong><a href="https://www.rpclegal.com/events/london-tech-week-2025/"><strong><span>here</span></strong></a>.</p>]]></description><pubDate>Wed, 21 May 2025 10:09:00 +0100</pubDate><category>Data and privacy</category><authors:names>Richard Breavington, Daniel Guilfoyle, Rachel Ford, Ian Dinning, Christopher Ashton, Elizabeth Zang, Emanuele Santella , Lauren Kerr</authors:names><enclosure url="https://www.rpclegal.com/-/media/rpc/redesign-images/thinking-tiles/wide/data-and-cyber-3---thinking-tile-wide.jpg?rev=a832fae6b3754f3b9abfb7342b45258f&amp;hash=67DF9E4B7F445C81A9421F962408D790" type="image/jpeg" medium="image" /><content:encoded><![CDATA[<h3 style="color: #000000; background-color: #ffffff; margin-right: 0px; margin-bottom: 20px; margin-left: 0px; padding: 0px; text-align: left;"><span>RPC Cyber App: Breach Counsel at Your Fingertips </span></h3>
<p>As cyber-attacks and follow-on litigation continue to be a board-level issue for organisations worldwide, the RPCCyber_ App provides a one-stop-shop resource for cyber breach assistance and pre-breach preparedness. As well as information about RPC's cyber-related expertise, the app also contains guidance on prevention against common incidents and access to our ongoing cyber market insights.</p>
<p>RPCCyber_ can be downloaded for free from the<span> <strong><a href="https://apps.apple.com/gb/app/rpc-cyber/id6478118376">Apple Store</a></strong> or <strong><a href="https://apps.apple.com/gb/app/rpc-cyber/id6478118376">Google Play Store</a></strong>.</span></p>
<h3><span><strong>UK government ransom ban – what does this mean for insurance?</strong></span></h3>
<p>RPC's Head of Cyber & Tech Insurance, Richard Breavington, was recently featured in <em>Insurance Business</em>' article on the UK government's proposed ransom ban and what it means for insurance.</p>
<p>The government has proposed legislation that would ban all public sector bodies and critical national infrastructure – including the NHS, local councils, and schools – from making ransomware payments. The aim is to make these entities less attractive targets for criminals; this would expand the current ban on ransom payments by government departments.</p>
<p>Speaking on how such a ban could impact organisations, Richard said: “If the option to pay a ransom is removed, the potential impact could be significantly greater because organisations are unlikely to be able to restore data unless backups are available or the data can otherwise be replaced from non-affected sources.”</p>
<p>For cyber insurers, a ransom ban would need to be factored into planning at both the underwriting and claims stages. For instance, there is a possibility that multiple insured organisations could be successfully attacked at the same time and be unable to pay a ransom.</p>
<p>Richard commented: “Insurers are developing various strategies to deal with this – including sophisticated modelling, asking questions upfront about supply chains to monitor exposure across insureds – and reinsurance. However, it remains a key concern in this area.”</p>
<p><strong>Click </strong><span><a href="https://www.insurancebusinessmag.com/uk/news/cyber/uk-government-ransom-ban--what-does-this-mean-for-insurance-533012.aspx"><strong>here</strong></a></span><strong> to read more from Insurance Business and </strong><span><a href="https://www.gov.uk/government/consultations/ransomware-proposals-to-increase-incident-reporting-and-reduce-payments-to-criminals/ransomware-legislative-proposals-reducing-payments-to-cyber-criminals-and-increasing-incident-reporting-accessible"><strong>here</strong></a></span><strong> to read the GOV.UK consultation.</strong></p>
<h3><span><strong>DPP Law Ltd faces a £60,000 penalty notice</strong></span></h3>
<p>The ICO required DPP Law Ltd (DPP) to pay a £60,000 fine after finding that they had infringed Articles 5(1)(f), 32(1), 32(2), and 33(1) of the UK GDPR.<br />
<br />
These articles cover:</p>
<ul>
    <li>
    <p>Article 5(1)(f): Ensuring data is processed securely.</p>
    </li>
    <li>
    <p>Article 32(1) and (2): Implementing appropriate technical and organisational measures to ensure a level of security appropriate to the risk.</p>
    </li>
    <li>
    <p>Article 33(1): Notifying the Information Commissioner of a personal data breach without undue delay and, where feasible, within 72 hours.</p>
    </li>
</ul>
<p>DPP’s email server had stopped working and staff had no access to DPP’s IT network. DPP’s in-house IT manager established that all files across its servers had been corrupted. DPP’s external IT supplier believed that DPP had suffered a ransomware incident, despite not receiving any ransom demands.</p>
<p>The ICO determined that, by neglecting to undertake an assessment of the risks posed to data subjects as a result of the lack of availability of personal data, DPP did not notify the Commissioner until 43 days after the Cyber Incident, which was well-beyond the 72-hour reporting deadline. Furthermore, DPP demonstrated a lack of understanding of its obligation to notify the Commissioner of a personal data breach by not appreciating that lack of availability constituted a personal data breach.</p>
<p>The finding that DPP did not have appropriate technical and organisational security measures in place at the time of the incident provides a further precedent as to what that crucial standard actually looks like in practice.  Not for the first time, the lack of MFA in place was a factor in deciding that the standard had not been met.</p>
<p>The incident led to the exfiltration and dark web publication of personal data belonging to 791 individuals, including clients and expert witnesses. This included highly sensitive information relating to court proceedings and DPP’s legal advice to its clients.</p>
<p><strong>Read the decision from the ICO </strong><a href="https://ico.org.uk/media2/pr4bg5hq/dpp-law-ltd-monetary-penalty-notice.pdf"><strong><span>here</span></strong></a>.</p>
<h3><span><strong>ICO issues notice of intent to fine 23andMe £4.59mn for data breach</strong></span></h3>
<p>On 24 March 2025, the UK Information Commissioner's Office (ICO) issued a Notice of Intent to fine 23andMe £4.9m in relation to a data breach that was reported in October 2023.</p>
<p>23andMe is a biotechnology company offering direct-to-consumer genetic testing services. Consequently, the company holds sensitive personal data for its customers.</p>
<p>The October 2023 data breach involved a hacker who claimed to have stolen DNA information from 23andMe customers, and subsequently, published the data of over 1 million customers as proof. It was later confirmed that the hacker had gained access to the personal data of 6.9 million customers in total.</p>
<p>The ICO launched an investigation into 23andMe with the intention to (i) identify the information implicated in the incident and any potential harms involved, (ii) examine whether adequate safeguards were in place, and (iii) assess whether 23andMe provided the required notifications to the ICO and affected data subjects. Given that the ICO had deemed 23andMe to be a custodian of sensitive information, the threshold for breaching its obligations was lowered.</p>
<p>This decision demonstrates the importance of identifying the sensitivity of the information held by an organisation and incorporating the appropriate technical and organisational measures to protect that information.</p>
<p><strong>Click </strong><a href="https://ico.org.uk/about-the-ico/media-centre/news-and-blogs/2025/05/ico-calls-for-protections-for-23andme-customer-data/"><strong><span>here</span></strong></a><strong> to read the latest statement from the ICO.</strong></p>
<h3><span><strong>The high stakes of cybersecurity issues in retail</strong></span></h3>
<p>Between 22 and 29 April 2025 three major retailers – Marks & Spencer, Harrods and the Co-Op – suffered cyber-attacks.</p>
<p>The effects of an incident on high profile retailers can be broad-ranging.  M&S had to pause all online transactions, and experienced widespread in-store disruptions. It has been confirmed that this single attack has resulted in the loss of more than £650m in the company's stock market value. The Co-Op, meanwhile, has been able to recover at a faster pace than M&S, who appear to have had their systems more comprehensively compromised. This might have been because the Co-Op's IT team discovered the incident while it was happening and made the decision to pull the plug on their systems during the attack, meaning threat actors were unsuccessful in deploying ransomware.</p>
<p>Cyber crime should be a cause for concern for all organisations. The number of "nationally significant" cyber attacks in the last 8 months has doubled compared to the same period a year ago.</p>
<p>In a recent speech, Cabinet Minister Pat McFadden has emphasised that cybersecurity can no longer be viewed as a luxury but must become "an absolute necessity" for organisations. </p>
<p>A further point of interest on which we are starting to see comment is the extent to which these recent significant cyber losses could affect the cyber insurance market.  They provide a clear demonstration of the potential for rapid multi-limit losses.</p>
<p><strong>Click </strong><span><a href="https://www.bbc.co.uk/news/articles/cwy382w9eglo"><strong>here</strong></a></span><strong> and </strong><span><a href="https://www.bbc.co.uk/news/articles/cpqe213vw3po"><strong>here</strong></a></span><strong> to read more from the BBC.</strong></p>
<h3><span><strong>Main challenges of EU AI Act-GDPR interplay identified by Member States</strong></span></h3>
<p>On 14 March 2025, representatives from the EU Member States gathered to discuss and identify the compliance challenges that arise from the interplay between the EU AI Act and the EU GDPR.</p>
<p>The representatives have raised concerns surrounding the potential for conflicting legal requirements, inconsistent national governance approaches, and the need for legal advice to minimise the compliance burden.</p>
<p>The potential for conflict is created by the differing regulatory approaches underpinning the two pieces of legislation. The EU GDPR aims to protect personal data from a fundamental rights perspective, while the EU AI Act is primarily a piece of product safety legislation and protects personal data through targeted requirements based on risk levels.</p>
<p>This divergence could lead to contradictory outcomes where an AI system may be compliant with one piece of legislation, but not the other. It was stressed during the March discussion that the two laws must be interpreted and enforced coherently, and not viewed as distinct entities.</p>
<p>Additionally, the representatives called for the creation of joint task forces and technical working groups to create consistent interpretation of these laws across the EU Member States. The goal would be to create a uniform regulatory environment across the EU to reduce the administrative and financial cost of compliance.</p>
<p>The representatives emphasised the need for clear guidelines on how the two laws should interact, and how key concepts should be interpreted and applied. Currently, the Commission and European Data Protection Board are developing guidelines.</p>
<p><strong>Click </strong><span><a href="https://sites-rpc.vuturevx.com/e/muqitq890dqfea/d8fc9cb9-0c64-45a0-a799-2eab3d75d70e"><strong>here</strong></a></span><strong> to read more on MLex.</strong></p>
<h3><span><strong>RPC at London Tech Week – 12 June 2025</strong></span></h3>
<p>Finally, join us on 12 June as we uncover the opportunities, challenges, and innovative solutions shaping the tech industry, presented by an exceptional line-up of experts. We'll be covering everything from how businesses can harness AI ethically for competitive growth to how tech is being used within organisations to bridge generational divides and unlock innovation. We'll also be sharing and celebrating the stories of inspiring women in the sector and looking at how tech and the use of tech has changed over the last decade and what the future looks like in terms of tech use in the media & entertainment, retail & consumer and other industries.</p>
<p><strong>Find out more and register your place </strong><a href="https://www.rpclegal.com/events/london-tech-week-2025/"><strong><span>here</span></strong></a>.</p>]]></content:encoded></item><item><guid isPermaLink="false">{642C53FA-1E8D-4EC3-A351-71C3E7FB0E10}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/data-dispatch-april-2025/</link><title>Data Dispatch - April 2025</title><description><![CDATA[<p style="text-align: left;">Please do feel free to forward on the publication to your colleagues or, better still, recommend that they <a href="https://sites-rpc.vuturevx.com/5/8/landing-pages/subscribe-data-digest.asp">subscribe</a> to receive the publication directly.</p>
<p style="text-align: left;">If there are any issues on which you'd like more information (or if you have any questions or feedback), please do let us know or get in touch with your usual contact at RPC.</p>
<h4 style="text-align: left;">ICO launches investigations into use of children's data by social media and video-sharing platforms</h4>
<p style="text-align: left;">As part of its campaign to ensure digital services are designed to safeguard children's personal data and in line with its 2024/2025 focus area on social media and video sharing platforms, the UK's Information Commissioner's Office (ICO) has recently launched investigations into TikTok, Reddit and Imgur to assess how the platforms handle children's personal data.<br />
<br />
The ICO's investigation of TikTok, a video-sharing app that has gained immense popularity among younger audiences, is focused on TikTok's use of the personal data of 13-17 years olds to make recommendations and deliver tailored content. The investigation was triggered by the ICO's concerns about how young people's online activity is being used to provide potentially unsuitable and dangerous content to them.<br />
<br />
Reddit and Imgur, both widely used for sharing images and participating in online communities, are under scrutiny by the ICO for their use of age assurance measures (i.e. methods to estimate or confirm the age of users), which play a crucial role in maintaining safe online environment for children's personal data.<br />
<br />
This is the latest in a series of actions taken by the ICO since its Children’s Code was launched in 2021 and which are aimed at protection of children's privacy rights. On the back of the ICO's campaign, various platforms like X, Sendit, BeReal, Dailymotion, and Viber have implemented stronger privacy measures to safeguard children’s data.<br />
<br />
Along with the announcement of the investigations into TikTok, Reddit and Imgur, the ICO provided a progress report on its Children's Code strategy, including an overview of the results of its enforcement activity and a table showing the compliance of 34 social media and video sharing platforms against key metrics. It is also worth noting that the new Data (Use and Access) Bill contains new requirements in relation to the offering of information society services to children.<br />
<br />
In a sign of the increasingly cross-regulatory nature of enforcement, the ICO will be coordinating its work on children's data with Ofcom (which enforces the Online Safety Act), particularly in relation to age assurance. Ofcom's significant online safety enforcement powers include the ability to levy large fines and, in serious cases, restrict services or access to the offending platform. Coupled with the serious potential sanctions under data protection law, the risks are heightened for platforms that fail to comply with the law in this area.<br />
<br />
(<a href="https://sites-rpc.vuturevx.com/e/1e2bnm2pnbcrq">ICO's Website</a>)<br />
<br />
(<a href="https://sites-rpc.vuturevx.com/e/4ykaxlbb9imfphw">ICO's Children's Code strategy progress update - March 2025</a>)<br />
<br />
</p>
<h4 style="text-align: left;">CJEU - Data protection fines imposed on a subsidiary must be determined based on the total annual revenue of its parent company</h4>
<p style="text-align: left;">In a case before the Court of Justice of the European Union last month, the court found that data protection fines against subsidiary companies should be calculated based on the group's total annual worldwide turnover, but the actual fine imposed should be determined by reference to additional factors.<br />
<br />
The case concerned a request for a preliminary ruling from the High Court of Western Denmark in respect of Articles 83(4) to (6) of GDPR.  It related to a fine levied on a furniture retail chain for breaches of GDPR (specifically retention of former customer data) and whether or not the fine should be calculated based on the turnover of the furniture company's group or just of the company in breach. The court also addressed the meaning of "undertaking" (used in the relevant fining calculation provisions of GDPR (Article 83)).<br />
<br />
The Court found that an "undertaking" refers to the competition law Treaty on the Functioning of the European Law (TFEU) meaning of the term, i.e. that it is "an economic unit" and relates to "<em>any entity engaged in an economic activity, irrespective of the legal status of that entity and the way in which it is financed</em>". The level of the fine should be assessed as a percentage of the group's (i.e. the "undertaking's") total annual worldwide turnover in the previous year.<br />
<br />
The Court however drew a distinction between the basis for calculating the maximum fine and assessing what fine actually to impose in each case for breach of GDPR. Fines must be "<em>effective, proportionate and dissuasive</em>". The subsidiary's "<em>actual or material economic capacity</em>" must be considered to assess if the fine is proportionate. This includes taking into account if the company in breach is part of an undertaking/group. Other factors that should be considered when deciding on the level of fine are the type, severity and duration of the infringement, the number of data subjects impacted, and the extent of the damage to the individuals incurred. Authorities should also take account of whether the violation was negligent or intentional, the steps taken by the relevant controller or processor to mitigate the breach, an assessment of the controller or processor's responsibility for the breach and the types of personal data affected by the breach. In this way, the fine imposed will reflect the relevant circumstances and achieve its intended purpose (of being "<em>effective, proportionate and dissuasive</em>"). <br />
<br />
It is worth noting that the ICO's fining guidance (March 2024) takes the same view on the meaning of "undertaking" as taken by the Court: "<em>Where a controller or processor forms part of an undertaking, for example where a controller is a subsidiary of a parent company, the Commissioner will calculate the maximum fine based on the turnover of the undertaking as a whole</em>".  The ICO refers to Recital 150 UK GDPR which states that "<em>Where administrative fines are imposed on an undertaking, an undertaking should be understood to be an undertaking in accordance with Articles 101 and 102 TFEI for those purposes</em>". The ICO guidance goes on to state that "<em>While Articles 101 and 102 TFEU and EDPB decisions no longer apply to the UK following the UK’s exit from the European Union, the concept of an ‘undertaking’ is well established in UK competition law through UK and retained EU case law.</em>"<br />
<br />
Although companies may take some comfort from the reasoning of the court in relation to calibrating fines based on the context/particular circumstances of the breach, the case highlights the importance of ensuring data protection law compliance across groups of companies and the potentially severe financial repercussions that can ensue if things go wrong.<br />
<br />
(<a href="https://sites-rpc.vuturevx.com/e/kjegrouwrsksolq">Judgment</a>)<br />
<br />
(<a href="https://sites-rpc.vuturevx.com/e/vuivznyetdtmw">ICO Fining Guidance</a>)<br />
<br />
</p>
<h4 style="text-align: left;">ICO issues first fine against data processor for security failings</h4>
<p style="text-align: left;">Advanced Computer Software, now trading as OneAdvanced (Advanced), has become the first data processor to be fined by the UK Information Commissioner’s Office (ICO) for security failings that resulted in a serious ransomware incident in August 2022. The fine, initially set at £6.09 million, was reduced to £3.07 million after the company made representations and agreed not to appeal. This marks a significant development under the UK GDPR and the Data Protection Act 2018, demonstrating the ICO’s readiness to hold processors directly accountable under the UK GDPR, particularly where there are substantial and prolonged security deficiencies.<br />
<br />
Advanced was providing software and services to NHS organisations, which included processing special category personal data under Article 9 UK GDPR relating to health as well as the data of children, and vulnerable individuals. The ICO found that the company had failed to implement appropriate technical and organisational measures, as required under Article 32(1) UK GDPR, to ensure a level of security appropriate to the risk. This included not applying critical security updates, failing to follow National Cyber Security Centre (NCSC) guidance, and taking no action despite being aware of the relevant vulnerabilities as early as 2021. The breach, which occurred in 2022, resulted in the data of around 80,000 data subjects being accessed and disrupted services across the healthcare sector, classified as critical national infrastructure. The ICO concluded that Advanced had the resources and capability to prevent the incident but failed to do so over a four-year period.<br />
<br />
The monetary penalty was issued under sections 149 and 155 of the Data Protection Act 2018, which empower the ICO to impose fines on a controller or processor that fails to comply with its obligations under Articles 25 to 39 of the UK GDPR. The Commissioner found a high level of culpability, particularly in light of Advanced’s role as a processor for public bodies and the sensitive nature of the data involved. This case serves as a warning that processors are not beyond the scope of enforcement and must meet their security obligations under the UK GDPR, especially when supporting public services that rely on the secure handling of special category data.<br />
<br />
(<a href="https://sites-rpc.vuturevx.com/e/dskichy1hkebbw">ICO Fine</a>)<br />
<br />
</p>
<h4 style="text-align: left;">RPC's Data Download Event: Insights from the ICO</h4>
<p style="text-align: left;">At RPC's Data Download event on 27 February 2025, RPC's specialist data teams explored current and future challenges and risks in the field of data protection, including compliance, handling cyber incidents and data disputes. We were joined by Padi Dolatshahi, Principal Lawyer at the Information Commissioner's Office (ICO), who discussed the ICO's role in enforcing data protection law in the UK, particularly in relation to personal data breaches.<br />
<br />
In her address, Padi urged companies to engage proactively with the ICO when breaches occur and provided recent statistics on reported cyber incidents, speed of reporting and categories of incident.  The presentation also outlined how the ICO’s engages with organisations following such data breaches and how it assesses the sufficiency of security measures and an organisation's compliance with UK GDPR. Padi also gave an overview of the ICO's data protection fining guidance and upcoming regulatory changes, including the Cyber Resilience Bill.<br />
<br />
A copy of her slides can be found <a href="https://sites-rpc.vuturevx.com/e/nd0kszjhmuyqyg">here</a>.<br />
<br />
The ICO's remarks and the other sessions at Data Download underscored organisations' need to remain proactive, transparent, and compliant in their data governance practices to navigate the evolving regulatory environment effectively.<br />
<br />
</p>
<h4 style="text-align: left;">Other important developments</h4>
<p style="text-align: left;">EDPB launches its <a href="https://sites-rpc.vuturevx.com/e/keirj2th0fli9q">2025 Coordinated Enforcement on the Right to Erasure</a>, with 30 data protection authorities across Europe participating in an assessment of how controllers handle erasure requests under the GDPR.</p>
<p style="text-align: left;">In a meeting with the British Retail Consortium which RPC attended, the Department of Science, Innovation and Technology announced that the DUA Bill is expected to be passed in May with most data protection provisions being enforceable 6 months after.  The EU Commission has postponed its review of UK adequacy from June to December to allow for review of the DUA Bill.</p>
<p style="text-align: left;">The ICO has finalised its <a href="https://sites-rpc.vuturevx.com/e/az0mnwwzhtoemra">guidance</a> on anonymisation and pseudonymisation. Separately, the ICO has published: (i) its <a href="https://sites-rpc.vuturevx.com/e/1deg8ntrh3rkk4a">2025 Tech Horizons Report</a> highlighting the most impactful technologies for the next few years; and (ii) a <a href="https://sites-rpc.vuturevx.com/e/zckotodcqo1jbw">package of measures</a> to support the UK government's growth agenda. <br />
<br />
In our March episode of The Work Couch, Jon Bartley and Helen Yost joined host Ellie Gelder in a two-part series which delves into data protection compliance in the employment context. Listen <a href="https://sites-rpc.vuturevx.com/e/iduybre8ca0pvw">here</a>.</p>]]></description><pubDate>Wed, 16 Apr 2025 16:23:00 +0100</pubDate><category>Data and privacy</category><authors:names>Jon Bartley, Helen Yost, Amy Blackburn, Kiran Dhoot</authors:names><enclosure url="https://www.rpclegal.com/-/media/rpc/redesign-images/thinking-tiles/wide/tech-media-1---thinking-tile-wide.jpg?rev=ee4cf7f6fb8048c5b8fbba82117fa558&amp;hash=B2A6FCC6F2975DF2B5BF91ABB37D548D" type="image/jpeg" medium="image" /><content:encoded><![CDATA[<p style="text-align: left;">Please do feel free to forward on the publication to your colleagues or, better still, recommend that they <a href="https://sites-rpc.vuturevx.com/5/8/landing-pages/subscribe-data-digest.asp">subscribe</a> to receive the publication directly.</p>
<p style="text-align: left;">If there are any issues on which you'd like more information (or if you have any questions or feedback), please do let us know or get in touch with your usual contact at RPC.</p>
<h4 style="text-align: left;">ICO launches investigations into use of children's data by social media and video-sharing platforms</h4>
<p style="text-align: left;">As part of its campaign to ensure digital services are designed to safeguard children's personal data and in line with its 2024/2025 focus area on social media and video sharing platforms, the UK's Information Commissioner's Office (ICO) has recently launched investigations into TikTok, Reddit and Imgur to assess how the platforms handle children's personal data.<br />
<br />
The ICO's investigation of TikTok, a video-sharing app that has gained immense popularity among younger audiences, is focused on TikTok's use of the personal data of 13-17 years olds to make recommendations and deliver tailored content. The investigation was triggered by the ICO's concerns about how young people's online activity is being used to provide potentially unsuitable and dangerous content to them.<br />
<br />
Reddit and Imgur, both widely used for sharing images and participating in online communities, are under scrutiny by the ICO for their use of age assurance measures (i.e. methods to estimate or confirm the age of users), which play a crucial role in maintaining safe online environment for children's personal data.<br />
<br />
This is the latest in a series of actions taken by the ICO since its Children’s Code was launched in 2021 and which are aimed at protection of children's privacy rights. On the back of the ICO's campaign, various platforms like X, Sendit, BeReal, Dailymotion, and Viber have implemented stronger privacy measures to safeguard children’s data.<br />
<br />
Along with the announcement of the investigations into TikTok, Reddit and Imgur, the ICO provided a progress report on its Children's Code strategy, including an overview of the results of its enforcement activity and a table showing the compliance of 34 social media and video sharing platforms against key metrics. It is also worth noting that the new Data (Use and Access) Bill contains new requirements in relation to the offering of information society services to children.<br />
<br />
In a sign of the increasingly cross-regulatory nature of enforcement, the ICO will be coordinating its work on children's data with Ofcom (which enforces the Online Safety Act), particularly in relation to age assurance. Ofcom's significant online safety enforcement powers include the ability to levy large fines and, in serious cases, restrict services or access to the offending platform. Coupled with the serious potential sanctions under data protection law, the risks are heightened for platforms that fail to comply with the law in this area.<br />
<br />
(<a href="https://sites-rpc.vuturevx.com/e/1e2bnm2pnbcrq">ICO's Website</a>)<br />
<br />
(<a href="https://sites-rpc.vuturevx.com/e/4ykaxlbb9imfphw">ICO's Children's Code strategy progress update - March 2025</a>)<br />
<br />
</p>
<h4 style="text-align: left;">CJEU - Data protection fines imposed on a subsidiary must be determined based on the total annual revenue of its parent company</h4>
<p style="text-align: left;">In a case before the Court of Justice of the European Union last month, the court found that data protection fines against subsidiary companies should be calculated based on the group's total annual worldwide turnover, but the actual fine imposed should be determined by reference to additional factors.<br />
<br />
The case concerned a request for a preliminary ruling from the High Court of Western Denmark in respect of Articles 83(4) to (6) of GDPR.  It related to a fine levied on a furniture retail chain for breaches of GDPR (specifically retention of former customer data) and whether or not the fine should be calculated based on the turnover of the furniture company's group or just of the company in breach. The court also addressed the meaning of "undertaking" (used in the relevant fining calculation provisions of GDPR (Article 83)).<br />
<br />
The Court found that an "undertaking" refers to the competition law Treaty on the Functioning of the European Law (TFEU) meaning of the term, i.e. that it is "an economic unit" and relates to "<em>any entity engaged in an economic activity, irrespective of the legal status of that entity and the way in which it is financed</em>". The level of the fine should be assessed as a percentage of the group's (i.e. the "undertaking's") total annual worldwide turnover in the previous year.<br />
<br />
The Court however drew a distinction between the basis for calculating the maximum fine and assessing what fine actually to impose in each case for breach of GDPR. Fines must be "<em>effective, proportionate and dissuasive</em>". The subsidiary's "<em>actual or material economic capacity</em>" must be considered to assess if the fine is proportionate. This includes taking into account if the company in breach is part of an undertaking/group. Other factors that should be considered when deciding on the level of fine are the type, severity and duration of the infringement, the number of data subjects impacted, and the extent of the damage to the individuals incurred. Authorities should also take account of whether the violation was negligent or intentional, the steps taken by the relevant controller or processor to mitigate the breach, an assessment of the controller or processor's responsibility for the breach and the types of personal data affected by the breach. In this way, the fine imposed will reflect the relevant circumstances and achieve its intended purpose (of being "<em>effective, proportionate and dissuasive</em>"). <br />
<br />
It is worth noting that the ICO's fining guidance (March 2024) takes the same view on the meaning of "undertaking" as taken by the Court: "<em>Where a controller or processor forms part of an undertaking, for example where a controller is a subsidiary of a parent company, the Commissioner will calculate the maximum fine based on the turnover of the undertaking as a whole</em>".  The ICO refers to Recital 150 UK GDPR which states that "<em>Where administrative fines are imposed on an undertaking, an undertaking should be understood to be an undertaking in accordance with Articles 101 and 102 TFEI for those purposes</em>". The ICO guidance goes on to state that "<em>While Articles 101 and 102 TFEU and EDPB decisions no longer apply to the UK following the UK’s exit from the European Union, the concept of an ‘undertaking’ is well established in UK competition law through UK and retained EU case law.</em>"<br />
<br />
Although companies may take some comfort from the reasoning of the court in relation to calibrating fines based on the context/particular circumstances of the breach, the case highlights the importance of ensuring data protection law compliance across groups of companies and the potentially severe financial repercussions that can ensue if things go wrong.<br />
<br />
(<a href="https://sites-rpc.vuturevx.com/e/kjegrouwrsksolq">Judgment</a>)<br />
<br />
(<a href="https://sites-rpc.vuturevx.com/e/vuivznyetdtmw">ICO Fining Guidance</a>)<br />
<br />
</p>
<h4 style="text-align: left;">ICO issues first fine against data processor for security failings</h4>
<p style="text-align: left;">Advanced Computer Software, now trading as OneAdvanced (Advanced), has become the first data processor to be fined by the UK Information Commissioner’s Office (ICO) for security failings that resulted in a serious ransomware incident in August 2022. The fine, initially set at £6.09 million, was reduced to £3.07 million after the company made representations and agreed not to appeal. This marks a significant development under the UK GDPR and the Data Protection Act 2018, demonstrating the ICO’s readiness to hold processors directly accountable under the UK GDPR, particularly where there are substantial and prolonged security deficiencies.<br />
<br />
Advanced was providing software and services to NHS organisations, which included processing special category personal data under Article 9 UK GDPR relating to health as well as the data of children, and vulnerable individuals. The ICO found that the company had failed to implement appropriate technical and organisational measures, as required under Article 32(1) UK GDPR, to ensure a level of security appropriate to the risk. This included not applying critical security updates, failing to follow National Cyber Security Centre (NCSC) guidance, and taking no action despite being aware of the relevant vulnerabilities as early as 2021. The breach, which occurred in 2022, resulted in the data of around 80,000 data subjects being accessed and disrupted services across the healthcare sector, classified as critical national infrastructure. The ICO concluded that Advanced had the resources and capability to prevent the incident but failed to do so over a four-year period.<br />
<br />
The monetary penalty was issued under sections 149 and 155 of the Data Protection Act 2018, which empower the ICO to impose fines on a controller or processor that fails to comply with its obligations under Articles 25 to 39 of the UK GDPR. The Commissioner found a high level of culpability, particularly in light of Advanced’s role as a processor for public bodies and the sensitive nature of the data involved. This case serves as a warning that processors are not beyond the scope of enforcement and must meet their security obligations under the UK GDPR, especially when supporting public services that rely on the secure handling of special category data.<br />
<br />
(<a href="https://sites-rpc.vuturevx.com/e/dskichy1hkebbw">ICO Fine</a>)<br />
<br />
</p>
<h4 style="text-align: left;">RPC's Data Download Event: Insights from the ICO</h4>
<p style="text-align: left;">At RPC's Data Download event on 27 February 2025, RPC's specialist data teams explored current and future challenges and risks in the field of data protection, including compliance, handling cyber incidents and data disputes. We were joined by Padi Dolatshahi, Principal Lawyer at the Information Commissioner's Office (ICO), who discussed the ICO's role in enforcing data protection law in the UK, particularly in relation to personal data breaches.<br />
<br />
In her address, Padi urged companies to engage proactively with the ICO when breaches occur and provided recent statistics on reported cyber incidents, speed of reporting and categories of incident.  The presentation also outlined how the ICO’s engages with organisations following such data breaches and how it assesses the sufficiency of security measures and an organisation's compliance with UK GDPR. Padi also gave an overview of the ICO's data protection fining guidance and upcoming regulatory changes, including the Cyber Resilience Bill.<br />
<br />
A copy of her slides can be found <a href="https://sites-rpc.vuturevx.com/e/nd0kszjhmuyqyg">here</a>.<br />
<br />
The ICO's remarks and the other sessions at Data Download underscored organisations' need to remain proactive, transparent, and compliant in their data governance practices to navigate the evolving regulatory environment effectively.<br />
<br />
</p>
<h4 style="text-align: left;">Other important developments</h4>
<p style="text-align: left;">EDPB launches its <a href="https://sites-rpc.vuturevx.com/e/keirj2th0fli9q">2025 Coordinated Enforcement on the Right to Erasure</a>, with 30 data protection authorities across Europe participating in an assessment of how controllers handle erasure requests under the GDPR.</p>
<p style="text-align: left;">In a meeting with the British Retail Consortium which RPC attended, the Department of Science, Innovation and Technology announced that the DUA Bill is expected to be passed in May with most data protection provisions being enforceable 6 months after.  The EU Commission has postponed its review of UK adequacy from June to December to allow for review of the DUA Bill.</p>
<p style="text-align: left;">The ICO has finalised its <a href="https://sites-rpc.vuturevx.com/e/az0mnwwzhtoemra">guidance</a> on anonymisation and pseudonymisation. Separately, the ICO has published: (i) its <a href="https://sites-rpc.vuturevx.com/e/1deg8ntrh3rkk4a">2025 Tech Horizons Report</a> highlighting the most impactful technologies for the next few years; and (ii) a <a href="https://sites-rpc.vuturevx.com/e/zckotodcqo1jbw">package of measures</a> to support the UK government's growth agenda. <br />
<br />
In our March episode of The Work Couch, Jon Bartley and Helen Yost joined host Ellie Gelder in a two-part series which delves into data protection compliance in the employment context. Listen <a href="https://sites-rpc.vuturevx.com/e/iduybre8ca0pvw">here</a>.</p>]]></content:encoded></item><item><guid isPermaLink="false">{08D6D565-AA12-4C27-95FE-B5D6C34E1F4F}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/cyber-bytes-issue-73/</link><title>Cyber_Bytes - Issue 73</title><description><![CDATA[<p style="text-align: left;"><strong>New App: RPCCyber_</strong></p>
<p><strong></strong>As cyber-attacks and follow-on litigation continue to be a board-level issue for organisations worldwide, the RPC Cyber App provides a one-stop-shop resource for cyber breach assistance and pre-breach preparedness. As well as information about RPC's cyber-related expertise, the app also contains guidance on prevention against common incidents and access to our ongoing cyber market insights.</p>
<p>RPCCyber_ can be downloaded for free from the <strong><a href="https://apps.apple.com/gb/app/rpc-cyber/id6478118376">Apple Store</a></strong> or <strong><a href="https://sites-rpc.vuturevx.com/e/7ecqz3nwr6ojw">Google Play Store</a>.</strong></p>
<h4>ICO's first fine against data processor</h4>
<p>
At the end of last month, the ICO issued its first fine against a data processor in respect of a security breach.  The fine of £3m was imposed on Advanced Computer Software Group (ACS), which is a SaaS provider to healthcare organisations including the NHS.  The fine, which was originally £6m, was reduced following representations made by ACS to the ICO. Grounds on which the fine was reduced include the ACS' engagement with the National Cyber Security Centre, the National Crime Agency and the NHS in the aftermath of the incident. ACS estimated its costs of handling the incident at £21m.<br />
<br />
The fine concerns a ransomware incident from August 2022 in which the special category health data of ACS' customers was stolen and systems were encrypted. The data included details of how to gain entry into the homes of 890 people who were receiving care at home. Hackers accessed ACS' systems via a customer account that did not have multi-factor authentication (MFA) in place. The key failures identified by the ICO, and which led to the fine, were:</p>
<ol>
    <li>A failure to adopt MFA across all user-facing systems;</li>
    <li>Lack of comprehensive vulnerability scanning; and</li>
    <li>Inadequate patch management.</li>
</ol>
<p>The enforcement decision is important because it provides practical insight on the security standards expected when processing personal date, albeit in the context of particularly sensitive special category data. . It also shows a willingness of the ICO to pursue data processors, not just controllers, when breaches happen.<br />
<br />
Click <a href="https://sites-rpc.vuturevx.com/e/wy0impqrjrnvnsg">here</a> to read more from the ICO. The ICO's analysis of ACS' technical failures are outlined at paragraphs 50-57 of the <a href="https://sites-rpc.vuturevx.com/e/ej0e6parwe0kcq">Monetary Penalty Notice.</a></p>
<h4>Cyber Security and Resilience Bill: policy statement published</h4>
<p>On 1 April 2025, a policy statement was published by the government, providing further detail on what the much anticipated Cyber Security and Resilience Bill will look like when it comes into force later this year. As expected, the Bill is in part effectively an expansion of the existing Network and Information Systems (NIS) Regulations.  Three measures under the Bill have been identified.<br />
<br />
<em>Bringing more entities into the scope of the regulatory framework</em><br />
<br />
The Bill will bring Managed Service Providers (MSPs) into scope. These will be defined in the Bill and are expected to include providers offering IT services to businesses and public sector organisations with access to client data.<br />
<br />
The Bill will contain measures aimed at strengthening supply chain security and will enable regulators to designate "critical suppliers". The Bill will allow the government to set stronger supply chain duties for operators of essential services (OES) and relevant digital service providers (RDSP).<br />
<br />
<em>Empowering regulators and enhancing oversight</em></p>
<ol>
    <li><em></em>The Bill will establish the Cyber Assessment Framework (CAF) on a stronger footing, so that firms follow best practice, and it is easier for them to do so. The Bill will provide the Secretary of State with powers to make regulations to update the existing requirements.</li>
    <li>The Bill will improve cyber incident reporting through expanding the incident reporting criteria, updating incident reporting times, streamlining reporting and enhancing transparency requirements.</li>
    <li>The Bill will improve the ICO's information gathering powers, for example through expanding duties of firms that provide digital services to share information with the ICO on registration.</li>
    <li>The Bill will allow regulators to set up new fee regimes and to proactively raise funds.</li>
</ol>
<p><em>Ensuring the regulatory framework can keep pace with the changing cyber landscape.</em></p>
<p>The statement reflects a desire to align the UK's cyber security position with the EU's NIS2 (Directive (EU) 2022/2555), though not all measures in NIS2 are apparent in the Bill, such as management liability. The increase of in-scope firms that are due to have the same duties as digital service providers will increase costs related to security improvements and compliance. The two-stage reporting system in which regulated entities will need to notify their regulator within no later than 24 hours of becoming aware of an incident will require them to be highly reactive.<br />
<br />
Click <a href="https://sites-rpc.vuturevx.com/e/7ceoxmyk1teisdg">here</a> to read the cyber security and resilience policy statement.<br />
<br />
</p>
<h4>UK data reform bill will be ready this spring, minister says</h4>
The Data (Use and Access) (DUA) Bill is expected to be ready this spring, according to Data Minister Chris Bryant, who spoke at a conference on 12 March 2025. While Bryant acknowledged that the DUA Bill is "probably two or three years out of date, and we should have done it earlier," he expressed optimism that it will meet the requirements for EU data adequacy.<br />
<br />
The DUA Bill was first introduced to Parliament in October 2024. It is a legislative effort by the UK government to modernise data and ensure compliance with the EU's data adequacy requirements. It introduces a new Smart Data scheme (that allows for the sharing and access of customer and business data), new digital verification services, and changes to the structure of the ICO.<br />
<br />
Ensuring EU data adequacy is key for the DUA Bill. An EU adequacy decision, dating back to 2021, found that the UK's data protection provisions were an "essentially equivalent" standard to that of the EU, however this decision needs to be reviewed before it expires in June 2025.<br />
<br />
If, upon review, the EU commission decides that adequacy status is lost with the EU, then this could cost businesses between $210m and $420m in lost export revenue annually. It could also cost businesses "between $190m and $460m in on-off Standard Contractual Clause costs", a report published last year estimated, with an annual cost of between $210m and $420m in lost export revenue.<br />
<br />
Click <a href="https://sites-rpc.vuturevx.com/e/yde2t987rc3zl7g">here</a> for details on the DUA Bill from Cyber_Bytes Issue 72 and click <a href="https://sites-rpc.vuturevx.com/e/pwkan7f9tyesrpq">here</a> to see the latest version of the DUA Bill.<br />
<br />
<h4>UK under-prepared for catastrophic cyber attack</h4>
The Public Accounts Committee (PAC) of the House of Commons has heard that the government is under-prepared for a catastrophic cyber-attack. Its 'Government cyber resilience report' warned that the cyber threat to the UK government is "severe and advancing quickly". In particular, it found that 58 critical IT systems which were assessed in 2024 had gaps in cyber resilience and that the government is unaware of how vulnerable 228 "legacy" IT systems are to a cyber attack. The question is no longer whether the government will face a damaging cyber attack, but how serve the impacts will be.<br />
<br />
According to the report, the main hurdle to making the UK government resilient to a cyber attack is a skills gap. A third of cyber security roles in the government were vacant or filled by temporary staff in 2023-24 and 70% of specialist security architects were on temporary contracts. However, programmes such as the Cyber Security Fast Stream are starting to make a difference, such that the overall number of digital technology professional in the civil service has grown and stands at nearly 6%.<br />
<br />
Click <a href="https://sites-rpc.vuturevx.com/e/bkmyl0kpnmmxsa">here</a> to read more from Computer Weekly.<br />
<br />
<h4>Europol warns against use of AI in cyber attacks</h4>
Europol, the EU's police agency, has warned in a report titled 'The changing DNA of serious and organised crime' that criminal organisations are increasingly using artificial intelligence (AI) and other technologies to stage attacks on behalf of hostile powers.<br />
<br />
“Cyber crime is evolving into a digital arms race” said Europol executive director Catherine De Bolle. One use of AI has been to accelerate online fraud and help criminals to access personal data, for example through automated phishing attacks. AI has also been used to create sophisticated malware and to generate targeted messages to deceive victims, impersonate victims or blackmail targets.<strong><br />
<br />
</strong>The report also highlighted how AI is helping criminal efficiency, for example attack automation, social engineering and bypassing security measures, which in turn is making cyber-attacks more scalable and efficient.<br />
<br />
Click <a href="https://sites-rpc.vuturevx.com/e/uus9g7np7tfyq">here</a> to read more from the Financial Times and <a href="https://sites-rpc.vuturevx.com/e/5q0eftc7vq8wlzg">here</a> to read the report.<br />
<br />
<h4>Hambro Perks, now Salica Investments, to pay £2mn for stealing confidential information</h4>
On 3 March 2025, the Commercial Court handed down judgment in a claim concerning breach of confidence and misuse of confidential information.<br />
<br />
Mr Anthony Gifford (the <strong>Claimant</strong>) brought a claim against the First Defendant, Salica Investments Ltd (formerly Hambro Perks) and the Fourth Defendant, Mr Dominic Perks. The claim arose out of two meetings in early 2016 in which Mr Gifford sought to obtain investment funding from Salica, the Defendant, for his product, 'True View Care' (<strong>TVC</strong>), a care technology platform for the elderly cared-for population.<br />
<br />
Mr Gifford argued that Salica and Mr Perks misused this confidential information to develop their own business and cloud-based software (known as <strong>Vida</strong>) for the care industry.<br />
<br />
The Court of Appeal applied the test for breach of confidence set out in Coco v AN Clark (Engineers) Ltd [1968] FSR 415, namely:<br />
<br />
(i) Did the information imparted by Mr. Gifford at the first and second meetings have the necessary quality of confidence?<br />
<br />
(ii) Was the information said to have been confidential imparted in circumstances importing an obligation of confidence?<br />
<br />
(iii) Was the information used or put to a use which is unauthorised to the detriment of the person communicating it?<br />
<br />
The Court of Appeal found that the Defendant misused Mr Gifford's confidential information relating to his TVC care software system in developing their competing Vida software and damages were awarded to him.<br />
<br />
Click <a href="https://sites-rpc.vuturevx.com/e/imemcnqspjuwuxq">here</a> to read the judgment.]]></description><pubDate>Fri, 11 Apr 2025 09:41:00 +0100</pubDate><category>Data and privacy</category><authors:names>Richard Breavington, Daniel Guilfoyle, Rachel Ford, Ian Dinning, Christopher Ashton, Elizabeth Zang, Emanuele Santella , Lauren Kerr</authors:names><enclosure url="https://www.rpclegal.com/-/media/rpc/redesign-images/thinking-tiles/wide/data-and-cyber-2---thinking-tile-wide.jpg?rev=8f262369de1c46c6bef3c74e0d2b51c9&amp;hash=3379AF5F3FF6F6CC5ECB36CC0235B10B" type="image/jpeg" medium="image" /><content:encoded><![CDATA[<p style="text-align: left;"><strong>New App: RPCCyber_</strong></p>
<p><strong></strong>As cyber-attacks and follow-on litigation continue to be a board-level issue for organisations worldwide, the RPC Cyber App provides a one-stop-shop resource for cyber breach assistance and pre-breach preparedness. As well as information about RPC's cyber-related expertise, the app also contains guidance on prevention against common incidents and access to our ongoing cyber market insights.</p>
<p>RPCCyber_ can be downloaded for free from the <strong><a href="https://apps.apple.com/gb/app/rpc-cyber/id6478118376">Apple Store</a></strong> or <strong><a href="https://sites-rpc.vuturevx.com/e/7ecqz3nwr6ojw">Google Play Store</a>.</strong></p>
<h4>ICO's first fine against data processor</h4>
<p>
At the end of last month, the ICO issued its first fine against a data processor in respect of a security breach.  The fine of £3m was imposed on Advanced Computer Software Group (ACS), which is a SaaS provider to healthcare organisations including the NHS.  The fine, which was originally £6m, was reduced following representations made by ACS to the ICO. Grounds on which the fine was reduced include the ACS' engagement with the National Cyber Security Centre, the National Crime Agency and the NHS in the aftermath of the incident. ACS estimated its costs of handling the incident at £21m.<br />
<br />
The fine concerns a ransomware incident from August 2022 in which the special category health data of ACS' customers was stolen and systems were encrypted. The data included details of how to gain entry into the homes of 890 people who were receiving care at home. Hackers accessed ACS' systems via a customer account that did not have multi-factor authentication (MFA) in place. The key failures identified by the ICO, and which led to the fine, were:</p>
<ol>
    <li>A failure to adopt MFA across all user-facing systems;</li>
    <li>Lack of comprehensive vulnerability scanning; and</li>
    <li>Inadequate patch management.</li>
</ol>
<p>The enforcement decision is important because it provides practical insight on the security standards expected when processing personal date, albeit in the context of particularly sensitive special category data. . It also shows a willingness of the ICO to pursue data processors, not just controllers, when breaches happen.<br />
<br />
Click <a href="https://sites-rpc.vuturevx.com/e/wy0impqrjrnvnsg">here</a> to read more from the ICO. The ICO's analysis of ACS' technical failures are outlined at paragraphs 50-57 of the <a href="https://sites-rpc.vuturevx.com/e/ej0e6parwe0kcq">Monetary Penalty Notice.</a></p>
<h4>Cyber Security and Resilience Bill: policy statement published</h4>
<p>On 1 April 2025, a policy statement was published by the government, providing further detail on what the much anticipated Cyber Security and Resilience Bill will look like when it comes into force later this year. As expected, the Bill is in part effectively an expansion of the existing Network and Information Systems (NIS) Regulations.  Three measures under the Bill have been identified.<br />
<br />
<em>Bringing more entities into the scope of the regulatory framework</em><br />
<br />
The Bill will bring Managed Service Providers (MSPs) into scope. These will be defined in the Bill and are expected to include providers offering IT services to businesses and public sector organisations with access to client data.<br />
<br />
The Bill will contain measures aimed at strengthening supply chain security and will enable regulators to designate "critical suppliers". The Bill will allow the government to set stronger supply chain duties for operators of essential services (OES) and relevant digital service providers (RDSP).<br />
<br />
<em>Empowering regulators and enhancing oversight</em></p>
<ol>
    <li><em></em>The Bill will establish the Cyber Assessment Framework (CAF) on a stronger footing, so that firms follow best practice, and it is easier for them to do so. The Bill will provide the Secretary of State with powers to make regulations to update the existing requirements.</li>
    <li>The Bill will improve cyber incident reporting through expanding the incident reporting criteria, updating incident reporting times, streamlining reporting and enhancing transparency requirements.</li>
    <li>The Bill will improve the ICO's information gathering powers, for example through expanding duties of firms that provide digital services to share information with the ICO on registration.</li>
    <li>The Bill will allow regulators to set up new fee regimes and to proactively raise funds.</li>
</ol>
<p><em>Ensuring the regulatory framework can keep pace with the changing cyber landscape.</em></p>
<p>The statement reflects a desire to align the UK's cyber security position with the EU's NIS2 (Directive (EU) 2022/2555), though not all measures in NIS2 are apparent in the Bill, such as management liability. The increase of in-scope firms that are due to have the same duties as digital service providers will increase costs related to security improvements and compliance. The two-stage reporting system in which regulated entities will need to notify their regulator within no later than 24 hours of becoming aware of an incident will require them to be highly reactive.<br />
<br />
Click <a href="https://sites-rpc.vuturevx.com/e/7ceoxmyk1teisdg">here</a> to read the cyber security and resilience policy statement.<br />
<br />
</p>
<h4>UK data reform bill will be ready this spring, minister says</h4>
The Data (Use and Access) (DUA) Bill is expected to be ready this spring, according to Data Minister Chris Bryant, who spoke at a conference on 12 March 2025. While Bryant acknowledged that the DUA Bill is "probably two or three years out of date, and we should have done it earlier," he expressed optimism that it will meet the requirements for EU data adequacy.<br />
<br />
The DUA Bill was first introduced to Parliament in October 2024. It is a legislative effort by the UK government to modernise data and ensure compliance with the EU's data adequacy requirements. It introduces a new Smart Data scheme (that allows for the sharing and access of customer and business data), new digital verification services, and changes to the structure of the ICO.<br />
<br />
Ensuring EU data adequacy is key for the DUA Bill. An EU adequacy decision, dating back to 2021, found that the UK's data protection provisions were an "essentially equivalent" standard to that of the EU, however this decision needs to be reviewed before it expires in June 2025.<br />
<br />
If, upon review, the EU commission decides that adequacy status is lost with the EU, then this could cost businesses between $210m and $420m in lost export revenue annually. It could also cost businesses "between $190m and $460m in on-off Standard Contractual Clause costs", a report published last year estimated, with an annual cost of between $210m and $420m in lost export revenue.<br />
<br />
Click <a href="https://sites-rpc.vuturevx.com/e/yde2t987rc3zl7g">here</a> for details on the DUA Bill from Cyber_Bytes Issue 72 and click <a href="https://sites-rpc.vuturevx.com/e/pwkan7f9tyesrpq">here</a> to see the latest version of the DUA Bill.<br />
<br />
<h4>UK under-prepared for catastrophic cyber attack</h4>
The Public Accounts Committee (PAC) of the House of Commons has heard that the government is under-prepared for a catastrophic cyber-attack. Its 'Government cyber resilience report' warned that the cyber threat to the UK government is "severe and advancing quickly". In particular, it found that 58 critical IT systems which were assessed in 2024 had gaps in cyber resilience and that the government is unaware of how vulnerable 228 "legacy" IT systems are to a cyber attack. The question is no longer whether the government will face a damaging cyber attack, but how serve the impacts will be.<br />
<br />
According to the report, the main hurdle to making the UK government resilient to a cyber attack is a skills gap. A third of cyber security roles in the government were vacant or filled by temporary staff in 2023-24 and 70% of specialist security architects were on temporary contracts. However, programmes such as the Cyber Security Fast Stream are starting to make a difference, such that the overall number of digital technology professional in the civil service has grown and stands at nearly 6%.<br />
<br />
Click <a href="https://sites-rpc.vuturevx.com/e/bkmyl0kpnmmxsa">here</a> to read more from Computer Weekly.<br />
<br />
<h4>Europol warns against use of AI in cyber attacks</h4>
Europol, the EU's police agency, has warned in a report titled 'The changing DNA of serious and organised crime' that criminal organisations are increasingly using artificial intelligence (AI) and other technologies to stage attacks on behalf of hostile powers.<br />
<br />
“Cyber crime is evolving into a digital arms race” said Europol executive director Catherine De Bolle. One use of AI has been to accelerate online fraud and help criminals to access personal data, for example through automated phishing attacks. AI has also been used to create sophisticated malware and to generate targeted messages to deceive victims, impersonate victims or blackmail targets.<strong><br />
<br />
</strong>The report also highlighted how AI is helping criminal efficiency, for example attack automation, social engineering and bypassing security measures, which in turn is making cyber-attacks more scalable and efficient.<br />
<br />
Click <a href="https://sites-rpc.vuturevx.com/e/uus9g7np7tfyq">here</a> to read more from the Financial Times and <a href="https://sites-rpc.vuturevx.com/e/5q0eftc7vq8wlzg">here</a> to read the report.<br />
<br />
<h4>Hambro Perks, now Salica Investments, to pay £2mn for stealing confidential information</h4>
On 3 March 2025, the Commercial Court handed down judgment in a claim concerning breach of confidence and misuse of confidential information.<br />
<br />
Mr Anthony Gifford (the <strong>Claimant</strong>) brought a claim against the First Defendant, Salica Investments Ltd (formerly Hambro Perks) and the Fourth Defendant, Mr Dominic Perks. The claim arose out of two meetings in early 2016 in which Mr Gifford sought to obtain investment funding from Salica, the Defendant, for his product, 'True View Care' (<strong>TVC</strong>), a care technology platform for the elderly cared-for population.<br />
<br />
Mr Gifford argued that Salica and Mr Perks misused this confidential information to develop their own business and cloud-based software (known as <strong>Vida</strong>) for the care industry.<br />
<br />
The Court of Appeal applied the test for breach of confidence set out in Coco v AN Clark (Engineers) Ltd [1968] FSR 415, namely:<br />
<br />
(i) Did the information imparted by Mr. Gifford at the first and second meetings have the necessary quality of confidence?<br />
<br />
(ii) Was the information said to have been confidential imparted in circumstances importing an obligation of confidence?<br />
<br />
(iii) Was the information used or put to a use which is unauthorised to the detriment of the person communicating it?<br />
<br />
The Court of Appeal found that the Defendant misused Mr Gifford's confidential information relating to his TVC care software system in developing their competing Vida software and damages were awarded to him.<br />
<br />
Click <a href="https://sites-rpc.vuturevx.com/e/imemcnqspjuwuxq">here</a> to read the judgment.]]></content:encoded></item><item><guid isPermaLink="false">{6C7D8C15-25D4-4C98-B9DF-98282398C532}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/cyber-bytes-issue-72/</link><title>Cyber_Bytes - Issue 72</title><description><![CDATA[<p style="text-align: left;"><strong>RPC Cyber App: Breach Counsel at Your Fingertips</strong></p>
<p><strong></strong>As cyber-attacks and follow-on litigation continue to be a board-level issue for organisations worldwide, the RPC Cyber App provides a one-stop-shop resource for cyber breach assistance and pre-breach preparedness. As well as information about RPC's cyber-related expertise, the app also contains guidance on prevention against common incidents and access to our ongoing cyber market insights.</p>
<p>RPC Cyber can be downloaded for free from the <strong><a href="https://apps.apple.com/gb/app/rpc-cyber/id6478118376">Apple Store</a></strong> or <strong><a href="https://play.google.com/store/apps/details?id=com.rpc.rpcCyber&pli=1">Google Play Store</a>.</strong></p>
<p><span><strong>Government publishes response to its Call for Views on Cyber Security of AI</strong></span></p>
<p>On 15 May 2024, the Department for Science, Innovation and Technology (<strong>DSIT</strong>) published its Call for Views on 'Cyber Security of AI' which outlined a proposed 'two-part intervention' approach, and 12 principles aimed at enhancing and maintaining cyber security standards for AI technology.</p>
<p>Following receipt of 123 responses to the Call for Views, the DSIT has now published a response paper which summarises respondent's key views and outlines the next steps. The salient points of the publication are that:</p>
<ul>
    <li>
    <p>80% of respondents were supportive of the 'two-part intervention' approach, which first involves the development of a voluntary Code of Practice (<strong>Code</strong>), and then using that Code for the subsequent development of a global standard focused on baseline cyber security requirements for AI models and systems.</p>
    </li>
    <li>
    <p>There was overwhelming support for the 12 Principles outlined in the Code which included "Securing your Infrastructure" (Principle 6) and "Conduct appropriate testing and evaluation" (Principle 9).</p>
    </li>
    <li>
    <p>Respondents noted more detail/guidance is needed to implement the Code and that the existing market might not provide sufficient skills or capabilities to implement the Code.</p>
    </li>
</ul>
<p>The DSIT states it has taken the feedback on board and used it to update the Code and create new implementation guidance. The DSIT will now take the Code and guidance to the European Telecommunications Standards Institute (<strong>ETSI</strong>) to develop a new global standard focused on baseline cyber security requirements, in line with the two-part approach set out above.</p>
<p>Click <span><strong><a href="https://assets.publishing.service.gov.uk/media/679ce207a9ee53687470a34c/Government_response_on_cyber_security_for_AI_E03283358_PRINT.pdf">here</a> </strong></span><a href="https://sites-rpc.vuturevx.com/e/reebsuo0kxhnw/b17e9dac-2c4b-49a1-a6b8-01d827604654"></a><span></span>to consider the DSIT's full response.</p>
<p><span><strong>Amendments to the Data (Use and Access) Bill and comments from the ICO</strong></span></p>
<p>The Data (Use and Access) Bill (<strong>DUA</strong>) which was introduced in October 2024 has recently been passed to the House of Commons (<strong>HoC</strong>) from the House of Lords (<strong>HoL</strong>). During the DUA's time at the HoL several key changes have been made to the Bill, including:</p>
<ul>
    <li>
    <p>An amendment to Article 25 of the UK GDPR- Article 25 currently requires controllers to implement technical and organisational measures to ensure only necessary personal data is processed. The proposed amendment would require controllers handling children's personal data to consider newly introduced "higher protection matters" which require controllers to evaluate how to best protect/support children when implementing Article 25 measures.</p>
    </li>
    <li>
    <p>An amendment to PECR 2003 which extends the "soft opt in" exemption for text and email marketing communications to charities.</p>
    </li>
    <li>
    <p>A requirement for AI developers and operators of web crawlers to provide transparency information when requested, which demonstrates that UK copyright law is being adhered to when training AI models.</p>
    </li>
    <li>
    <p>An amendment to the Sexual Offences Act 2003 which would introduce a criminal offence for creating sexual deepfakes without consent or reasonable belief of consent.</p>
    </li>
    <li>
    <p>A requirement for the ICO to introduce Codes of Practice relating to AI automated decision making.</p>
    </li>
    <li>
    <p>A requirement for the ICO to regulate transparency for web crawler use.</p>
    </li>
</ul>
<p>The ICO has responded to these amendments mostly in a positive light, whilst noting it would like clarity on the policy intent behind "higher protection matters" as specified in the first bullet point above. The ICO has stated it looks forward to discussing the changes which concern its new areas of responsibility with the government, so it can "properly assess and account for the implications".  </p>
<p>Click <span><strong><a href="https://bills.parliament.uk/bills/3825">here</a></strong></span> to see the latest version of the DUA and click <strong><span><a href="https://ico.org.uk/about-the-ico/the-data-use-and-access-dua-bill/information-commissioner-s-updated-response-to-the-data-use-and-access-dua-bill-house-of-commons/">here</a></span> </strong>to read the ICO's response.</p>
<p><span><strong>Lecturers' trade union obtains default judgment and injunction against (unknown) threat actors</strong></span></p>
<p>In <em>University College Union v Persons Unknown</em> [2025] EWHC 192 (KB), the High Court has granted summary judgment and issued a final injunction against a group of unknown threat actors following a ransomware incident. The injunction prohibits the threat actors from publishing, disclosing or using the stolen data, and orders the threat actors to deliver/up delete the information and provide a witness statement confirming compliance with the same.   </p>
<p>This judgment followed a ransomware attack which occurred in August 2024 and targeted University College Union (<strong>UCU</strong>), a lecturers' trade union. The incident saw the unknown threat actor group extract and publish sensitive information relating to UCU's employees and third parties on the deep and dark web. Shortly after the incident, UCU applied for an interim injunction which was granted. As there was no engagement from the unknown persons, the Court has now issued a final injunction.</p>
<p>This decision provides an example of the process for obtaining injunctions against unknown parties, including to a final injunction.</p>
<p>Click <strong><a href="https://iclg.com/news/22220-lecturers-trade-union-wins-default-judgment-against-hackers"><span>here</span></a> </strong>to read more from ICLG News.</p>
<p><span><strong>Google releases report on Adversarial Misuse of Generative AI</strong></span></p>
<p>Google's threat intelligence group has recently released a report on misuse of its generative AI model (Gemini) by bad actors. Some of the key takeaways from the report are that:</p>
<ul>
    <li>
    <p>Threat actors are experimenting with Gemini to enable their operations, finding productivity gains but not yet developing novel capabilities.</p>
    </li>
    <li>
    <p>Advanced Persistent Threats (APT) relating to government-backed hacking activity used Gemini to support several phases of attack lifecycles.</p>
    </li>
    <li>
    <p>Information Operations which attempt to influence online audiences in a deceptive, coordinated manner used Gemini for: research; content generation including developing personas and messaging; translation and localisation; and to find ways to increase reach.</p>
    </li>
    <li>
    <p>Gemini's safety and security measures restricted content that would enhance adversarial capabilities.</p>
    </li>
</ul>
<p>Google says it is committed to maximising the positive benefits of AI to society while addressing the challenges and will continue to be guided by its AI Principles to ensure robust security measures. Google also highlights it has introduced the Secure AI Framework which consists of six key elements which all aim to keep AI systems safe and secure.</p>
<p>Click <strong><span><a href="https://cloud.google.com/blog/topics/threat-intelligence/adversarial-misuse-generative-ai">here</a></span> </strong>to read Google's full report.</p>
<p><span><strong>Qualified one-way costs shifting (QOCS) applies to wrongful disclosure of private information claim</strong></span></p>
<p>In<em> Birley and another (personal representatives of the Estate of Ms Rosa Taylor) v Heritage Independent Living Ltd and others</em> [2025] EWCA Civ 44, the Court of Appeal held that QOCS applied to a mental health injury claim arising from a data breach.</p>
<p>The QOCS rules prevent Defendants from enforcing their litigation costs against unsuccessful Claimants and apply to personal injury claims. Introduced in the 2013 Jackson Reforms, QOCS aims to alleviate the need for After-the-Event (ATE) insurance premiums and protects Claimants from adverse cost orders, which many previously argued deterred individuals from bringing injury claims. In <em>Birley</em>, QOCS was applied despite the cost provisions for media claims, which allow for the recovery ATE insurance premiums and success fees also being applicable. </p>
<p>The judgment is significant as it clarifies that (i) QOCS applies to all personal injury claims regardless of the method of injury and (ii) QOCS and media claims provisions which allow recovery of ATE premiums and success fees can exist in tandem</p>
<p>Click <strong><span><a href="https://www.casemine.com/commentary/uk/integration-of-media-claim-cost-provisions-with-qualified-one-way-costs-shifting-in-personal-injury-claims:-analysis-of-birley-&-anor-v-heritage-independent-living-ltd-2025-ewca-civ-44/view">here</a></span> </strong>to read more from Casemine.</p>]]></description><pubDate>Tue, 04 Mar 2025 11:30:00 Z</pubDate><category>Data and privacy</category><authors:names>Richard Breavington, Daniel Guilfoyle, Rachel Ford, Ian Dinning, Christopher Ashton, Elizabeth Zang, Emanuele Santella , Lauren Kerr</authors:names><enclosure url="https://www.rpclegal.com/-/media/rpc/redesign-images/thinking-tiles/wide/data-and-cyber-1---thinking-tile-wide.jpg?rev=4b6dbfd0eb224470bc21a554b4cb58fd&amp;hash=7E983E679A0FF006CFC9E5543A132D05" type="image/jpeg" medium="image" /><content:encoded><![CDATA[<p style="text-align: left;"><strong>RPC Cyber App: Breach Counsel at Your Fingertips</strong></p>
<p><strong></strong>As cyber-attacks and follow-on litigation continue to be a board-level issue for organisations worldwide, the RPC Cyber App provides a one-stop-shop resource for cyber breach assistance and pre-breach preparedness. As well as information about RPC's cyber-related expertise, the app also contains guidance on prevention against common incidents and access to our ongoing cyber market insights.</p>
<p>RPC Cyber can be downloaded for free from the <strong><a href="https://apps.apple.com/gb/app/rpc-cyber/id6478118376">Apple Store</a></strong> or <strong><a href="https://play.google.com/store/apps/details?id=com.rpc.rpcCyber&pli=1">Google Play Store</a>.</strong></p>
<p><span><strong>Government publishes response to its Call for Views on Cyber Security of AI</strong></span></p>
<p>On 15 May 2024, the Department for Science, Innovation and Technology (<strong>DSIT</strong>) published its Call for Views on 'Cyber Security of AI' which outlined a proposed 'two-part intervention' approach, and 12 principles aimed at enhancing and maintaining cyber security standards for AI technology.</p>
<p>Following receipt of 123 responses to the Call for Views, the DSIT has now published a response paper which summarises respondent's key views and outlines the next steps. The salient points of the publication are that:</p>
<ul>
    <li>
    <p>80% of respondents were supportive of the 'two-part intervention' approach, which first involves the development of a voluntary Code of Practice (<strong>Code</strong>), and then using that Code for the subsequent development of a global standard focused on baseline cyber security requirements for AI models and systems.</p>
    </li>
    <li>
    <p>There was overwhelming support for the 12 Principles outlined in the Code which included "Securing your Infrastructure" (Principle 6) and "Conduct appropriate testing and evaluation" (Principle 9).</p>
    </li>
    <li>
    <p>Respondents noted more detail/guidance is needed to implement the Code and that the existing market might not provide sufficient skills or capabilities to implement the Code.</p>
    </li>
</ul>
<p>The DSIT states it has taken the feedback on board and used it to update the Code and create new implementation guidance. The DSIT will now take the Code and guidance to the European Telecommunications Standards Institute (<strong>ETSI</strong>) to develop a new global standard focused on baseline cyber security requirements, in line with the two-part approach set out above.</p>
<p>Click <span><strong><a href="https://assets.publishing.service.gov.uk/media/679ce207a9ee53687470a34c/Government_response_on_cyber_security_for_AI_E03283358_PRINT.pdf">here</a> </strong></span><a href="https://sites-rpc.vuturevx.com/e/reebsuo0kxhnw/b17e9dac-2c4b-49a1-a6b8-01d827604654"></a><span></span>to consider the DSIT's full response.</p>
<p><span><strong>Amendments to the Data (Use and Access) Bill and comments from the ICO</strong></span></p>
<p>The Data (Use and Access) Bill (<strong>DUA</strong>) which was introduced in October 2024 has recently been passed to the House of Commons (<strong>HoC</strong>) from the House of Lords (<strong>HoL</strong>). During the DUA's time at the HoL several key changes have been made to the Bill, including:</p>
<ul>
    <li>
    <p>An amendment to Article 25 of the UK GDPR- Article 25 currently requires controllers to implement technical and organisational measures to ensure only necessary personal data is processed. The proposed amendment would require controllers handling children's personal data to consider newly introduced "higher protection matters" which require controllers to evaluate how to best protect/support children when implementing Article 25 measures.</p>
    </li>
    <li>
    <p>An amendment to PECR 2003 which extends the "soft opt in" exemption for text and email marketing communications to charities.</p>
    </li>
    <li>
    <p>A requirement for AI developers and operators of web crawlers to provide transparency information when requested, which demonstrates that UK copyright law is being adhered to when training AI models.</p>
    </li>
    <li>
    <p>An amendment to the Sexual Offences Act 2003 which would introduce a criminal offence for creating sexual deepfakes without consent or reasonable belief of consent.</p>
    </li>
    <li>
    <p>A requirement for the ICO to introduce Codes of Practice relating to AI automated decision making.</p>
    </li>
    <li>
    <p>A requirement for the ICO to regulate transparency for web crawler use.</p>
    </li>
</ul>
<p>The ICO has responded to these amendments mostly in a positive light, whilst noting it would like clarity on the policy intent behind "higher protection matters" as specified in the first bullet point above. The ICO has stated it looks forward to discussing the changes which concern its new areas of responsibility with the government, so it can "properly assess and account for the implications".  </p>
<p>Click <span><strong><a href="https://bills.parliament.uk/bills/3825">here</a></strong></span> to see the latest version of the DUA and click <strong><span><a href="https://ico.org.uk/about-the-ico/the-data-use-and-access-dua-bill/information-commissioner-s-updated-response-to-the-data-use-and-access-dua-bill-house-of-commons/">here</a></span> </strong>to read the ICO's response.</p>
<p><span><strong>Lecturers' trade union obtains default judgment and injunction against (unknown) threat actors</strong></span></p>
<p>In <em>University College Union v Persons Unknown</em> [2025] EWHC 192 (KB), the High Court has granted summary judgment and issued a final injunction against a group of unknown threat actors following a ransomware incident. The injunction prohibits the threat actors from publishing, disclosing or using the stolen data, and orders the threat actors to deliver/up delete the information and provide a witness statement confirming compliance with the same.   </p>
<p>This judgment followed a ransomware attack which occurred in August 2024 and targeted University College Union (<strong>UCU</strong>), a lecturers' trade union. The incident saw the unknown threat actor group extract and publish sensitive information relating to UCU's employees and third parties on the deep and dark web. Shortly after the incident, UCU applied for an interim injunction which was granted. As there was no engagement from the unknown persons, the Court has now issued a final injunction.</p>
<p>This decision provides an example of the process for obtaining injunctions against unknown parties, including to a final injunction.</p>
<p>Click <strong><a href="https://iclg.com/news/22220-lecturers-trade-union-wins-default-judgment-against-hackers"><span>here</span></a> </strong>to read more from ICLG News.</p>
<p><span><strong>Google releases report on Adversarial Misuse of Generative AI</strong></span></p>
<p>Google's threat intelligence group has recently released a report on misuse of its generative AI model (Gemini) by bad actors. Some of the key takeaways from the report are that:</p>
<ul>
    <li>
    <p>Threat actors are experimenting with Gemini to enable their operations, finding productivity gains but not yet developing novel capabilities.</p>
    </li>
    <li>
    <p>Advanced Persistent Threats (APT) relating to government-backed hacking activity used Gemini to support several phases of attack lifecycles.</p>
    </li>
    <li>
    <p>Information Operations which attempt to influence online audiences in a deceptive, coordinated manner used Gemini for: research; content generation including developing personas and messaging; translation and localisation; and to find ways to increase reach.</p>
    </li>
    <li>
    <p>Gemini's safety and security measures restricted content that would enhance adversarial capabilities.</p>
    </li>
</ul>
<p>Google says it is committed to maximising the positive benefits of AI to society while addressing the challenges and will continue to be guided by its AI Principles to ensure robust security measures. Google also highlights it has introduced the Secure AI Framework which consists of six key elements which all aim to keep AI systems safe and secure.</p>
<p>Click <strong><span><a href="https://cloud.google.com/blog/topics/threat-intelligence/adversarial-misuse-generative-ai">here</a></span> </strong>to read Google's full report.</p>
<p><span><strong>Qualified one-way costs shifting (QOCS) applies to wrongful disclosure of private information claim</strong></span></p>
<p>In<em> Birley and another (personal representatives of the Estate of Ms Rosa Taylor) v Heritage Independent Living Ltd and others</em> [2025] EWCA Civ 44, the Court of Appeal held that QOCS applied to a mental health injury claim arising from a data breach.</p>
<p>The QOCS rules prevent Defendants from enforcing their litigation costs against unsuccessful Claimants and apply to personal injury claims. Introduced in the 2013 Jackson Reforms, QOCS aims to alleviate the need for After-the-Event (ATE) insurance premiums and protects Claimants from adverse cost orders, which many previously argued deterred individuals from bringing injury claims. In <em>Birley</em>, QOCS was applied despite the cost provisions for media claims, which allow for the recovery ATE insurance premiums and success fees also being applicable. </p>
<p>The judgment is significant as it clarifies that (i) QOCS applies to all personal injury claims regardless of the method of injury and (ii) QOCS and media claims provisions which allow recovery of ATE premiums and success fees can exist in tandem</p>
<p>Click <strong><span><a href="https://www.casemine.com/commentary/uk/integration-of-media-claim-cost-provisions-with-qualified-one-way-costs-shifting-in-personal-injury-claims:-analysis-of-birley-&-anor-v-heritage-independent-living-ltd-2025-ewca-civ-44/view">here</a></span> </strong>to read more from Casemine.</p>]]></content:encoded></item><item><guid isPermaLink="false">{01084733-193D-48B6-B59A-77D24E047671}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/cyber-bytes-issue-71/</link><title>Cyber_Bytes - Issue 71</title><description><![CDATA[<p style="text-align: left;"><strong>RPC Cyber App: Breach Counsel at Your Fingertips</strong></p>
<p><strong></strong>As cyber-attacks and follow-on litigation continue to be a board-level issue for organisations worldwide, the RPC Cyber App provides a one-stop-shop resource for cyber breach assistance and pre-breach preparedness. As well as information about RPC's cyber-related expertise, the app also contains guidance on prevention against common incidents and access to our ongoing cyber market insights.</p>
<p>RPC Cyber can be downloaded for free from the <strong><a href="https://apps.apple.com/gb/app/rpc-cyber/id6478118376">Apple Store</a></strong> or <strong><a href="https://play.google.com/store/apps/details?id=com.rpc.rpcCyber&pli=1">Google Play Store</a></strong>.</p>
<p><span><strong><span style="text-decoration: underline;">RPC looks back at recent developments</span></strong></span></p>
<p>For the cyber market, the past year brought with it many legislative and regulatory changes, as well as sophisticated cyber-attacks and ground-breaking law enforcement activity.</p>
<p>We have produced our very own 'Key Cyber Developments' update to provide a recap of the key issues and changes that took place over the last year. This includes insights on:</p>
<ul>
    <li>
    <p>Key legislative and regulatory changes in the UK and EU;</p>
    </li>
    <li>
    <p>Significant cyber incidents;</p>
    </li>
    <li>
    <p>Domestic regulatory activity;</p>
    </li>
    <li>
    <p>Law enforcement activity, and more.</p>
    </li>
</ul>
<p>Click <span><strong><a href="/thinking/data-and-privacy/key-cyber-developments-looking-back-over-2024/">here</a></strong></span> to read our 2024 update in full.</p>
<p><span><strong><span style="text-decoration: underline;">Why 2025 will be 'pivotal' for cyber insurance</span></strong></span></p>
<p>RPC's Richard Breavington comments on why he thinks it will be a big year for the cyber insurance industry.  Speaking to Insurance Business, Richard highlights the increasing regulation coming across the EU and UK which will increase minimum security standards in a broad range of sectors, as well as imposing additional notification obligations for cyber incidents.</p>
<p>Richard also discusses that ransomware groups are adopting new models, such as 'as-a-service' structures where affiliates independently broker access to victims' systems for high commission rates. These models could increase the volume of incidents and result in more unsophisticated attacks. Finally, it's predicted that we'll see more threat actors use AI to enhance the scale and effectiveness of their attacks.</p>
<p>Click <strong><span><a href="https://www.insurancebusinessmag.com/uk/news/cyber/why-2025-is-a-pivotal-year-for-the-cyber-insurance-industry-522610.aspx">here</a></span> </strong>to read more from Insurance Business.</p>
<p><span><strong><span style="text-decoration: underline;">DORA comes into force</span></strong></span></p>
<p>On 17 January 2025, the Digital Operational Resilience Act (<strong>DORA</strong>) became enforceable across EU Member States. DORA requires financial services entities and third-party ICT providers operating in the EU to comply with strict new technical requirements and standards to protect against digital threats. There is provision in DORA for significant enforcement action, including substantial fines, for organisations found to have been non-compliant.        </p>
<p>Click <span><strong><a href="/snapshots/technology-digital/spring-2024/the-new-eu-digital-operational-resilience-act-dora/">here</a></strong></span> to read our recent article on the content and likely effect of DORA.</p>
<p><span><strong><span style="text-decoration: underline;">Home Office Consultation: six proposals on the future of ransomware payments</span></strong></span></p>
<p>On 14 January 2025, the Home Office released a public consultation seeking views on various methods aimed at combatting the criminal ransomware 'business models' exploited by threat actors. The Consultation is made up of two key documents: the Ransomware Legislative Proposal which contains 3 key broad proposals, and the Options Assessment which looks at 6 more detailed options.</p>
<p>The Ransomware Legislative Proposals include:</p>
<ol>
    <li>
    <p>A targeted ransomware ban for public sector organisations;</p>
    </li>
    <li>
    <p>A ransomware payment regime in which all planned ransomware payments must be reported before they are made; and</p>
    </li>
    <li>
    <p>A mandatory incident reporting regime which requires victims to report ransomware incidents.</p>
    </li>
</ol>
<p>The six more granular options in the Options Assessment are:</p>
<ol>
    <li>
    <p>A complete ban on ransom payments;</p>
    </li>
    <li>
    <p>A targeted ransom ban for regulated critical national infrastructure and public sectors;</p>
    </li>
    <li>
    <p>A ransom payment prevention regime for all payments;</p>
    </li>
    <li>
    <p>Mandatory reporting of all ransom payments prior to transactions (sector specific or economy);</p>
    </li>
    <li>
    <p>Mandatory ransomware incident reporting regime for all sectors; and</p>
    </li>
    <li>
    <p>Mandatory ransomware incident reporting regime for targeted sectors.</p>
    </li>
</ol>
<p>Interestingly, there is also an 'Option 0' which is to do nothing.</p>
<p>The primary aims of the Consultation are to (i) reduce the amount of money flowing to ransomware criminals; (ii) increase the ability of operational agencies to disrupt and investigate ransomware attacks, and; (iii) enhance the government’s understanding of the threats in this area to inform future interventions.</p>
<p>The Consultation is open until 8 April 2025. Click <a href="https://www.gov.uk/government/consultations/ransomware-proposals-to-increase-incident-reporting-and-reduce-payments-to-criminals"><span><strong><span>here</span></strong></span></a> to read more and/or complete the Consultation from the Home Office.</p>
<p><span><strong><span style="text-decoration: underline;">FCA consults on incident reporting obligations</span></strong></span></p>
<p>In December 2024, the FCA published a consultation paper for firms to report operational incidents and material third party arrangements. The paper closely mirrors proposals put forward by the Bank of England and PRA, which are designed to align with international standards such as DORA (as mentioned above).</p>
<p>These proposals aim to introduce a consistent, sufficient, and timely reporting framework for firms, payment service providers, UK Recognised Investment Exchanges, registered trade repositories and registered credit rating agencies. The FCA paper proposes a definition of "operational incident" and requires firms to report incidents where a breach meets one or more of the following thresholds:</p>
<ul>
    <li>
    <p><span style="text-decoration: underline;">Consumer harm</span>: where the incident could cause or has caused intolerable levels of harm to consumers from which they cannot easily recover.<br />
    <br />
    </p>
    </li>
    <li>
    <p><span style="text-decoration: underline;">Market integrity</span>: where the incident could pose or has posed a risk to the stability, integrity or confidence of the UK financial system.<br />
    <br />
    </p>
    </li>
    <li>
    <p><span style="text-decoration: underline;">Safety and soundness</span>: where the incident could pose or has posed a risk to the safety and soundness of the firm or other market participants.</p>
    </li>
</ul>
<p>The proposals would also involve the firm producing an initial report, intermediate report and final report following an incident, much like DORA. Further, firms would be required to report on 'material third party arrangements'. These are arrangements between a firm and a third party where the disruption or failure of the service could:</p>
<ul>
    <li>
    <p>Cause intolerable levels of harm to the firm's clients;<br />
    <br />
    </p>
    </li>
    <li>
    <p>Pose risk to the soundness, stability and confidence of the UK financial system; or<br />
    <br />
    </p>
    </li>
    <li>
    <p>Cast serious doubt on the firm's ability to satisfy threshold conditions under the FCA handbook or meet the operational resilience requirements under SYSC 15A of the FCA's Principles for Business.</p>
    </li>
</ul>
<p>Click <span><strong><a href="/thinking/regulatory-updates/fca-consults-on-new-reporting-obligations-for-i-incidents-and-ii-third-party-arrangements/">here</a></strong></span> to read our article for further insights and click <a href="https://www.fca.org.uk/publication/consultation/cp24-28.pdf">here</a> to consider the FCA's Consultation which closes on 13 March 2025.</p>
<p><span><strong><span style="text-decoration: underline;">EU's Digital Fairness Act</span></strong></span></p>
<p>In October 2024, through a 'Digital Fairness Fitness Check', the EU Commission evaluated the adequacy of consumer protection law and found issues with a number of harmful online tactics.  Examples of these include complicated subscription systems, dark patterns, addictive deign, unfair contract terms, lack of transparency and exploitative ads. Considering this, the EU Commission is expected to present a new 'Digital Fairness Act' to combat these harmful tactics. Whilst this act has not yet been formally introduced, it is anticipated that 2025 will bring a public consultation on the issue, and a first draft of the Act could be seen by 2026.</p>
<p>Click <span><strong><span><a rel="noopener noreferrer" href="https://publyon.com/digital-fairness-act-protecting-consumers-from-unethical-techniques-and-commercial-practices/?switch_language=en" target="_blank">here</a></span></strong></span> to read more from Publyon. </p>
<p><span><strong><span style="text-decoration: underline;">Government increases Data protection fees for data controllers</span></strong></span></p>
<p>After a 2024 consultation on proposed amendments to the data protection fee regime, which mandates data controllers to pay an annual fee under the Data Protection (Charges and Information) Regulations 2018, the government has published the consultation results. These results were based on 103 complete responses from various organisations and individuals.</p>
<p>In short, the government intends to increase the fee regime by 29.8% for all three tiers of data controllers. The Tier 1 fee which applies to micro-organisations will be £52 (previously £40); the Tier 2 fee which applies to small and medium organisations will be £78 (previously £60); and the Tier 3 fee which applies to only large organisations will be £3,763 (previously £2,900).</p>
<p>Click <span><strong><span><a href="https://www.gov.uk/government/consultations/data-protection-fee-regime-proposed-changes/outcome/data-protection-fee-regime-government-response#executive-summary">here</a></span></strong></span> to read the government's consultation outcome for further details and thoughts behind the changes.</p>]]></description><pubDate>Wed, 05 Feb 2025 09:00:00 Z</pubDate><category>Data and privacy</category><authors:names>Richard Breavington, Daniel Guilfoyle, Rachel Ford, Ian Dinning, Christopher Ashton, Elizabeth Zang, Emanuele Santella , Lauren Kerr</authors:names><enclosure url="https://www.rpclegal.com/-/media/rpc/redesign-images/thinking-tiles/wide/data-and-cyber-3---thinking-tile-wide.jpg?rev=a832fae6b3754f3b9abfb7342b45258f&amp;hash=67DF9E4B7F445C81A9421F962408D790" type="image/jpeg" medium="image" /><content:encoded><![CDATA[<p style="text-align: left;"><strong>RPC Cyber App: Breach Counsel at Your Fingertips</strong></p>
<p><strong></strong>As cyber-attacks and follow-on litigation continue to be a board-level issue for organisations worldwide, the RPC Cyber App provides a one-stop-shop resource for cyber breach assistance and pre-breach preparedness. As well as information about RPC's cyber-related expertise, the app also contains guidance on prevention against common incidents and access to our ongoing cyber market insights.</p>
<p>RPC Cyber can be downloaded for free from the <strong><a href="https://apps.apple.com/gb/app/rpc-cyber/id6478118376">Apple Store</a></strong> or <strong><a href="https://play.google.com/store/apps/details?id=com.rpc.rpcCyber&pli=1">Google Play Store</a></strong>.</p>
<p><span><strong><span style="text-decoration: underline;">RPC looks back at recent developments</span></strong></span></p>
<p>For the cyber market, the past year brought with it many legislative and regulatory changes, as well as sophisticated cyber-attacks and ground-breaking law enforcement activity.</p>
<p>We have produced our very own 'Key Cyber Developments' update to provide a recap of the key issues and changes that took place over the last year. This includes insights on:</p>
<ul>
    <li>
    <p>Key legislative and regulatory changes in the UK and EU;</p>
    </li>
    <li>
    <p>Significant cyber incidents;</p>
    </li>
    <li>
    <p>Domestic regulatory activity;</p>
    </li>
    <li>
    <p>Law enforcement activity, and more.</p>
    </li>
</ul>
<p>Click <span><strong><a href="/thinking/data-and-privacy/key-cyber-developments-looking-back-over-2024/">here</a></strong></span> to read our 2024 update in full.</p>
<p><span><strong><span style="text-decoration: underline;">Why 2025 will be 'pivotal' for cyber insurance</span></strong></span></p>
<p>RPC's Richard Breavington comments on why he thinks it will be a big year for the cyber insurance industry.  Speaking to Insurance Business, Richard highlights the increasing regulation coming across the EU and UK which will increase minimum security standards in a broad range of sectors, as well as imposing additional notification obligations for cyber incidents.</p>
<p>Richard also discusses that ransomware groups are adopting new models, such as 'as-a-service' structures where affiliates independently broker access to victims' systems for high commission rates. These models could increase the volume of incidents and result in more unsophisticated attacks. Finally, it's predicted that we'll see more threat actors use AI to enhance the scale and effectiveness of their attacks.</p>
<p>Click <strong><span><a href="https://www.insurancebusinessmag.com/uk/news/cyber/why-2025-is-a-pivotal-year-for-the-cyber-insurance-industry-522610.aspx">here</a></span> </strong>to read more from Insurance Business.</p>
<p><span><strong><span style="text-decoration: underline;">DORA comes into force</span></strong></span></p>
<p>On 17 January 2025, the Digital Operational Resilience Act (<strong>DORA</strong>) became enforceable across EU Member States. DORA requires financial services entities and third-party ICT providers operating in the EU to comply with strict new technical requirements and standards to protect against digital threats. There is provision in DORA for significant enforcement action, including substantial fines, for organisations found to have been non-compliant.        </p>
<p>Click <span><strong><a href="/snapshots/technology-digital/spring-2024/the-new-eu-digital-operational-resilience-act-dora/">here</a></strong></span> to read our recent article on the content and likely effect of DORA.</p>
<p><span><strong><span style="text-decoration: underline;">Home Office Consultation: six proposals on the future of ransomware payments</span></strong></span></p>
<p>On 14 January 2025, the Home Office released a public consultation seeking views on various methods aimed at combatting the criminal ransomware 'business models' exploited by threat actors. The Consultation is made up of two key documents: the Ransomware Legislative Proposal which contains 3 key broad proposals, and the Options Assessment which looks at 6 more detailed options.</p>
<p>The Ransomware Legislative Proposals include:</p>
<ol>
    <li>
    <p>A targeted ransomware ban for public sector organisations;</p>
    </li>
    <li>
    <p>A ransomware payment regime in which all planned ransomware payments must be reported before they are made; and</p>
    </li>
    <li>
    <p>A mandatory incident reporting regime which requires victims to report ransomware incidents.</p>
    </li>
</ol>
<p>The six more granular options in the Options Assessment are:</p>
<ol>
    <li>
    <p>A complete ban on ransom payments;</p>
    </li>
    <li>
    <p>A targeted ransom ban for regulated critical national infrastructure and public sectors;</p>
    </li>
    <li>
    <p>A ransom payment prevention regime for all payments;</p>
    </li>
    <li>
    <p>Mandatory reporting of all ransom payments prior to transactions (sector specific or economy);</p>
    </li>
    <li>
    <p>Mandatory ransomware incident reporting regime for all sectors; and</p>
    </li>
    <li>
    <p>Mandatory ransomware incident reporting regime for targeted sectors.</p>
    </li>
</ol>
<p>Interestingly, there is also an 'Option 0' which is to do nothing.</p>
<p>The primary aims of the Consultation are to (i) reduce the amount of money flowing to ransomware criminals; (ii) increase the ability of operational agencies to disrupt and investigate ransomware attacks, and; (iii) enhance the government’s understanding of the threats in this area to inform future interventions.</p>
<p>The Consultation is open until 8 April 2025. Click <a href="https://www.gov.uk/government/consultations/ransomware-proposals-to-increase-incident-reporting-and-reduce-payments-to-criminals"><span><strong><span>here</span></strong></span></a> to read more and/or complete the Consultation from the Home Office.</p>
<p><span><strong><span style="text-decoration: underline;">FCA consults on incident reporting obligations</span></strong></span></p>
<p>In December 2024, the FCA published a consultation paper for firms to report operational incidents and material third party arrangements. The paper closely mirrors proposals put forward by the Bank of England and PRA, which are designed to align with international standards such as DORA (as mentioned above).</p>
<p>These proposals aim to introduce a consistent, sufficient, and timely reporting framework for firms, payment service providers, UK Recognised Investment Exchanges, registered trade repositories and registered credit rating agencies. The FCA paper proposes a definition of "operational incident" and requires firms to report incidents where a breach meets one or more of the following thresholds:</p>
<ul>
    <li>
    <p><span style="text-decoration: underline;">Consumer harm</span>: where the incident could cause or has caused intolerable levels of harm to consumers from which they cannot easily recover.<br />
    <br />
    </p>
    </li>
    <li>
    <p><span style="text-decoration: underline;">Market integrity</span>: where the incident could pose or has posed a risk to the stability, integrity or confidence of the UK financial system.<br />
    <br />
    </p>
    </li>
    <li>
    <p><span style="text-decoration: underline;">Safety and soundness</span>: where the incident could pose or has posed a risk to the safety and soundness of the firm or other market participants.</p>
    </li>
</ul>
<p>The proposals would also involve the firm producing an initial report, intermediate report and final report following an incident, much like DORA. Further, firms would be required to report on 'material third party arrangements'. These are arrangements between a firm and a third party where the disruption or failure of the service could:</p>
<ul>
    <li>
    <p>Cause intolerable levels of harm to the firm's clients;<br />
    <br />
    </p>
    </li>
    <li>
    <p>Pose risk to the soundness, stability and confidence of the UK financial system; or<br />
    <br />
    </p>
    </li>
    <li>
    <p>Cast serious doubt on the firm's ability to satisfy threshold conditions under the FCA handbook or meet the operational resilience requirements under SYSC 15A of the FCA's Principles for Business.</p>
    </li>
</ul>
<p>Click <span><strong><a href="/thinking/regulatory-updates/fca-consults-on-new-reporting-obligations-for-i-incidents-and-ii-third-party-arrangements/">here</a></strong></span> to read our article for further insights and click <a href="https://www.fca.org.uk/publication/consultation/cp24-28.pdf">here</a> to consider the FCA's Consultation which closes on 13 March 2025.</p>
<p><span><strong><span style="text-decoration: underline;">EU's Digital Fairness Act</span></strong></span></p>
<p>In October 2024, through a 'Digital Fairness Fitness Check', the EU Commission evaluated the adequacy of consumer protection law and found issues with a number of harmful online tactics.  Examples of these include complicated subscription systems, dark patterns, addictive deign, unfair contract terms, lack of transparency and exploitative ads. Considering this, the EU Commission is expected to present a new 'Digital Fairness Act' to combat these harmful tactics. Whilst this act has not yet been formally introduced, it is anticipated that 2025 will bring a public consultation on the issue, and a first draft of the Act could be seen by 2026.</p>
<p>Click <span><strong><span><a rel="noopener noreferrer" href="https://publyon.com/digital-fairness-act-protecting-consumers-from-unethical-techniques-and-commercial-practices/?switch_language=en" target="_blank">here</a></span></strong></span> to read more from Publyon. </p>
<p><span><strong><span style="text-decoration: underline;">Government increases Data protection fees for data controllers</span></strong></span></p>
<p>After a 2024 consultation on proposed amendments to the data protection fee regime, which mandates data controllers to pay an annual fee under the Data Protection (Charges and Information) Regulations 2018, the government has published the consultation results. These results were based on 103 complete responses from various organisations and individuals.</p>
<p>In short, the government intends to increase the fee regime by 29.8% for all three tiers of data controllers. The Tier 1 fee which applies to micro-organisations will be £52 (previously £40); the Tier 2 fee which applies to small and medium organisations will be £78 (previously £60); and the Tier 3 fee which applies to only large organisations will be £3,763 (previously £2,900).</p>
<p>Click <span><strong><span><a href="https://www.gov.uk/government/consultations/data-protection-fee-regime-proposed-changes/outcome/data-protection-fee-regime-government-response#executive-summary">here</a></span></strong></span> to read the government's consultation outcome for further details and thoughts behind the changes.</p>]]></content:encoded></item><item><guid isPermaLink="false">{066071B0-3724-42BA-96EF-9713EF234F21}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/data-dispatch-january-2025/</link><title>Data Dispatch - January 2025</title><description><![CDATA[<p style="text-align: left;">Please do feel free to forward on the publication to your colleagues or, better still, recommend that they <a href="https://sites-rpc.vuturevx.com/5/8/landing-pages/subscribe-data-digest.asp">subscribe</a> to receive the publication directly.</p>
<p style="text-align: left;">If there are any issues on which you'd like more information (or if you have any questions or feedback), please do let us know or get in touch with your usual contact at RPC.</p>
<h4 style="text-align: left;"><strong>Data Download</strong></h4>
<p style="text-align: left;">Our Data and Privacy Group will be hosting our exclusive conference, Data Download, on 27 February 2025, with sessions from 2pm. The RPC specialist data teams and the ICO will examine key data protection challenges, from compliance to managing cyber incidents and disputes. Attendees will gain practical insights through an immersive case study, hear directly from Padi Dolatshahi, Principal Lawyer at the ICO, and explore upcoming developments in 2025—all while networking with leading professionals in the field.</p>
<p style="text-align: left;">For further details and to RSVP, please click <a href="/events/data-download-february-2025/">here</a>. </p>
<h4 style="text-align: left;"><strong>Navigating compliance in Italy: Garante’s Stance on OpenAI’s Gedi Partnership and GDPR Violations.</strong></h4>
<p style="text-align: left;"><strong></strong><em>Italian enforcement action in the generative AI landscape gives insight into how Europe may view collaboration with, and compliance of, AI providers. </em></p>
<p style="text-align: left;">The Italian Data Protection Authority (the “<strong>Garante</strong>”) issued two important decisions concerning generative AI over the last few months.</p>
<p style="text-align: left;">The Garante has formally warned the publishing group GEDI in relation to its agreement with OpenAI, which involves sharing GEDI’s editorial content to train OpenAI’s AI algorithms. The key issues included: (i) the risks arising from processing sensitive and judicial data contained in GEDI’s digital archives; (ii) that the data subjects had not been adequately informed about the use of their data or given the opportunity to object; and (iii) GEDI claimed a legitimate interest in using innovative methods for journalistic activities. However, the Garante ruled that this did not justify the transfer of personal data to OpenAI, as the training process falls outside GEDI’s control. The Garante concluded that the data sharing agreement could potentially violate GDPR and warned GEDI of possible sanctions.</p>
<p style="text-align: left;">In another decision, the Garante fined OpenAI €15 million and ordered it implement several measures concerning the collection of personal data to train generative AI models and respecting data subjects' rights. The Garante found OpenAI responsible for: (i) failing to notify the March 2023 personal data breach to the Garante; (ii) processing users’ personal data to train ChatGPT without a proper lawful basis; (iii) not adequately informing users about the processing of their personal data, including using that data to train its AI model; (iv) not implementing an adequate age-verification mechanism; (v) implementing an inadequate awareness campaign, since the one required in 2023 was implemented without having been agreed with the Garante and it was inadequate; and (vi) infringement of the accuracy principle,  owing to inaccurate output data from the AI model..</p>
<p style="text-align: left;">Just a few days ago, following the launch of DeepSeek, a generative AI tool, the Garante requested information from the Chinese companies that own the tool. This further actions confirm the focus of the Garante on generative AI. </p>
<p style="text-align: left;"><a href="https://www.garanteprivacy.it/home/docweb/-/docweb-display/docweb/10077129">(<span>Garante order in relation to GEDI</span>)</a></p>
<p style="text-align: left;"><a href="https://www.garanteprivacy.it/home/docweb/-/docweb-display/docweb/10085432#english">(<span>Garante decision in relation to OpenAI)</span></a></p>
<p style="text-align: left;"><em>This article was authored by Laura Liguori of Portolano Cavallo in Italy, providing insights into the Italian regulatory approach to generative AI.<br />
</em></p>
<h4 style="text-align: left;"><strong>Data Protection in Generative AI: Perspectives from the ICO and the EDPB.</strong></h4>
<p style="text-align: left;"><em>Insights from UK and EU Authorities on Ensuring Responsible Generative AI Development and Operation.</em></p>
<p style="text-align: left;">The use of personal data in the development and operation of generative AI models is a significant area of concern for data protection authorities. Both the UK’s Information Commissioner’s Office ("<strong>ICO"</strong>) and the European Data Protection Board ("<strong>EDPB"</strong>) have published guidance on how these technologies should align with existing data protection laws.</p>
<p style="text-align: left;">In December 2024, the ICO published a report outlining its stance on generative AI following its public consultation which garnered over 200 responses. The report highlighted several key areas including: (i) the lawful basis for using web-scraped data to train AI models; (ii) determining the data protection roles of entities in the AI supply chain; and (iii) the engineering of individual rights into generative AI models. The ICO found that a lack of transparency around how generative AI uses public data has eroded trust in AI systems, calling on AI developers to be more transparent about their data practices including clarifying: (i) what personal information is being collected; (ii) how it is being used; and (iii) how individuals and publishers can better understand these processes.</p>
<p style="text-align: left;">The ICO emphasised that while generative AI holds significant potential for the UK, it must be used responsibly and in accordance with data protection laws. Developers are urged to ensure that the personal data used to train these models is obtained lawfully, and that mechanisms for exercising individual rights are built into the models themselves.</p>
<p style="text-align: left;">Meanwhile, the Irish DPC has sought guidance from the EDPB to harmonise the regulatory framework across Europe on the use of personal data for AI training, developing and operation. The EDPB's opinion addressed questions about the anonymisation of AI models, the use of legitimate interest as a legal basis for processing, and the consequences of using unlawfully processed personal data in AI development and deployment.</p>
<p style="text-align: left;">The EDPB guidance suggests that the compliance of AI models must be evaluated on a case-by-case basis, deferring to local data protection authorities' judgment; it provides a non-exhaustive list of methods for data protection authorities to assess and demonstrate the anonymity of data in AI models.</p>
<p style="text-align: left;">The guidance also focuses on the validation of the legitimate interest lawful basis for AI model's development and deployment. It confirmed that legitimate interests could be a valid lawful basis for both developing and deploying AI models, as long as the balancing test favours the data controller’s or a third party's interests over the rights of data subjects, taking into account mitigatory measures. The EDPB has suggested to controllers that publishing this test may assist with increasing transparency and fairness.</p>
<p style="text-align: left;">Businesses which are considering or already do deploy or provide AI systems should review the relevant guidance in order to update their data protection compliance programmes.</p>
<p style="text-align: left;">(<span><a href="https://ico.org.uk/about-the-ico/media-centre/news-and-blogs/2024/12/generative-ai-developers-it-s-time-to-tell-people-how-you-re-using-their-information/">ICO's opinion on Generative AI developers</a></span>)</p>
<p style="text-align: left;">(<span><a href="https://www.edpb.europa.eu/system/files/2024-12/edpb_opinion_202428_ai-models_en.pdf">Opinion 28/2024 on certain data protection aspects related  to the processing of personal data in the context of AI models</a></span>)</p>
<h4 style="text-align: left;"><strong>Exploring the ICO's Draft Guidance on Storage and Access Technologies</strong></h4>
<p style="text-align: left;"><em>An overview of the ICO’s latest proposed guidelines for businesses on storage and access technologies.</em></p>
<p style="text-align: left;">The Information Commissioner’s Office (ICO) has published a draft update to its guidance on storage and access technologies, crucial for businesses in digital marketing and data management.</p>
<p style="text-align: left;">This final version will impact how organisations handle user data, aligning with current regulatory standards and legal developments. It is proposed that the guidance will cover a broader range of technologies beyond traditional cookies. Key updates include a structured approach with "must," "should," or "could" directives, integrating insights from recent case law and ICO positions, especially on online advertising norms.</p>
<p style="text-align: left;">The expanded coverage of PECR-regulated technologies offers detailed rules and examples, clarifying interactions with UK GDPR. A new chapter on consent management highlights practical strategies and common pitfalls for businesses implementing consent collection mechanisms such as cookie banners. Transparency and user consent are emphasised as central principles, with organisations urged to provide clear explanations and genuine choices regarding technologies like cookies.</p>
<p style="text-align: left;">The ICO is seeking public feedback until 5pm on Friday 14 March 2025.</p>
<p style="background-color: #ffffff; margin-right: 0px; margin-bottom: 20px; margin-left: 0px; padding: 0px; text-align: left;">(<a href="https://ico.org.uk/for-organisations/direct-marketing-and-privacy-and-electronic-communications/guidance-on-the-use-of-storage-and-access-technologies/"><span>ICO guidance on the use of storage and access technologies</span></a>)</p>]]></description><pubDate>Fri, 31 Jan 2025 12:30:00 Z</pubDate><category>Data and privacy</category><authors:names>Jon Bartley, Helen Yost, Amy Blackburn, Kiran Dhoot</authors:names><enclosure url="https://www.rpclegal.com/-/media/rpc/redesign-images/thinking-tiles/wide/tech-media-1---thinking-tile-wide.jpg?rev=ee4cf7f6fb8048c5b8fbba82117fa558&amp;hash=B2A6FCC6F2975DF2B5BF91ABB37D548D" type="image/jpeg" medium="image" /><content:encoded><![CDATA[<p style="text-align: left;">Please do feel free to forward on the publication to your colleagues or, better still, recommend that they <a href="https://sites-rpc.vuturevx.com/5/8/landing-pages/subscribe-data-digest.asp">subscribe</a> to receive the publication directly.</p>
<p style="text-align: left;">If there are any issues on which you'd like more information (or if you have any questions or feedback), please do let us know or get in touch with your usual contact at RPC.</p>
<h4 style="text-align: left;"><strong>Data Download</strong></h4>
<p style="text-align: left;">Our Data and Privacy Group will be hosting our exclusive conference, Data Download, on 27 February 2025, with sessions from 2pm. The RPC specialist data teams and the ICO will examine key data protection challenges, from compliance to managing cyber incidents and disputes. Attendees will gain practical insights through an immersive case study, hear directly from Padi Dolatshahi, Principal Lawyer at the ICO, and explore upcoming developments in 2025—all while networking with leading professionals in the field.</p>
<p style="text-align: left;">For further details and to RSVP, please click <a href="/events/data-download-february-2025/">here</a>. </p>
<h4 style="text-align: left;"><strong>Navigating compliance in Italy: Garante’s Stance on OpenAI’s Gedi Partnership and GDPR Violations.</strong></h4>
<p style="text-align: left;"><strong></strong><em>Italian enforcement action in the generative AI landscape gives insight into how Europe may view collaboration with, and compliance of, AI providers. </em></p>
<p style="text-align: left;">The Italian Data Protection Authority (the “<strong>Garante</strong>”) issued two important decisions concerning generative AI over the last few months.</p>
<p style="text-align: left;">The Garante has formally warned the publishing group GEDI in relation to its agreement with OpenAI, which involves sharing GEDI’s editorial content to train OpenAI’s AI algorithms. The key issues included: (i) the risks arising from processing sensitive and judicial data contained in GEDI’s digital archives; (ii) that the data subjects had not been adequately informed about the use of their data or given the opportunity to object; and (iii) GEDI claimed a legitimate interest in using innovative methods for journalistic activities. However, the Garante ruled that this did not justify the transfer of personal data to OpenAI, as the training process falls outside GEDI’s control. The Garante concluded that the data sharing agreement could potentially violate GDPR and warned GEDI of possible sanctions.</p>
<p style="text-align: left;">In another decision, the Garante fined OpenAI €15 million and ordered it implement several measures concerning the collection of personal data to train generative AI models and respecting data subjects' rights. The Garante found OpenAI responsible for: (i) failing to notify the March 2023 personal data breach to the Garante; (ii) processing users’ personal data to train ChatGPT without a proper lawful basis; (iii) not adequately informing users about the processing of their personal data, including using that data to train its AI model; (iv) not implementing an adequate age-verification mechanism; (v) implementing an inadequate awareness campaign, since the one required in 2023 was implemented without having been agreed with the Garante and it was inadequate; and (vi) infringement of the accuracy principle,  owing to inaccurate output data from the AI model..</p>
<p style="text-align: left;">Just a few days ago, following the launch of DeepSeek, a generative AI tool, the Garante requested information from the Chinese companies that own the tool. This further actions confirm the focus of the Garante on generative AI. </p>
<p style="text-align: left;"><a href="https://www.garanteprivacy.it/home/docweb/-/docweb-display/docweb/10077129">(<span>Garante order in relation to GEDI</span>)</a></p>
<p style="text-align: left;"><a href="https://www.garanteprivacy.it/home/docweb/-/docweb-display/docweb/10085432#english">(<span>Garante decision in relation to OpenAI)</span></a></p>
<p style="text-align: left;"><em>This article was authored by Laura Liguori of Portolano Cavallo in Italy, providing insights into the Italian regulatory approach to generative AI.<br />
</em></p>
<h4 style="text-align: left;"><strong>Data Protection in Generative AI: Perspectives from the ICO and the EDPB.</strong></h4>
<p style="text-align: left;"><em>Insights from UK and EU Authorities on Ensuring Responsible Generative AI Development and Operation.</em></p>
<p style="text-align: left;">The use of personal data in the development and operation of generative AI models is a significant area of concern for data protection authorities. Both the UK’s Information Commissioner’s Office ("<strong>ICO"</strong>) and the European Data Protection Board ("<strong>EDPB"</strong>) have published guidance on how these technologies should align with existing data protection laws.</p>
<p style="text-align: left;">In December 2024, the ICO published a report outlining its stance on generative AI following its public consultation which garnered over 200 responses. The report highlighted several key areas including: (i) the lawful basis for using web-scraped data to train AI models; (ii) determining the data protection roles of entities in the AI supply chain; and (iii) the engineering of individual rights into generative AI models. The ICO found that a lack of transparency around how generative AI uses public data has eroded trust in AI systems, calling on AI developers to be more transparent about their data practices including clarifying: (i) what personal information is being collected; (ii) how it is being used; and (iii) how individuals and publishers can better understand these processes.</p>
<p style="text-align: left;">The ICO emphasised that while generative AI holds significant potential for the UK, it must be used responsibly and in accordance with data protection laws. Developers are urged to ensure that the personal data used to train these models is obtained lawfully, and that mechanisms for exercising individual rights are built into the models themselves.</p>
<p style="text-align: left;">Meanwhile, the Irish DPC has sought guidance from the EDPB to harmonise the regulatory framework across Europe on the use of personal data for AI training, developing and operation. The EDPB's opinion addressed questions about the anonymisation of AI models, the use of legitimate interest as a legal basis for processing, and the consequences of using unlawfully processed personal data in AI development and deployment.</p>
<p style="text-align: left;">The EDPB guidance suggests that the compliance of AI models must be evaluated on a case-by-case basis, deferring to local data protection authorities' judgment; it provides a non-exhaustive list of methods for data protection authorities to assess and demonstrate the anonymity of data in AI models.</p>
<p style="text-align: left;">The guidance also focuses on the validation of the legitimate interest lawful basis for AI model's development and deployment. It confirmed that legitimate interests could be a valid lawful basis for both developing and deploying AI models, as long as the balancing test favours the data controller’s or a third party's interests over the rights of data subjects, taking into account mitigatory measures. The EDPB has suggested to controllers that publishing this test may assist with increasing transparency and fairness.</p>
<p style="text-align: left;">Businesses which are considering or already do deploy or provide AI systems should review the relevant guidance in order to update their data protection compliance programmes.</p>
<p style="text-align: left;">(<span><a href="https://ico.org.uk/about-the-ico/media-centre/news-and-blogs/2024/12/generative-ai-developers-it-s-time-to-tell-people-how-you-re-using-their-information/">ICO's opinion on Generative AI developers</a></span>)</p>
<p style="text-align: left;">(<span><a href="https://www.edpb.europa.eu/system/files/2024-12/edpb_opinion_202428_ai-models_en.pdf">Opinion 28/2024 on certain data protection aspects related  to the processing of personal data in the context of AI models</a></span>)</p>
<h4 style="text-align: left;"><strong>Exploring the ICO's Draft Guidance on Storage and Access Technologies</strong></h4>
<p style="text-align: left;"><em>An overview of the ICO’s latest proposed guidelines for businesses on storage and access technologies.</em></p>
<p style="text-align: left;">The Information Commissioner’s Office (ICO) has published a draft update to its guidance on storage and access technologies, crucial for businesses in digital marketing and data management.</p>
<p style="text-align: left;">This final version will impact how organisations handle user data, aligning with current regulatory standards and legal developments. It is proposed that the guidance will cover a broader range of technologies beyond traditional cookies. Key updates include a structured approach with "must," "should," or "could" directives, integrating insights from recent case law and ICO positions, especially on online advertising norms.</p>
<p style="text-align: left;">The expanded coverage of PECR-regulated technologies offers detailed rules and examples, clarifying interactions with UK GDPR. A new chapter on consent management highlights practical strategies and common pitfalls for businesses implementing consent collection mechanisms such as cookie banners. Transparency and user consent are emphasised as central principles, with organisations urged to provide clear explanations and genuine choices regarding technologies like cookies.</p>
<p style="text-align: left;">The ICO is seeking public feedback until 5pm on Friday 14 March 2025.</p>
<p style="background-color: #ffffff; margin-right: 0px; margin-bottom: 20px; margin-left: 0px; padding: 0px; text-align: left;">(<a href="https://ico.org.uk/for-organisations/direct-marketing-and-privacy-and-electronic-communications/guidance-on-the-use-of-storage-and-access-technologies/"><span>ICO guidance on the use of storage and access technologies</span></a>)</p>]]></content:encoded></item><item><guid isPermaLink="false">{FC782EDC-8716-4050-92E5-AAA3B2F858FA}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/key-cyber-developments-looking-back-over-2024/</link><title>Key cyber developments: looking back over 2024</title><description><![CDATA[For the cyber market, 2024 brought with it many legislative and regulatory changes, as well as sophisticated cyber-attacks and ground-breaking law enforcement activity. ]]></description><pubDate>Mon, 27 Jan 2025 09:09:00 Z</pubDate><category>Data and privacy</category><authors:names>Richard Breavington, Daniel Guilfoyle, Rachel Ford</authors:names><enclosure url="https://www.rpclegal.com/-/media/rpc/images/thinking-tiles/wide/301136-website-perspective-tiles-final-wide-715x370px_02_data-and-cyber_1304253705.jpg?rev=0729be1e6bbc4b3e85a34b3436bb3108&amp;hash=1629F44F57A339F0B5F98E48DA850D15" type="image/jpeg" medium="image" /><content:encoded><![CDATA[In the guide below, we recap the key developments from the past year in the cyber market.]]></content:encoded></item><item><guid isPermaLink="false">{47D14B7C-AC4C-40D5-A5F8-D1717D1B76F5}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/cyber-bytes-issue-70/</link><title>Cyber_Bytes - Issue 70</title><description><![CDATA[<p><strong>RPC Cyber App: Breach Counsel at Your Fingertips</strong></p>
<p><strong></strong>As cyber-attacks and follow-on litigation continue to be a board-level issue for organisations worldwide, the RPC Cyber App provides a one-stop-shop resource for cyber breach assistance and pre-breach preparedness. As well as information about RPC's cyber-related expertise, the app also contains guidance on prevention against common incidents and access to our ongoing cyber market insights.</p>
<p>RPC Cyber can be downloaded for free from the <span><strong><a href="https://sites-rpc.vuturevx.com/e/3g0oz8we2cgj4ra">Apple Store</a></strong> or <strong><a href="https://sites-rpc.vuturevx.com/e/hjuwjou8y4uz9a">Google Play Store</a></strong>.</span></p>
<p><span><strong>NCSC publishes its Annual Review</strong></span></p>
<p>The NCSC has published its Annual Review which looks back at key cyber developments and observations between September 2023 and August 2024. Some of the NCSC's key findings are:</p>
<ul>
    <li>
    <p>Many nation-state threat actors and cyber criminals are using AI to increase the volume and heighten the impact of cyber-attacks.</p>
    </li>
    <li>
    <p>More recently, a greater proportion of threat actors are choosing not to encrypt systems and simply to threaten publication of sensitive data.</p>
    </li>
    <li>
    <p>The NCSC Incident Management (<strong>IM</strong>) team received 1,957 reports of cyber-attacks between the relevant period (down from 2,005 reports the previous year). 317 of 1,957 incidents were ransomware-related. 430 of the total incidents required support from the IM team (last year this was 371). 89 incidents were also described as nationally significant with 12 of them being at the "top end of the scale".</p>
    </li>
    <li>
    <p>The sectors reporting the highest levels of ransomware activity were academia, manufacturing, IT, legal, charities and construction.</p>
    </li>
    <li>
    <p>The NCSC believes organisations from all sectors are widely underestimating the severity of cyber threats in the UK.</p>
    </li>
    <li>
    <p>Global ransomware payments in 2023 topped $1 billion.</p>
    </li>
    <li>
    <p>There is a widening gap between the increasingly complex threats and collective defensive capabilities in the UK.</p>
    </li>
    <li>
    <p>The NCSC is pioneering research in the secure development of AI technologies.</p>
    </li>
</ul>
<p>To mark the release of this Annual Review, NCSC CEO, Dr Richard Horne, gave a speech.  He noted that the threat landscape is diversifying at speed and that talking about being resilient is not enough, rather existing guidance must be put into practice across the board to bolster defences.</p>
<p>Click <span><strong><a href="https://sites-rpc.vuturevx.com/e/3esqueebv6k0kg">here</a></strong></span> to read the NCSC's Annual Review and click <span><strong><a href="https://sites-rpc.vuturevx.com/e/ieu8zmponje6ra">here</a></strong></span> to read Dr Richard Horne's full speech.</p>
<p><span><strong>Court of Appeal dismisses mass misuse of private information representative claim</strong></span></p>
<p>In <em>Prismall v Google UK Ltd and DeepMind Technologies Ltd</em> [2023] EWHC 1169, Mr Prismall (the <strong>Claimant</strong>) had brought a representative action against Google and its artificial intelligence company, DeepMind Technologies (together, the <strong>Respondents</strong>). The Claimant alleged that the Respondents misused data belonging to 1.6m NHS patients (the proposed class members) by obtaining data from the Royal Free London NHS and using it to create a mobile app called 'Streams' which was used to help individuals detect kidney issues.</p>
<p>On 13 May 2023, the High Court dismissed the claim stating there was no prospect of establishing that the data relating to 1.6m class members could have been misused, and that such proceedings should not be allowed to proceed on an opt-out basis. The Claimant obtained permission to appeal.</p>
<p>On 11 December 2024, the Court of Appeal (<strong>CoA</strong>) handed down its judgment (Neutral citation: [2024] EWCA Civ 1516) following a hearing in October 2024. The CoA upheld the High Court's decision and dismissed the appeal. The CoA stated that a representative class claim for misuse of private information is always going to be very difficult because relevant circumstances will affect whether there is a reasonable expectation of privacy, which will affect whether the representative class have the same interest.  In this situation, showing that all members of the representative class have exactly the same interest in the claim is likely to be challenging.</p>
<p>This judgment highlights the difficulties in bringing data misuse claims on a class basis in the UK and may serve as a deterrent for representatives looking to bring such claims.</p>
<p>Click <span><strong><a href="https://sites-rpc.vuturevx.com/e/7tuoeebxj8n7h7g">here</a></strong></span> to see the CoA's judgment and click <span><strong><a href="https://sites-rpc.vuturevx.com/e/osk6yzncj0pa">here</a></strong></span> to access the High Court's judgment.</p>
<p><span><strong>EDPB's statement calls for coherence of legislation with the GDPR</strong></span></p>
<p>On 3 December 2024, the European Data Protection Board (<strong>EDPB</strong>) adopted a statement (Statement 6/2024) on the European Commission's second report on the applicability of the GDPR (COM (2024) 357)).</p>
<p>Whilst the EDPB's statement acknowledges that the GDPR has improved individuals' control over their own data and established high data protection standards through the EU, it notes there are outstanding challenges. More specifically, the EDPB notes that further clarity and coherence is needed between the GDPR and other EU statutory instruments such as the Artificial Intelligence Act, Digital Markets Act (DMA), and broader EU Data Strategy. It also indicates that further cooperation is needed between DPAs and other regulatory bodies.</p>
<p>The EDPB referred to some of its ongoing initiatives such as producing guidance to assist with understanding various EU statutory instruments and establishing cooperation mechanisms with other sectoral regulators. It also highlighted the need for additional financial and human resources to help DPAs and the EDPB deal with increasingly complex challenges and additional competences. The EDPB has encouraged reports from the European Commission and the Fundamental Rights Agency.</p>
<p>Click <strong><a href="https://sites-rpc.vuturevx.com/e/tueudsg4pjcdwww"><span>here</span></a></strong> to read the press release and statement from the EDPB.</p>
<p><span><strong>EU's Cyber Resilience Act comes into force</strong></span></p>
<p>On 10 December 2024, the EU's Cyber Resilience Act (<strong>CRA</strong>) has come into force.  Whilst most of the Act's obligations will not be applicable until three years from now, it marks a significant advance towards protecting products from cyber threats. The CRA applies to 'products with digital elements' (<strong>PDEs</strong>) which can range from Internet of Things (<strong>IOTs</strong>), computer components and even software. The CRA applies to manufacturers, distributors, and importers of PDEs.</p>
<p>Manufacturers are under the highest level of scrutiny as it is their responsibility to ensure that the PDE meets essential cybersecurity and vulnerability handling requirements, and to make notifications if there are severe PDE incidents.  Failure to comply with the CRA obligations can result in a fine of up to EUR 15 million or up to 2.5% of worldwide turnover.  Non-compliant products can also get banned, withdrawn or recalled from the EU. The provisions of the CRA will apply from 11 December 2027, with certain articles coming into force in 2026.</p>
<p>Click <span><strong><a href="https://sites-rpc.vuturevx.com/e/h0i0zud4nxuziq">here</a></strong></span> to read our full article which contains further analysis and commentary on the CRA.</p>
<p style="background-color: #ffffff; margin-right: 0px; margin-bottom: 20px; margin-left: 0px; padding: 0px; text-align: justify;"><span><strong>Nuclear Decommissioning Authority launches cyber facility</strong></span></p>
<p>The Nuclear Decommissioning Authority (<strong>NDA</strong>) is responsible for cleaning the UK's earliest nuclear sites and is made up of four key competencies: Sellafield; Nuclear Restoration Services; Nuclear Waste Services; and Nuclear Transport Solutions. The NDA has recently announced its establishment of a specialised cyber facility, the Group Cyberspace Collaboration Centre (<strong>GCCC</strong>).  The facility will seek to collaborate with nuclear operators and the wider supply chain to work on technologies such as AI and robotics whilst enhancing collective ability to defend against cyber threats. The GCCC is a wholly owned subsidiary of the NDA.</p>
<p>Earlier this year, another of the NDA's subsidiaries which is responsible for managing the Sellafield site, Sellafield Ltd, was fined £332,500. This came from Sellafield Ltd's failures to meet standards, procedures and arrangements as set out in in its approved cyber security plan and breaches of the Nuclear Industries Security Regulations 2003, which occurred over a course of four years.</p>
<p>Click <strong><a href="https://sites-rpc.vuturevx.com/e/eeecu7jc1qoucoq"><span>here</span></a></strong> to read more from Nuclear Engineering International on the establishment of the GCCC and click <span><strong><a href="https://sites-rpc.vuturevx.com/e/sqequmbgmhqdq9a">here</a></strong></span> to read regarding Sellafield's fine. </p>]]></description><pubDate>Tue, 31 Dec 2024 10:19:00 Z</pubDate><category>Data and privacy</category><authors:names>Richard Breavington, Daniel Guilfoyle, Rachel Ford, Ian Dinning, Christopher Ashton, Elizabeth Zang, Emanuele Santella , Lauren Kerr</authors:names><enclosure url="https://www.rpclegal.com/-/media/rpc/redesign-images/thinking-tiles/wide/data-and-cyber-2---thinking-tile-wide.jpg?rev=8f262369de1c46c6bef3c74e0d2b51c9&amp;hash=3379AF5F3FF6F6CC5ECB36CC0235B10B" type="image/jpeg" medium="image" /><content:encoded><![CDATA[<p><strong>RPC Cyber App: Breach Counsel at Your Fingertips</strong></p>
<p><strong></strong>As cyber-attacks and follow-on litigation continue to be a board-level issue for organisations worldwide, the RPC Cyber App provides a one-stop-shop resource for cyber breach assistance and pre-breach preparedness. As well as information about RPC's cyber-related expertise, the app also contains guidance on prevention against common incidents and access to our ongoing cyber market insights.</p>
<p>RPC Cyber can be downloaded for free from the <span><strong><a href="https://sites-rpc.vuturevx.com/e/3g0oz8we2cgj4ra">Apple Store</a></strong> or <strong><a href="https://sites-rpc.vuturevx.com/e/hjuwjou8y4uz9a">Google Play Store</a></strong>.</span></p>
<p><span><strong>NCSC publishes its Annual Review</strong></span></p>
<p>The NCSC has published its Annual Review which looks back at key cyber developments and observations between September 2023 and August 2024. Some of the NCSC's key findings are:</p>
<ul>
    <li>
    <p>Many nation-state threat actors and cyber criminals are using AI to increase the volume and heighten the impact of cyber-attacks.</p>
    </li>
    <li>
    <p>More recently, a greater proportion of threat actors are choosing not to encrypt systems and simply to threaten publication of sensitive data.</p>
    </li>
    <li>
    <p>The NCSC Incident Management (<strong>IM</strong>) team received 1,957 reports of cyber-attacks between the relevant period (down from 2,005 reports the previous year). 317 of 1,957 incidents were ransomware-related. 430 of the total incidents required support from the IM team (last year this was 371). 89 incidents were also described as nationally significant with 12 of them being at the "top end of the scale".</p>
    </li>
    <li>
    <p>The sectors reporting the highest levels of ransomware activity were academia, manufacturing, IT, legal, charities and construction.</p>
    </li>
    <li>
    <p>The NCSC believes organisations from all sectors are widely underestimating the severity of cyber threats in the UK.</p>
    </li>
    <li>
    <p>Global ransomware payments in 2023 topped $1 billion.</p>
    </li>
    <li>
    <p>There is a widening gap between the increasingly complex threats and collective defensive capabilities in the UK.</p>
    </li>
    <li>
    <p>The NCSC is pioneering research in the secure development of AI technologies.</p>
    </li>
</ul>
<p>To mark the release of this Annual Review, NCSC CEO, Dr Richard Horne, gave a speech.  He noted that the threat landscape is diversifying at speed and that talking about being resilient is not enough, rather existing guidance must be put into practice across the board to bolster defences.</p>
<p>Click <span><strong><a href="https://sites-rpc.vuturevx.com/e/3esqueebv6k0kg">here</a></strong></span> to read the NCSC's Annual Review and click <span><strong><a href="https://sites-rpc.vuturevx.com/e/ieu8zmponje6ra">here</a></strong></span> to read Dr Richard Horne's full speech.</p>
<p><span><strong>Court of Appeal dismisses mass misuse of private information representative claim</strong></span></p>
<p>In <em>Prismall v Google UK Ltd and DeepMind Technologies Ltd</em> [2023] EWHC 1169, Mr Prismall (the <strong>Claimant</strong>) had brought a representative action against Google and its artificial intelligence company, DeepMind Technologies (together, the <strong>Respondents</strong>). The Claimant alleged that the Respondents misused data belonging to 1.6m NHS patients (the proposed class members) by obtaining data from the Royal Free London NHS and using it to create a mobile app called 'Streams' which was used to help individuals detect kidney issues.</p>
<p>On 13 May 2023, the High Court dismissed the claim stating there was no prospect of establishing that the data relating to 1.6m class members could have been misused, and that such proceedings should not be allowed to proceed on an opt-out basis. The Claimant obtained permission to appeal.</p>
<p>On 11 December 2024, the Court of Appeal (<strong>CoA</strong>) handed down its judgment (Neutral citation: [2024] EWCA Civ 1516) following a hearing in October 2024. The CoA upheld the High Court's decision and dismissed the appeal. The CoA stated that a representative class claim for misuse of private information is always going to be very difficult because relevant circumstances will affect whether there is a reasonable expectation of privacy, which will affect whether the representative class have the same interest.  In this situation, showing that all members of the representative class have exactly the same interest in the claim is likely to be challenging.</p>
<p>This judgment highlights the difficulties in bringing data misuse claims on a class basis in the UK and may serve as a deterrent for representatives looking to bring such claims.</p>
<p>Click <span><strong><a href="https://sites-rpc.vuturevx.com/e/7tuoeebxj8n7h7g">here</a></strong></span> to see the CoA's judgment and click <span><strong><a href="https://sites-rpc.vuturevx.com/e/osk6yzncj0pa">here</a></strong></span> to access the High Court's judgment.</p>
<p><span><strong>EDPB's statement calls for coherence of legislation with the GDPR</strong></span></p>
<p>On 3 December 2024, the European Data Protection Board (<strong>EDPB</strong>) adopted a statement (Statement 6/2024) on the European Commission's second report on the applicability of the GDPR (COM (2024) 357)).</p>
<p>Whilst the EDPB's statement acknowledges that the GDPR has improved individuals' control over their own data and established high data protection standards through the EU, it notes there are outstanding challenges. More specifically, the EDPB notes that further clarity and coherence is needed between the GDPR and other EU statutory instruments such as the Artificial Intelligence Act, Digital Markets Act (DMA), and broader EU Data Strategy. It also indicates that further cooperation is needed between DPAs and other regulatory bodies.</p>
<p>The EDPB referred to some of its ongoing initiatives such as producing guidance to assist with understanding various EU statutory instruments and establishing cooperation mechanisms with other sectoral regulators. It also highlighted the need for additional financial and human resources to help DPAs and the EDPB deal with increasingly complex challenges and additional competences. The EDPB has encouraged reports from the European Commission and the Fundamental Rights Agency.</p>
<p>Click <strong><a href="https://sites-rpc.vuturevx.com/e/tueudsg4pjcdwww"><span>here</span></a></strong> to read the press release and statement from the EDPB.</p>
<p><span><strong>EU's Cyber Resilience Act comes into force</strong></span></p>
<p>On 10 December 2024, the EU's Cyber Resilience Act (<strong>CRA</strong>) has come into force.  Whilst most of the Act's obligations will not be applicable until three years from now, it marks a significant advance towards protecting products from cyber threats. The CRA applies to 'products with digital elements' (<strong>PDEs</strong>) which can range from Internet of Things (<strong>IOTs</strong>), computer components and even software. The CRA applies to manufacturers, distributors, and importers of PDEs.</p>
<p>Manufacturers are under the highest level of scrutiny as it is their responsibility to ensure that the PDE meets essential cybersecurity and vulnerability handling requirements, and to make notifications if there are severe PDE incidents.  Failure to comply with the CRA obligations can result in a fine of up to EUR 15 million or up to 2.5% of worldwide turnover.  Non-compliant products can also get banned, withdrawn or recalled from the EU. The provisions of the CRA will apply from 11 December 2027, with certain articles coming into force in 2026.</p>
<p>Click <span><strong><a href="https://sites-rpc.vuturevx.com/e/h0i0zud4nxuziq">here</a></strong></span> to read our full article which contains further analysis and commentary on the CRA.</p>
<p style="background-color: #ffffff; margin-right: 0px; margin-bottom: 20px; margin-left: 0px; padding: 0px; text-align: justify;"><span><strong>Nuclear Decommissioning Authority launches cyber facility</strong></span></p>
<p>The Nuclear Decommissioning Authority (<strong>NDA</strong>) is responsible for cleaning the UK's earliest nuclear sites and is made up of four key competencies: Sellafield; Nuclear Restoration Services; Nuclear Waste Services; and Nuclear Transport Solutions. The NDA has recently announced its establishment of a specialised cyber facility, the Group Cyberspace Collaboration Centre (<strong>GCCC</strong>).  The facility will seek to collaborate with nuclear operators and the wider supply chain to work on technologies such as AI and robotics whilst enhancing collective ability to defend against cyber threats. The GCCC is a wholly owned subsidiary of the NDA.</p>
<p>Earlier this year, another of the NDA's subsidiaries which is responsible for managing the Sellafield site, Sellafield Ltd, was fined £332,500. This came from Sellafield Ltd's failures to meet standards, procedures and arrangements as set out in in its approved cyber security plan and breaches of the Nuclear Industries Security Regulations 2003, which occurred over a course of four years.</p>
<p>Click <strong><a href="https://sites-rpc.vuturevx.com/e/eeecu7jc1qoucoq"><span>here</span></a></strong> to read more from Nuclear Engineering International on the establishment of the GCCC and click <span><strong><a href="https://sites-rpc.vuturevx.com/e/sqequmbgmhqdq9a">here</a></strong></span> to read regarding Sellafield's fine. </p>]]></content:encoded></item><item><guid isPermaLink="false">{DE10294F-8514-448C-902B-CCFC86CE40B8}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/privacy-developments-looking-back-and-looking-forward/</link><title>Privacy developments – looking back and looking forward</title><description><![CDATA[In this article, we give you a high-level snapshot of the key data protection and privacy developments in the UK and EU in 2024 as well as developments we anticipate for 2025.]]></description><pubDate>Thu, 19 Dec 2024 13:01:00 Z</pubDate><category>Data and privacy</category><authors:names>Oliver Bray, Jon Bartley, Joe Lippitt</authors:names><enclosure url="https://www.rpclegal.com/-/media/rpc/images/thinking-tiles/wide/301136-website-perspective-tiles-final-wide-715x370px_data-and-cyber---1271742015.jpg?rev=2280c60f10b440daba866ea74d9d912a&amp;hash=ECD0E649C606484031477B98C945F78A" type="image/jpeg" medium="image" /><content:encoded><![CDATA[<h4>Looking back on 2024</h4>
<table style="border: 1px solid #000000; width: 672px; height: 1289px; top: 80.4375px;">
    <tbody>
        <tr>
            <td style="border:1px solid #000000;"><strong> Date</strong></td>
            <td style="border:1px solid #000000;"><strong> Development</strong></td>
        </tr>
        <tr>
            <td rowspan="2" style="border:1px solid #000000;"> January</td>
            <td style="border:1px solid #000000;"> The ICO fines HelloFresh £140,000 for sending millions of spam marketing messages across a seven-month campaign period in contravention of regulation 22 of the Privacy and Electronic Communications Regulations. <a href="https://www.rpclegal.com/thinking/data-and-privacy/data-dispatch-april-2024/">Data Dispatch</a></td>
        </tr>
        <tr>
            <td style="border:1px solid #000000;"> The CNIL fines Amazon France Logistics €32 million for various breaches of the GDPR regarding the company's monitoring practices towards its employees that were found to be disproportionate. <a href="https://www.rpclegal.com/thinking/data-and-privacy/data-dispatch-april-2024/#page=1">Data Dispatch</a></td>
        </tr>
        <tr>
            <td rowspan="2" style="border:1px solid #000000;"> February</td>
            <td style="border:1px solid #000000;"> The EDPB clarifies in an opinion that a “main establishment” must be based in the EU and take the decisions on the purposes and means of the processing of personal data and have power to have these decisions implemented. <a href="https://www.rpclegal.com/snapshots/quarterly-roundups/snapshots-spring-2024//snapshots/data-protection/spring-2024/edpb-adopts-opinion-on-main-establishment-of-a-controller-in-the-eu/">Snapshots</a></td>
        </tr>
        <tr>
            <td style="border:1px solid #000000;"> The ICO publishes new guidance on how organisations can comply with data protection laws, specifically the UK GDPR and DPA 2018, when it comes to deploying or providing content moderation services. <a href="https://www.rpclegal.com/snapshots/data-protection/spring-2024/new-ico-guidance-on-content-moderation-and-data-compliance/">Snapshots</a><br />
            </td>
        </tr>
        <tr>
            <td style="border:1px solid #000000;"> March</td>
            <td style="border:1px solid #000000;"> The ICO publishes guidance on how it will assess if a fine should be imposed for data protection law breaches and how it decides on the amount as well as the proactive and reactive steps organisations can take to minimise the risk and quantum of fines. <a href="https://sites-rpc.vuturevx.com/95/5696/compose-email/rpc-s-data-dispatch---issue-5.asp">Data Dispatch</a><br />
            </td>
        </tr>
        <tr>
            <td style="border:1px solid #000000;"> April</td>
            <td style="border:1px solid #000000;"> The ICO closes its consultation on 'consent or pay' business models with the initial view that access mechanisms are not likely to comply with expectations in data protection law for consent to be “freely given” where they do not provide people with a free choice about whether to receive personalised ads. <a href="https://www.rpclegal.com/snapshots/data-protection/summer-2024/consent-or-pay-models-under-scrutiny-in-uk-and-eu/">Snapshots</a></td>
        </tr>
        <tr>
            <td style="border:1px solid #000000;"> May</td>
            <td style="border:1px solid #000000;"> The Data Protection and Digital Information Bill fails to make it through parliamentary 'wash up'. <a href="https://www.rpclegal.com/thinking/retail-therapy/parliamentary-wash-up-which-bills-made-it-through/">Blog</a> </td>
        </tr>
        <tr>
            <td style="border:1px solid #000000;"> June</td>
            <td style="border:1px solid #000000;"> The EU AI Act is signed. The Act establishes a risk-based framework that imposes obligations on AI providers and users (eg transparency, safety and accountability) with stricter requirements for high-risk AI applications and general purpose AI models. <a href="https://www.rpclegal.com/snapshots/technology-digital/summer-2024/eu-ai-act-is-signed/#:~:text=The%20development-,On%2013%20June%202024%2C%20the%20President%20of%20the%20Council%20of,are%20safe%2C%20trustworthy%20and%20transparent.">Snapshots</a></td>
        </tr>
        <tr>
            <td rowspan="2" style="border:1px solid #000000;"> August</td>
            <td style="border:1px solid #000000;"> The Dutch DPA publishes a record €290 million fine on Uber for transferring personal data of European taxi drivers to the US without using an appropriate transfer tool between 2021 and 2023. <a href="https://www.rpclegal.com/snapshots/quarterly-roundups/snapshots-autumn-2024//snapshots/data-protection/autumn-2024/uber-hit-with-290m-fine-transferring-eu-driver-data-to-its-us-hq/">Snapshots</a></td>
        </tr>
        <tr>
            <td style="border:1px solid #000000;"> The ICO puts several social media and video sharing platforms on notice to improve their children's privacy practices. <a href="https://www.rpclegal.com/snapshots/quarterly-roundups/snapshots-autumn-2024//snapshots/data-protection/autumn-2024/social-media-platforms-targeted-by-ico-over-children-privacy-practices/">Snapshots</a></td>
        </tr>
        <tr>
            <td rowspan="2" style="border:1px solid #000000;"> September</td>
            <td style="border:1px solid #000000;"> The ICO concludes a series of consultations focused on data protection and generative AI. The consultations aimed to address key challenges related to the responsible use of personal data in AI systems, ensuring compliance with UK GDPR and the DPA. <a href="https://www.rpclegal.com/thinking/data-and-privacy/data-dispatch-september-2024/">Data Dispatch</a></td>
        </tr>
        <tr>
            <td style="border:1px solid #000000;"> The European Commission <a href="https://ec.europa.eu/info/law/better-regulation/have-your-say/initiatives/14404-Standard-contractual-clauses-for-the-transfer-of-data-to-third-country-controllers-and-processors-subject-to-the-GDPR_en">announces</a> its intention to launch a public consultation on a new module of the Standard Contractual Clauses which will cover data transfers where both the data exporter and data importer are subject to the EU GDPR.</td>
        </tr>
        <tr>
            <td rowspan="3" style="border:1px solid #000000;"> October</td>
            <td style="border:1px solid #000000;"> The UK government introduces the Data (Use and Access) Bill to Parliament which, in addition to making GDPR-specific changes, introduces a new Smart Data scheme (that allows for the sharing and access of customer and business data), new digital verification services, and changes to the structure of the ICO. <a href="https://www.rpclegal.com/thinking/data-and-privacy/new-data-use-and-access-bill/">Blog</a></td>
        </tr>
        <tr>
            <td style="border:1px solid #000000;"> The ICO, together with fifteen other data protection supervisory authorities around the world, have released a joint statement for social media companies to adopt proactive measures to deal with data scraping. <a href="https://www.rpclegal.com/thinking/data-and-privacy/data-dispatch-november-2024/">Data Dispatch</a></td>
        </tr>
        <tr>
            <td style="border:1px solid #000000;"> The EDPB issues advice on controllers' responsibilities with multiple processors and sub-processors, alongside opening consultation on legitimate interest requirements. <a href="https://www.rpclegal.com/thinking/data-and-privacy/data-dispatch-october-2024/">Data Dispatch</a></td>
        </tr>
        <tr>
            <td style="border:1px solid #000000;"> November</td>
            <td style="border:1px solid #000000;"> The ICO releases its AI tools in recruitment audit outcomes report which sets out recommendations for both AI providers and developers to ensure their AI recruitment tools protect job seekers' privacy rights. <a href="https://www.rpclegal.com/thinking/data-and-privacy/data-dispatch-november-2024/">Data Dispatch</a></td>
        </tr>
        <tr>
            <td style="border:1px solid #000000;"> December</td>
            <td style="border:1px solid #000000;"> The ICO <a href="https://ico.org.uk/media/about-the-ico/what-we-do/our-work-on-artificial-intelligence/response-to-the-consultation-series-on-generative-ai-0-0.pdf">responds</a> to its generative AI consultation and is <a href="https://ico.org.uk/about-the-ico/what-we-do/our-plans-for-new-and-updated-guidance/">due to publish</a> final guidance on 'consent or pay' and storage and access technologies. </td>
        </tr>
    </tbody>
</table>
<p> </p>
<h4 style="margin-bottom: 2.22222rem;">Looking forward to 2025</h4>
<table style="border:1px solid #000000;height: 1289px; width: 672px;">
    <tbody>
        <tr>
            <td style="border:1px solid #000000;"><strong>Date</strong></td>
            <td style="border:1px solid #000000;"><strong>Development</strong></td>
        </tr>
        <tr>
            <td style="border:1px solid #000000;">January to March</td>
            <td style="border:1px solid #000000;">In the Privacy Laws & Business event held on 25 November, the UK government announced that the Data (Use and Access) Bill is expected to be debated in the House of Commons in early 2025 with Royal Assent following in Spring. </td>
        </tr>
        <tr>
            <td style="border:1px solid #000000;">Early 2025</td>
            <td style="border:1px solid #000000;"> The EDPB has selected the right of erasure as the topic for its fourth <a href="https://www.edpb.europa.eu/news/news/2024/cef-2025-edpb-selects-topic-next-years-coordinated-action_en">Coordinated Enforcement Action</a> amongst data protection authorities which will be launched in early 2025. The report on the outcome of the 2024 coordinated action on the right of access is also expected in early 2025.</td>
        </tr>
        <tr>
            <td style="border:1px solid #000000;">Spring 2025</td>
            <td style="border:1px solid #000000;"> The ICO is <a href="https://ico.org.uk/about-the-ico/what-we-do/our-plans-for-new-and-updated-guidance/">due to publish</a> final guidance on consumer Internet of Things and anonymisation/ pseudonymisation.</td>
        </tr>
        <tr>
            <td style="border:1px solid #000000;">Summer 2025</td>
            <td style="border:1px solid #000000;"> The EDPB expects to release draft Standard Contractual Clauses for where the data exporter and importer are both subject to the EU GDPR in late 2024/early 2025. The European Commission is then expected to adopt these by Q2 2025. <a href="https://www.rpclegal.com/thinking/data-and-privacy/data-dispatch-september-2024/">Data Dispatch</a></td>
        </tr>
        <tr>
            <td style="border:1px solid #000000;">November 2025</td>
            <td style="border:1px solid #000000;"> Implementation of key obligations under the EU Cyber Resilience Act begins. <a href="https://www.rpclegal.com/thinking/data-and-privacy/the-eu-cyber-resilience-act-targets-digital-components-made-available-in-the-eu-market/#:~:text=Subscribe-,The%20EU%20Cyber%20Resilience%20Act%20targets%20digital%20components%20made%20available,supply%20chain%20of%20a%20product&text=In%20an%20era%20when%20cyberattacks,taken%20a%20bold%20step%20forward.">Blog</a></td>
        </tr>
        <tr>
            <td style="border:1px solid #000000;" rowspan="3"> 2025</td>
            <td style="border:1px solid #000000;">The EDPB has said that it will issue guidance on the use of 'consent or pay' models by all providers operating in the EU in 2025. <a href="https://www.rpclegal.com/snapshots/data-protection/summer-2024/consent-or-pay-models-under-scrutiny-in-uk-and-eu/">Snapshot</a></td>
        </tr>
        <tr>
            <td style="border:1px solid #000000;"> In its <a href="https://www.edpb.europa.eu/system/files/2024-10/edpb_work_programme_2024-2025_en.pdf">2024-2025 work programme</a>, the EDPB also identified anonymisation, pseudonymisation and children's data as being the subject of further guidance being developed. </td>
        </tr>
        <tr>
            <td style="border:1px solid #000000;">The Coalition for Privacy Compliance in Advertising <a href="https://www.compliantads.org/">expects</a> to finalise an ICO-approved certification for adtech.</td>
        </tr>
        <tr>
            <td style="border:1px solid #000000;"> Unknown</td>
            <td style="border:1px solid #000000;"> In the Privacy Laws & Business event held on 25 November, the ICO identified children's privacy, AI and biometrics, online tracking, cyber, and supporting innovation as its current priorities. </td>
        </tr>
    </tbody>
</table>
<br />]]></content:encoded></item><item><guid isPermaLink="false">{E3E1C07D-16A2-4A6E-A42D-661B4E2F824A}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/the-eu-cyber-resilience-act/</link><title>The EU's Cyber Resilience Act: 10 on the 10</title><description><![CDATA[Today the EU's Cyber Resilience Act (Regulation (EU) 2024/2847) ('CRA') enters into force. The CRA recognises that the continuously evolving world of smart products is frequently challenged by vulnerabilities which can potentially lead to cyber-security incidents. Whilst most of the Act's obligations will not be applicable until three years from now, 10 December is the day when the EU takes a big step towards it's ten-year Cybersecurity Strategy. To mark the occasion, we have outlined ten key points that entities in scope must be aware of in preparation for compliance with the CRA.]]></description><pubDate>Tue, 10 Dec 2024 11:00:00 Z</pubDate><category>Data and privacy</category><authors:names>Richard Breavington, Dorian Nunzek</authors:names><enclosure url="https://www.rpclegal.com/-/media/rpc/redesign-images/thinking-tiles/wide/data-and-cyber-2---thinking-tile-wide.jpg?rev=8f262369de1c46c6bef3c74e0d2b51c9&amp;hash=3379AF5F3FF6F6CC5ECB36CC0235B10B" type="image/jpeg" medium="image" /><content:encoded><![CDATA[<p class="Heading2pink" style="text-align: left;">The
CRA recognises that the continuously evolving world of smart products is frequently
challenged by vulnerabilities which can potentially lead to cyber-security incidents.
Whilst most of the Act's obligations will not be applicable until three years
from now, 10 December is the day when the EU takes a big step towards it's ten-year
Cybersecurity Strategy. To mark the occasion, we have outlined ten key points that
entities in scope must be aware of in preparation for compliance with the CRA.</p>
<p style="text-align: left;"><strong>1. </strong><strong>Products with Digital
Elements</strong></p>
<p style="text-align: left;">The objective of the CRA is to protect consumer rights in relation to
Products with Digital Elements ('<strong>PDEs'</strong>) across the EU. The definition of
PDEs is broad. It includes any goods incorporating either software or hardware elements.
From Internet of Things (<strong>'IOTs'</strong>) products to computer components, remote
data processing solutions and any other devices which foreseeably use or
connect to a device or network. </p>
<p style="text-align: left;"><!--[if !supportLists]--></p>
<p style="text-align: left;"><strong>2. </strong><!--[endif]--><strong>Entities in Scope</strong></p>
<p style="text-align: left;"><strong></strong>The CRA is applicable
across the entire EU supply chain, capturing Manufacturers, Importers and
Distributors of PDEs. If Importers or Distributors use any manufacturers' products
with the Importer's or Distributor's own branding, they will be considered a
Manufacturer for the purposes of the CRA.</p>
<p style="text-align: left;"><!--[if !supportLists]--></p>
<p style="text-align: left;"><strong>3. </strong><!--[endif]--><strong>Risk Categories</strong></p>
<p style="text-align: left;">The CRA recognises that PDEs bear different levels of risk depending
upon their intended use and the potential extent of the impact rising from a
disruption. As such, the Act sets out four categories of risk:</p>
<ul>
    <li style="text-align: left;"><em>Default
    Products</em>: Products in this category are considered to bear the
    lowest level of cybersecurity risk and as such they are subject to basic cybersecurity
    requirements. This group covers the majority of PDEs including IOTs such as smart
    connected toys, smart watches, smart speakers, smart fridges and other
    connectable home devices.</li>
    <li style="text-align: left;"><em>Important
    Products (Class 1):</em> These are PDEs which present a higher risk
    than Default Products. Examples of this category include operating systems,
    identity management systems, password managers and VPNs.</li>
    <li style="text-align: left;"><em>Important
    Products (Class 2):</em> The level of risk for products in this
    category is even higher than that of Important Products Class 1. Examples of
    this category include firewalls, tamper-resistant microprocessors and
    microcontrollers.</li>
    <li style="text-align: left;"><em>Critical
    Products:</em> This category comprises those PDEs bearing the highest
    level of risk. Examples of these include smart metre gateways<sup>1</sup> and hardware devices with security boxes, smartcards or similar devices.</li>
</ul>
<p style="text-align: left;"><!--[if !supportLists]--></p>
<p style="text-align: left;"><strong>4. </strong><strong>PDE Conformity</strong></p>
<p style="text-align: left;">Different
conformity requirements apply to each risk category. </p>
<p style="text-align: left;">Whilst
Manufacturers can self-assess conformity for Default Products, further steps
are required for Important and Critical products. These can include instructing
a third-party to assess the PDE, obtaining an applicable European Cybersecurity
Certification Scheme or conducting self-assessments (only available to PDEs
with common specifications standards).</p>
<p style="text-align: left;"><!--[if !supportLists]--></p>
<p style="text-align: left;"><strong>5. </strong><strong>Obligations</strong></p>
<p style="text-align: left;">The extent
of the obligations arising under the CRA differs depending on whether an entity
is a Manufacturer, Importer or Distributor.</p>
<p style="text-align: left;">Manufacturers are under the highest level of
scrutiny. It is their responsibility to ensure that the PDE meets the essential
cybersecurity and vulnerability handling requirements, listed at Annex I and II
of the Act respectively.</p>
<p style="text-align: left;">Essential cybersecurity requirements include carrying
out risk assessments on PDEs to ensure that they are designed, developed and
produced with an appropriate level of controls. 
Those controls relate to cybersecurity, secure default configurations,
access control, data minimisation policies, availability and resilience
features.  There are also obligations to report
PDE vulnerabilities to the local Computer Security Incident Response Teams
(CSIRT) and European Union Agency for Cybersecurity (ENISA).</p>
<p style="text-align: left;">Vulnerability requirements include an
obligation for Manufacturers to conduct security tests, identify and document
vulnerabilities and distribute updates to fix or mitigate vulnerabilities.</p>
<p style="text-align: left;">Importers are under an
obligation to ensure that any PDEs entering the EU market are CRA compliant and
must obtain documents from the Manufacturer evidencing this. Importers must
also ensure that PDEs bear the 'CE' mark and are accompanied with information
and instructions for use. </p>
<p style="text-align: left;">Distributors must check
that Importers and Manufacturers have complied with their CRA obligations and
ensure that the product bears the 'CE' mark. Upon identifying any vulnerability
in PDEs, both Importers and Distributors must inform the Manufacturer without
undue delay.</p>
<p style="text-align: left;"><strong>6. </strong><!--[endif]--><strong>Enforcement Powers</strong></p>
<p style="text-align: left;">From a
wider EU perspective, ENISA will oversee the notifications arising from severe
PDE incidents and local CSIRTs will receive notifications at a national level.
However, each Member State will also expect to appoint its own market
surveillance authority, responsible for the enforcement of CRA obligations. Market
surveillance authorities' powers include the banning or withdrawing / recalling
non-compliant PDEs from the market.</p>
<p style="text-align: left;"><strong>7. </strong><strong>Consequences of
Non-compliance</strong></p>
<p style="text-align: left;">Potential fines for
non-compliance vary depending upon the nature of the breach:</p>
<p style="text-align: left;"><!--[if !supportLists]--></p>
<ul>
    <li style="text-align: left;">Non-compliance with the essential cybersecurity
    requirements, Manufacturers' obligations<sup>2</sup> or reporting obligations<sup>3</sup> can result in a fine up to EUR 15 million or up to 2.5% of the offender's
    worldwide turnover.</li>
    <li style="text-align: left;">Non-compliance with other obligations can
    result in a fine up to EUR 10 million or up to 2% of the offender's worldwide
    turnover.</li>
    <li style="text-align: left;">Providing misleading or incorrect information
    to market surveillance authorities or a relevant body can result in a fine up
    to EUR 5 million or 1% of the offender's worldwide turnover.</li>
</ul>
<p style="text-align: left;"><!--[if !supportLists]--></p>
<p style="text-align: left;"><strong>8. </strong><!--[endif]--><strong>Key Dates</strong></p>
<p style="text-align: left;">The CRA comes into force today (10 December 2024) but its applicability
is spread across three key dates:</p>
<ul>
    <li style="text-align: left;">On 11 June
    2026, provisions relating to conformity assessment bodies will start to apply
    (18 months).<sup>4</sup></li>
    <li style="text-align: left;">On 11
    September 2026, Manufacturers' obligations related to reporting exploitable
    vulnerabilities will commence (21 months).</li>
    <li style="text-align: left;">On 11
    December 2027, the CRA will become fully applicable (36 months).</li>
</ul>
<p style="text-align: left;"><!--[if !supportLists]--></p>
<p style="text-align: left;"><strong>9. </strong><!--[endif]--><strong>EU Legislation</strong></p>
<p style="text-align: left;">The CRA will join a number of European Directives and Regulations currently
being implemented to attempt to create a harmonised and safe cybersecurity
environment across the EU. Others include:</p>
<p style="text-align: left;"><em>NIS2 -</em> The NIS2 directive aims to create
a high common level of cybersecurity for important organisations and critical entities
providing physical and digital infrastructure across Member States. There is an
interplay between the two pieces of legislation as PDEs can be deemed critical
if they are used or relied upon by Essential Entities as defined in NIS2 (Art
6(5)(a) CRA).  However, NIS2 focuses on
the harmonisation of cybersecurity and cyber resilience standards, whereas the
CRA focuses on PDEs and the protection of consumers' rights.</p>
<p style="text-align: left;"><em>AI Act - </em>The AI Act aims to
ensure that artificial intelligence products are safe and transparent. In a
similar vein to the CRA, the AI Act applies to providers, distributors and
manufacturers and takes a risk-based approach, dividing AI systems into
different risk categories. While the focus of each Act is clearly distinct,
there is also an interplay between them. 
Products deemed High Risk AI systems which fulfil the requirements of
Section I Annex I of the CRA are deemed to have fulfilled the AI Act
requirements too (Art 8(1) CRA).</p>
<p style="text-align: left;"><em>European Data Act</em> - The
European Data Act requires data to be accessible and usable throughout Member
States with a view to increase data availability and innovation. It establishes
rules for information sharing which were previously not defined. It applies to
manufacturers and providers of connected goods and entities that hold data obtained
by such connected products or services. The products in scope are similar to
the CRA and can include electronics such as smart fridges and equipment that
collects and transmits data.</p>
<p style="text-align: left;">Whilst both Acts focus on similar products, their
aims are clearly distinct. The Data Act is aimed at enhancing the EU's data
economy and fostering a competitive data market by giving users of connected
products greater control over their data  and to impose measures to increase fairness
and competition in the cloud market. The CRA is primarily aimed at strengthening
the cybersecurity of products in scope.</p>
<p style="text-align: left;"><!--[if !supportLists]--></p>
<p style="text-align: left;"><strong>10. </strong><strong>UK Legislation</strong></p>
<p style="text-align: left;">In the UK, the most
comparable piece of legislation to the CRA is the Product Security and
Telecommunications Infrastructure Act (<strong>PSTI</strong>). The PSTI imposes minimum
security requirements on manufacturers, importers, and distributors in relation
to smart products. Some of these requirements include the need to provide
information on how to report security issues and the duty to investigate
potential compliance failures. Whilst both instruments are similar and target
the wider product supply chain, the CRA's definition of PDEs is further
reaching than the PTSI.</p>
<p style="text-align: left;">Despite a similar naming
convention, the UK's Cyber Security and Resilience Bill (which was announced at
the King's Speech in July) appears to be more aligned with NIS2 than with the
CRA.</p>
<p style="text-align: left;">
</p>
<p style="text-align: left;">The EU landscape on digital products is
developing at rapid speed. The combination of the CRA and other European
statutory instruments creates a changing playing field for the highly
competitive tech market. Whilst these changes impose more strenuous
requirements on businesses, in particular start-ups which may find challenging to
navigate, they are intended to create an even, safer and more consistent
environment for the industry and consumers across the EU. Businesses in the EU and
the UK have started giving careful consideration to the increasing legislation
and constant developments in the cybermarket where neither innovation nor
regulation are showing signs of slowing down anytime soon.</p>
<p style="text-align: left;"> </p>
<div style="text-align: left;"><hr align="left" size="1" width="33%" />
<!--[endif]-->
<div id="ftn1">
<p><a href="#_ftnref1" name="_ftn1"><!--[if !supportFootnotes]--></a><sup>1</sup>As defined in Article
2(23) of Directive (EU) 2019/944 of the European Parliament and of the Council and other devices for advanced security
purposes, including for secure crypto processing.</p>
</div>
<div id="ftn2">
<p><a href="#_ftnref2" name="_ftn2"><!--[if !supportFootnotes]--></a><sup>2</sup>Article 10 CRA</p>
</div>
<div id="ftn3">
<p><a href="#_ftnref3" name="_ftn3"><!--[if !supportFootnotes]--></a><sup>3</sup>Article 11 CRA</p>
</div>
<div id="ftn4">
<p><a href="#_ftnref4" name="_ftn4"><!--[if !supportFootnotes]--></a><sup>4</sup>Chapter VI, CRA </p>
</div>
</div>]]></content:encoded></item><item><guid isPermaLink="false">{4419E522-47D7-4185-8102-9F308B8B0AC2}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/new-data-use-and-access-bill/</link><title>New Data (Use and Access) Bill</title><description><![CDATA[What does the new Data (Use and Access) Bill (the Data Bill) mean for businesses?]]></description><pubDate>Tue, 26 Nov 2024 16:30:00 Z</pubDate><category>Data and privacy</category><authors:names>Jon Bartley</authors:names><enclosure url="https://www.rpclegal.com/-/media/rpc/redesign-images/thinking-tiles/wide/data-and-cyber-1---thinking-tile-wide.jpg?rev=4b6dbfd0eb224470bc21a554b4cb58fd&amp;hash=7E983E679A0FF006CFC9E5543A132D05" type="image/jpeg" medium="image" /><content:encoded><![CDATA[<p class="Heading2pink"><span><strong>The </strong></span><span><strong>question</strong></span></p>
<p><span>What does the new Data (Use and Access) Bill (the <strong>Data Bill</strong>) mean for businesses?</span></p>
<p><span><strong>The </strong></span><span><strong>key takeaway</strong></span></p>
<p><span>The Data Bill, whilst not as ambitious as the previous Data Protection and Digital Information Bill (the <strong>DPDI Bill</strong>), introduces several new business-friendly changes to the UK data protection regime.</span></p>
<p><span><strong>The </strong></span><span><strong>background</strong></span></p>
<p><span>The previous government had introduced the DPDI Bill as a progressive, business-friendly framework that would cut down on costs and paperwork. The DPDI Bill then went through several iterations and was described as a 'Christmas-tree' bill for the number of different provisions it sought to include. On the whole, however, the new regime would still have been very similar to the EU GDPR as too great a departure would threaten the UK's EU adequacy (also a concern with the new Data Bill). </span></p>
<p><span>Ultimately, the DPDI Bill did not pass through Parliament before its dissolution on 24 May 2024 ahead of the general election on 4 July 2024 and failed to become law. Eyes were on the new government as to whether it would resurrect the DPDI Bill and in what form. </span></p>
<p><span><strong>The </strong></span><span><strong>development</strong></span></p>
<p><span>On 23 October 2024, the government introduced the Data Bill to Parliament. Like the DPDI Bill, the Data Bill serves multiple purposes. In addition to making GDPR-specific changes, the Data Bill introduces a new Smart Data scheme (that allows for the sharing and access of customer and business data), new digital verification services, and changes to the structure of the ICO. </span></p>
<p><span>The Data Bill introduces the following amendments to the UK data protection regime:</span></p>
<ul>
    <li><strong><span>Legitimate interests: </span></strong><span>The Data Bill includes certain "recognised legitimate interests" which do not require that a balancing test is performed to be relied on as a lawful basis of processing. Additions to this list can be made by the Secretary of State but must be in the public interest. Otherwise, businesses can rely on the existing legitimate interest lawful basis subject to performing the balancing test and the Data Bill includes certain types of processing that might fall within this category e.g. processing for direct marketing, intra-group transmission for admin purposes and to ensure security of IT systems (these examples were already in the recitals of UK GDPR but for clarity have been moved into the substantive provisions).<br />
    <br />
    </span></li>
    <li><strong><span>Automated decision-making: </span></strong><span>The Data Bill includes additional controls on automated decision-making including clarifying where there is meaningful human involvement in any decisions (and therefore where the automated decision-making prohibition does not apply).<br />
    <br />
    </span></li>
    <li><strong><span>Research and statistics:</span></strong><span> The Data Bill clarifies the meaning of scientific research purposes and statistical purposes in UK GDPR.For example it makes clear that data processing in the context of privately-funded commercial activity or technology development can still benefit from the provisions related to scientific research as long as the activities can reasonably be described as scientific.<br />
    <br />
    </span></li>
    <li><strong><span>Data protection test: </span></strong><span>The Data Bill provides for a new "data protection test" instead of the adequacy test under the EU GDPR to be carried out prior to any international transfer. Organisations will be required to consider whether the standard of data protection in a third country is “not materially lower” than that under the UK GDPR.<br />
    <br />
    </span></li>
    <li><strong><span>Special category data: </span></strong><span>The Data Bill allows the Secretary of State to amend the Article 9 prohibition on processing special category data to add new special categories of data (e.g. neuro data), state that certain processing does not fall within the prohibition and amend how an exception to the prohibition should apply.<br />
    <br />
    </span></li>
    <li><strong><span>DSARs: </span></strong><span>The Data Bill codifies case law by providing that organisations only have to carry out reasonable and proportionate searches when responding to a DSAR but must do so "without delay" and in any case within a month of receiving the request, subject to exceptions where an extension is available.<br />
    <br />
    </span></li>
    <li><strong><span>Processing purposes: </span></strong><span>The Data Bill clarifies when processing may be carried out for a new purpose which is compatible with the original purpose of processing.<br />
    <br />
    </span></li>
    <li><span><strong>PECR: </strong>The Data Bill aligns the fine for PECR breaches and time limit for reporting PECR breaches to the GDPR standard in both cases.It also introduces an exception to the requirement for consent for certain non-intrusive cookies or similar technologies (e.g. to measure website use in order to improve the site), provided that users are given clear and comprehensive information about the cookies and an opportunity to object.</span></li>
</ul>
<p><span>On the other hand, the Data Bill does not include the following a­­­mendments that were proposed in the DPDI Bill:</span></p>
<ul>
    <li><strong>Accountability</strong>: The DPDI Bill sought to simplify the accountability regime for organisations by introducing the concept of a Senior Responsible Individual (to replace a DPO), limiting the obligation to produce records of processing activity only to high risk processing, replacing data protection impact assessments with assessments of high risk processing, and removing the requirement for overseas organisations to have a UK representative. These changes have not been carried through.<br />
    <br />
    </li>
    <li><strong>Definition of personal data</strong>: The DPDI Bill intended to restrict the definition of "personal data" to where the information is identifiable by the controller or a third party by reasonable means. This has not been carried into the Data Bill.<br />
    <br />
    </li>
    <li><strong>Vexatious/excessive requests</strong>: Under the DPDI Bill, organisations had the right to refuse a data subject request where it was vexatious or excessive. This right has been removed.</li>
</ul>
<p><span><strong>Why is this important?</strong></span></p>
<p><span>The Data Bill is the Labour government's attempt at recalibrating the UK's approach to data protection, after the previous government failed to push the DPDI Bill through. The narrower scope of the Data Bill will disappoint businesses expecting a less burdensome regime, but this may be a tactical decision to ensure that the UK does not lose its EU adequacy. However, with the more ambitious DPDI Bill,  organisations that operate across the UK and EU would have needed to decide how to manage both sets of requirements – either adopt a dual-track system for the UK and EU or require that the entire business complies with the stricter EU regime.  With the more limited changes proposed by the Data Bill, such organisations will not need to make such strategic decisions but they may be able to take advantage of minor tweaks to their UK processing.</span></p>
<p><strong><span>Any </span></strong><strong><span>practical</span></strong><strong><span> </span></strong><strong><span>tips</span></strong><strong><span>?</span></strong></p>
<p><span>The Data Bill is currently making its way through the House of Lords before continuing through the House of Commons. It's still very early days and the text may go through several rounds of amendments.  However, much of the Data Bill had cross-party support when it appeared in the DPDI Bill and some of the more controversial reforms to the data protection regime have been removed, so the government's target of achieving Royal Assent by Spring 2025 with commencement later in the year does not seem overly ambitious.</span></p>
<p><span>Businesses should keep track of the draft through the Parliamentary process and begin initial analysis of how these changes would affect contracts and processes.</span></p>]]></content:encoded></item><item><guid isPermaLink="false">{AC75E16D-9E27-4A5C-B8B2-A295DCA37FDE}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/cyber-bytes-issue-69/</link><title>Cyber_Bytes - Issue 69</title><description><![CDATA[<p><strong>Data (Use and Access) Bill introduced to Parliament</strong></p>
<p>On 23 October 2024, the House of Lords introduced the Data (Use and Access) Bill (DUA). The DUA is intended to replace the Data Protection and Digital Information Bill (DPDI) which was dropped during the parliamentary wash-up.  </p>
<p>Some of the key points in the DUA include:</p>
<ul>
    <li>the introduction of open public data bases and smart data which is intended to free up Police and NHS resources;</li>
    <li>the power for the Secretary of State to alter which types of data can be classed as special category data, and provisions on access to business and customer data; and</li>
    <li>the introduction of a national register for underground services such as cables, water, pipes, and power.</li>
</ul>
<p>The DUA does however remove some elements from the DPDI, including:</p>
<ul>
    <li>the requirement for the ICO to consider the government's objectives;</li>
    <li>changes to the meaning of personal data;</li>
    <li>the requirement for overseas companies to have a representative in the UK, and;</li>
    <li>the right to refuse to respond to data subject access requests which are disproportionate.</li>
</ul>
<p>Whilst some have commented that the Bill is less ambitious than the DPDI, this is still a significant piece of legislation which will introduce notable changes to the UK GDPR.</p>
<p>Click <a rel="noopener noreferrer" href="https://www.gov.uk/government/publications/data-use-and-access-bill-factsheets" target="_blank">here</a> to read the government's press releases considering further changes and click <a rel="noopener noreferrer" href="https://bills.parliament.uk/bills/3825" target="_blank">here</a> to view the DUA in its entirety. </p>
<p><strong>NCSC issues guidance for legal practitioners on cyber policies</strong></p>
<p>The NCSC has released a list of preventative steps which solicitors, barristers and other legal professionals should incorporate to reduce the risk of falling foul to a cyber-attack. These steps include:</p>
<ul>
    <li>Creating and testing backups of important data which would allow client data to be accessible even in the event cyber-attack.</li>
    <li>Keeping software updated and enabling automatic updates to ensure the latest security updates are in place.</li>
    <li>Enabling encryption on all devices.</li>
    <li>Protecting email accounts using strong passwords and using 2-step verification / multi-factor authentication.</li>
    <li>Controlling access to devices by using passcodes or biometrics where applicable and locking your devices when not at your desk.</li>
    <li>Turning on firewalls to prevent unwanted connections to devices.</li>
    <li>Limiting the number of administrator accounts.</li>
    <li>Enabling antivirus software.</li>
    <li>Ensuring lost or stolen devices can be tracked, locked or wiped, so that unauthorised individuals cannot access the information on the device.</li>
    <li>Auditing and reviewing privacy permissions connected with other apps and making sure that staff only have access to applications which are necessary for the purposes of their role.</li>
</ul>
<p>For each recommendation, the NCSC has helpfully provided various links containing guidance on how to implement these measures on various systems.</p>
<p>Click <a href="https://www.ncsc.gov.uk/guidance/cyber-security-tips-for-barristers-solicitors-and-legal-professionals">here</a> to read more from the NCSC.</p>
<p> </p>
<p><strong>Regulators' latest updates on Operational Resilience and Critical Third Parties</strong></p>
<p>In August 2024, the Bank of England (BoE) published its Report on Operational Resilience on a Macroprudential Framework with a view to assisting financial entities and the wider financial system to prevent and respond better to operational disruptions.</p>
<p>This has now been complemented on 12 November 2024 by a Policy Statement PS16/24, titled "Operational Resilience: Critical Third Parties to the UK Financial Sector" (the Rules) which have been published by the BoE in collaboration with the FCA and the PRA (the Regulators).  </p>
<p>The Rules stem from the Regulators' recognition of the increasing reliance by financial entities on services provided by third parties and the impact disruptions can have to these services, which can include potential threats to financial stability and market integrity.</p>
<p>The Rules aim to harmonise various regulatory instruments into a new Critical Third-Party (CTP) regime.  This sets out measures to ensure CTPs can prevent and deal with disruptions from Macro Vulnerabilities and Transmission Channels. The Rules also outline 6 'Fundamental Rules' which OTPs are required to exercise whilst conducting business. </p>
<p>Click <a href="https://www.rpclegal.com/thinking/data-and-privacy/digital-operational-resilience-the-uk-regulatory-landscape/">here</a> to read our full article on the Rules and the UK's digital operational resilience landscape, and click <a href="https://www.bankofengland.co.uk/-/media/boe/files/prudential-regulation/supervisory-statement/2024/ss624-november-2024.pdf">here</a> to access the Rules.</p>
<p> </p>
<p><strong>What does your cyber insurance cover? ICAEW provides insights</strong></p>
<p>The ICAEW has emphasised that companies must be vigilant of exclusions and limitations within their cyber policies. RPC's Richard Breavington highlights that some policies require evidence of multi-factor authentication, effective patch management or other security measures; meaning that failure to follow these steps could prevent the policy from responding.</p>
<p>The ICAEW also refer to a report from Delinea which states that 47% of incidents linked to insurance claims are related to privilege and identify compromises, meaning that consequently, 41% of insurers now require evidence of privileged access controls before writing a policy.</p>
<p>The ICAEW use these points to highlight the importance of suitably assessing cyber policies to ensure the rights steps are being taken to ensure claims will be covered, and putting in place the right steps so businesses can be issued the right cyber policy in the first place. The ICAEW also comments that companies should explore AI-supported threat detection and monitoring solutions which can reduce likelihood of incidents and minimise cyber-related loss.</p>
<p>Click <a href="https://www.icaew.com/insights/viewpoints-on-the-news/2024/oct-2024/cyber-is-your-insurance-adequate-in-2024">here</a> to read more from the ICAEW on this topic.</p>
<p> </p>
<p><strong>Cybersecurity myths putting accounting professionals at risk</strong></p>
<p>The Financial Accountant states that whilst over 560,000 cyber threats are discovered daily which mostly target SMEs, many accounting professionals still believe certain cybersecurity myths which leave them vulnerable.</p>
<p>These myths include assuming that:</p>
<p>"Only the big four accounting firms get hacked"- In reality, 81% of cyber threats target small to medium sized businesses.</p>
<p>"Silence is the best policy"- Staying silent can involve risk and can even be contrary to legal requirements if the breach meets applicable notification thresholds.</p>
<p>"You can choose who to report the incident to"- Reporting requirements differ by jurisdiction. Certain incidents may also require reporting to multiple jurisdictions, such as if the company is part of an EU supply chain. RPC's Richard Breavington comments that notifications to European regulators might be needed if European data subjects are affected.</p>
<p>"Backing up data eliminates risk"- In fact, many cyber criminals intentionally target back-up data, albeit having properly protected back ups is a crucial part of a firm's cybersecurity posture.</p>
<p>"Cybersecurity is 'set and forget"- Constant vigilance is required to mitigate cyber risks.</p>
<p>To read more on this topic, click <a href="https://financialaccountant.co.uk/features/five-cybersecurity-myths/">here</a> for the Financial Accountant's full article.</p>
<p> </p>
<p><strong>Australian draft law to encourage businesses to share private data with government.</strong></p>
<p>Following escalating cyber threats, the Australian government is introducing the Cyber Security Act which will require businesses to report any ransom payments to authorities. The Act also encourages businesses to share private details with relevant agencies.</p>
<p>The new 'limited use' obligations within the Act will prevent sharing of information provided to the National Cyber Security Coordinator and Australian Signals Directorate – although it will not give businesses a complete indemnity from future prosecution. Under a new power aimed at protecting the country's critical infrastructure, businesses will also be forced to address serious cyber deficiencies within their risk management programmes.</p>
<p>The Australian government's cyber security minister, Tony Burke, has said the Cyber Security Act is long overdue and reflects their deep focus on cyber threats as well as keeping pace with emerging threats and positioning businesses and individuals to respond and bounce back from cyber-attacks effectively.</p>
<p>Click <a href="https://www.abc.net.au/news/2024-10-09/cyber-laws-could-force-businesses-to-report-ransomware-payments/104446552">here</a> to read more from ABC news.</p>]]></description><pubDate>Thu, 21 Nov 2024 15:26:00 Z</pubDate><category>Data and privacy</category><authors:names>Richard Breavington, Daniel Guilfoyle, Rachel Ford, Ian Dinning, Christopher Ashton, Elizabeth Zang, Emanuele Santella , Lauren Kerr</authors:names><enclosure url="https://www.rpclegal.com/-/media/rpc/redesign-images/thinking-tiles/wide/data-and-cyber-2---thinking-tile-wide.jpg?rev=8f262369de1c46c6bef3c74e0d2b51c9&amp;hash=3379AF5F3FF6F6CC5ECB36CC0235B10B" type="image/jpeg" medium="image" /><content:encoded><![CDATA[<p><strong>Data (Use and Access) Bill introduced to Parliament</strong></p>
<p>On 23 October 2024, the House of Lords introduced the Data (Use and Access) Bill (DUA). The DUA is intended to replace the Data Protection and Digital Information Bill (DPDI) which was dropped during the parliamentary wash-up.  </p>
<p>Some of the key points in the DUA include:</p>
<ul>
    <li>the introduction of open public data bases and smart data which is intended to free up Police and NHS resources;</li>
    <li>the power for the Secretary of State to alter which types of data can be classed as special category data, and provisions on access to business and customer data; and</li>
    <li>the introduction of a national register for underground services such as cables, water, pipes, and power.</li>
</ul>
<p>The DUA does however remove some elements from the DPDI, including:</p>
<ul>
    <li>the requirement for the ICO to consider the government's objectives;</li>
    <li>changes to the meaning of personal data;</li>
    <li>the requirement for overseas companies to have a representative in the UK, and;</li>
    <li>the right to refuse to respond to data subject access requests which are disproportionate.</li>
</ul>
<p>Whilst some have commented that the Bill is less ambitious than the DPDI, this is still a significant piece of legislation which will introduce notable changes to the UK GDPR.</p>
<p>Click <a rel="noopener noreferrer" href="https://www.gov.uk/government/publications/data-use-and-access-bill-factsheets" target="_blank">here</a> to read the government's press releases considering further changes and click <a rel="noopener noreferrer" href="https://bills.parliament.uk/bills/3825" target="_blank">here</a> to view the DUA in its entirety. </p>
<p><strong>NCSC issues guidance for legal practitioners on cyber policies</strong></p>
<p>The NCSC has released a list of preventative steps which solicitors, barristers and other legal professionals should incorporate to reduce the risk of falling foul to a cyber-attack. These steps include:</p>
<ul>
    <li>Creating and testing backups of important data which would allow client data to be accessible even in the event cyber-attack.</li>
    <li>Keeping software updated and enabling automatic updates to ensure the latest security updates are in place.</li>
    <li>Enabling encryption on all devices.</li>
    <li>Protecting email accounts using strong passwords and using 2-step verification / multi-factor authentication.</li>
    <li>Controlling access to devices by using passcodes or biometrics where applicable and locking your devices when not at your desk.</li>
    <li>Turning on firewalls to prevent unwanted connections to devices.</li>
    <li>Limiting the number of administrator accounts.</li>
    <li>Enabling antivirus software.</li>
    <li>Ensuring lost or stolen devices can be tracked, locked or wiped, so that unauthorised individuals cannot access the information on the device.</li>
    <li>Auditing and reviewing privacy permissions connected with other apps and making sure that staff only have access to applications which are necessary for the purposes of their role.</li>
</ul>
<p>For each recommendation, the NCSC has helpfully provided various links containing guidance on how to implement these measures on various systems.</p>
<p>Click <a href="https://www.ncsc.gov.uk/guidance/cyber-security-tips-for-barristers-solicitors-and-legal-professionals">here</a> to read more from the NCSC.</p>
<p> </p>
<p><strong>Regulators' latest updates on Operational Resilience and Critical Third Parties</strong></p>
<p>In August 2024, the Bank of England (BoE) published its Report on Operational Resilience on a Macroprudential Framework with a view to assisting financial entities and the wider financial system to prevent and respond better to operational disruptions.</p>
<p>This has now been complemented on 12 November 2024 by a Policy Statement PS16/24, titled "Operational Resilience: Critical Third Parties to the UK Financial Sector" (the Rules) which have been published by the BoE in collaboration with the FCA and the PRA (the Regulators).  </p>
<p>The Rules stem from the Regulators' recognition of the increasing reliance by financial entities on services provided by third parties and the impact disruptions can have to these services, which can include potential threats to financial stability and market integrity.</p>
<p>The Rules aim to harmonise various regulatory instruments into a new Critical Third-Party (CTP) regime.  This sets out measures to ensure CTPs can prevent and deal with disruptions from Macro Vulnerabilities and Transmission Channels. The Rules also outline 6 'Fundamental Rules' which OTPs are required to exercise whilst conducting business. </p>
<p>Click <a href="https://www.rpclegal.com/thinking/data-and-privacy/digital-operational-resilience-the-uk-regulatory-landscape/">here</a> to read our full article on the Rules and the UK's digital operational resilience landscape, and click <a href="https://www.bankofengland.co.uk/-/media/boe/files/prudential-regulation/supervisory-statement/2024/ss624-november-2024.pdf">here</a> to access the Rules.</p>
<p> </p>
<p><strong>What does your cyber insurance cover? ICAEW provides insights</strong></p>
<p>The ICAEW has emphasised that companies must be vigilant of exclusions and limitations within their cyber policies. RPC's Richard Breavington highlights that some policies require evidence of multi-factor authentication, effective patch management or other security measures; meaning that failure to follow these steps could prevent the policy from responding.</p>
<p>The ICAEW also refer to a report from Delinea which states that 47% of incidents linked to insurance claims are related to privilege and identify compromises, meaning that consequently, 41% of insurers now require evidence of privileged access controls before writing a policy.</p>
<p>The ICAEW use these points to highlight the importance of suitably assessing cyber policies to ensure the rights steps are being taken to ensure claims will be covered, and putting in place the right steps so businesses can be issued the right cyber policy in the first place. The ICAEW also comments that companies should explore AI-supported threat detection and monitoring solutions which can reduce likelihood of incidents and minimise cyber-related loss.</p>
<p>Click <a href="https://www.icaew.com/insights/viewpoints-on-the-news/2024/oct-2024/cyber-is-your-insurance-adequate-in-2024">here</a> to read more from the ICAEW on this topic.</p>
<p> </p>
<p><strong>Cybersecurity myths putting accounting professionals at risk</strong></p>
<p>The Financial Accountant states that whilst over 560,000 cyber threats are discovered daily which mostly target SMEs, many accounting professionals still believe certain cybersecurity myths which leave them vulnerable.</p>
<p>These myths include assuming that:</p>
<p>"Only the big four accounting firms get hacked"- In reality, 81% of cyber threats target small to medium sized businesses.</p>
<p>"Silence is the best policy"- Staying silent can involve risk and can even be contrary to legal requirements if the breach meets applicable notification thresholds.</p>
<p>"You can choose who to report the incident to"- Reporting requirements differ by jurisdiction. Certain incidents may also require reporting to multiple jurisdictions, such as if the company is part of an EU supply chain. RPC's Richard Breavington comments that notifications to European regulators might be needed if European data subjects are affected.</p>
<p>"Backing up data eliminates risk"- In fact, many cyber criminals intentionally target back-up data, albeit having properly protected back ups is a crucial part of a firm's cybersecurity posture.</p>
<p>"Cybersecurity is 'set and forget"- Constant vigilance is required to mitigate cyber risks.</p>
<p>To read more on this topic, click <a href="https://financialaccountant.co.uk/features/five-cybersecurity-myths/">here</a> for the Financial Accountant's full article.</p>
<p> </p>
<p><strong>Australian draft law to encourage businesses to share private data with government.</strong></p>
<p>Following escalating cyber threats, the Australian government is introducing the Cyber Security Act which will require businesses to report any ransom payments to authorities. The Act also encourages businesses to share private details with relevant agencies.</p>
<p>The new 'limited use' obligations within the Act will prevent sharing of information provided to the National Cyber Security Coordinator and Australian Signals Directorate – although it will not give businesses a complete indemnity from future prosecution. Under a new power aimed at protecting the country's critical infrastructure, businesses will also be forced to address serious cyber deficiencies within their risk management programmes.</p>
<p>The Australian government's cyber security minister, Tony Burke, has said the Cyber Security Act is long overdue and reflects their deep focus on cyber threats as well as keeping pace with emerging threats and positioning businesses and individuals to respond and bounce back from cyber-attacks effectively.</p>
<p>Click <a href="https://www.abc.net.au/news/2024-10-09/cyber-laws-could-force-businesses-to-report-ransomware-payments/104446552">here</a> to read more from ABC news.</p>]]></content:encoded></item><item><guid isPermaLink="false">{397B99DA-5537-480B-B8CC-4C8D0E3FB182}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/digital-operational-resilience-the-uk-regulatory-landscape/</link><title>Digital operational resilience: the UK regulatory landscape</title><description><![CDATA[Operational Resilience in the supply chain has become an undeniable priority for all financial service providers across the continent. ]]></description><pubDate>Fri, 15 Nov 2024 11:59:00 Z</pubDate><category>Data and privacy</category><authors:names>Richard Breavington</authors:names><enclosure url="https://www.rpclegal.com/-/media/rpc/images/thinking-tiles/wide/301136-website-perspective-tiles-final-wide-715x370px_data-and-cyber---1271742015.jpg?rev=2280c60f10b440daba866ea74d9d912a&amp;hash=ECD0E649C606484031477B98C945F78A" type="image/jpeg" medium="image" /><content:encoded><![CDATA[<p>The significance of Operational Resilience has increased in parallel with developments in technology in the financial services sector. Its pivotal place as a risk to financial stability has been put further in the spotlight during recent cross border cyber incidents such as the worldwide IT outage caused by a defective update distributed by CrowdStrike and the outage at Swift, a global messaging service affecting wholesale payments. </p>
<p>Back in August 2024, the Bank of England ('<strong>BoE</strong>') published their Report on Operational Resilience on a Macroprudential Framework.  This aimed to assist financial entities and the wider financial system to prevent and respond better to operational disruptions.</p>
<p>This has now been complemented by the Digital Rules on ICT Critical Providers published on 12 November by the BoE in collaboration with the Financial Conduct Authority ('<strong>FCA</strong>') and the Prudential Regulatory Authority ('<strong>PRA</strong>'). The Rules are aimed at levelling up cybersecurity and Operational Resilience to international standards.<br />
<br />
1. <strong>The BoE report: operational resilience in a macroprudential framework</strong></p>
<p>In March 2024, the BoE’s Financial Policy Committee ('<strong>FPC</strong>') published a report exploring its attitude to Operational Resilience with the intention of highlighting how financial stability can be affected by operational risk.</p>
<p>This was further developed in the Report on Operational Resilience in a Macroprudential Framework, published on 27 August 2024 (the '<strong>Report</strong>'). </p>
<p><strong>Identifying macro vulnerabilities</strong></p>
<p>The first step when considering macroprudential risks is, as highlighted in the Report, to take account of the level of Operational Resilience of financial services firms, Financial Market Infrastructures ('<strong>FMIs</strong>') and the wider financial system. The Report notes that the likelihood that an individual firm of FMI will experience an operational incident is determined by the number and extent of its (micro and macro) vulnerabilities. </p>
<p>The only possible way that these vulnerabilities can be centrally addressed is by putting in place robust operational risk management processes not just within the financial entities but also as regards their critical service providers. </p>
<p>The Report states that macro vulnerabilities pose a greater risk of generating a domino effect which could threaten the stability of the financial system. It is for this reason that they are considered with particular care by the regulators. </p>
<p><strong>System-Wide Resilience</strong></p>
<p><strong></strong>The Report shows how Operational Resilience policies set by the regulators aim to narrow the gap between firm-level and system-wide Operational Resilience, highlighting how system-wide Operational Resilience is backed up by further system-wide policies and tools. </p>
<p>Relevant firms such as banks, building societies, insurers and FMIs are expected to:</p>
<p style="margin-left: 40px;">a.<span> </span>recognise the vital services that are significant to financial stability when looking at their important business services; <br />
b.<span> </span>consider how the wider financial system might be affected by deficiencies in their own Operational Resilience and implement clear processes to be followed when dealing with incidents as they attempt to increase their resilience; and<br />
c.<span> </span>ensure that the impact of any disruption to the provision of essential business services does not go beyond certain tolerable levels.</p>
<p>The FPC also set out an expectation as to the time taken for critical payments to be made after an operational incident (known as the ‘FPC’s impact tolerance for critical payments’) and future new requirements to raise the resilience of material services provided by critical third parties to firms and FMIs. </p>
<p>The FPC have themselves taken steps to lessen systemic risks from operational issues by way of a program of work which includes stress tests to advance the financial system’s resilience to cyber-attacks. </p>
<p>System-wide resilience is to be supported by the cooperative attitude between the UK financial authorities and the wider financial sector through collaborative action and increased engagement within the sector.</p>
<p><strong>Third Party Services Providers</strong></p>
<p>The Report recognises the key role played by third party service providers to financial institutions. </p>
<p>Disturbances to the financial entities' services, or those of their third-party service providers, can directly impact the capability of the financial system to provide essential services. This can consequently affect multiple levels of the industry.</p>
<p>The Report makes clear that individual firms and FMIs' resilience may not be enough as standalone defences against system-level vulnerabilities. These vulnerabilities mean that operational incidents suffered by critical third parties serving financial entities, can cause contagion across the financial system.  The result is that system-wide policies and tools are required alongside firm-level measures. </p>
<p>This point is further developed by the BoE in the PS16/24 Operation Resilience Rules considered below. </p>
<p><strong>2. PS16/24 – Operational Resilience: Critical Third Parties to the UK Financial Sector</strong></p>
<p>In recognition of the increasing reliance by financial entities on services provided by third parties, the impact of disruption to these services and potential threat to the financial stability and market integrity, the BoE, in collaboration with the PRA and the FCA (the '<strong>Regulators</strong>') have also issued Policy Statement PS16/24, titled "Operational Resilience: Critical Third Parties to the UK Financial Sector" on 12 November 2024 (the '<strong>Rules</strong>'). </p>
<p>The Rules are set up on the foundational basis of the '<em>Overall Objective of the oversight regime for CTPs which is to manage risks to the stability of, or confidence in, the UK financial system that may arise due to a failure in, or disruption to, the services (either individually or, where more than one service is provided, taken together) that a CTP provides to ‘firms</em>’.<sup>1</sup></p>
<p>The Rules seek to harmonise various regulatory instruments across the Regulators, into a new Critical Third-Party ('<strong>CTP</strong>') Regime, comprising:</p>
<p style="margin-left: 40px;">1.<span> </span><a rel="noopener noreferrer" href="https://www.bankofengland.co.uk/-/media/boe/files/financial-stability/financial-market-infrastructure-supervision/critical-third-parties/final-ctp-rule-instrument.pdf" target="_blank">Critical Third Parties Instrument 2024 </a><br />
2.<span> </span><a rel="noopener noreferrer" href="https://www.bankofengland.co.uk/-/media/boe/files/financial-stability/financial-market-infrastructure-supervision/critical-third-parties/final-ctp-emergency-provisions.pdf" target="_blank">Critical Third Parties Emergency Provisions Instrument 2024</a><br />
3.<span> </span><a rel="noopener noreferrer" href="https://www.bankofengland.co.uk/prudential-regulation/publication/2024/november/operational-resilience-critical-third-parties-to-the-uk-financial-sector-supervisory-statement" target="_blank">Supervisory statement 6/24 - Critical third parties to the UK financial sector</a><br />
4.<span> </span><a rel="noopener noreferrer" href="https://www.bankofengland.co.uk/prudential-regulation/publication/2024/november/reports-by-skilled-persons-critical-third-parties-supervisory-statement" target="_blank">Supervisory statement 7/24 - Reports by skilled persons: Critical third parties</a><br />
5.<span> </span><a rel="noopener noreferrer" href="https://www.bankofengland.co.uk/prudential-regulation/publication/2024/november/operational-resilience-critical-third-parties-to-the-uk-financial-sector-policy-statement" target="_blank">Policy statement 16/24 - Operational Resilience: Critical third parties to the UK financial sector</a><br />
6.<span> </span><a rel="noopener noreferrer" href="https://www.bankofengland.co.uk/prudential-regulation/publication/approach-to-the-oversight-of-critical-third-parties" target="_blank">Approach to the oversight of critical third parties</a></p>
<p>The Rules, further explain in the Supervisory Statement,<sup>2</sup> outline the regulatory framework for oversight of CTPs and set out the Regulators' expectations of how a CTP should comply with the obligations placed on it under the Financial Services and Markets Act 2023 ('FSMA') and the Regulators' rules.  </p>
<p>HM Treasury ('<strong>HMT</strong>') holds the authority to designate third-party service providers as CTPs<sup>3</sup>if their failure or disruption could threaten the stability or confidence in the UK financial system. Additional guidance will be provided by the regulators in respect of HMT's approach to designation of third-party service providers as CTP. </p>
<p>Pursuant to the Rules, CTPs are required to meet specific resilience standards, ensuring they can prevent, and deal with, operational disruptions arising primarily from Macro Vulnerabilities and Transmission Channels.</p>
<p>Macro vulnerabilities which can amplify the impact of an incident in ways which can affect financial stability include:</p>
<ul>
    <li><em>Concentration</em> - which arises directly as a result of arrangements between multiple firms and a third-party service provider, between a systemically important firm and a third party service provider, and/or indirectly through recurrent nth party<sup>4</sup> providers in the supply chains of multiple third party service providers.</li>
    <li><em>Interconnectedness</em> - the inevitable large number of interconnections arise in an array of scenarios such as counterpart relationships. They increase the probability that an operational incident originating in one link of the financial system could have a knock-on impact on other links. </li>
    <li><em>Correlation and common vulnerabilities</em> - when micro vulnerabilities become common, and they coexist across different entities. </li>
    <li><em>Complexity and opacity</em> - in the case of interconnections and correlated common vulnerabilities, their complexity and opacity levels can augment the difficulty for financial entities to resist, respond to or recover from incidents. </li>
    <li><em>The financial system’s dependence on data</em> - If a CTP which has direct access to a financial entity's key data suffers a breach such as a cyber-attack, this could threaten the confidentiality, integrity, authenticity or availability of the firm's data. </li>
</ul>
<p><strong>Transmission Channels</strong></p>
<div>
<p><strong><span></span></strong>In addition to macro vulnerabilities, the system is also threatened by Transmission Channels such as:</p>
<p><em><span>Contagion</span></em><span> - when an initial operational disruption causes further (operational or financial) disruption elsewhere.</span></p>
<p><span></span><em>Loss of Confidence</em> – when as a result of an operational incident, the financial system suffers a loss of confidence. Unlike the Contagion (which can potentially be mitigated), loss of confidence can be difficult to restore hence rendering a threat to financial stability.</p>
<p><strong>Fundamental Rules</strong></p>
<p><strong></strong>CTPs are expected to operate their business on the basis of six Fundamental Rules:</p>
<ul style="list-style-type: disc;">
    <li><span>Integrity;</span></li>
    <li><span>Due skill;</span></li>
    <li><span>Care and diligence;</span></li>
    <li><span>Acting in a prudent manner;</span></li>
    <li><span>Having effective risk strategies;</span></li>
    <li><span>Risk management systems;</span></li>
    <li><span>Organising and controlling their affairs responsibly and effectively;</span></li>
    <li><span>Dealing with each regulator appropriately in an open and cooperative way<sup>5</sup></span></li>
</ul>
<p>These Fundamental Rules should be exercised in a manner which is consistent with the Overall Objective.</p>
<p><strong>Requirements</strong></p>
<p><strong></strong>In addition to the Fundamental Rules, CTPs' obligations are set out across 8 overarching requirements:</p>
<ol>
    <li><span>Governance - </span>
    <ol style="list-style-type: lower-alpha;">
        <li><span>Appoint central points of contact with the regulators who are overseeing them. </span></li>
        <li><span>Establish clear roles and responsibilities to staff who are essential to the delivery of a systemic third-party service</span></li>
        <li><span>Establish a clear approach to preventing, responding and adapting to any CTP operational incident</span></li>
        <li><span>Keep records of lessons earnt from previous incidents/testing exercises</span></li>
        <li><span>Notify regulators of key contacts, their contact details and any changes to this information</span></li>
    </ol>
    </li>
    <li><span>Risk Management </span>
    <ol style="list-style-type: lower-alpha;">
        <li><span>Identify and monitor external and internal risks</span></li>
        <li><span>Develop and update risk management processes to effectively manage those risks</span></li>
    </ol>
    </li>
    <li><span>Dependency and Supply Risk Management</span>
    <ol style="list-style-type: lower-alpha;">
        <li><span>Identify and manage any risk to its supply chain which could affect its ability to deliver a systemic third-party service </span></li>
        <li><span>Take reasonable steps and ensure that their Key Nth party providers are informed of the duties that apply to the CTP and cooperate with the CTP in meeting those duties. </span></li>
    </ol>
    </li>
    <li><span>Technology and Cyber Resilience</span>
    <ol style="list-style-type: lower-alpha;">
        <li><span>Take reasonable steps to ensure the resilience of any technologies that deliver, maintain or support a systemic third-party service, including the development of comprehensive strategies and systems to adequately manage risks to technology; conduct regular testing of those strategies, processes and systems. </span></li>
    </ol>
    </li>
    <li><span>Change Management</span>
    <ol style="list-style-type: lower-alpha;">
        <li><span>Develop systematic and effective policies, procedures and controls to deal with changes to systemic third party services, including changes to processes or technologies used to deliver, support, and maintain each systemic third party service it provides</span></li>
    </ol>
    </li>
    <li><span>Mapping</span>
    <ol style="list-style-type: lower-alpha;">
        <li><span>Within 12 months from designation, identify and document:</span>
        <ol style="list-style-type: lower-roman;">
            <li><span>All resources, assets, supporting services and technology used to deliver, support, and maintain each systemic third-party service it provides</span></li>
            <li><span>Any internal and external interconnections and interdependencies between the resources</span></li>
        </ol>
        </li>
        <li><span>Update these documents regularly</span></li>
    </ol>
    </li>
    <li><span>Incident Management</span>
    <ol style="list-style-type: lower-alpha;">
        <li><span>Implement appropriate measures to respond and recover from CTP operational incidents</span></li>
        <li><span>Set up maximum tolerable levels of disruption to each systemic third-party service</span></li>
        <li><span>Maintain and operate an incident management playbook which sets out the plans and procedures to be followed in the event of a CTP operational incident</span></li>
        <li><span>Cooperate and coordinate with regulators and affected firms in response to CTP operational incidents, including through Collective Incident Response Frameworks. </span></li>
    </ol>
    </li>
    <li><span>Termination of Services</span>
    <ol style="list-style-type: lower-alpha;">
        <li><span>Have in place appropriate measures to respond to a termination of any of its systemic third-party services by putting in place arrangements to support the effective and orderly termination of the service and provisions to ensure access to, recovery and return of any assets to each relevant firm to whom it provides the service.</span></li>
    </ol>
    </li>
</ol>
<p><span>The Rules also incorporate detailed guidance on self-assessment, testing and incident management playbook exercises.</span></p>
<p><strong><span>UK v EU</span></strong></p>
<p><strong><span></span></strong><span style="text-align: justify;">Regulators across the EU are also preparing to implement the newly harmonised standards introduced by the Digital Operational Resilience Act ('</span><strong style="text-align: justify;">DORA</strong><span style="text-align: justify;">').</span></p>
<p><span style="text-align: justify;"></span><span style="text-align: justify;">Effective January 2025, the key DORA obligations for financial entities in scope are structured around five pillars:</span></p>
<ul style="list-style-type: disc;">
    <li><span>Risk management framework</span></li>
    <li><span>ICT-related incident reporting</span></li>
    <li><span>Threat-led penetration testing</span></li>
    <li><span>Management of third-party ICT service providers</span></li>
    <li><span>Information sharing arrangements</span></li>
</ul>
<p style="text-align: justify;">The objective of the regulations is to enable financial entities operating in the EU to act in a coordinated and consistent manner in relation to cyber resilience in conjunction with their third-party ICT providers, including in the event of a significant cyber incident<sup>6</sup>.</p>
<p style="text-align: justify;"><span style="text-align: left;">While both the EU and UK regimes share the same overall objective, there are distinct approaches across the legal frameworks.</span></p>
<p style="text-align: justify;"><span style="text-align: left;"></span><strong style="text-align: left;">In the UK</strong><span style="text-align: left;">, the focus is on Operational Resilience. the BoE emphasises system-wide vulnerabilities such as interconnectedness and concentration risks. Whereas in the EU, while there is consideration of a wide range of risks, DORA's focus remains on managing ICT-related risks and streamlining cybersecurity regulations for financial entities.</span></p>
<p style="text-align: justify;"><span style="text-align: left;"></span><span style="text-align: left;">As regards their approach to </span><span style="text-decoration: underline;">critical</span><span style="text-align: left;"> service providers, another distinction lies in the requirement on an ICT provider to establish a subsidiary in the relevant region. Unlike DORA<sup>7</sup></span><span style="text-align: left;">, in the UK, there is no requirement for a CTP whose head office is outside the UK to establish a UK subsidiary or branch under the CTP oversight regime<sup>8</sup></span><span style="text-align: left;">.</span></p>
<p style="text-align: justify;"><span style="text-align: left;"></span><span style="text-align: left;">However, there are undoubtedly areas in common. The UK Rules focus on CTPs, creating an oversight scheme. CTPs must meet specific resilience standards, conduct regular testing, and report incidents promptly. Meanwhile, DORA covers ICT service providers, introducing contractual standards, an oversight scheme and technical requirements too.</span></p>
<p style="text-align: justify;"><span style="text-align: left;"></span><span style="text-align: left;">It is also clear that both regimes share the importance of proportionality<sup>9 </sup></span><span style="text-align: left;">particularly in respect of third-party service providers. Regulators and financial entities in the EU are expected to take a proportionate approach to the application of the rules in DORA while in the UK, the Rules are clear on the obligation for regulators to consider proportionality in the exercise of their oversight functions to ensure that the rules do not become </span><em style="text-align: left;">unduly burdensome<sup></sup></em><span style="text-align: left;"><sup>10</sup></span><span style="text-align: left;">.</span></p>
<p style="text-align: justify;"><span style="text-align: left;"></span><span style="text-align: left;">Critically, they both agree on the importance of guiding financial entities and their supply chain towards a pre-agreed, robust, planned approach to incident management and the need to recognise Digital Operational Resilience as the ultimate priority on governance and policy development at an internal and external level, requiring active collaboration from all parties involved in the prudent management of systemic risks.</span></p>
<hr />
<div> </div>
<p>1. Operational Resilience: Critical third Parties to the UK Financial Sector, Supervisory Statement Section 1.3: Overall Objective, pg. 5.)<br />
 2. <a rel="noopener noreferrer" href="https://www.bankofengland.co.uk/-/media/boe/files/prudential-regulation/supervisory-statement/2024/ss624-november-2024.pdf" target="_blank">Supervisory statement on Operational Resilience: Critical Third Parties to the UK Financial Sector</a><br />
 3. A critical third party means an entity designated by HM Treasury in regulations made under s312L(1)FSMA. HM Treasury may designate an entity as a CTP only if it is satisfied that a failure in, or disruption to, services it provides to firms could threaten the stability of, or confidence in, the UK financial system (Operational Resilience: Critical Third Parties to the UK Financial Sector, Supervisory Statement section 2: Key terms, Key entities and persons, pg. 7.) <br />
4. An nth party is defined as a service provider that is part of a third party service provider’s ('TPSP's') supply chain and supports the ultimate delivery of a critical service by a TPSP to a bank or that has the ability to access sensitive or confidential bank information (<a rel="noopener noreferrer" href="https://www.bis.org/bcbs/publ/d577.pdf" target="_blank">Basel Committee on Banking Supervision</a>, Consultative Document, Principles for the Sound Management of Third Party Risk, July 2024, pg. 4)<br />
5. Operational Resilience: Critical Third Parties to the UK Financial Sector, Supervisory Statement Section 5: CTP Fundamental Rules, pg. 26<br />
6. DORA, Article 2(1) (u)<br />
7. Article 31(2) DORA refers to the establishment of a subsidiary of an ICT critical service provider in the EU.<br />
8. Operational Resilience: Critical third Parties to the UK Financial Sector, Supervisory Statement, Section 4.12: No requirement to establish a UK Subsidiary or branch, pg. 22.)<br />
9. See for EU, DORA Regulation (EU) 2022/2554, Article 4 and for the UK, Operational Resilience: Critical third Parties to the UK Financial Sector Supervisory Statement Sections 4.23 to 4.25: Proportionality pg. 14.)<br />
10. Operational Resilience: Critical third Parties to the UK Financial Sector Supervisory Statement Sections 4.23: Proportionality pg. 14</p>
</div>]]></content:encoded></item><item><guid isPermaLink="false">{5BCCEE84-5ED5-43FB-84DB-8ECCC2CA923E}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/the-eu-cyber-resilience-act-targets-digital-components-made-available-in-the-eu-market/</link><title>The EU Cyber Resilience Act targets digital components made available in the EU market throughout the entire supply chain of a product</title><description><![CDATA[Last month, the EDPB published their "Guidelines on Examples regarding Personal Data Breach Notification" (the Guidelines).  These are intended to provide "practice-oriented, case-based" guidance on when it is necessary to notify the relevant supervisory authorities (the SA) under Article 33(1) of the GDPR and/or data subjects under Article 34(1) of the GDPR following a personal data breach.]]></description><pubDate>Mon, 28 Oct 2024 11:25:00 Z</pubDate><category>Data and privacy</category><authors:names>Lauren Kerr</authors:names><enclosure url="https://www.rpclegal.com/-/media/rpc/images/thinking-tiles/wide/301136-website-perspective-tiles-final-wide-715x370px_data-and-cyber---1271742015.jpg?rev=2280c60f10b440daba866ea74d9d912a&amp;hash=ECD0E649C606484031477B98C945F78A" type="image/jpeg" medium="image" /><content:encoded><![CDATA[<p>The CRA is set to transform the security landscape for digital products sold in the EU. It covers a wide range of internet-connected devices, from everyday items like digital refrigerators and baby monitors to the software embedded within these products. This means that both tangible products and non-tangible digital products, such as software products embedded into connected devices, will now be subject to stringent security regulation, marking the CRA as the world's first specific legislation relating to the regulation of the ‘Internet of Things’ (IoT).  </p>
<p>This move is intended to create a safer digital environment for consumers, ensuring that our increasingly connected world is better protected against cyber threats.</p>
<p><strong>The changes ahead</strong></p>
<p><strong> </strong>The Act splits digital products into three categories based on risk factors:   </p>
<p>1.<span> </span><span style="text-decoration: underline;">Unclassified or Default </span></p>
<p><span style="text-decoration: underline;"> </span>The Default category applies to products without critical cybersecurity vulnerabilities. According to the Commission, this category will cover 90% of connected devices, including (but not limited to): photo-editing software, video games, and other commonplace software and devices such as smart toys, TVs and fridges.</p>
<p>2.<span> </span><span style="text-decoration: underline;">Class I </span></p>
<p><span style="text-decoration: underline;"> </span>Products which have a lower cybersecurity risk level than Class II products but a higher level of risk than the unclassified or default category. </p>
<p>3.<span> </span><span style="text-decoration: underline;">Class II </span></p>
<p>Class II are higher-risk products with digital elements concerning critical cybersecurity vulnerabilities. Under the certification scheme, Class II products must meet the highest level of assurance. </p>
<p>Risk factors for these products can include:</p>
<ul>
    <li>whether it runs with privilege, privileged access, or performs a function critical to trust;</li>
    <li>whether it is to be used in sensitive environments as described by the NIS2 Directive (including, but not limited to, energy and infrastructure, transportation, banking, and healthcare);</li>
    <li>whether it is to be used to process personal information or other sensitive functions;</li>
    <li>whether its vulnerability can affect a group of people; and</li>
    <li>whether it has already caused adverse effects when disrupted.</li>
</ul>
<p><strong>How will the CRA affect companies? </strong></p>
<p>Although the CRA is an EU regulation, it has far-reaching effects. The legislation applies to relevant entities that manufacture or place products with the requisite digital elements in the EU market.</p>
<p>In the case of UK companies, the CRA can apply to manufacturers and importers, as well as resellers of the regulated hardware and software.  </p>
<p><strong>How can companies prepare themselves? </strong></p>
<p>Companies should prepare themselves before the implementation date of November 2025.<br />
Conducting a comprehensive cyber security assessment to identify potential threats and vulnerabilities will be crucial to help prioritise and focus on the most critical areas. Affected organisations will need to consider cybersecurity requirements from the commencement of the product development phase through to when the customer receives the product or service. </p>
<p>It is recommended that companies consider preparing a detailed incident response plan, since organisations caught by the CRA will be required to inform European authorities of cyber security incidents. </p>
<p>Organisations must also be alive to ongoing and overlapping data protection obligations and ensure their teams are up to speed. Companies should strive to be vigilant to help avoid penalties. </p>
<p><strong>Reporting requirements under the CRA </strong></p>
<p>The CRA creates reporting obligations for manufacturers to notify the EU Agency for Cybersecurity (ENISA) within 24 hours after becoming aware of ‘any actively exploited vulnerability contained in the product with digital elements’ or ‘any incident having an impact on the security of the product with digital elements.’ </p>
<p>The manufacturers will also need to inform the users of the product of the incident, as well as take corrective measures to mitigate the consumer impact.</p>
<p>Similarly, importers and distributors of products with digital elements must inform manufacturers of cybersecurity vulnerabilities without delay. If there is a significant cybersecurity risk, importers and distributors must also inform national market surveillance authorities of the non-conformity and corrective measures taken.</p>
<p><strong>The impact of the new penalty system under the CRA </strong></p>
<p>Organisations should keep in mind the new sanctions under CRA, which include: </p>
<ul>
    <li>non-compliance with essential requirements and obligations in Articles 10 and 11 potentially subjects offending businesses to administrative fines of up to €15 million or 2.5 percent of their global annual turnover for the previous fiscal year, whichever is greater; </li>
    <li>non-compliance with other obligations within the CRA could lead to administrative fines of up to €10 million or 2 percent of global annual turnover for the previous fiscal year, whichever is higher; and </li>
    <li>misleading market surveillance authorities with incorrect, incomplete, or manipulated information could lead to a fine of €5 million or 1 percent of global annual turnover for the previous fiscal year, whichever is greater. </li>
</ul>
<p><strong>Comment</strong></p>
<p>We understand the significant challenge of balancing cyber security requirements with practical implementation for manufacturers and suppliers. We recognise that some companies may be concerned about the extra burden and compliance costs the CRA will bring. <br />
However, it is important also to appreciate the benefits of the CRA. </p>
<p>The CRA's emphasis on risk assessment and security by design allows organisations to proactively identify and address potential vulnerabilities. This will ultimately boost digital resilience and help to prevent cyber incidents, and the associated costs and potential reputational damage. There could also be an increase in the trust of users and market adoption.</p>
<p>The Act indicates a growing trend in ensuring that cybersecurity remains firmly on the global agenda. The need for organisations affected to start preparing is pressing. </p>
<div> </div>]]></content:encoded></item><item><guid isPermaLink="false">{1ECC7D90-C022-4CB4-AAB4-9882C450E03C}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/cyber-bytes-issue-68/</link><title>Cyber_Bytes - Issue 68</title><description><![CDATA[<p><strong>RPC Cyber App: Breach Counsel at Your Fingertips</strong></p>
<p>As cyber-attacks and follow-on litigation continue to be a board-level issue for organisations worldwide, the RPCCyber_ App provides a one-stop-shop resource for cyber breach assistance and pre-breach preparedness. As well as information about RPC's cyber-related expertise, the app also contains guidance on prevention against common incidents and access to our ongoing cyber market insights.</p>
<p>RPCCyber_ can be downloaded for free from the <a href="https://apps.apple.com/gb/app/rpccyber/id6478118376"><strong>Apple Store</strong></a> or <strong><a href="https://play.google.com/store/apps/details?id=com.rpc.rpcCyber&pli=1">Google Play Store</a></strong>.</p>
<p><strong>Cyber Security and Resilience Bill scheduled for 2025 parliamentary introduction</strong></p>
<p>On 30 September, the UK Government confirmed that the Cyber Security and Resilience Bill (the Bill) will be introduced to Parliament by 2025. The Bill was introduced during the King's Speech in July, and largely aims to update the UK’s cyber defences and digital infrastructure following European legislation such as the Network and Information Security (NIS2) Directive and Cyber Resilience Act.</p>
<p>The Bill is anticipated to impose stricter rules regarding technical security and incident notification on a bigger pool of organisations classified as operators of essential services or relevant digital service providers.  The wider applicability of the Bill is set to foster higher cybersecurity standards and promote a better understanding of ongoing cyber threats, particularly in relation to the increasing targeted threats on the UK's critical infrastructure.</p>
<p>Click <a href="https://www.gov.uk/government/collections/cyber-security-and-resilience-bill">here</a> to read the government's recent update on the Bill.</p>
<p><strong>Long-awaited changes to Australian Privacy Act</strong></p>
<p>Following the Australian Federal Government's Privacy Act Review which commenced four years ago, the Government has finally introduced its first substantial amendments in an 81-page bill. The key changes include:</p>
<ul>
    <li>New statutory tort to address serious invasions of privacy which previously did not exist. This is to assist individuals in seek recourse for losses arising from breaches of privacy and will likely make businesses with large amounts of data more susceptible to class actions.</li>
    <li>Development of a Children’s Online Privacy Code to better protect children from online harms.</li>
    <li>Increased transparency for individuals on automated decisions which affected them.</li>
    <li>Streamlined information sharing during emergencies.</li>
    <li>Stronger powers for the Australian Information Commissioner.</li>
    <li>Criminalisation of 'doxxing' – i.e. releasing personal data in a menacing or harmful manner.</li>
</ul>
<p>The proposed changes are mostly welcome, however some expected implementations have been omitted from the draft bill. Click <a href="https://www.cbp.com.au/insights/publications/australian-federal-government-s-proposed-amendments-to-the-privacy-act-the-long-awaited-changes-ar">here</a> to read more on this from Colin Biggers & Paisley - part of RPC's Global Access Network and click <a href="https://www.globalaccesslawyers.com/global-access-week-2024">here</a> to learn more about the Network.</p>
<p><strong>UK and allies issue joint cyber security warning amid China-linked campaign botnet</strong></p>
<p>The NCSC and relevant bodies in the US, Australia, Canada, and New Zealand have issued a joint advisory informing organisations and individuals that Integrity Technology Group, a Chinese based company with links to the Chinese government and state actor, Flax Typhoon, has managed a botnet with over 260,000 compromised passwords around the globe.</p>
<p>The compromised devices are said to include firewalls, routers, webcams, and CCTV cameras – all devices which threat actors can use for a multitude of malicious activities. The joint advisory shares technical details to help organisations and individuals defend against the malicious activity as well as providing mitigation advice. It also highlights how unpatched and of end-of-life systems can be exploited by threat actors.</p>
<p>Click <a href="https://www.ncsc.gov.uk/news/ncsc-and-partners-issue-advice-to-counter-china-linked-campaign-targeting-thousands-of-devices">here</a> to read more from the NCSC and click <a href="https://media.defense.gov/2024/Sep/18/2003547016/-1/-1/0/CSA-PRC-LINKED-ACTORS-BOTNET.PDF">here</a> to read the joint advisory.</p>
<p><strong>FGS Global's Leadership in Crisis report reveals cyber security remains key concern among business leaders</strong></p>
<p>In FGS Global's recent report, 'Leadership in a crisis', around 500 business leaders have been polled and interviews have been conducted with several of the UK's most prominent CEOs; unsurprisingly, cyber risk has been pinpointed as the biggest threat due to the financial, reputational, regulatory and operational impact that a single attack can potentially cause to a business.</p>
<p>The report reveals that 36% of the businesses polled have faced a cyber-attack and, despite growing prevalence, there is still a limited understanding of cybersecurity and cybercrime. FGS further comment that not enough companies learn as much as they could from crises. Despite emphasis on cyber security, only 40% of companies have implemented technological updates, 33% have strengthened security measures and 31% enhanced their data protection initiatives.</p>
<p>Click <a href="https://share-eu1.hsforms.com/1kc1vj6T9TuGTmipomchmNAf2xl0?utm_campaign=FGS%20Radar&utm_content=196085486&utm_medium=social&utm_source=linkedin&hss_channel=lcp-86247512">here</a> to download the Leadership in Crisis report to read more about cyber risks and other current concerns prevalent in business leaders.</p>
<p><strong>TFL still feeling the effects of last month's cyber-attack, but NCA makes first arrest</strong></p>
<p>On 1 September, TFL fell victim to an aggressive cyber-attack which is still impacting its key IT infrastructure and affecting live tube arrival times, refunds for contactless pay-as-you-go journeys, photo applications for new Oyster cards and staff access to systems. The incident has also exposed 30,000 employees' passwords and bank details for around 5,000 customers. So far, the incident is said to have cost several millions of pounds.</p>
<p>But in an unusual turn of events, the NCA may have found the first culprit behind this attack.  It confirmed the arrest of a 17-year-old male who has since been questioned and bailed. Further details on the arrest have not been provided. However, Paul Foster, NCA deputy director and head of the agency's National Cyber Crime Unit has commented that "The swift response by TfL following the incident has enabled us to act quickly, and we are grateful for their continued co-operation with our investigation, which remains ongoing."</p>
<p>Click <a href="https://www.nationalcrimeagency.gov.uk/news/arrest-made-in-nca-investigation-into-transport-for-london-cyber-attack">here</a> to read more from the NCA and click <a href="https://tfl.gov.uk/campaign/cyber-security-incident">here</a> for the latest update from TFL.</p>
<p><strong>Ireland to expand scope of NCSC's powers in times of emergency</strong></p>
<p>The Irish Government's General Scheme for the National Cyber Security Bill has revealed it plans to place the NCSC on a statutory basis and allow the security agency to monitor all internet traffic in the event of pressing national security threats. This update comes amid rising cyber-attacks and an uptick in foreign interference during general elections. Richard Brown, director of the NCSC has stated these powers are similar to those granted to France's security agency during the Paris Olympics.</p>
<p>The powers will not be automatic.  The NCSC will have to apply to the High Court for the monitoring powers and will only be granted them where there are real and persistent risks to security of the state, integrity of public sector data or continuity of essential services. It is not yet known when this Bill will become law.</p>
<p>Click here to <a href="https://www.finextra.com/newsarticle/44809/ireland-to-grant-national-cyber-security-centre-emergency-powers?utm_medium=rssfinextra&utm_source=finextrafeed&fhch=0c375a808c2b34e148717672dfbecba0">read</a> more from Finextra and click <a href="https://www.gov.ie/en/publication/229af-general-scheme-of-the-national-cyber-security-bill-2024/">here</a> to read the Irish Government's General Scheme.</p>]]></description><pubDate>Tue, 15 Oct 2024 18:06:00 +0100</pubDate><category>Data and privacy</category><authors:names>Richard Breavington, Daniel Guilfoyle, Rachel Ford, Ian Dinning, Christopher Ashton, Elizabeth Zang, Emanuele Santella , Lauren Kerr</authors:names><enclosure url="https://www.rpclegal.com/-/media/rpc/redesign-images/thinking-tiles/wide/data-and-cyber-2---thinking-tile-wide.jpg?rev=8f262369de1c46c6bef3c74e0d2b51c9&amp;hash=3379AF5F3FF6F6CC5ECB36CC0235B10B" type="image/jpeg" medium="image" /><content:encoded><![CDATA[<p><strong>RPC Cyber App: Breach Counsel at Your Fingertips</strong></p>
<p>As cyber-attacks and follow-on litigation continue to be a board-level issue for organisations worldwide, the RPCCyber_ App provides a one-stop-shop resource for cyber breach assistance and pre-breach preparedness. As well as information about RPC's cyber-related expertise, the app also contains guidance on prevention against common incidents and access to our ongoing cyber market insights.</p>
<p>RPCCyber_ can be downloaded for free from the <a href="https://apps.apple.com/gb/app/rpccyber/id6478118376"><strong>Apple Store</strong></a> or <strong><a href="https://play.google.com/store/apps/details?id=com.rpc.rpcCyber&pli=1">Google Play Store</a></strong>.</p>
<p><strong>Cyber Security and Resilience Bill scheduled for 2025 parliamentary introduction</strong></p>
<p>On 30 September, the UK Government confirmed that the Cyber Security and Resilience Bill (the Bill) will be introduced to Parliament by 2025. The Bill was introduced during the King's Speech in July, and largely aims to update the UK’s cyber defences and digital infrastructure following European legislation such as the Network and Information Security (NIS2) Directive and Cyber Resilience Act.</p>
<p>The Bill is anticipated to impose stricter rules regarding technical security and incident notification on a bigger pool of organisations classified as operators of essential services or relevant digital service providers.  The wider applicability of the Bill is set to foster higher cybersecurity standards and promote a better understanding of ongoing cyber threats, particularly in relation to the increasing targeted threats on the UK's critical infrastructure.</p>
<p>Click <a href="https://www.gov.uk/government/collections/cyber-security-and-resilience-bill">here</a> to read the government's recent update on the Bill.</p>
<p><strong>Long-awaited changes to Australian Privacy Act</strong></p>
<p>Following the Australian Federal Government's Privacy Act Review which commenced four years ago, the Government has finally introduced its first substantial amendments in an 81-page bill. The key changes include:</p>
<ul>
    <li>New statutory tort to address serious invasions of privacy which previously did not exist. This is to assist individuals in seek recourse for losses arising from breaches of privacy and will likely make businesses with large amounts of data more susceptible to class actions.</li>
    <li>Development of a Children’s Online Privacy Code to better protect children from online harms.</li>
    <li>Increased transparency for individuals on automated decisions which affected them.</li>
    <li>Streamlined information sharing during emergencies.</li>
    <li>Stronger powers for the Australian Information Commissioner.</li>
    <li>Criminalisation of 'doxxing' – i.e. releasing personal data in a menacing or harmful manner.</li>
</ul>
<p>The proposed changes are mostly welcome, however some expected implementations have been omitted from the draft bill. Click <a href="https://www.cbp.com.au/insights/publications/australian-federal-government-s-proposed-amendments-to-the-privacy-act-the-long-awaited-changes-ar">here</a> to read more on this from Colin Biggers & Paisley - part of RPC's Global Access Network and click <a href="https://www.globalaccesslawyers.com/global-access-week-2024">here</a> to learn more about the Network.</p>
<p><strong>UK and allies issue joint cyber security warning amid China-linked campaign botnet</strong></p>
<p>The NCSC and relevant bodies in the US, Australia, Canada, and New Zealand have issued a joint advisory informing organisations and individuals that Integrity Technology Group, a Chinese based company with links to the Chinese government and state actor, Flax Typhoon, has managed a botnet with over 260,000 compromised passwords around the globe.</p>
<p>The compromised devices are said to include firewalls, routers, webcams, and CCTV cameras – all devices which threat actors can use for a multitude of malicious activities. The joint advisory shares technical details to help organisations and individuals defend against the malicious activity as well as providing mitigation advice. It also highlights how unpatched and of end-of-life systems can be exploited by threat actors.</p>
<p>Click <a href="https://www.ncsc.gov.uk/news/ncsc-and-partners-issue-advice-to-counter-china-linked-campaign-targeting-thousands-of-devices">here</a> to read more from the NCSC and click <a href="https://media.defense.gov/2024/Sep/18/2003547016/-1/-1/0/CSA-PRC-LINKED-ACTORS-BOTNET.PDF">here</a> to read the joint advisory.</p>
<p><strong>FGS Global's Leadership in Crisis report reveals cyber security remains key concern among business leaders</strong></p>
<p>In FGS Global's recent report, 'Leadership in a crisis', around 500 business leaders have been polled and interviews have been conducted with several of the UK's most prominent CEOs; unsurprisingly, cyber risk has been pinpointed as the biggest threat due to the financial, reputational, regulatory and operational impact that a single attack can potentially cause to a business.</p>
<p>The report reveals that 36% of the businesses polled have faced a cyber-attack and, despite growing prevalence, there is still a limited understanding of cybersecurity and cybercrime. FGS further comment that not enough companies learn as much as they could from crises. Despite emphasis on cyber security, only 40% of companies have implemented technological updates, 33% have strengthened security measures and 31% enhanced their data protection initiatives.</p>
<p>Click <a href="https://share-eu1.hsforms.com/1kc1vj6T9TuGTmipomchmNAf2xl0?utm_campaign=FGS%20Radar&utm_content=196085486&utm_medium=social&utm_source=linkedin&hss_channel=lcp-86247512">here</a> to download the Leadership in Crisis report to read more about cyber risks and other current concerns prevalent in business leaders.</p>
<p><strong>TFL still feeling the effects of last month's cyber-attack, but NCA makes first arrest</strong></p>
<p>On 1 September, TFL fell victim to an aggressive cyber-attack which is still impacting its key IT infrastructure and affecting live tube arrival times, refunds for contactless pay-as-you-go journeys, photo applications for new Oyster cards and staff access to systems. The incident has also exposed 30,000 employees' passwords and bank details for around 5,000 customers. So far, the incident is said to have cost several millions of pounds.</p>
<p>But in an unusual turn of events, the NCA may have found the first culprit behind this attack.  It confirmed the arrest of a 17-year-old male who has since been questioned and bailed. Further details on the arrest have not been provided. However, Paul Foster, NCA deputy director and head of the agency's National Cyber Crime Unit has commented that "The swift response by TfL following the incident has enabled us to act quickly, and we are grateful for their continued co-operation with our investigation, which remains ongoing."</p>
<p>Click <a href="https://www.nationalcrimeagency.gov.uk/news/arrest-made-in-nca-investigation-into-transport-for-london-cyber-attack">here</a> to read more from the NCA and click <a href="https://tfl.gov.uk/campaign/cyber-security-incident">here</a> for the latest update from TFL.</p>
<p><strong>Ireland to expand scope of NCSC's powers in times of emergency</strong></p>
<p>The Irish Government's General Scheme for the National Cyber Security Bill has revealed it plans to place the NCSC on a statutory basis and allow the security agency to monitor all internet traffic in the event of pressing national security threats. This update comes amid rising cyber-attacks and an uptick in foreign interference during general elections. Richard Brown, director of the NCSC has stated these powers are similar to those granted to France's security agency during the Paris Olympics.</p>
<p>The powers will not be automatic.  The NCSC will have to apply to the High Court for the monitoring powers and will only be granted them where there are real and persistent risks to security of the state, integrity of public sector data or continuity of essential services. It is not yet known when this Bill will become law.</p>
<p>Click here to <a href="https://www.finextra.com/newsarticle/44809/ireland-to-grant-national-cyber-security-centre-emergency-powers?utm_medium=rssfinextra&utm_source=finextrafeed&fhch=0c375a808c2b34e148717672dfbecba0">read</a> more from Finextra and click <a href="https://www.gov.ie/en/publication/229af-general-scheme-of-the-national-cyber-security-bill-2024/">here</a> to read the Irish Government's General Scheme.</p>]]></content:encoded></item><item><guid isPermaLink="false">{44D0682F-646D-4B35-B762-56F4BCE15AF5}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/cyber-bytes-issue-67/</link><title>Cyber_Bytes - Issue 67</title><description><![CDATA[<p><strong>New App - RPCCyber_ </strong></p>
<p>As cyber-attacks and follow-on litigation continue to be a board-level issue for organisations worldwide, the RPCCyber_ App provides a one-stop-shop resource for cyber breach assistance and pre-breach preparedness. As well as information about RPC's cyber-related expertise, the app also contains guidance on prevention against common incidents and access to our ongoing cyber market insights.</p>
<p>RPCCyber_ can be downloaded for free from the <a href="https://apps.apple.com/gb/app/rpccyber/id6478118376"><strong>Apple Store</strong></a> or <strong><a href="https://play.google.com/store/apps/details?id=com.rpc.rpcCyber&pli=1">Google Play Store</a></strong>.</p>
<p><strong>The challenges and benefits of the Digital Operational Resilience Act (DORA) compliance</strong></p>
<p>With less than four months until the deadline for organisations within scope to become fully compliant with DORA, RPC's Partner and Head of Cyber & Tech Insurance Richard Breavington has highlighted the challenges and benefits of DORA compliance in a recent interview.</p>
<p>Speaking to InsurTech magazine, Richard highlights the material cost of ensuring compliance with DORA's standards as one of the challenges posed by the new regulation, with the need for implementation of new policies, rules, and processes (such as incident management systems, mandatory threat-led testing, and employee training). Benefits include the harmonisation of previously varied and uneven national regulatory rules, and the establishment of an intelligence sharing mechanism, allowing the exchange of critical information, such as emerging threats and indicators of compromise.</p>
<p>The deadline for entities to become fully compliant with the DORA regulation is 17 January 2025.</p>
<p>Click <a href="https://insurtechdigital.com/magazine/insurtech-magazine-september-2024?page=74">here</a> to read more from InsurTech magazine.</p>
<p><strong>Cyber-attacks on law firms jumped by 77% over the past year</strong></p>
<p>It has been reported that the number of successful cyber-attacks against UK law firms rose by 77% in the past year to 954, up from 538 the year before. Nearly three quarters of the UK’s top 100 law firms have been impacted by cyber-attacks, according to a report by The National Cyber Security Centre.</p>
<p>Law firms often hold information that can potentially be used by threat actors to attempt fraud and other crime, making them an attractive target.</p>
<p>Click <a href="https://www.lawgazette.co.uk/news/cyber-attacks-on-law-firms-jump-by-77/5120668.article">here</a> to read more from the Law Gazette.</p>
<p><strong>Law firms have a record of paying ransoms, report claims</strong></p>
<p>A report by technology researcher Comparitech has revealed that law firms targeted by ransomware threat actors have been paid on at least eight known occasions over the past six years. The report identified 138 ransomware attacks on the legal sector, resulting in almost 3 million individual records being compromised.</p>
<p>The largest known ransom demand was $42 million from a New York firm, which was refused. The UK is the second most affected country after the US, with a notable spike in attacks reported in London earlier this year.</p>
<p>Click <a href="https://www.lawgazette.co.uk/news/law-firms-cough-up-to-ransomware-hijackers-report-claims/5120545.article?utm_source=gazette_newsletter&utm_medium=email&utm_campaign=Problem-solving+courts+save+councils+thousands+%7c+SRA+acts+on+complaints+surge+%7c+Planning%3a+is+a+change+gonna+come%3f_08%2f02%2f2024">here</a> to read the full Law Gazette article. </p>
<p><strong>Provisional ICO decision to impose £6m fine on software provider following 2022 ransomware attack that disrupted NHS and social care services</strong></p>
<p>The Information Commissioner's Office (ICO) have decided provisionally to fine Advanced Computer Software Group Ltd (Advanced) £6.09m for failing to implement measures to protect the personal data of 82,946 individuals.</p>
<p>Advanced provides IT and software services to organisations including the NHS and other healthcare providers and acts as a data processor for these organisations.  </p>
<p>The fine follows a ransomware attack in August 2022 where hackers accessed Advanced’s health and care systems via a customer account lacking multi-factor authentication. Although no evidence suggests the data was published on the dark web, the attack disrupted NHS services and compromised personal data such as medical records and home entry details for 890 patients.</p>
<p>Click <a href="https://ico.org.uk/about-the-ico/media-centre/news-and-blogs/2024/08/provisional-decision-to-impose-6m-fine-on-software-provider-following-2022-ransomware-attack/">here</a> to read the full ICO article.</p>
<p><strong>NCSC CEO shares insights into securing UK elections in cyber space at major international conference</strong></p>
<p>Felicity Oswald, CEO of the UK's National Cyber Security Centre (NCSC), has emphasised the importance of long-term planning and vigilance in safeguarding the 2024 UK General Election from cyber threats.</p>
<p>Speaking at the Black Hat USA conference, she highlighted how the UK collaborated with partners across government, industry, and international allies to strengthen cyber resilience before polling day.</p>
<p>Despite the traditional use of paper ballots, significant digital infrastructure involved in the electoral process required robust protection against cyber actors. Oswald stressed the need for citizens to trust the democratic process and the integrity of online information. She shared these insights alongside experts from the US and EU, underscoring the global nature of election security challenges. The NCSC also provided updated advice to protect high-risk individuals and organisations involved in the election.</p>
<p>Click <a href="https://www.ncsc.gov.uk/news/ncsc-ceo-shares-insights-international-conference">here</a> to read the full NCSC article.</p>
<p><strong>Deepfakes: the next frontier in digital deception</strong></p>
<p>Machine learning and artificial intelligence (AI) tools, particularly deepfakes, raise concerns in cybersecurity due to their potential to spread disinformation. Deepfakes can convincingly mimic individuals' voices, making them a powerful tool for cybercriminals as anyone can produce realistic fake content.</p>
<p>This has led to costly scams, such as a fraud where deepfake technology impersonated a CFO and convinced a finance worker to pay $25 million to fraudsters.</p>
<p>Despite advances in AI, the basics of cybersecurity, such as verifying unusual requests and being aware of time-pressured requests, remain crucial. Legislation is emerging to address these threats, with the EU's AI Act categorising AI risks, the UK government's aim to establish AI specific legislation and similar measures being considering in the USA.</p>
<p>Click <a href="https://www.business-reporter.co.uk/risk-management/risk-management/deepfakes-the-next-frontier-in-digital-deception">here</a> to read the full Business Reporter article.</p>]]></description><pubDate>Tue, 10 Sep 2024 14:10:00 +0100</pubDate><category>Data and privacy</category><authors:names>Richard Breavington, Daniel Guilfoyle, Rachel Ford, Ian Dinning, Christopher Ashton, Elizabeth Zang, Emanuele Santella , Lauren Kerr</authors:names><enclosure url="https://www.rpclegal.com/-/media/rpc/redesign-images/thinking-tiles/wide/data-and-cyber-2---thinking-tile-wide.jpg?rev=8f262369de1c46c6bef3c74e0d2b51c9&amp;hash=3379AF5F3FF6F6CC5ECB36CC0235B10B" type="image/jpeg" medium="image" /><content:encoded><![CDATA[<p><strong>New App - RPCCyber_ </strong></p>
<p>As cyber-attacks and follow-on litigation continue to be a board-level issue for organisations worldwide, the RPCCyber_ App provides a one-stop-shop resource for cyber breach assistance and pre-breach preparedness. As well as information about RPC's cyber-related expertise, the app also contains guidance on prevention against common incidents and access to our ongoing cyber market insights.</p>
<p>RPCCyber_ can be downloaded for free from the <a href="https://apps.apple.com/gb/app/rpccyber/id6478118376"><strong>Apple Store</strong></a> or <strong><a href="https://play.google.com/store/apps/details?id=com.rpc.rpcCyber&pli=1">Google Play Store</a></strong>.</p>
<p><strong>The challenges and benefits of the Digital Operational Resilience Act (DORA) compliance</strong></p>
<p>With less than four months until the deadline for organisations within scope to become fully compliant with DORA, RPC's Partner and Head of Cyber & Tech Insurance Richard Breavington has highlighted the challenges and benefits of DORA compliance in a recent interview.</p>
<p>Speaking to InsurTech magazine, Richard highlights the material cost of ensuring compliance with DORA's standards as one of the challenges posed by the new regulation, with the need for implementation of new policies, rules, and processes (such as incident management systems, mandatory threat-led testing, and employee training). Benefits include the harmonisation of previously varied and uneven national regulatory rules, and the establishment of an intelligence sharing mechanism, allowing the exchange of critical information, such as emerging threats and indicators of compromise.</p>
<p>The deadline for entities to become fully compliant with the DORA regulation is 17 January 2025.</p>
<p>Click <a href="https://insurtechdigital.com/magazine/insurtech-magazine-september-2024?page=74">here</a> to read more from InsurTech magazine.</p>
<p><strong>Cyber-attacks on law firms jumped by 77% over the past year</strong></p>
<p>It has been reported that the number of successful cyber-attacks against UK law firms rose by 77% in the past year to 954, up from 538 the year before. Nearly three quarters of the UK’s top 100 law firms have been impacted by cyber-attacks, according to a report by The National Cyber Security Centre.</p>
<p>Law firms often hold information that can potentially be used by threat actors to attempt fraud and other crime, making them an attractive target.</p>
<p>Click <a href="https://www.lawgazette.co.uk/news/cyber-attacks-on-law-firms-jump-by-77/5120668.article">here</a> to read more from the Law Gazette.</p>
<p><strong>Law firms have a record of paying ransoms, report claims</strong></p>
<p>A report by technology researcher Comparitech has revealed that law firms targeted by ransomware threat actors have been paid on at least eight known occasions over the past six years. The report identified 138 ransomware attacks on the legal sector, resulting in almost 3 million individual records being compromised.</p>
<p>The largest known ransom demand was $42 million from a New York firm, which was refused. The UK is the second most affected country after the US, with a notable spike in attacks reported in London earlier this year.</p>
<p>Click <a href="https://www.lawgazette.co.uk/news/law-firms-cough-up-to-ransomware-hijackers-report-claims/5120545.article?utm_source=gazette_newsletter&utm_medium=email&utm_campaign=Problem-solving+courts+save+councils+thousands+%7c+SRA+acts+on+complaints+surge+%7c+Planning%3a+is+a+change+gonna+come%3f_08%2f02%2f2024">here</a> to read the full Law Gazette article. </p>
<p><strong>Provisional ICO decision to impose £6m fine on software provider following 2022 ransomware attack that disrupted NHS and social care services</strong></p>
<p>The Information Commissioner's Office (ICO) have decided provisionally to fine Advanced Computer Software Group Ltd (Advanced) £6.09m for failing to implement measures to protect the personal data of 82,946 individuals.</p>
<p>Advanced provides IT and software services to organisations including the NHS and other healthcare providers and acts as a data processor for these organisations.  </p>
<p>The fine follows a ransomware attack in August 2022 where hackers accessed Advanced’s health and care systems via a customer account lacking multi-factor authentication. Although no evidence suggests the data was published on the dark web, the attack disrupted NHS services and compromised personal data such as medical records and home entry details for 890 patients.</p>
<p>Click <a href="https://ico.org.uk/about-the-ico/media-centre/news-and-blogs/2024/08/provisional-decision-to-impose-6m-fine-on-software-provider-following-2022-ransomware-attack/">here</a> to read the full ICO article.</p>
<p><strong>NCSC CEO shares insights into securing UK elections in cyber space at major international conference</strong></p>
<p>Felicity Oswald, CEO of the UK's National Cyber Security Centre (NCSC), has emphasised the importance of long-term planning and vigilance in safeguarding the 2024 UK General Election from cyber threats.</p>
<p>Speaking at the Black Hat USA conference, she highlighted how the UK collaborated with partners across government, industry, and international allies to strengthen cyber resilience before polling day.</p>
<p>Despite the traditional use of paper ballots, significant digital infrastructure involved in the electoral process required robust protection against cyber actors. Oswald stressed the need for citizens to trust the democratic process and the integrity of online information. She shared these insights alongside experts from the US and EU, underscoring the global nature of election security challenges. The NCSC also provided updated advice to protect high-risk individuals and organisations involved in the election.</p>
<p>Click <a href="https://www.ncsc.gov.uk/news/ncsc-ceo-shares-insights-international-conference">here</a> to read the full NCSC article.</p>
<p><strong>Deepfakes: the next frontier in digital deception</strong></p>
<p>Machine learning and artificial intelligence (AI) tools, particularly deepfakes, raise concerns in cybersecurity due to their potential to spread disinformation. Deepfakes can convincingly mimic individuals' voices, making them a powerful tool for cybercriminals as anyone can produce realistic fake content.</p>
<p>This has led to costly scams, such as a fraud where deepfake technology impersonated a CFO and convinced a finance worker to pay $25 million to fraudsters.</p>
<p>Despite advances in AI, the basics of cybersecurity, such as verifying unusual requests and being aware of time-pressured requests, remain crucial. Legislation is emerging to address these threats, with the EU's AI Act categorising AI risks, the UK government's aim to establish AI specific legislation and similar measures being considering in the USA.</p>
<p>Click <a href="https://www.business-reporter.co.uk/risk-management/risk-management/deepfakes-the-next-frontier-in-digital-deception">here</a> to read the full Business Reporter article.</p>]]></content:encoded></item><item><guid isPermaLink="false">{229C97EA-2118-41F3-8A1E-57FC2BFECD08}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/cyber-bytes-issue-66/</link><title>Cyber_Bytes - Issue 66</title><description><![CDATA[<p><strong>The CrowdStrike Incident</strong></p>
<p>On 19th July 2024, a faulty software update by cybersecurity firm, CrowdStrike, triggered a global IT outage, affecting a substantial number of Windows devices.  This interrupted services for a number of organisations and caused significant disruption, including in air transport.</p>
<p>This incident, considered one of the most severe cyber events in history, has resulted in economic losses for numerous businesses. Notably, Delta Airlines and various financial institutions were severely affected, prompting threats of legal action against Crowdstrike for compensation.</p>
<p>The insurance implications of this event are still being assessed. Initial suggestions are that businesses may file claims under the ‘system failure’ provisions of their cyber insurance policies, given that the incident was not a result of a malicious attack. The potential volume and scale of these claims could affect the cyber insurance industry materially, including potentially the cost of premiums and the scope of policy wordings.</p>
<p>For more information, a BBC report into the incident is <a href="https://www.bbc.co.uk/news/articles/cpe3zgznwjno">here</a> and an article from Spiceworks which includes reference to the potential litigation and insurance consequences is <a href="https://www.spiceworks.com/it-security/endpoint-security/news/crowdstrike-faces-lawsuits-global-outage-drives-insurance-costs/">here</a>.</p>
<p><strong>King's Speech announces new Cyber Resilience Law  </strong></p>
<p>The King's Speech announced plans to introduce a new Cyber Security and Resilience Bill to Parliament in the coming months following an increase in cyber threats to critical organisations.</p>
<p>The Bill aims to update existing UK Regulations including the Network and Information Systems (NIS) Regulations 2018. According to a briefing paper published alongside the King's Speech, the Bill will extend the scope of the existing NIS regime to protect more digital services and supply chains. Additional incident reporting obligations will likely be imposed, including in relation to ransomware attacks to improve national threat understanding. Other measures will be put forward to strengthen regulators’ powers in relation to enforcement, costs recovery and the ability to carry out proactive investigations.</p>
<p>This is a step towards an updated cyber security regime in line with the developments in this field at European level, where the implementation deadline for the EU NIS 2 Directive is 17 October 2024.</p>
<p>Click <a href="https://www.gov.uk/government/speeches/the-kings-speech-2024">here</a> to read the full King's Speech and click <a href="https://www.gov.uk/government/publications/kings-speech-2024-background-briefing-notes">here</a> to read the accompanying briefing paper from the UK Government. </p>
<p><strong>ICO reprimands Electoral Commission</strong></p>
<p>The Information Commissioner's Office (ICO) has reprimanded the Electoral Commission over cyber security failings relating to an attack in August 2021.</p>
<p>Hackers entered the Electoral Commission's servers and exploited a known flaw in the software that should have been fixed months before. This resulted in personal data, including names and addresses, of approximately 40 million voters being exposed to hackers for over a year until the problem was found.</p>
<p>The ICO's report said the Electoral Commission did not have appropriate security measures in place to protect the personal information it held and did not keep its servers up to date with the latest security patches issued months before the attack. The ICO also found that the Commission did not have sufficient password policies in place at the time of the attack, with many staff still using default passwords.</p>
<p>Click <a href="https://ico.org.uk/media/action-weve-taken/reprimands/4030454/the-electoral-commission-reprimand.pdf">here</a> to read the full reprimand.</p>
<p><strong>NCSC and partners issue warning over North Korean state-sponsored cyber campaign to steal military and nuclear secrets</strong></p>
<p>The National Cyber Security Centre (NCSC), alongside international partners from the US and South Korea, has issued a new advisory revealing a global cyber espionage campaign linked to the Democratic People’s Republic of Korea (DPRK). The group, identified as Andariel and associated with DPRK's Reconnaissance General Bureau (RGB), has targeted critical sectors including defence, aerospace, nuclear, and engineering, with a lesser focus on medical and energy entities. The attackers aim to steal sensitive technical information such as contract specification design and project details.</p>
<p>Andariel's activities have expanded to include ransomware attacks, notably against US healthcare organisations, to extort payments and fund further espionage. The advisory provides technical insights and mitigation strategies to defend against these threats. It highlights the group's tactics of exploiting known vulnerabilities, maintaining persistence, and evading detection. The NCSC and partners warn that Andariel has evolved from destructive attacks to sophisticated espionage and ransomware operations, sometimes combining both tactics against the same target.</p>
<p>Click <a href="https://www.ic3.gov/Media/News/2024/240725.pdf">here</a> to read the full joint advisory. </p>
<p><strong>ICO takes action against two organisations for "risking public trust" by failing to respond to public requests for information</strong></p>
<p>The ICO has issued enforcement notices to Devon and Cornwall Police and Barking, Havering and Redbridge Hospitals NHS Trust for failing to meet requirements under the Freedom of Information (FOI) Act 2000.</p>
<p>Investigations revealed both organisations had significant delays in responding to FOI requests and have been issued with enforcement notices for their ongoing FOI failings.</p>
<p>Devon and Cornwall Police responded to only 39-65% of requests within the required 20 working days' timeframe between 2022 and 2024, with a backlog increasing from 77 to 251 requests between December 2023 and June 2024. The Police have 30 days to publish an action plan and clear the backlog within 6 months. </p>
<p>Barking, Havering and Redbridge Hospitals NHS Trust was found to respond to only 29% of requests within the required timeframe, with only 2.5% of requests made in January 2024 responded to in a timely manner. The Trust's backlog increased from 589 to 785 requests between April and June 2024. The Trust has been given 35 days to publish an action plan to clear the backlog by the end of the year.</p>
<p>Failure to comply with the enforcement notices may lead to Court proceedings.</p>
<p>Click here to read Devon and Cornwall Police's enforcement notice and click <a href="https://ico.org.uk/media/action-weve-taken/foi-enforcement-notices/4030451/enf0988359.pdf">here</a> to read Barking, Havering and Redbridge University Hospitals NHS Trust's enforcement notice.</p>
<p><strong>NCSC and partners issue warning about evolving techniques used by China state-sponsored cyber attackers</strong></p>
<p>The National Cyber Security Centre (NCSC), in collaboration with international partners from Australia, the US, Canada, New Zealand, Germany, the Republic of Korea, and Japan, has released an advisory highlighting the evolving tactics of China state-sponsored cyber actors. The focus is on APT40, a group linked to the Chinese Ministry of State Security, which has targeted Australian networks by exploiting vulnerable small-office and home-office devices.</p>
<p>These devices, often not running the latest software or lacking security updates, provide a weak point that attackers exploit to launch attacks and hide malicious traffic. The advisory includes two technical case studies demonstrating these attack methods, which are also used by other Chinese state-sponsored groups globally.</p>
<p>The UK has previously attributed APT40 as being part of the Chinese Ministry of State Security. Defenders are encouraged to follow the latest advice to help detect and mitigate the malicious activity.</p>
<p>Click <a href="https://www.ncsc.gov.uk/news/ncsc-and-partners-issue-alert-about-evolving-techniques-used-by-china-state-sponsored-cyber-attacks">here</a> to read the full advisory.</p>]]></description><pubDate>Thu, 08 Aug 2024 16:09:00 +0100</pubDate><category>Data and privacy</category><authors:names>Richard Breavington, Daniel Guilfoyle, Rachel Ford, Ian Dinning, Christopher Ashton, Elizabeth Zang, Emanuele Santella , Lauren Kerr</authors:names><enclosure url="https://www.rpclegal.com/-/media/rpc/redesign-images/thinking-tiles/wide/data-and-cyber-1---thinking-tile-wide.jpg?rev=4b6dbfd0eb224470bc21a554b4cb58fd&amp;hash=7E983E679A0FF006CFC9E5543A132D05" type="image/jpeg" medium="image" /><content:encoded><![CDATA[<p><strong>The CrowdStrike Incident</strong></p>
<p>On 19th July 2024, a faulty software update by cybersecurity firm, CrowdStrike, triggered a global IT outage, affecting a substantial number of Windows devices.  This interrupted services for a number of organisations and caused significant disruption, including in air transport.</p>
<p>This incident, considered one of the most severe cyber events in history, has resulted in economic losses for numerous businesses. Notably, Delta Airlines and various financial institutions were severely affected, prompting threats of legal action against Crowdstrike for compensation.</p>
<p>The insurance implications of this event are still being assessed. Initial suggestions are that businesses may file claims under the ‘system failure’ provisions of their cyber insurance policies, given that the incident was not a result of a malicious attack. The potential volume and scale of these claims could affect the cyber insurance industry materially, including potentially the cost of premiums and the scope of policy wordings.</p>
<p>For more information, a BBC report into the incident is <a href="https://www.bbc.co.uk/news/articles/cpe3zgznwjno">here</a> and an article from Spiceworks which includes reference to the potential litigation and insurance consequences is <a href="https://www.spiceworks.com/it-security/endpoint-security/news/crowdstrike-faces-lawsuits-global-outage-drives-insurance-costs/">here</a>.</p>
<p><strong>King's Speech announces new Cyber Resilience Law  </strong></p>
<p>The King's Speech announced plans to introduce a new Cyber Security and Resilience Bill to Parliament in the coming months following an increase in cyber threats to critical organisations.</p>
<p>The Bill aims to update existing UK Regulations including the Network and Information Systems (NIS) Regulations 2018. According to a briefing paper published alongside the King's Speech, the Bill will extend the scope of the existing NIS regime to protect more digital services and supply chains. Additional incident reporting obligations will likely be imposed, including in relation to ransomware attacks to improve national threat understanding. Other measures will be put forward to strengthen regulators’ powers in relation to enforcement, costs recovery and the ability to carry out proactive investigations.</p>
<p>This is a step towards an updated cyber security regime in line with the developments in this field at European level, where the implementation deadline for the EU NIS 2 Directive is 17 October 2024.</p>
<p>Click <a href="https://www.gov.uk/government/speeches/the-kings-speech-2024">here</a> to read the full King's Speech and click <a href="https://www.gov.uk/government/publications/kings-speech-2024-background-briefing-notes">here</a> to read the accompanying briefing paper from the UK Government. </p>
<p><strong>ICO reprimands Electoral Commission</strong></p>
<p>The Information Commissioner's Office (ICO) has reprimanded the Electoral Commission over cyber security failings relating to an attack in August 2021.</p>
<p>Hackers entered the Electoral Commission's servers and exploited a known flaw in the software that should have been fixed months before. This resulted in personal data, including names and addresses, of approximately 40 million voters being exposed to hackers for over a year until the problem was found.</p>
<p>The ICO's report said the Electoral Commission did not have appropriate security measures in place to protect the personal information it held and did not keep its servers up to date with the latest security patches issued months before the attack. The ICO also found that the Commission did not have sufficient password policies in place at the time of the attack, with many staff still using default passwords.</p>
<p>Click <a href="https://ico.org.uk/media/action-weve-taken/reprimands/4030454/the-electoral-commission-reprimand.pdf">here</a> to read the full reprimand.</p>
<p><strong>NCSC and partners issue warning over North Korean state-sponsored cyber campaign to steal military and nuclear secrets</strong></p>
<p>The National Cyber Security Centre (NCSC), alongside international partners from the US and South Korea, has issued a new advisory revealing a global cyber espionage campaign linked to the Democratic People’s Republic of Korea (DPRK). The group, identified as Andariel and associated with DPRK's Reconnaissance General Bureau (RGB), has targeted critical sectors including defence, aerospace, nuclear, and engineering, with a lesser focus on medical and energy entities. The attackers aim to steal sensitive technical information such as contract specification design and project details.</p>
<p>Andariel's activities have expanded to include ransomware attacks, notably against US healthcare organisations, to extort payments and fund further espionage. The advisory provides technical insights and mitigation strategies to defend against these threats. It highlights the group's tactics of exploiting known vulnerabilities, maintaining persistence, and evading detection. The NCSC and partners warn that Andariel has evolved from destructive attacks to sophisticated espionage and ransomware operations, sometimes combining both tactics against the same target.</p>
<p>Click <a href="https://www.ic3.gov/Media/News/2024/240725.pdf">here</a> to read the full joint advisory. </p>
<p><strong>ICO takes action against two organisations for "risking public trust" by failing to respond to public requests for information</strong></p>
<p>The ICO has issued enforcement notices to Devon and Cornwall Police and Barking, Havering and Redbridge Hospitals NHS Trust for failing to meet requirements under the Freedom of Information (FOI) Act 2000.</p>
<p>Investigations revealed both organisations had significant delays in responding to FOI requests and have been issued with enforcement notices for their ongoing FOI failings.</p>
<p>Devon and Cornwall Police responded to only 39-65% of requests within the required 20 working days' timeframe between 2022 and 2024, with a backlog increasing from 77 to 251 requests between December 2023 and June 2024. The Police have 30 days to publish an action plan and clear the backlog within 6 months. </p>
<p>Barking, Havering and Redbridge Hospitals NHS Trust was found to respond to only 29% of requests within the required timeframe, with only 2.5% of requests made in January 2024 responded to in a timely manner. The Trust's backlog increased from 589 to 785 requests between April and June 2024. The Trust has been given 35 days to publish an action plan to clear the backlog by the end of the year.</p>
<p>Failure to comply with the enforcement notices may lead to Court proceedings.</p>
<p>Click here to read Devon and Cornwall Police's enforcement notice and click <a href="https://ico.org.uk/media/action-weve-taken/foi-enforcement-notices/4030451/enf0988359.pdf">here</a> to read Barking, Havering and Redbridge University Hospitals NHS Trust's enforcement notice.</p>
<p><strong>NCSC and partners issue warning about evolving techniques used by China state-sponsored cyber attackers</strong></p>
<p>The National Cyber Security Centre (NCSC), in collaboration with international partners from Australia, the US, Canada, New Zealand, Germany, the Republic of Korea, and Japan, has released an advisory highlighting the evolving tactics of China state-sponsored cyber actors. The focus is on APT40, a group linked to the Chinese Ministry of State Security, which has targeted Australian networks by exploiting vulnerable small-office and home-office devices.</p>
<p>These devices, often not running the latest software or lacking security updates, provide a weak point that attackers exploit to launch attacks and hide malicious traffic. The advisory includes two technical case studies demonstrating these attack methods, which are also used by other Chinese state-sponsored groups globally.</p>
<p>The UK has previously attributed APT40 as being part of the Chinese Ministry of State Security. Defenders are encouraged to follow the latest advice to help detect and mitigate the malicious activity.</p>
<p>Click <a href="https://www.ncsc.gov.uk/news/ncsc-and-partners-issue-alert-about-evolving-techniques-used-by-china-state-sponsored-cyber-attacks">here</a> to read the full advisory.</p>]]></content:encoded></item><item><guid isPermaLink="false">{1DB2DFFD-0AC8-492B-BAA4-F4935EC8D0DF}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/cyber-bytes-issue-65/</link><title>Cyber_Bytes - Issue 65</title><description><![CDATA[<p><strong>ICO to investigate 23andMe data breach with Canadian counterpart</strong></p>
<p>The Information Commissioner's Office (ICO) and the Office of the Privacy Commissioner of Canada (OPC) have launched a joint investigation into the data breach that occurred in October 2023 at the global direct-to-consumer genetic testing company 23andMe. 23andMe processed highly sensitive personal information, including genetic data that remains unchanged over time and reveals details about individuals and their families, such as health, ethnicity, and biological relationships. Last year the company experienced a data breach where this sensitive personal data was stolen by threat actors and made available online. The joint investigation will assess the scope of information exposed by the breach and the potential harm to affected individuals. It will also determine whether 23andMe had sufficient safeguards in place to protect personal data and whether the company provided proper notification about the breach to the regulators and affected individuals.</p>
<p>Click <a href="https://url.uk.m.mimecastprotect.com/s/5VWQCJZDRHpEnD2uGh7tGFMtr?domain=sites-rpc.vuturevx.com">here</a> to read more from the ICO.</p>
<p><strong>Downturn in percentage of companies paying cyber ransoms </strong></p>
<p>A new report by insurance and risk management company Marsh has highlighted that 23% of clients affected by a cyber extortion event in 2023 paid the ransom, out of a (rising) total of 282 events, according to Marsh's report.</p>
<p>The report, which analysed over 1,800 cyber claims submitted to Marsh in the U.S. and Canada last year, revealed a significant increase in the median payment for ransomware. While fewer payors were recorded, the median payment rose to $6.5 million in 2023 from $335,000 in 2022, and the median demand increased to $20 million from $1.4 million.</p>
<p>In 2023, 21% of Marsh clients with a cyber policy reported an incident. The healthcare and communications sectors experienced the highest number of claims annually. Although ransomware accounted for less than 20% of reported claims, it remains a primary concern due to its frequency, sophistication, and potential severity.</p>
<p>The report recommends companies develop a "cyber resilience strategy" that considers the enterprise-wide economic and operational impact of cyber risks. Meredith Schnur, cyber practice leader at Marsh, U.S. and Canada, emphasised the importance of clients adopting a proactive approach to safeguard themselves.</p>
<p>Click <a href="https://url.uk.m.mimecastprotect.com/s/j8WfCKOXRF851GYi3iJt4i5Dp?domain=sites-rpc.vuturevx.com">here</a> to read the Marsh report. Click <a href="https://url.uk.m.mimecastprotect.com/s/-eDPCLg6RTNn3Zgcmsxt3ZLPn?domain=sites-rpc.vuturevx.com">here</a> to read the accompanying press release.</p>
<p><strong>Further developments in Snowflake data breach</strong> </p>
<p>Hundreds of customers of Snowflake Inc, a popular US-based cloud data platform, have recently reported suffering a data breach. Cyber criminals allegedly used stolen log-in credentials obtained via infostealer malware to illegally access companies' accounts, with hundreds of Snowflake customers' passwords reportedly found online.</p>
<p>
As an unfolding incident, the full extent of the breach is still being investigated. However, it is estimated that hundreds of millions of records have been exfiltrated, including data from major companies like Ticketmaster, with details of over 550 million customers being exposed. The threat actor behind the attack claims to have accessed data from around 400 organisations. A report by Mandiant, a cybersecurity organisation, suggests that these credentials were "primarily obtained from multiple infostealer malware campaigns that infected non-Snowflake owned systems".</p>
<p>A statement released by Snowflake has clarified that it has “not identified evidence suggesting this activity was caused by a vulnerability, misconfiguration or breach of Snowflake’s platform", and there is no "identified evidence suggesting this activity was caused by compromised credentials of current or former Snowflake personnel".</p>
<p>“This appears to be a targeted campaign directed at users with single-factor authentication. As part of this campaign, threat actors have leveraged credentials previously purchased or obtained through infostealing malware.”</p>
<p>Click <a href="https://url.uk.m.mimecastprotect.com/s/IBz3CMjD6Cx4JALTQtjt2QCrW?domain=sites-rpc.vuturevx.com">here</a> to read the Mandiant report.</p>
<p><strong>Lloyd's of London issues bulletin to update cyber coverage risk requirements</strong></p>
<p>Lloyd's of London has issued bulletin Y5433 to update cyber risk underwriting requirements in relation to state-backed cyber-attacks. This follows the controversial Y5381 bulletin from August 2022, which first mandated the use of cyber-specific war exclusion clauses in cyber policies written in the Lloyd's market.</p>
<p>The bulletin explains further steps being taken by Lloyd's to limit the use of cyber-specific war risk exclusion clauses which do not comply with the requirements in the original Y5381 bulletin. In particular, non-compliant exclusions for which there has been no dispensation issued by Lloyd's are forbidden from 1 July 2024. Where dispensations have been granted, these will not be renewed on expiry and no new dispensations will be granted.</p>
<p>The Y5433 bulletin also indicates that one of the narrower types of exclusion previously categorised previously as being compliant (or at least outside of the expressly non-compliant category) will now be phased out. This 'Type 4' variant of the exclusion contained a carve back for losses suffered as a result of cyber operations carried out as part of war where the affected systems were situated outside of the warring states. This is now stated to be outside of Lloyd's risk appetite and will be phased out by policies incepting on 1 January 2025.</p>
<p>Despite the variable reaction to the initial Y5381 bulletin, this more recent bulletin reinforces the approach of insisting on robust exclusions meeting original requirements. This might well be due in part to the deterioration in the global geopolitical landscape since the original bulletin.</p>
<p>Click <a href="https://url.uk.m.mimecastprotect.com/s/YOSfCNxDRSVm6GQI0uxtqg5X4?domain=sites-rpc.vuturevx.com">here</a> to read Market Bulletin Y5433.</p>
<p><strong>FRA publishes report outlining issues, best practices, and suggested solutions on EU data protection enforcement </strong></p>
<p>The European Union Agency for Fundamental Rights (FRA) has announced the publication of its report "GDPR in practice - Experiences of data protection authorities," based on interviews with representatives from data protection authorities in 27 EU Member States.</p>
<p>The report highlights several issues undermining EU data protection enforcement:</p>
<ul>
    <li>a lack of resources, funding and staff which prevent authorities from fully carrying out their mandates, made more difficult by increased workloads generated from new laws such as the EU Artificial Intelligence Act (the AI Act);</li>
    <li>a need for more tools to reinforce data protection authority's supervisory capacity, including the ability to conduct undercover investigations or the possibility of fining organisations that refuse to cooperate;</li>
    <li>a need for more guidance and exchange of best practices for data protection authorities that often need to prioritise complaint handling over other tasks;</li>
    <li>EU countries and their public institutions should systematically consult the data protection authorities and seek their advice in advance of new legislation - currently, data protection authorities are often not consulted on new legislation or are given tight deadlines;</li>
    <li>a lack of awareness among individuals regarding their personal data rights and organisations that struggle to identify and prevent data protection risks, especially when it comes to AI systems;</li>
    <li>difficulties for researchers in accessing data – specific guidance and clarifications are needed around processing of data for scientific purposes; and</li>
    <li>data protection authorities struggling to regulate new technologies - regulators need to identify specific technology related areas where more clarity is needed and work closely together when advising on new technologies.</li>
</ul>
<p>Click <a href="https://url.uk.m.mimecastprotect.com/s/8A_YCO7lRf5mOygsACVtLYtIj?domain=sites-rpc.vuturevx.com">here</a> to read the press release. Click <a href="https://url.uk.m.mimecastprotect.com/s/qzESCP1m8FvE6k2iZFwt98Boe?domain=sites-rpc.vuturevx.com">here</a> to read the FRA's report.</p>]]></description><pubDate>Thu, 11 Jul 2024 17:28:00 +0100</pubDate><category>Data and privacy</category><authors:names>Richard Breavington, Daniel Guilfoyle, Rachel Ford, Ian Dinning, Christopher Ashton, Elizabeth Zang, Emanuele Santella , Lauren Kerr</authors:names><enclosure url="https://www.rpclegal.com/-/media/rpc/redesign-images/thinking-tiles/wide/data-and-cyber-2---thinking-tile-wide.jpg?rev=8f262369de1c46c6bef3c74e0d2b51c9&amp;hash=3379AF5F3FF6F6CC5ECB36CC0235B10B" type="image/jpeg" medium="image" /><content:encoded><![CDATA[<p><strong>ICO to investigate 23andMe data breach with Canadian counterpart</strong></p>
<p>The Information Commissioner's Office (ICO) and the Office of the Privacy Commissioner of Canada (OPC) have launched a joint investigation into the data breach that occurred in October 2023 at the global direct-to-consumer genetic testing company 23andMe. 23andMe processed highly sensitive personal information, including genetic data that remains unchanged over time and reveals details about individuals and their families, such as health, ethnicity, and biological relationships. Last year the company experienced a data breach where this sensitive personal data was stolen by threat actors and made available online. The joint investigation will assess the scope of information exposed by the breach and the potential harm to affected individuals. It will also determine whether 23andMe had sufficient safeguards in place to protect personal data and whether the company provided proper notification about the breach to the regulators and affected individuals.</p>
<p>Click <a href="https://url.uk.m.mimecastprotect.com/s/5VWQCJZDRHpEnD2uGh7tGFMtr?domain=sites-rpc.vuturevx.com">here</a> to read more from the ICO.</p>
<p><strong>Downturn in percentage of companies paying cyber ransoms </strong></p>
<p>A new report by insurance and risk management company Marsh has highlighted that 23% of clients affected by a cyber extortion event in 2023 paid the ransom, out of a (rising) total of 282 events, according to Marsh's report.</p>
<p>The report, which analysed over 1,800 cyber claims submitted to Marsh in the U.S. and Canada last year, revealed a significant increase in the median payment for ransomware. While fewer payors were recorded, the median payment rose to $6.5 million in 2023 from $335,000 in 2022, and the median demand increased to $20 million from $1.4 million.</p>
<p>In 2023, 21% of Marsh clients with a cyber policy reported an incident. The healthcare and communications sectors experienced the highest number of claims annually. Although ransomware accounted for less than 20% of reported claims, it remains a primary concern due to its frequency, sophistication, and potential severity.</p>
<p>The report recommends companies develop a "cyber resilience strategy" that considers the enterprise-wide economic and operational impact of cyber risks. Meredith Schnur, cyber practice leader at Marsh, U.S. and Canada, emphasised the importance of clients adopting a proactive approach to safeguard themselves.</p>
<p>Click <a href="https://url.uk.m.mimecastprotect.com/s/j8WfCKOXRF851GYi3iJt4i5Dp?domain=sites-rpc.vuturevx.com">here</a> to read the Marsh report. Click <a href="https://url.uk.m.mimecastprotect.com/s/-eDPCLg6RTNn3Zgcmsxt3ZLPn?domain=sites-rpc.vuturevx.com">here</a> to read the accompanying press release.</p>
<p><strong>Further developments in Snowflake data breach</strong> </p>
<p>Hundreds of customers of Snowflake Inc, a popular US-based cloud data platform, have recently reported suffering a data breach. Cyber criminals allegedly used stolen log-in credentials obtained via infostealer malware to illegally access companies' accounts, with hundreds of Snowflake customers' passwords reportedly found online.</p>
<p>
As an unfolding incident, the full extent of the breach is still being investigated. However, it is estimated that hundreds of millions of records have been exfiltrated, including data from major companies like Ticketmaster, with details of over 550 million customers being exposed. The threat actor behind the attack claims to have accessed data from around 400 organisations. A report by Mandiant, a cybersecurity organisation, suggests that these credentials were "primarily obtained from multiple infostealer malware campaigns that infected non-Snowflake owned systems".</p>
<p>A statement released by Snowflake has clarified that it has “not identified evidence suggesting this activity was caused by a vulnerability, misconfiguration or breach of Snowflake’s platform", and there is no "identified evidence suggesting this activity was caused by compromised credentials of current or former Snowflake personnel".</p>
<p>“This appears to be a targeted campaign directed at users with single-factor authentication. As part of this campaign, threat actors have leveraged credentials previously purchased or obtained through infostealing malware.”</p>
<p>Click <a href="https://url.uk.m.mimecastprotect.com/s/IBz3CMjD6Cx4JALTQtjt2QCrW?domain=sites-rpc.vuturevx.com">here</a> to read the Mandiant report.</p>
<p><strong>Lloyd's of London issues bulletin to update cyber coverage risk requirements</strong></p>
<p>Lloyd's of London has issued bulletin Y5433 to update cyber risk underwriting requirements in relation to state-backed cyber-attacks. This follows the controversial Y5381 bulletin from August 2022, which first mandated the use of cyber-specific war exclusion clauses in cyber policies written in the Lloyd's market.</p>
<p>The bulletin explains further steps being taken by Lloyd's to limit the use of cyber-specific war risk exclusion clauses which do not comply with the requirements in the original Y5381 bulletin. In particular, non-compliant exclusions for which there has been no dispensation issued by Lloyd's are forbidden from 1 July 2024. Where dispensations have been granted, these will not be renewed on expiry and no new dispensations will be granted.</p>
<p>The Y5433 bulletin also indicates that one of the narrower types of exclusion previously categorised previously as being compliant (or at least outside of the expressly non-compliant category) will now be phased out. This 'Type 4' variant of the exclusion contained a carve back for losses suffered as a result of cyber operations carried out as part of war where the affected systems were situated outside of the warring states. This is now stated to be outside of Lloyd's risk appetite and will be phased out by policies incepting on 1 January 2025.</p>
<p>Despite the variable reaction to the initial Y5381 bulletin, this more recent bulletin reinforces the approach of insisting on robust exclusions meeting original requirements. This might well be due in part to the deterioration in the global geopolitical landscape since the original bulletin.</p>
<p>Click <a href="https://url.uk.m.mimecastprotect.com/s/YOSfCNxDRSVm6GQI0uxtqg5X4?domain=sites-rpc.vuturevx.com">here</a> to read Market Bulletin Y5433.</p>
<p><strong>FRA publishes report outlining issues, best practices, and suggested solutions on EU data protection enforcement </strong></p>
<p>The European Union Agency for Fundamental Rights (FRA) has announced the publication of its report "GDPR in practice - Experiences of data protection authorities," based on interviews with representatives from data protection authorities in 27 EU Member States.</p>
<p>The report highlights several issues undermining EU data protection enforcement:</p>
<ul>
    <li>a lack of resources, funding and staff which prevent authorities from fully carrying out their mandates, made more difficult by increased workloads generated from new laws such as the EU Artificial Intelligence Act (the AI Act);</li>
    <li>a need for more tools to reinforce data protection authority's supervisory capacity, including the ability to conduct undercover investigations or the possibility of fining organisations that refuse to cooperate;</li>
    <li>a need for more guidance and exchange of best practices for data protection authorities that often need to prioritise complaint handling over other tasks;</li>
    <li>EU countries and their public institutions should systematically consult the data protection authorities and seek their advice in advance of new legislation - currently, data protection authorities are often not consulted on new legislation or are given tight deadlines;</li>
    <li>a lack of awareness among individuals regarding their personal data rights and organisations that struggle to identify and prevent data protection risks, especially when it comes to AI systems;</li>
    <li>difficulties for researchers in accessing data – specific guidance and clarifications are needed around processing of data for scientific purposes; and</li>
    <li>data protection authorities struggling to regulate new technologies - regulators need to identify specific technology related areas where more clarity is needed and work closely together when advising on new technologies.</li>
</ul>
<p>Click <a href="https://url.uk.m.mimecastprotect.com/s/8A_YCO7lRf5mOygsACVtLYtIj?domain=sites-rpc.vuturevx.com">here</a> to read the press release. Click <a href="https://url.uk.m.mimecastprotect.com/s/qzESCP1m8FvE6k2iZFwt98Boe?domain=sites-rpc.vuturevx.com">here</a> to read the FRA's report.</p>]]></content:encoded></item><item><guid isPermaLink="false">{7BBC61AB-748C-4CE9-82A5-10985CBB5F33}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/data-dispatch-july-2024/</link><title>Data dispatch - July 2024</title><description><![CDATA[<p>The format makes it easy for you to get a flavour of each item from a short summary, from which you can click "read full article".</p>
<p>Please do feel free to forward on the publication to your colleagues or, better still, recommend that they <a href="https://sites-rpc.vuturevx.com/5/8/landing-pages/subscribe-data-digest.asp">subscribe</a> to receive the publication directly.</p>
<p>If there are any issues on which you'd like more information (or if you have any questions or feedback), please do let us know or get in touch with your usual contact at RPC.</p>
<h4>Key developments</h4>
<p>
</p>
<p><strong>DPDI Bill falls in 'wash up' ahead of General Elections</strong></p>
<p>The Data Protection and Digital Information Bill has been dropped in the Parliamentary 'wash up' process following the announcement of the general elections this summer. </p>
<p><a rel="noopener noreferrer" href="https://sites-rpc.vuturevx.com/95/5696/compose-email/rpc-s-data-dispatch---issue-5.asp#DPDI_Bill" target="_blank">Read the full article</a>.</p>
<p><strong>ICO consults on "consent or pay" business model</strong></p>
<p>The ICO has called for views on the use of "consent or pay" business models which will contribute to the ICO's final regulatory position on this issue.</p>
<p><a rel="noopener noreferrer" href="https://sites-rpc.vuturevx.com/95/5696/compose-email/rpc-s-data-dispatch---issue-5.asp#ICO_consults" target="_blank">Read the full article</a>.</p>
<p><strong>AI Update</strong></p>
<p>The EU AI Act has been signed. In the UK, the AI and Digital Hub has been set up to provide one-stop-shop regulatory advice on innovative tech .</p>
<p><a rel="noopener noreferrer" href="https://sites-rpc.vuturevx.com/95/5696/compose-email/rpc-s-data-dispatch---issue-5.asp#Ai_Update" target="_blank">Read the full article</a>.</p>
<h4>Enforcement action</h4>
<p><strong>ICO orders Serco Leisure and community leisure trusts to stop processing biometric data for the purposes of monitoring their employees</strong></p>
<p>On 23 February 2024, the Information Commissioner's Office (ICO) announced the issuing of enforcement notices ordering Serco Leisure, Serco Jersey, and seven associated community leisure trusts to stop using facial recognition technology, and fingerprint scanning, to monitor their employees' attendance at work (see <a rel="noopener noreferrer" href="https://ico.org.uk/about-the-ico/media-centre/news-and-blogs/2024/02/ico-orders-serco-leisure-to-stop-using-facial-recognition-technology/" target="_blank">here</a>).</p>
<p><a rel="noopener noreferrer" href="https://sites-rpc.vuturevx.com/95/5696/compose-email/rpc-s-data-dispatch---issue-5.asp#ICO_Orders" target="_blank">Read the full article</a>.<br />
<br />
<strong>CJEU finds that a press release by the European Anti-Fraud Office indirectly identified the subject of a fraud investigation</strong></p>
<p>On 7 March 2024, the Court of Justice of the European Union (CJEU), annulling a finding of the General Court of the European Union (GC), confirmed that, to determine if a data subject is indirectly identifiable, it is necessary to view the information in its entirety and to consider 'all the means reasonably likely to be used' by individuals to identify a data subject.</p>
<p><a rel="noopener noreferrer" href="https://sites-rpc.vuturevx.com/95/5696/compose-email/rpc-s-data-dispatch---issue-5.asp#CJEU_finds" target="_blank">Read the full article</a>.</p>
<h4>Need to know</h4>
<p><strong>The ICO has issued guidance on the use of fines under the UK GDPR  </strong><br />
<br />
<a rel="noopener noreferrer" href="https://sites-rpc.vuturevx.com/95/5696/compose-email/rpc-s-data-dispatch---issue-5.asp#Guidance_on_ICO_fines" target="_blank">Read the full article</a>.</p>
<p><strong>The ICO plan to create an AI tool to identify websites which are using non-compliant cookie banners</strong></p>
<p><a rel="noopener noreferrer" href="https://sites-rpc.vuturevx.com/95/5696/compose-email/rpc-s-data-dispatch---issue-5.asp#ICO_AI_tool" target="_blank">Read the full article</a>.<br />
<br />
<strong>UK's ICO and USA's FCC collaborate to tackle unwanted communications</strong></p>
<p><strong> </strong>The UK's Information Commissioner's Office (ICO) and USA's Federal Communications Commission (FCC) have announced that they have signed a Memorandum of Understanding (the Memorandum) regarding the protection of consumers from unsolicited communications.<br />
<br />
<a rel="noopener noreferrer" href="https://sites-rpc.vuturevx.com/95/5696/compose-email/rpc-s-data-dispatch---issue-5.asp#ICO_USA" target="_blank">Read the full article</a>.</p>]]></description><pubDate>Fri, 05 Jul 2024 10:22:00 +0100</pubDate><category>Data and privacy</category><authors:names>Jon Bartley</authors:names><enclosure url="https://www.rpclegal.com/-/media/rpc/images/thinking-tiles/wide/301136-website-perspective-tiles-final-wide-715x370px_data-and-cyber---1271742015.jpg?rev=2280c60f10b440daba866ea74d9d912a&amp;hash=ECD0E649C606484031477B98C945F78A" type="image/jpeg" medium="image" /><content:encoded><![CDATA[<p>The format makes it easy for you to get a flavour of each item from a short summary, from which you can click "read full article".</p>
<p>Please do feel free to forward on the publication to your colleagues or, better still, recommend that they <a href="https://sites-rpc.vuturevx.com/5/8/landing-pages/subscribe-data-digest.asp">subscribe</a> to receive the publication directly.</p>
<p>If there are any issues on which you'd like more information (or if you have any questions or feedback), please do let us know or get in touch with your usual contact at RPC.</p>
<h4>Key developments</h4>
<p>
</p>
<p><strong>DPDI Bill falls in 'wash up' ahead of General Elections</strong></p>
<p>The Data Protection and Digital Information Bill has been dropped in the Parliamentary 'wash up' process following the announcement of the general elections this summer. </p>
<p><a rel="noopener noreferrer" href="https://sites-rpc.vuturevx.com/95/5696/compose-email/rpc-s-data-dispatch---issue-5.asp#DPDI_Bill" target="_blank">Read the full article</a>.</p>
<p><strong>ICO consults on "consent or pay" business model</strong></p>
<p>The ICO has called for views on the use of "consent or pay" business models which will contribute to the ICO's final regulatory position on this issue.</p>
<p><a rel="noopener noreferrer" href="https://sites-rpc.vuturevx.com/95/5696/compose-email/rpc-s-data-dispatch---issue-5.asp#ICO_consults" target="_blank">Read the full article</a>.</p>
<p><strong>AI Update</strong></p>
<p>The EU AI Act has been signed. In the UK, the AI and Digital Hub has been set up to provide one-stop-shop regulatory advice on innovative tech .</p>
<p><a rel="noopener noreferrer" href="https://sites-rpc.vuturevx.com/95/5696/compose-email/rpc-s-data-dispatch---issue-5.asp#Ai_Update" target="_blank">Read the full article</a>.</p>
<h4>Enforcement action</h4>
<p><strong>ICO orders Serco Leisure and community leisure trusts to stop processing biometric data for the purposes of monitoring their employees</strong></p>
<p>On 23 February 2024, the Information Commissioner's Office (ICO) announced the issuing of enforcement notices ordering Serco Leisure, Serco Jersey, and seven associated community leisure trusts to stop using facial recognition technology, and fingerprint scanning, to monitor their employees' attendance at work (see <a rel="noopener noreferrer" href="https://ico.org.uk/about-the-ico/media-centre/news-and-blogs/2024/02/ico-orders-serco-leisure-to-stop-using-facial-recognition-technology/" target="_blank">here</a>).</p>
<p><a rel="noopener noreferrer" href="https://sites-rpc.vuturevx.com/95/5696/compose-email/rpc-s-data-dispatch---issue-5.asp#ICO_Orders" target="_blank">Read the full article</a>.<br />
<br />
<strong>CJEU finds that a press release by the European Anti-Fraud Office indirectly identified the subject of a fraud investigation</strong></p>
<p>On 7 March 2024, the Court of Justice of the European Union (CJEU), annulling a finding of the General Court of the European Union (GC), confirmed that, to determine if a data subject is indirectly identifiable, it is necessary to view the information in its entirety and to consider 'all the means reasonably likely to be used' by individuals to identify a data subject.</p>
<p><a rel="noopener noreferrer" href="https://sites-rpc.vuturevx.com/95/5696/compose-email/rpc-s-data-dispatch---issue-5.asp#CJEU_finds" target="_blank">Read the full article</a>.</p>
<h4>Need to know</h4>
<p><strong>The ICO has issued guidance on the use of fines under the UK GDPR  </strong><br />
<br />
<a rel="noopener noreferrer" href="https://sites-rpc.vuturevx.com/95/5696/compose-email/rpc-s-data-dispatch---issue-5.asp#Guidance_on_ICO_fines" target="_blank">Read the full article</a>.</p>
<p><strong>The ICO plan to create an AI tool to identify websites which are using non-compliant cookie banners</strong></p>
<p><a rel="noopener noreferrer" href="https://sites-rpc.vuturevx.com/95/5696/compose-email/rpc-s-data-dispatch---issue-5.asp#ICO_AI_tool" target="_blank">Read the full article</a>.<br />
<br />
<strong>UK's ICO and USA's FCC collaborate to tackle unwanted communications</strong></p>
<p><strong> </strong>The UK's Information Commissioner's Office (ICO) and USA's Federal Communications Commission (FCC) have announced that they have signed a Memorandum of Understanding (the Memorandum) regarding the protection of consumers from unsolicited communications.<br />
<br />
<a rel="noopener noreferrer" href="https://sites-rpc.vuturevx.com/95/5696/compose-email/rpc-s-data-dispatch---issue-5.asp#ICO_USA" target="_blank">Read the full article</a>.</p>]]></content:encoded></item><item><guid isPermaLink="false">{084CF800-5E17-4192-9CFB-1BB634651624}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/cyber-bytes-issue-64/</link><title>Cyber_Bytes - Issue 64</title><description><![CDATA[<p><strong>NCSC Publishes guidance for organisations considering payment in ransomware incidents</strong></p>
<p>The National Cyber Security Centre has published guidance for organisations considering payment in ransomware incidents, developed in conjunction with the Association of British Insurers, the British Insurance Brokers’ Association, and the International Underwriting Association.</p>
<p>Key points include:</p>
<ul>
    <li>Alternative Solutions: Companies should consider viable backups and unexpected methods to recover systems and data instead of paying ransoms.</li>
    <li>Consulting  Experts: Decision-making should involve consulting insurers, law enforcement, and cyber incident response specialists.<br />
    Be aware that  payment does not  guarantee access to data: There is a chance that decryption keys will not work and, even if they do, it will take time to run across large networks.</li>
    <li>Consider the correct legal and regulatory practice around  payment: There are a range of legal risks involved in paying a ransom which need to be considered and mitigated to the extent possible.</li>
    <li>Payment of a ransom does not fulfil regulatory obligations: The ICO has made clear that payment of a ransom, including for deletion of data, does not affect the level of risk to data subjects and the resulting notification obligations.</li>
    <li>Report to the UK authorities: The NCSC will usually expect to be informed about ransomware incidents, particularly where payment of the ransom is being considered.</li>
</ul>
<p>
Click <a href="https://www.ncsc.gov.uk/guidance/organisations-considering-payment-in-ransomware-incidents">here</a> to read the NCSC's full guidance.</p>
<p><strong>Leader of LockBit ransomware group sanctioned</strong></p>
<p>The identity of the leader of LockBit, the notorious cyber-crime group, has been named by law enforcement agencies. This individual has now been sanctioned, as announced by the UK Foreign, Commonwealth and Development Office, alongside the US Department of the Treasury’s Office of Foreign Assets Control and the Australian Department of Foreign Affairs.</p>
<p>LockBit offers ransomware-as-a-service (RaaS) to a global network of hackers, supplying them with the tools and infrastructure to perpetrate cyber-attacks internationally. Between June 2022 and February 2024, it is estimated that more than 7,000 attacks were built using LockBit's services, with the top five impacted countries being the US, UK, France, Germany, and China.</p>
<p>Commenting on this development, the Director General of the National Crime Agency, Graeme Biggar, states that “<em>These sanctions are hugely significant and show that there is no hiding place for cyber criminals... who wreak havoc across the globe. He was certain he could remain anonymous, but he was wrong.</em>"</p>
<p>Click <a href="https://nationalcrimeagency.gov.uk/news/lockbit-leader-unmasked-and-sanctioned">here</a> to read more from the National Crime Agency.</p>
<p><strong>ICO urges organisations to boost cyber-security amidst growing threat of cyber attacks</strong></p>
<p>The ICO has issued a call for organisations to boost their cyber security and protect the personal data they hold. This comes amid the growing threat of cyber-attacks as over 3,000 cyber breaches were reported in 2023.</p>
<p>The ICO refers to a report containing practical advice to assist organisations with understanding common security failures and addresses steps that can be taken to improve security and prevent cyber breaches. The report focuses on five leading causes of cyber-security attacks:</p>
<ol>
    <li>Phishing: where scam messages trick the user and persuade people to share passwords or accidentally download malware.</li>
    <li>Supply chain attacks: where products, services, or technology organisations use are compromised and then used to infiltrate their own systems.</li>
    <li>Brute force attacks: where threat actors use trial and error to guess username and password combinations, or encryption keys.</li>
    <li>Denial of service: where threat actors aim to stop the normal functioning of a website or computer network by overloading it.</li>
    <li>Errors: where security settings are misconfigured, including being poorly implemented, not maintained and or left on default settings.</li>
</ol>
<p>
Click <a href="https://ico.org.uk/about-the-ico/media-centre/news-and-blogs/2024/05/organisations-must-do-more-to-combat-the-growing-threat-of-cyber-attacks/">here</a> to read the ICO's statement. Click <a href="http://https://ico.org.uk/about-the-ico/research-reports-impact-and-evaluation/research-and-reports/learning-from-the-mistakes-of-others-a-retrospective-review/">here</a> to read the ICO's report.</p>
<p><strong>Information Commissioner highlights persistent breaches of sensitive information failing people living with HIV</strong></p>
<p>The ICO called out failing data protection standards at health services for people living with HIV following several breaches and concerns raised by major UK HIV representative-organisations.</p>
<p>In 2022/23, the health sector was the most common source of data breach reports to the ICO, accounting for over a fifth of all personal data breaches.</p>
<p>The ICO has previously issued fines and reprimands for data breaches involving various health organisations, such as the Central Young Men's Christian Association, HIV Scotland, and NHS Highland. These breaches led to a loss of confidentiality over the identity of HIV patients, which has led to a drive for better staff training, appropriate technical procedures and prompt reporting.</p>
<p>The ICO highlights some key pieces of advice for organisations, such as:</p>
<ol>
    <li>Ensuring that staff receive thorough data protection training.</li>
    <li>Ensuring that appropriate technical measures are in place, such as passwords and access controls.</li>
    <li>Avoiding using BCC when sending bulk communications and opting for bulk email services, mail merge, or secure data transfer services.</li>
    <li>Training staff on the data breach reporting process.</li>
</ol>
<p>
Click <a href="http://https://ico.org.uk/about-the-ico/media-centre/news-and-blogs/2024/04/information-commissioner-persistent-sensitive-information-breaches-failing-people-living-with-hiv/">here</a> to read the ICO's press release.</p>
<p><strong>Tech Minister delivers speech on UK cyber resilience</strong></p>
<p>Tech Minister Saqib Bhatti MP recently delivered a speech to the National Cyber Security Centre's CyberUK 2024 conference in Birmingham. In his address, Mr Bhatti underscored the critical importance of cyber resilience for the UK.</p>
<p>The Government’s National Cyber Strategy focuses on several key areas: improving cyber resilience, fostering growth in the cyber security sector, enhancing cyber security skills, and addressing the security of new and emerging technologies such as AI, quantum computers, and semiconductors. He highlighted three significant challenges: ensuring that technology is “secure by design”; strategically managing cyber risk; and implementing effective rules and controls.</p>
<p>Mr Bhatti also set out a new Code of Practice for software vendors, which sets out how developers and vendors can look to ensure software is developed and maintained securely, with improved information sharing through supply chains. The code sets out four principles:</p>
<ol>
    <li>Secure design and development</li>
    <li>Build environment security</li>
    <li>Secure deployment and maintenance, and</li>
    <li>Communication with customers.</li>
</ol>
<p>
He also announced a new Code of Practice in the Cyber Security of AI, which is based on the NCSC's Guidelines for secure AI system development and is intended to form the basis of an international standard on AI cyber security.</p>
<p>Click <a href="https://www.gov.uk/government/speeches/improving-uk-cyber-resilience-ai-software-and-skills">here</a> to read Mr Bhatti's speech. Click <a href="http://https://www.gov.uk/government/calls-for-evidence/call-for-views-on-the-code-of-practice-for-software-vendors">here</a> to read the Code of Practice for Software Vendors and click <a href="https://www.gov.uk/government/calls-for-evidence/call-for-views-on-the-cyber-security-of-ai">here</a> to read the Code of Practice on the Cyber Security of AI.</p>
<p><strong>Government issues cyber security standards for schools and colleges</strong></p>
<p>The Government has published guidance on standards that schools and colleges should meet in relation to cyber security and user accounts. This aims to mitigate the significant operational and financial impact that cyber incidents and attacks have on schools and colleges.</p>
<p>The Government guidance also refers to the Cyber Essentials certification programme, which aims to provide these organisations with increased assurance over the technical elements of cyber security. Whilst Cyber Essentials is not a requirement and is open to organisations across all sectors, schools and colleges are urged to complete it as part of their cyber security activities.</p>
<p>Click <a href="https://www.gov.uk/guidance/meeting-digital-and-technology-standards-in-schools-and-colleges/cyber-security-standards-for-schools-and-colleges?fhch=821d04dcb61b4651087c9328ae69c7b4">here</a> to read the government's guidance. Click <a href="https://www.ncsc.gov.uk/cyberessentials/overview">here</a> to read more about Cyber Essentials.</p>]]></description><pubDate>Tue, 04 Jun 2024 09:30:00 +0100</pubDate><category>Data and privacy</category><authors:names>Richard Breavington, Daniel Guilfoyle, Ian Dinning, Rachel Ford, Christopher Ashton, Elizabeth Zang, Emanuele Santella </authors:names><enclosure url="https://www.rpclegal.com/-/media/rpc/redesign-images/thinking-tiles/wide/data-and-cyber-2---thinking-tile-wide.jpg?rev=8f262369de1c46c6bef3c74e0d2b51c9&amp;hash=3379AF5F3FF6F6CC5ECB36CC0235B10B" type="image/jpeg" medium="image" /><content:encoded><![CDATA[<p><strong>NCSC Publishes guidance for organisations considering payment in ransomware incidents</strong></p>
<p>The National Cyber Security Centre has published guidance for organisations considering payment in ransomware incidents, developed in conjunction with the Association of British Insurers, the British Insurance Brokers’ Association, and the International Underwriting Association.</p>
<p>Key points include:</p>
<ul>
    <li>Alternative Solutions: Companies should consider viable backups and unexpected methods to recover systems and data instead of paying ransoms.</li>
    <li>Consulting  Experts: Decision-making should involve consulting insurers, law enforcement, and cyber incident response specialists.<br />
    Be aware that  payment does not  guarantee access to data: There is a chance that decryption keys will not work and, even if they do, it will take time to run across large networks.</li>
    <li>Consider the correct legal and regulatory practice around  payment: There are a range of legal risks involved in paying a ransom which need to be considered and mitigated to the extent possible.</li>
    <li>Payment of a ransom does not fulfil regulatory obligations: The ICO has made clear that payment of a ransom, including for deletion of data, does not affect the level of risk to data subjects and the resulting notification obligations.</li>
    <li>Report to the UK authorities: The NCSC will usually expect to be informed about ransomware incidents, particularly where payment of the ransom is being considered.</li>
</ul>
<p>
Click <a href="https://www.ncsc.gov.uk/guidance/organisations-considering-payment-in-ransomware-incidents">here</a> to read the NCSC's full guidance.</p>
<p><strong>Leader of LockBit ransomware group sanctioned</strong></p>
<p>The identity of the leader of LockBit, the notorious cyber-crime group, has been named by law enforcement agencies. This individual has now been sanctioned, as announced by the UK Foreign, Commonwealth and Development Office, alongside the US Department of the Treasury’s Office of Foreign Assets Control and the Australian Department of Foreign Affairs.</p>
<p>LockBit offers ransomware-as-a-service (RaaS) to a global network of hackers, supplying them with the tools and infrastructure to perpetrate cyber-attacks internationally. Between June 2022 and February 2024, it is estimated that more than 7,000 attacks were built using LockBit's services, with the top five impacted countries being the US, UK, France, Germany, and China.</p>
<p>Commenting on this development, the Director General of the National Crime Agency, Graeme Biggar, states that “<em>These sanctions are hugely significant and show that there is no hiding place for cyber criminals... who wreak havoc across the globe. He was certain he could remain anonymous, but he was wrong.</em>"</p>
<p>Click <a href="https://nationalcrimeagency.gov.uk/news/lockbit-leader-unmasked-and-sanctioned">here</a> to read more from the National Crime Agency.</p>
<p><strong>ICO urges organisations to boost cyber-security amidst growing threat of cyber attacks</strong></p>
<p>The ICO has issued a call for organisations to boost their cyber security and protect the personal data they hold. This comes amid the growing threat of cyber-attacks as over 3,000 cyber breaches were reported in 2023.</p>
<p>The ICO refers to a report containing practical advice to assist organisations with understanding common security failures and addresses steps that can be taken to improve security and prevent cyber breaches. The report focuses on five leading causes of cyber-security attacks:</p>
<ol>
    <li>Phishing: where scam messages trick the user and persuade people to share passwords or accidentally download malware.</li>
    <li>Supply chain attacks: where products, services, or technology organisations use are compromised and then used to infiltrate their own systems.</li>
    <li>Brute force attacks: where threat actors use trial and error to guess username and password combinations, or encryption keys.</li>
    <li>Denial of service: where threat actors aim to stop the normal functioning of a website or computer network by overloading it.</li>
    <li>Errors: where security settings are misconfigured, including being poorly implemented, not maintained and or left on default settings.</li>
</ol>
<p>
Click <a href="https://ico.org.uk/about-the-ico/media-centre/news-and-blogs/2024/05/organisations-must-do-more-to-combat-the-growing-threat-of-cyber-attacks/">here</a> to read the ICO's statement. Click <a href="http://https://ico.org.uk/about-the-ico/research-reports-impact-and-evaluation/research-and-reports/learning-from-the-mistakes-of-others-a-retrospective-review/">here</a> to read the ICO's report.</p>
<p><strong>Information Commissioner highlights persistent breaches of sensitive information failing people living with HIV</strong></p>
<p>The ICO called out failing data protection standards at health services for people living with HIV following several breaches and concerns raised by major UK HIV representative-organisations.</p>
<p>In 2022/23, the health sector was the most common source of data breach reports to the ICO, accounting for over a fifth of all personal data breaches.</p>
<p>The ICO has previously issued fines and reprimands for data breaches involving various health organisations, such as the Central Young Men's Christian Association, HIV Scotland, and NHS Highland. These breaches led to a loss of confidentiality over the identity of HIV patients, which has led to a drive for better staff training, appropriate technical procedures and prompt reporting.</p>
<p>The ICO highlights some key pieces of advice for organisations, such as:</p>
<ol>
    <li>Ensuring that staff receive thorough data protection training.</li>
    <li>Ensuring that appropriate technical measures are in place, such as passwords and access controls.</li>
    <li>Avoiding using BCC when sending bulk communications and opting for bulk email services, mail merge, or secure data transfer services.</li>
    <li>Training staff on the data breach reporting process.</li>
</ol>
<p>
Click <a href="http://https://ico.org.uk/about-the-ico/media-centre/news-and-blogs/2024/04/information-commissioner-persistent-sensitive-information-breaches-failing-people-living-with-hiv/">here</a> to read the ICO's press release.</p>
<p><strong>Tech Minister delivers speech on UK cyber resilience</strong></p>
<p>Tech Minister Saqib Bhatti MP recently delivered a speech to the National Cyber Security Centre's CyberUK 2024 conference in Birmingham. In his address, Mr Bhatti underscored the critical importance of cyber resilience for the UK.</p>
<p>The Government’s National Cyber Strategy focuses on several key areas: improving cyber resilience, fostering growth in the cyber security sector, enhancing cyber security skills, and addressing the security of new and emerging technologies such as AI, quantum computers, and semiconductors. He highlighted three significant challenges: ensuring that technology is “secure by design”; strategically managing cyber risk; and implementing effective rules and controls.</p>
<p>Mr Bhatti also set out a new Code of Practice for software vendors, which sets out how developers and vendors can look to ensure software is developed and maintained securely, with improved information sharing through supply chains. The code sets out four principles:</p>
<ol>
    <li>Secure design and development</li>
    <li>Build environment security</li>
    <li>Secure deployment and maintenance, and</li>
    <li>Communication with customers.</li>
</ol>
<p>
He also announced a new Code of Practice in the Cyber Security of AI, which is based on the NCSC's Guidelines for secure AI system development and is intended to form the basis of an international standard on AI cyber security.</p>
<p>Click <a href="https://www.gov.uk/government/speeches/improving-uk-cyber-resilience-ai-software-and-skills">here</a> to read Mr Bhatti's speech. Click <a href="http://https://www.gov.uk/government/calls-for-evidence/call-for-views-on-the-code-of-practice-for-software-vendors">here</a> to read the Code of Practice for Software Vendors and click <a href="https://www.gov.uk/government/calls-for-evidence/call-for-views-on-the-cyber-security-of-ai">here</a> to read the Code of Practice on the Cyber Security of AI.</p>
<p><strong>Government issues cyber security standards for schools and colleges</strong></p>
<p>The Government has published guidance on standards that schools and colleges should meet in relation to cyber security and user accounts. This aims to mitigate the significant operational and financial impact that cyber incidents and attacks have on schools and colleges.</p>
<p>The Government guidance also refers to the Cyber Essentials certification programme, which aims to provide these organisations with increased assurance over the technical elements of cyber security. Whilst Cyber Essentials is not a requirement and is open to organisations across all sectors, schools and colleges are urged to complete it as part of their cyber security activities.</p>
<p>Click <a href="https://www.gov.uk/guidance/meeting-digital-and-technology-standards-in-schools-and-colleges/cyber-security-standards-for-schools-and-colleges?fhch=821d04dcb61b4651087c9328ae69c7b4">here</a> to read the government's guidance. Click <a href="https://www.ncsc.gov.uk/cyberessentials/overview">here</a> to read more about Cyber Essentials.</p>]]></content:encoded></item><item><guid isPermaLink="false">{0BC72BAF-2017-4C04-89DF-009A4897CDEB}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/cyber-bytes-issue-63/</link><title>Cyber_Bytes - Issue 63</title><description><![CDATA[<p><strong>UK Government publishes cyber security breaches survey 2024</strong></p>
<p>The UK government has published the results of a research study for UK cyber resilience. The study explores the policies, processes and approach to cyber security for 2,000 businesses, 1,004 charities and 430 educational institutions. The findings of the survey provides a description of the cyber security position of a representative sample of UK organisations, providing a snapshot of UK cyber resilience at this point in time.</p>
<p>Some interesting statistics include:</p>
<ol>
    <li>7.78 million cyber crimes of all types have been experienced by UK businesses in the last 12 months.</li>
    <li>32% of businesses are experiencing attempted attacks at least once a week.</li>
    <li>Malware impacted 17% of organisations that experienced a cyber incident.</li>
    <li>Phishing remains the top method of initial access, and the cause of 84% of cyber incidents.</li>
    <li>Just 22 % of businesses have a formal incident response plan in place.</li>
    <li>Just 11% of businesses say they review the risks posed by their immediate suppliers and only 6% are looking at their wider supply chain.</li>
</ol>
<p>It will be interesting to see how the final two points develop with upcoming EU's NIS2 Directive and Digital Operational Resilience Act (DORA) prompting affected UK businesses to focus further on cyber risk.</p>
<p>Click <a href="https://www.gov.uk/government/statistics/cyber-security-breaches-survey-2024/cyber-security-breaches-survey-2024">here</a> to read the full UK Government survey.</p>
<p><strong>ICO launches consultation on accuracy of generative AI models</strong></p>
<p>The ICO has announced the launch of the third chapter of its consultation series on generative AI, focussing on how the accuracy principle of data protection law applies to the outputs of generative AI models and the impact that accurate training data has on the output.</p>
<p>The consultation explains that the level of accuracy required of the outputs of generative AI models depends on how the model will be used, with high accuracy needed for models that are used to make decisions about people or that are relied on by users as a source of information. It also notes that organisations developing and using generative AI models that have a purely creative purpose are unlikely to need to ensure that the outputs are accurate as their first priority. For example, the consultation highlights that models used to triage customer queries would need to maintain higher accuracy than models used to help develop ideas for video game storylines.</p>
<p>Where an application based on generative AI is used by individuals in consumer-facing services, the ICO notes that application developer need to consider:</p>
<ul>
    <li>Providing clear information about the statistical accuracy of the application, and easily understandable information about appropriate usage; </li>
    <li>Monitoring user-generated content;</li>
    <li>User engagement research, to validate whether the information provided is understandable and followed by users;</li>
    <li>Labelling the outputs as generated by AI, or not factually accurate; and</li>
    <li>Providing information about the reliability of the output. </li>
</ul>
<p>Click <a href="https://ico.org.uk/about-the-ico/what-we-do/our-work-on-artificial-intelligence/generative-ai-third-call-for-evidence/">here</a> to read the full publication by the ICO.</p>
<p><strong>NCSC published new version of the Cyber Assessment Framework</strong></p>
<p>The NCSC has published an updated version of the Cyber Assessment Framework (CAF). This follows an increase in the cyber threat to critical national infrastructure.</p>
<p>The updated CAF covers the increased use of AI technologies and makes changes to the previous CAF in relation to remote access, privileged operations, user access levels and the use of multi-factor authentication. It has also been revised to improve navigation across the CAF collection and consolidate references to both internal NCSC and wider external guidance.</p>
<p>The update has been completed in full consultation with NIS regulators and other interested parties. The NCSC explains that they have also improved alignment with Cyber Essentials by mirroring some of its requirements while ensuring the existing outcome-focussed approach of the CAF is retained.</p>
<p>Click <a href="https://www.ncsc.gov.uk/blog-post/cyber-assessment-framework-3-2">here</a> to read the NCSC press release.</p>
<p><strong>CyberCube issues warning on increased cyberattacks targeting public sector</strong></p>
<p>CyberCube, an analytics platform which provides data-driven insights for the insurance industry, has raised the rising risk of cyberattacks targeting public sector institutions, particularly government and election systems. In anticipation of the upcoming global electoral events, the report, "Global Threat Outlook, H1 2024," urges government agencies to enhance cybersecurity defences "in 2024 and beyond".</p>
<p>The report also discusses eight sectors vulnerable to cyber threats (telecoms, IT, education, retail, arts & entertainment, financials services and healthcare). CyberCube underscores healthcare as the most susceptible to cyber threats.</p>
<p>CyberCube explains that sectors like banking and aviation are frequently targeted but they maintain robust cybersecurity making them slightly less susceptible to threats. Sectors such as mining and agriculture are found to be targeted less but still maintain high security standards in any event.</p>
<p>Click <a href="https://www.insurancebusinessmag.com/asia/news/cyber/cybercube-issues-warning-on-increased-cyberattacks-targeting-public-sector-485234.aspx">here</a> to read more from Insurance Business Magazine.</p>
<p><strong>ICO publishes guidance to improve transparency in health and social care</strong></p>
<p>The Information Commissioner's Office (ICO) has published new guidance on improving transparency in health and social care.</p>
<p>The health and social care sectors routinely handle sensitive information about the most intimate aspects of someone’s health, which is provided in confidence to trusted practitioners. Under data protection law, people have a right to know what is happening to their personal information, which is particularly important when accessing vital services.</p>
<p>The guidance has been prepared following receipt of feedback from a public consultation earlier this year to heath and social care organisations across the UK.</p>
<p>The guidance will help health and social care organisations to understand the definition of transparency and assess appropriate levels of transparency, as well as providing practical steps to developing effective transparency information. The guidance supplements existing ICO guidance on the principle of transparency and the right to be informed.</p>
<p>Click <a href="https://ico.org.uk/for-organisations/uk-gdpr-guidance-and-resources/data-protection-principles/transparency-in-health-and-social-care/">here</a> to read the guidance. Click <a href="https://ico.org.uk/about-the-ico/media-centre/news-and-blogs/2024/04/ico-publishes-guidance-to-improve-transparency-in-health-and-social-care">here</a> to read the associated ICO press release.</p>
<p><strong>International agencies publish joint guidance on securely deploying AI systems</strong></p>
<p>Global government security agencies, including the UK's NCSC, have published the joint Cybersecurity Information Sheet "Deploying AI Systems Securely".</p>
<p>The guidance provides best practices for deploying and operating externally developed AI systems and aims to:</p>
<ul>
    <li>improve the confidentiality, integrity, and availability of AI systems;</li>
    <li>ensure there are appropriate mitigations for known vulnerabilities in AI systems; and</li>
    <li>provide methodologies and controls to protect, detect and respond to malicious activity against AI systems and related data and services. </li>
</ul>
<p>The information sheet is for organisations deploying and operating externally developed AI systems on premises or in private cloud environments, especially those in high-threat and high-value environments. The sheet notes that each organisation should consider the guidance alongside their use case and threat profile.</p>
<p>Click <a href="https://media.defense.gov/2024/Apr/15/2003439257/-1/-1/0/CSI-DEPLOYING-AI-SYSTEMS-SECURELY.PDF">here</a> to read the CISA press release.</p>
<p><strong>European Supervisory Authorities (ESAs) consultation seeks views on draft regulatory technical standards under DORA</strong></p>
<p>The Digital Operational Resilience Act (DORA) (Regulation (EU) 2022/2554) introduces a pan-European oversight framework of ICT third-party service providers designated as critical (CTPPs). ESAs have been mandated, under DORA, to develop draft regulatory technical standards (RTS) to harmonise the conduct of oversight activities by competent authorities and the ESAs.</p>
<p>Under Article 41(1) of DORA, the draft RTS should specify:</p>
<ul>
    <li>the information to be provided by an ICT third–party service provider in the application for a voluntary request to be designated as critical;</li>
    <li>the information to be submitted by the ICT third–party service providers that is necessary for the Lead Overseer (who is appointed to conduct oversight of the assigned CTPPs and act as the primary point of contact for those CTPPs) to carry out its duties;</li>
    <li>the criteria for determining the composition of the joint examination team, their designation, tasks, and working arrangements;</li>
    <li>the details of the competent authorities’ assessment of the measures taken by CTPPs based on the recommendations of the Lead Overseer.</li>
</ul>
<p>The consultation seeks feedback, until 18 May 2024, on whether the content of the RTS is sufficiently clear and detailed, and whether respondents agree with the impact assessment and main conclusions stemming from it.</p>
<p>Click <a href="https://www.eiopa.europa.eu/document/download/6cd63dd5-c911-4585-86b8-cfa08eec67f2_en?filename=JC%202024%2024%20-%20Draft%20Consultation%20paper%20on%20the%20RTS%20on%20JETs.pdf">here</a> to view the consultation paper.</p>]]></description><pubDate>Fri, 10 May 2024 11:00:00 +0100</pubDate><category>Data and privacy</category><authors:names>Richard Breavington, Daniel Guilfoyle, Ian Dinning, Rachel Ford, Christopher Ashton, Elizabeth Zang, Emanuele Santella </authors:names><content:encoded><![CDATA[<p><strong>UK Government publishes cyber security breaches survey 2024</strong></p>
<p>The UK government has published the results of a research study for UK cyber resilience. The study explores the policies, processes and approach to cyber security for 2,000 businesses, 1,004 charities and 430 educational institutions. The findings of the survey provides a description of the cyber security position of a representative sample of UK organisations, providing a snapshot of UK cyber resilience at this point in time.</p>
<p>Some interesting statistics include:</p>
<ol>
    <li>7.78 million cyber crimes of all types have been experienced by UK businesses in the last 12 months.</li>
    <li>32% of businesses are experiencing attempted attacks at least once a week.</li>
    <li>Malware impacted 17% of organisations that experienced a cyber incident.</li>
    <li>Phishing remains the top method of initial access, and the cause of 84% of cyber incidents.</li>
    <li>Just 22 % of businesses have a formal incident response plan in place.</li>
    <li>Just 11% of businesses say they review the risks posed by their immediate suppliers and only 6% are looking at their wider supply chain.</li>
</ol>
<p>It will be interesting to see how the final two points develop with upcoming EU's NIS2 Directive and Digital Operational Resilience Act (DORA) prompting affected UK businesses to focus further on cyber risk.</p>
<p>Click <a href="https://www.gov.uk/government/statistics/cyber-security-breaches-survey-2024/cyber-security-breaches-survey-2024">here</a> to read the full UK Government survey.</p>
<p><strong>ICO launches consultation on accuracy of generative AI models</strong></p>
<p>The ICO has announced the launch of the third chapter of its consultation series on generative AI, focussing on how the accuracy principle of data protection law applies to the outputs of generative AI models and the impact that accurate training data has on the output.</p>
<p>The consultation explains that the level of accuracy required of the outputs of generative AI models depends on how the model will be used, with high accuracy needed for models that are used to make decisions about people or that are relied on by users as a source of information. It also notes that organisations developing and using generative AI models that have a purely creative purpose are unlikely to need to ensure that the outputs are accurate as their first priority. For example, the consultation highlights that models used to triage customer queries would need to maintain higher accuracy than models used to help develop ideas for video game storylines.</p>
<p>Where an application based on generative AI is used by individuals in consumer-facing services, the ICO notes that application developer need to consider:</p>
<ul>
    <li>Providing clear information about the statistical accuracy of the application, and easily understandable information about appropriate usage; </li>
    <li>Monitoring user-generated content;</li>
    <li>User engagement research, to validate whether the information provided is understandable and followed by users;</li>
    <li>Labelling the outputs as generated by AI, or not factually accurate; and</li>
    <li>Providing information about the reliability of the output. </li>
</ul>
<p>Click <a href="https://ico.org.uk/about-the-ico/what-we-do/our-work-on-artificial-intelligence/generative-ai-third-call-for-evidence/">here</a> to read the full publication by the ICO.</p>
<p><strong>NCSC published new version of the Cyber Assessment Framework</strong></p>
<p>The NCSC has published an updated version of the Cyber Assessment Framework (CAF). This follows an increase in the cyber threat to critical national infrastructure.</p>
<p>The updated CAF covers the increased use of AI technologies and makes changes to the previous CAF in relation to remote access, privileged operations, user access levels and the use of multi-factor authentication. It has also been revised to improve navigation across the CAF collection and consolidate references to both internal NCSC and wider external guidance.</p>
<p>The update has been completed in full consultation with NIS regulators and other interested parties. The NCSC explains that they have also improved alignment with Cyber Essentials by mirroring some of its requirements while ensuring the existing outcome-focussed approach of the CAF is retained.</p>
<p>Click <a href="https://www.ncsc.gov.uk/blog-post/cyber-assessment-framework-3-2">here</a> to read the NCSC press release.</p>
<p><strong>CyberCube issues warning on increased cyberattacks targeting public sector</strong></p>
<p>CyberCube, an analytics platform which provides data-driven insights for the insurance industry, has raised the rising risk of cyberattacks targeting public sector institutions, particularly government and election systems. In anticipation of the upcoming global electoral events, the report, "Global Threat Outlook, H1 2024," urges government agencies to enhance cybersecurity defences "in 2024 and beyond".</p>
<p>The report also discusses eight sectors vulnerable to cyber threats (telecoms, IT, education, retail, arts & entertainment, financials services and healthcare). CyberCube underscores healthcare as the most susceptible to cyber threats.</p>
<p>CyberCube explains that sectors like banking and aviation are frequently targeted but they maintain robust cybersecurity making them slightly less susceptible to threats. Sectors such as mining and agriculture are found to be targeted less but still maintain high security standards in any event.</p>
<p>Click <a href="https://www.insurancebusinessmag.com/asia/news/cyber/cybercube-issues-warning-on-increased-cyberattacks-targeting-public-sector-485234.aspx">here</a> to read more from Insurance Business Magazine.</p>
<p><strong>ICO publishes guidance to improve transparency in health and social care</strong></p>
<p>The Information Commissioner's Office (ICO) has published new guidance on improving transparency in health and social care.</p>
<p>The health and social care sectors routinely handle sensitive information about the most intimate aspects of someone’s health, which is provided in confidence to trusted practitioners. Under data protection law, people have a right to know what is happening to their personal information, which is particularly important when accessing vital services.</p>
<p>The guidance has been prepared following receipt of feedback from a public consultation earlier this year to heath and social care organisations across the UK.</p>
<p>The guidance will help health and social care organisations to understand the definition of transparency and assess appropriate levels of transparency, as well as providing practical steps to developing effective transparency information. The guidance supplements existing ICO guidance on the principle of transparency and the right to be informed.</p>
<p>Click <a href="https://ico.org.uk/for-organisations/uk-gdpr-guidance-and-resources/data-protection-principles/transparency-in-health-and-social-care/">here</a> to read the guidance. Click <a href="https://ico.org.uk/about-the-ico/media-centre/news-and-blogs/2024/04/ico-publishes-guidance-to-improve-transparency-in-health-and-social-care">here</a> to read the associated ICO press release.</p>
<p><strong>International agencies publish joint guidance on securely deploying AI systems</strong></p>
<p>Global government security agencies, including the UK's NCSC, have published the joint Cybersecurity Information Sheet "Deploying AI Systems Securely".</p>
<p>The guidance provides best practices for deploying and operating externally developed AI systems and aims to:</p>
<ul>
    <li>improve the confidentiality, integrity, and availability of AI systems;</li>
    <li>ensure there are appropriate mitigations for known vulnerabilities in AI systems; and</li>
    <li>provide methodologies and controls to protect, detect and respond to malicious activity against AI systems and related data and services. </li>
</ul>
<p>The information sheet is for organisations deploying and operating externally developed AI systems on premises or in private cloud environments, especially those in high-threat and high-value environments. The sheet notes that each organisation should consider the guidance alongside their use case and threat profile.</p>
<p>Click <a href="https://media.defense.gov/2024/Apr/15/2003439257/-1/-1/0/CSI-DEPLOYING-AI-SYSTEMS-SECURELY.PDF">here</a> to read the CISA press release.</p>
<p><strong>European Supervisory Authorities (ESAs) consultation seeks views on draft regulatory technical standards under DORA</strong></p>
<p>The Digital Operational Resilience Act (DORA) (Regulation (EU) 2022/2554) introduces a pan-European oversight framework of ICT third-party service providers designated as critical (CTPPs). ESAs have been mandated, under DORA, to develop draft regulatory technical standards (RTS) to harmonise the conduct of oversight activities by competent authorities and the ESAs.</p>
<p>Under Article 41(1) of DORA, the draft RTS should specify:</p>
<ul>
    <li>the information to be provided by an ICT third–party service provider in the application for a voluntary request to be designated as critical;</li>
    <li>the information to be submitted by the ICT third–party service providers that is necessary for the Lead Overseer (who is appointed to conduct oversight of the assigned CTPPs and act as the primary point of contact for those CTPPs) to carry out its duties;</li>
    <li>the criteria for determining the composition of the joint examination team, their designation, tasks, and working arrangements;</li>
    <li>the details of the competent authorities’ assessment of the measures taken by CTPPs based on the recommendations of the Lead Overseer.</li>
</ul>
<p>The consultation seeks feedback, until 18 May 2024, on whether the content of the RTS is sufficiently clear and detailed, and whether respondents agree with the impact assessment and main conclusions stemming from it.</p>
<p>Click <a href="https://www.eiopa.europa.eu/document/download/6cd63dd5-c911-4585-86b8-cfa08eec67f2_en?filename=JC%202024%2024%20-%20Draft%20Consultation%20paper%20on%20the%20RTS%20on%20JETs.pdf">here</a> to view the consultation paper.</p>]]></content:encoded></item><item><guid isPermaLink="false">{7445F8C9-0B56-47D2-9872-083B9BD752FA}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/cyber-bytes-issue-62/</link><title>Cyber_Bytes - Issue 62</title><description><![CDATA[<p><strong>ICO publishes new fining guidance</strong></p>
<p><strong></strong>The Information Commissioner’s Office has published new <a href="https://cy.ico.org.uk/about-the-ico/our-information/policies-and-procedures/data-protection-fining-guidance/">data protection fining guidance</a> setting out how it intends to issue penalties and calculate fines. This provides greater transparency for organisations on the ICO's likely approach to fines.</p>
<p>Amongst other things, the guidance covers:</p>
<ul>
    <li>The legal framework that gives the ICO the power to impose fines - making it easier to navigate the complexity of the legislation;</li>
    <li>The methodology the ICO will use to calculate the appropriate amount of the fine.</li>
    <li>The new guidance replaces the sections about penalty notices in the ICO Regulatory Action Policy published in November 2018 (access this here at pages 24 and 27).</li>
</ul>
<p>Click <a href="https://cy.ico.org.uk/about-the-ico/our-information/policies-and-procedures/data-protection-fining-guidance/">here</a> to read the guidance and <a href="https://cy.ico.org.uk/about-the-ico/media-centre/news-and-blogs/2024/03/ico-publishes-new-fining-guidance/">here</a> to read the associated press release.<br />
<br />
<strong>NCSC Head considers banning ransom payments</strong></p>
<p><strong></strong>Ciaran Martin, Chief Executive of the UK's National Cyber Security Centre (NCSC), has reignited discussions about the feasibility of implementing a legal prohibition on ransom payments in ransomware cases. Martin has highlighted the escalating threat of ransomware, labelling it as the most detrimental cyber menace to businesses presently. He emphasised the urgency of finding effective measures to enforce a ban on ransom payments.</p>
<p>Banning ransomware payments has been a contentious issue, with proponents advocating for its implementation to curtail cybercriminal activities. However, those who have seen businesses who would be forced into failure without payment can sometimes take a different view.</p>
<p>A recent report by Emsisoft emphasised the necessity of disrupting the financial incentives that drive ransomware attacks through a comprehensive ban on payments. The report concludes that "the only solution is to financially disincentivise attacks by completely prohibiting the payment of demands. At this point, a ban is the only approach that is likely to work… For as long as ransomware payments remain lawful, cyber criminals will do whatever it takes to collect them." By preventing victims from bowing to the demands of cyber-attackers, the profitability of ransomware schemes will decrease.</p>
<p>To read the Computer Weekly article, please click <a href="https://www.computerweekly.com/news/366572194/Banning-ransomware-payments-back-on-the-agenda">here</a>. To read the Emsisoft report, please click <a href="https://www.emsisoft.com/en/blog/44987/the-state-of-ransomware-in-the-u-s-report-and-statistics-2023/">here</a>.</p>
<p><strong>EDPB publishes opinion on the notion of a main establishment of a controller in the European Union</strong></p>
<p><strong></strong>The European Data Protection Board (EDPB) recently published an opinion addressing a query from the French Supervisory Authority regarding the interpretation of certain aspects of the General Data Protection Regulation (GDPR). The focus was on defining the "main establishment" of a data controller under Article 4(16)(a) GDPR and the criteria for applying the one-stop-shop mechanism, particularly concerning the controller’s "place of central administration" within the Union.</p>
<p>The EDPB clarified that for an establishment to qualify as the main establishment under Article 4(16)(a) GDPR, it must make decisions regarding the processing of personal data and possess the authority to implement these decisions. Furthermore, the one-stop-shop mechanism is applicable only if such decision-making authority is within an establishment in the Union.</p>
<p>The Board emphasised that controllers bear the burden of proving where processing decisions are made and where the power to implement them lies. It stressed the importance of cooperation with supervisory authorities in this regard. Supervisory authorities retain the right to challenge a controller's claim based on an objective assessment of the facts.</p>
<p>While identifying a central management place in the Union aids in pinpointing decision-making authority, further assessment is necessary to qualify an establishment as the main one. Supervisory authorities must ascertain where processing decisions are made and the power to implement them before determining a main establishment. This clarification aims to ensure consistent application of GDPR principles across the Union.</p>
<p>To read the EDPB's opinion in full, please click <a href="https://www.edpb.europa.eu/system/files/2024-02/edpb_opinion_202404_mainestablishment_en.pdf">here</a>.<br />
<br />
<strong>Increase in cyber security incidents involving electric vehicles and chargers</strong></p>
<p><strong></strong>From 2019 to 2023, disclosable cyber security incidents in the automotive and mobility sector increased by more than 50%, according to Israel-based firm Upstream.  In 2023, there were 295 incidents with bad actors accounting for 64% of these attacks and 65% originating from dark web cyber activities.</p>
<p>For electric vehicles (EVs), the connected charging network is a target.  Recently, the Office for Product Safety and Standards told Wallbox that its Internet-connected Copper SB EV home charger was not properly secured against hackers and couldn’t be sold.  Updated Copper SB EV chargers can still be sold until June 30, but the company has stopped marketing the device.</p>
<p>To read Autoweek's full article on the issue, please click <a href="https://www.autoweek.com/news/a46857624/cyberattacks-on-electric-vehicles-and-chargers/">here</a>.<br />
<br />
<strong>Warning by UK Minister for Artificial Intelligence on cyber defences</strong></p>
<p><strong></strong>The UK Minister for Artificial Intelligence has urged British businesses to bolster their cyber defences following new government data revealing that three-quarters of medium and large-sized businesses experienced cyber incidents in the past year. Additionally, nearly 80% of high-income charities faced security breaches, highlighting the growing threat posed by bad actors utilising AI to steal sensitive information and facilitate ransom schemes.</p>
<p>According to the insurer Hiscox, cyber-attacks on businesses have risen for 4 consecutive years. The government, in close collaboration with industry experts, is implementing measures such as the Cyber Governance Code of Practice to strengthen cyber protections.</p>
<p>To read the full City AM article, please click <a href="https://www.msn.com/en-us/money/companies/minister-cyber-brings-risks-we-can-t-ignore-with-uk-firms-still-vulnerable/ar-BB1kcwfd">here</a>.</p>]]></description><pubDate>Wed, 03 Apr 2024 10:15:00 +0100</pubDate><category>Data and privacy</category><authors:names>Richard Breavington, Daniel Guilfoyle, Ian Dinning, Rachel Ford, Christopher Ashton, Elizabeth Zang, Emanuele Santella </authors:names><content:encoded><![CDATA[<p><strong>ICO publishes new fining guidance</strong></p>
<p><strong></strong>The Information Commissioner’s Office has published new <a href="https://cy.ico.org.uk/about-the-ico/our-information/policies-and-procedures/data-protection-fining-guidance/">data protection fining guidance</a> setting out how it intends to issue penalties and calculate fines. This provides greater transparency for organisations on the ICO's likely approach to fines.</p>
<p>Amongst other things, the guidance covers:</p>
<ul>
    <li>The legal framework that gives the ICO the power to impose fines - making it easier to navigate the complexity of the legislation;</li>
    <li>The methodology the ICO will use to calculate the appropriate amount of the fine.</li>
    <li>The new guidance replaces the sections about penalty notices in the ICO Regulatory Action Policy published in November 2018 (access this here at pages 24 and 27).</li>
</ul>
<p>Click <a href="https://cy.ico.org.uk/about-the-ico/our-information/policies-and-procedures/data-protection-fining-guidance/">here</a> to read the guidance and <a href="https://cy.ico.org.uk/about-the-ico/media-centre/news-and-blogs/2024/03/ico-publishes-new-fining-guidance/">here</a> to read the associated press release.<br />
<br />
<strong>NCSC Head considers banning ransom payments</strong></p>
<p><strong></strong>Ciaran Martin, Chief Executive of the UK's National Cyber Security Centre (NCSC), has reignited discussions about the feasibility of implementing a legal prohibition on ransom payments in ransomware cases. Martin has highlighted the escalating threat of ransomware, labelling it as the most detrimental cyber menace to businesses presently. He emphasised the urgency of finding effective measures to enforce a ban on ransom payments.</p>
<p>Banning ransomware payments has been a contentious issue, with proponents advocating for its implementation to curtail cybercriminal activities. However, those who have seen businesses who would be forced into failure without payment can sometimes take a different view.</p>
<p>A recent report by Emsisoft emphasised the necessity of disrupting the financial incentives that drive ransomware attacks through a comprehensive ban on payments. The report concludes that "the only solution is to financially disincentivise attacks by completely prohibiting the payment of demands. At this point, a ban is the only approach that is likely to work… For as long as ransomware payments remain lawful, cyber criminals will do whatever it takes to collect them." By preventing victims from bowing to the demands of cyber-attackers, the profitability of ransomware schemes will decrease.</p>
<p>To read the Computer Weekly article, please click <a href="https://www.computerweekly.com/news/366572194/Banning-ransomware-payments-back-on-the-agenda">here</a>. To read the Emsisoft report, please click <a href="https://www.emsisoft.com/en/blog/44987/the-state-of-ransomware-in-the-u-s-report-and-statistics-2023/">here</a>.</p>
<p><strong>EDPB publishes opinion on the notion of a main establishment of a controller in the European Union</strong></p>
<p><strong></strong>The European Data Protection Board (EDPB) recently published an opinion addressing a query from the French Supervisory Authority regarding the interpretation of certain aspects of the General Data Protection Regulation (GDPR). The focus was on defining the "main establishment" of a data controller under Article 4(16)(a) GDPR and the criteria for applying the one-stop-shop mechanism, particularly concerning the controller’s "place of central administration" within the Union.</p>
<p>The EDPB clarified that for an establishment to qualify as the main establishment under Article 4(16)(a) GDPR, it must make decisions regarding the processing of personal data and possess the authority to implement these decisions. Furthermore, the one-stop-shop mechanism is applicable only if such decision-making authority is within an establishment in the Union.</p>
<p>The Board emphasised that controllers bear the burden of proving where processing decisions are made and where the power to implement them lies. It stressed the importance of cooperation with supervisory authorities in this regard. Supervisory authorities retain the right to challenge a controller's claim based on an objective assessment of the facts.</p>
<p>While identifying a central management place in the Union aids in pinpointing decision-making authority, further assessment is necessary to qualify an establishment as the main one. Supervisory authorities must ascertain where processing decisions are made and the power to implement them before determining a main establishment. This clarification aims to ensure consistent application of GDPR principles across the Union.</p>
<p>To read the EDPB's opinion in full, please click <a href="https://www.edpb.europa.eu/system/files/2024-02/edpb_opinion_202404_mainestablishment_en.pdf">here</a>.<br />
<br />
<strong>Increase in cyber security incidents involving electric vehicles and chargers</strong></p>
<p><strong></strong>From 2019 to 2023, disclosable cyber security incidents in the automotive and mobility sector increased by more than 50%, according to Israel-based firm Upstream.  In 2023, there were 295 incidents with bad actors accounting for 64% of these attacks and 65% originating from dark web cyber activities.</p>
<p>For electric vehicles (EVs), the connected charging network is a target.  Recently, the Office for Product Safety and Standards told Wallbox that its Internet-connected Copper SB EV home charger was not properly secured against hackers and couldn’t be sold.  Updated Copper SB EV chargers can still be sold until June 30, but the company has stopped marketing the device.</p>
<p>To read Autoweek's full article on the issue, please click <a href="https://www.autoweek.com/news/a46857624/cyberattacks-on-electric-vehicles-and-chargers/">here</a>.<br />
<br />
<strong>Warning by UK Minister for Artificial Intelligence on cyber defences</strong></p>
<p><strong></strong>The UK Minister for Artificial Intelligence has urged British businesses to bolster their cyber defences following new government data revealing that three-quarters of medium and large-sized businesses experienced cyber incidents in the past year. Additionally, nearly 80% of high-income charities faced security breaches, highlighting the growing threat posed by bad actors utilising AI to steal sensitive information and facilitate ransom schemes.</p>
<p>According to the insurer Hiscox, cyber-attacks on businesses have risen for 4 consecutive years. The government, in close collaboration with industry experts, is implementing measures such as the Cyber Governance Code of Practice to strengthen cyber protections.</p>
<p>To read the full City AM article, please click <a href="https://www.msn.com/en-us/money/companies/minister-cyber-brings-risks-we-can-t-ignore-with-uk-firms-still-vulnerable/ar-BB1kcwfd">here</a>.</p>]]></content:encoded></item><item><guid isPermaLink="false">{E1CBF893-8F2D-4D6B-B609-5E0D2855ECFC}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/cyber-bytes-issue-61/</link><title>Cyber_Bytes - Issue 61</title><description><![CDATA[<p><strong>NCSC reports on AI's role in escalating ransomware threats</strong></p>
<p>The National Cyber Security Centre (NCSC) has issued its two-year predictions related to the growing threat posed by the use of artificial intelligence (AI) in ransomware attacks. In a recent report, the NCSC highlights the increasingly sophisticated use of AI by cybercriminals to perpetrate ransomware attacks, signalling a concerning evolution in cyber warfare.</p>
<p>Some key areas where AI is predicted to make its mark are:</p>
<ul>
    <li>Enhancing social engineering methods by creating convincing interactions with victims;</li>
    <li>Assisting threat actors with identifying high-value assets for examination and exfiltration, intensifying the damage inflicted by ransomware attacks;</li>
    <li>By employing AI-driven techniques, attackers can create more convincing and targeted phishing campaigns, increasing the likelihood of successful breaches; and</li>
    <li>Assisting threat actors with malware and exploit development, vulnerability research and lateral movement.</li>
</ul>
<p>While the adoption of AI in cyber operations has traditionally been limited to well-resourced and highly skilled threat actors, the NCSC warns that the commoditisation of AI-enabled tools could lower the barrier to entry for less sophisticated cybercriminals. This trend poses significant challenges for cybersecurity professionals tasked with defending against evolving threats.</p>
<p>In response to these emerging risks, the NCSC emphasises the importance of proactive measures and collaboration across sectors to improve cyber resilience. By staying vigilant and implementing robust cybersecurity strategies, organisations can better defend against the escalating threat posed by AI-driven ransomware attacks.</p>
<p>Click <a href="https://www.ncsc.gov.uk/report/impact-of-ai-on-cyber-threat">here</a> to read the NCSC's report.</p>
<p><strong>EU lawmakers ratify political deal on artificial intelligence rules</strong></p>
<p>The European AI Act has been ratified as a provisional agreement by two key groups of lawmakers in the European Parliament ahead of a vote by the legislative assembly in April. The AI Act aims to set guidelines for AI technology used across multiple industries, from cars, to airline, to police services.</p>
<p>The legislation will also regulate foundational or generative artificial intelligence (AI) models, such as Microsoft-backed OpenAI. However, Big Tech firms remain concerned about the ambiguous language in some of the Act's requirements and the impact it may have on innovation.</p>
<p>The UK Government has recently confirmed that it is currently not intending to regulate AI specifically and will devolve responsibility to existing regulators.</p>
<p>Click <a href="https://www.reuters.com/technology/eu-lawmakers-back-political-deal-artificial-intelligence-rules-2024-02-13/">here</a> to read the full Thompson Reuters article.</p>
<p><strong>Global Operation Disrupts LockBit Ransomware Group</strong></p>
<p>In a coordinated effort led by international law enforcement agencies, a major operation claims to have caused a significant blow to the notorious LockBit ransomware group. The operation, dubbed "Operation Cronos", involved collaboration between the UK's National Crime Agency, the Federal Bureau of Investigation, Europol, and several other countries' authorities.</p>
<p>LockBit, is believed to be one of the world's largest criminal ransomware groups, whose activities have had far-reaching consequences, with high-profile attacks, including the UK's Royal Mail in January 2023.</p>
<p>Operation Cronos seized control of LockBit's infrastructure, including servers containing victim data, its leak site, communication servers, and file-share servers. Additionally, 11,000 domains associated with LockBit and its affiliates were seized.</p>
<p>The operation also resulted in the arrest of two LockBit actors in Poland and Ukraine, as well as the issuance of three international arrest warrants and five indictments by French and US authorities. One of the most significant achievements of Operation Cronos was the retrieval of decryption keys, allowing global law enforcement agencies to develop tools to recover files encrypted by LockBit ransomware.</p>
<p>However, cybersecurity experts remain cautious about the long-term impact of the takedown. While the operation might have dealt a blow to LockBit, the group has shown resilience in the past, and appears to be still functioning to at least some degree.  We have advised on ransomware claimed to be LockBit after the takedown and understand that the LockBit leak site is back up on the dark web. </p>
<p>Click <a href="https://www.bbc.co.uk/news/technology-68344987">here</a>, <a href="https://www.infosecurity-magazine.com/news/operation-cronos-lockbit-takedown/?utm_source=slipcase&utm_medium=affiliate&utm_campaign=slipcase">here</a> and <a href="https://www.insurancejournal.com/news/national/2024/02/20/761415.htm?utm_source=slipcase&utm_medium=affiliate&utm_campaign=slipcase">here</a> to read news articles by the BBC, Infosecurity Magazine and the Insurance Journal respectively.  </p>
<p><strong>ICO Greenlights Legal Services Certification Scheme</strong></p>
<p>The Information Commissioner’s Office (ICO) has given the green light to a new certification scheme tailored for legal service providers tasked with processing personal data. This move, introduced under the UK GDPR, aims to improve data protection standards and enhance trust among consumers.</p>
<p>Emily Keaney, ICO Deputy Commissioner, highlights the significance of such schemes in ensuring adherence to data protection standards, particularly for entities like law firms and barristers’ chambers which can handle large amounts of sensitive personal data.</p>
<p>According to Keaney, participation in the certification scheme provides legal service providers with assurance of their commitment to data protection principles, streamlining the assessment process for third-party data processors. Additionally, it offers clients peace of mind, demonstrating a firm’s dedication to safeguarding their personal information and upholding robust information security practices.</p>
<p>The newly approved scheme marks the fifth set of UK GDPR certification criteria approved by the ICO. In summary, firms will need to comply with the following requirements:</p>
<ul>
    <li>Develop and implement a comprehensive data protection training program for all staff, overseen by the Data Protection Officer (DPO).</li>
    <li>Establish procedures for handling complaints and conduct regular data protection audits, taking corrective actions as needed.</li>
    <li>Assess risks and implement measures to protect data in all processing activities, maintaining a register of risks and measures.</li>
    <li>Conduct Data Protection Impact Assessments (DPIA) before processing high-risk data, documenting assessments and regularly reviewing them.</li>
    <li>Document policies for all data processing activities, ensuring they follow a standard format, are easily accessible and are regularly updated using a change control policy.</li>
</ul>
<p>Click <a href="https://ico.org.uk/about-the-ico/media-centre/news-and-blogs/2024/02/ico-approves-legal-services-certification-scheme/">here</a> to read the ICO's statement.</p>
<p><strong>Solicitor fined for failing to spot Friday afternoon cyber fraud</strong></p>
<p>A solicitor agreed to pay £26,000 in fines and costs following orders by the Solicitors Disciplinary Tribunal (SDT) for failure to verify a clearly suspicious change of bank details of a client, which amounted to a payment diversion fraud. The solicitor also failed to inform their client of the payment diversion fraud promptly.</p>
<p>The incident involved interception of a conveyancing transaction email change by a subtle email address change. The payment diversion fraud involved £290,000 being transferred to a fraudulent account with the bank raising concerns about the recipient account two weeks later. The solicitor only became aware of the incident at this point.</p>
<p>Emphasising prevention, the SRA advises solicitors to train staff, educate clients, verify contact details and promptly report suspicious transactions.</p>
<p>
Click <a href="https://www.lawsociety.org.uk/topics/regulation/solicitor-fined-for-failing-to-spot-friday-afternoon-cyber-fraud?utm_source=professional_update&utm_medium=email&utm_campaign=PU-02%2F19%2F2024&sc_camp=C7F0003414AA4230C6194004E418ACD4">here</a> to read the full Law Society article. </p>
<p><strong>NCSC publishes vulnerability management guidance</strong></p>
<p>The National Cyber Security Centre (NCSC) has published guidance on vulnerability management. The NCSC points out that all systems contain vulnerabilities which may take the form of a configuration issue for system administrators to resolve, software defects to be resolved by a vendor update, or a vulnerability which the vendor is unaware exists. The NCSC suggests that vulnerability management should be seen as a process to assess how well an organisation’s software update process and security controls are performing.</p>
<p>The guidance sets out five principles to help organisations create an efficient vulnerability management process:</p>
<ol>
    <li>Policy to apply updates by default, preferably automatically</li>
    <li>Identify what systems and software are in place</li>
    <li>Triaging and prioritising vulnerabilities</li>
    <li>Take responsibility for risks of not updating</li>
    <li>Verify and regularly review vulnerability management processes</li>
</ol>
<p>Click <a href="https://www.ncsc.gov.uk/collection/vulnerability-management">here</a> to read the full guidance.</p>
<p><strong>The Growing Threat of Cyberattacks in the Automotive Industry: Protecting EV Charging Networks</strong></p>
<p>Recent findings from cybersecurity firm Upstream reveal a surprising 295 cybersecurity incidents in the automotive and mobility sector in 2023 alone. Most of these attacks were orchestrated by malicious actors, posing a significant threat to the security of mobility assets worldwide.</p>
<p>The rise of electric vehicles (EVs) has further compounded these risks, as modern vehicles, especially those with electric drivetrains, increasingly rely on software-driven systems, leaving them susceptible to a new wave of cyber threats.</p>
<p>Michael Austin, Senior Research Analyst for EVs and Mobility at Guidehouse Insights, highlights the disruptive nature of car hacks, emphasising that even minor incidents could have profound impacts on individuals’ lives.</p>
<p>In a recent development, concerns have been raised about the security of EV charging networks. The Office for Product Safety and Standards in Britain issued a warning regarding the vulnerability of an internet-connected home EV charger, which, if abused, could disrupt the UK's critical national infrastructure.</p>
<p>Richard Breavington, Partner and head of the Cyber and Tech insurance team at RPC, emphasises the need for a holistic approach to cybersecurity. He explains, “<em>Today’s story highlights that cybersecurity vulnerabilities are not always localised to computers and software,</em>” highlighting the necessity of comprehensive cybersecurity strategies that encompass all aspects of automotive technology.</p>
<p>Click <a href="https://www.autoweek.com/news/a46857624/cyberattacks-on-electric-vehicles-and-chargers/">here</a> to read the Autoweek news article.</p>]]></description><pubDate>Tue, 05 Mar 2024 09:41:00 Z</pubDate><category>Data and privacy</category><authors:names>Richard Breavington, Daniel Guilfoyle, Ian Dinning, Rachel Ford, Christopher Ashton, Elizabeth Zang, Emanuele Santella </authors:names><content:encoded><![CDATA[<p><strong>NCSC reports on AI's role in escalating ransomware threats</strong></p>
<p>The National Cyber Security Centre (NCSC) has issued its two-year predictions related to the growing threat posed by the use of artificial intelligence (AI) in ransomware attacks. In a recent report, the NCSC highlights the increasingly sophisticated use of AI by cybercriminals to perpetrate ransomware attacks, signalling a concerning evolution in cyber warfare.</p>
<p>Some key areas where AI is predicted to make its mark are:</p>
<ul>
    <li>Enhancing social engineering methods by creating convincing interactions with victims;</li>
    <li>Assisting threat actors with identifying high-value assets for examination and exfiltration, intensifying the damage inflicted by ransomware attacks;</li>
    <li>By employing AI-driven techniques, attackers can create more convincing and targeted phishing campaigns, increasing the likelihood of successful breaches; and</li>
    <li>Assisting threat actors with malware and exploit development, vulnerability research and lateral movement.</li>
</ul>
<p>While the adoption of AI in cyber operations has traditionally been limited to well-resourced and highly skilled threat actors, the NCSC warns that the commoditisation of AI-enabled tools could lower the barrier to entry for less sophisticated cybercriminals. This trend poses significant challenges for cybersecurity professionals tasked with defending against evolving threats.</p>
<p>In response to these emerging risks, the NCSC emphasises the importance of proactive measures and collaboration across sectors to improve cyber resilience. By staying vigilant and implementing robust cybersecurity strategies, organisations can better defend against the escalating threat posed by AI-driven ransomware attacks.</p>
<p>Click <a href="https://www.ncsc.gov.uk/report/impact-of-ai-on-cyber-threat">here</a> to read the NCSC's report.</p>
<p><strong>EU lawmakers ratify political deal on artificial intelligence rules</strong></p>
<p>The European AI Act has been ratified as a provisional agreement by two key groups of lawmakers in the European Parliament ahead of a vote by the legislative assembly in April. The AI Act aims to set guidelines for AI technology used across multiple industries, from cars, to airline, to police services.</p>
<p>The legislation will also regulate foundational or generative artificial intelligence (AI) models, such as Microsoft-backed OpenAI. However, Big Tech firms remain concerned about the ambiguous language in some of the Act's requirements and the impact it may have on innovation.</p>
<p>The UK Government has recently confirmed that it is currently not intending to regulate AI specifically and will devolve responsibility to existing regulators.</p>
<p>Click <a href="https://www.reuters.com/technology/eu-lawmakers-back-political-deal-artificial-intelligence-rules-2024-02-13/">here</a> to read the full Thompson Reuters article.</p>
<p><strong>Global Operation Disrupts LockBit Ransomware Group</strong></p>
<p>In a coordinated effort led by international law enforcement agencies, a major operation claims to have caused a significant blow to the notorious LockBit ransomware group. The operation, dubbed "Operation Cronos", involved collaboration between the UK's National Crime Agency, the Federal Bureau of Investigation, Europol, and several other countries' authorities.</p>
<p>LockBit, is believed to be one of the world's largest criminal ransomware groups, whose activities have had far-reaching consequences, with high-profile attacks, including the UK's Royal Mail in January 2023.</p>
<p>Operation Cronos seized control of LockBit's infrastructure, including servers containing victim data, its leak site, communication servers, and file-share servers. Additionally, 11,000 domains associated with LockBit and its affiliates were seized.</p>
<p>The operation also resulted in the arrest of two LockBit actors in Poland and Ukraine, as well as the issuance of three international arrest warrants and five indictments by French and US authorities. One of the most significant achievements of Operation Cronos was the retrieval of decryption keys, allowing global law enforcement agencies to develop tools to recover files encrypted by LockBit ransomware.</p>
<p>However, cybersecurity experts remain cautious about the long-term impact of the takedown. While the operation might have dealt a blow to LockBit, the group has shown resilience in the past, and appears to be still functioning to at least some degree.  We have advised on ransomware claimed to be LockBit after the takedown and understand that the LockBit leak site is back up on the dark web. </p>
<p>Click <a href="https://www.bbc.co.uk/news/technology-68344987">here</a>, <a href="https://www.infosecurity-magazine.com/news/operation-cronos-lockbit-takedown/?utm_source=slipcase&utm_medium=affiliate&utm_campaign=slipcase">here</a> and <a href="https://www.insurancejournal.com/news/national/2024/02/20/761415.htm?utm_source=slipcase&utm_medium=affiliate&utm_campaign=slipcase">here</a> to read news articles by the BBC, Infosecurity Magazine and the Insurance Journal respectively.  </p>
<p><strong>ICO Greenlights Legal Services Certification Scheme</strong></p>
<p>The Information Commissioner’s Office (ICO) has given the green light to a new certification scheme tailored for legal service providers tasked with processing personal data. This move, introduced under the UK GDPR, aims to improve data protection standards and enhance trust among consumers.</p>
<p>Emily Keaney, ICO Deputy Commissioner, highlights the significance of such schemes in ensuring adherence to data protection standards, particularly for entities like law firms and barristers’ chambers which can handle large amounts of sensitive personal data.</p>
<p>According to Keaney, participation in the certification scheme provides legal service providers with assurance of their commitment to data protection principles, streamlining the assessment process for third-party data processors. Additionally, it offers clients peace of mind, demonstrating a firm’s dedication to safeguarding their personal information and upholding robust information security practices.</p>
<p>The newly approved scheme marks the fifth set of UK GDPR certification criteria approved by the ICO. In summary, firms will need to comply with the following requirements:</p>
<ul>
    <li>Develop and implement a comprehensive data protection training program for all staff, overseen by the Data Protection Officer (DPO).</li>
    <li>Establish procedures for handling complaints and conduct regular data protection audits, taking corrective actions as needed.</li>
    <li>Assess risks and implement measures to protect data in all processing activities, maintaining a register of risks and measures.</li>
    <li>Conduct Data Protection Impact Assessments (DPIA) before processing high-risk data, documenting assessments and regularly reviewing them.</li>
    <li>Document policies for all data processing activities, ensuring they follow a standard format, are easily accessible and are regularly updated using a change control policy.</li>
</ul>
<p>Click <a href="https://ico.org.uk/about-the-ico/media-centre/news-and-blogs/2024/02/ico-approves-legal-services-certification-scheme/">here</a> to read the ICO's statement.</p>
<p><strong>Solicitor fined for failing to spot Friday afternoon cyber fraud</strong></p>
<p>A solicitor agreed to pay £26,000 in fines and costs following orders by the Solicitors Disciplinary Tribunal (SDT) for failure to verify a clearly suspicious change of bank details of a client, which amounted to a payment diversion fraud. The solicitor also failed to inform their client of the payment diversion fraud promptly.</p>
<p>The incident involved interception of a conveyancing transaction email change by a subtle email address change. The payment diversion fraud involved £290,000 being transferred to a fraudulent account with the bank raising concerns about the recipient account two weeks later. The solicitor only became aware of the incident at this point.</p>
<p>Emphasising prevention, the SRA advises solicitors to train staff, educate clients, verify contact details and promptly report suspicious transactions.</p>
<p>
Click <a href="https://www.lawsociety.org.uk/topics/regulation/solicitor-fined-for-failing-to-spot-friday-afternoon-cyber-fraud?utm_source=professional_update&utm_medium=email&utm_campaign=PU-02%2F19%2F2024&sc_camp=C7F0003414AA4230C6194004E418ACD4">here</a> to read the full Law Society article. </p>
<p><strong>NCSC publishes vulnerability management guidance</strong></p>
<p>The National Cyber Security Centre (NCSC) has published guidance on vulnerability management. The NCSC points out that all systems contain vulnerabilities which may take the form of a configuration issue for system administrators to resolve, software defects to be resolved by a vendor update, or a vulnerability which the vendor is unaware exists. The NCSC suggests that vulnerability management should be seen as a process to assess how well an organisation’s software update process and security controls are performing.</p>
<p>The guidance sets out five principles to help organisations create an efficient vulnerability management process:</p>
<ol>
    <li>Policy to apply updates by default, preferably automatically</li>
    <li>Identify what systems and software are in place</li>
    <li>Triaging and prioritising vulnerabilities</li>
    <li>Take responsibility for risks of not updating</li>
    <li>Verify and regularly review vulnerability management processes</li>
</ol>
<p>Click <a href="https://www.ncsc.gov.uk/collection/vulnerability-management">here</a> to read the full guidance.</p>
<p><strong>The Growing Threat of Cyberattacks in the Automotive Industry: Protecting EV Charging Networks</strong></p>
<p>Recent findings from cybersecurity firm Upstream reveal a surprising 295 cybersecurity incidents in the automotive and mobility sector in 2023 alone. Most of these attacks were orchestrated by malicious actors, posing a significant threat to the security of mobility assets worldwide.</p>
<p>The rise of electric vehicles (EVs) has further compounded these risks, as modern vehicles, especially those with electric drivetrains, increasingly rely on software-driven systems, leaving them susceptible to a new wave of cyber threats.</p>
<p>Michael Austin, Senior Research Analyst for EVs and Mobility at Guidehouse Insights, highlights the disruptive nature of car hacks, emphasising that even minor incidents could have profound impacts on individuals’ lives.</p>
<p>In a recent development, concerns have been raised about the security of EV charging networks. The Office for Product Safety and Standards in Britain issued a warning regarding the vulnerability of an internet-connected home EV charger, which, if abused, could disrupt the UK's critical national infrastructure.</p>
<p>Richard Breavington, Partner and head of the Cyber and Tech insurance team at RPC, emphasises the need for a holistic approach to cybersecurity. He explains, “<em>Today’s story highlights that cybersecurity vulnerabilities are not always localised to computers and software,</em>” highlighting the necessity of comprehensive cybersecurity strategies that encompass all aspects of automotive technology.</p>
<p>Click <a href="https://www.autoweek.com/news/a46857624/cyberattacks-on-electric-vehicles-and-chargers/">here</a> to read the Autoweek news article.</p>]]></content:encoded></item><item><guid isPermaLink="false">{6B626BAC-0852-4C7F-AD40-CAFDFF7B5604}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/cyber-bytes-issue-60/</link><title>Cyber_bytes - Issue 60</title><description><![CDATA[<p><strong>UK Government Faces Risk of Catastrophic Ransomware Attack, Parliamentary Committee Warns</strong></p>
<p>In the recently released report, "<em>A Hostage to Fortune: Ransomware and UK National Security</em>," the UK Parliamentary Joint Committee on National Security Strategy has issued a warning regarding the elevated risk of catastrophic ransomware attacks. The findings highlight the pressing need for improved planning, increased investment, and enhanced cybersecurity measures.</p>
<p>Key findings from the report:</p>
<ol style="margin-top: 0cm;">
    <li><em>Sophisticated Ransomware Landscape:</em> The report underscores the rise of a sophisticated ransomware ecosystem, with advanced malware becoming more easily accessible by criminals leading to potentially significant attacks.</li>
    <li><em>Critical Infrastructure Vulnerability:</em> Critical national infrastructure, particularly that relying on outdated legacy systems, remains highly susceptible to potential attacks. Supply chains are also identified as weak points, with the interconnectedness posing risks across multiple sectors.</li>
    <li><em>Challenges in Resilience Implementation:</em> Implementing cyber resilience measures involves practical challenges, emphasising the need for a cross-sector regulator. The government is urged to enhance oversight and establish effective regulatory measures to oversee cyber resilience upkeep and implementation.</li>
    <li><em>Support for Local Authorities:</em> Some local authorities lack active support in preventing and responding to cyber-attacks. The report calls for funding to establish a robust cyber resilience program for these entities.</li>
    <li><em>Support for the Wider Public Sector:</em> Ransomware victims, particularly smaller organisations, receive limited support from law enforcement. The report proposes funding for the National Cyber Security Centre and National Crime Agency to offer negotiation and recovery services for public sector victims.</li>
</ol>
<p>In response to the report's findings, businesses in the UK are urged to take immediate action to enhance their cybersecurity measures. This includes the critical need for regular assessment and upgrading of cybersecurity protocols, especially within sectors constituting critical national infrastructure. Allocating resources to modernise legacy infrastructure, particularly in areas vulnerable to cyber threats, is highlighted as a crucial step. Additionally, businesses are advised to ensure compliance with the 2018 Network and Information System Regulations and prepare for upcoming cyber resilience standards for critical national infrastructure by 2025. The active participation in the National Exercise Programme is recommended to effectively prepare for the potential impact of a major national ransomware attack.</p>
<p>Click <strong><a href="https://committees.parliament.uk/publications/42493/documents/211438/default/">here</a></strong> to read the Parliamentary Committee's report.</p>
<p><strong>RUSI's In-Depth Analysis on Cyber Insurance's Impact</strong></p>
<p>A recent report by the Royal United Services Institute (RUSI) sheds light on the growing threat of ransomware and emphasises the need for robust cybersecurity measures.</p>
<p>The key points raised in the report include:</p>
<ul style="margin-top: 0cm; list-style-type: disc;">
    <li>Ransomware-as-a-service (RaaS), a model where criminals sell or rent ransomware to affiliates, is on the rise. These affiliates, equipped with RaaS tools, are responsible for executing ransomware attacks. The report underscores the need for a collective response to tackle this evolving threat.</li>
    <li>The report explores the role of cyber insurance in dealing with ransomware incidents. While cyber insurance is not seen as fuelling the ransomware epidemic, it is criticised for not instilling satisfactory ransom discipline among insureds. The low market penetration of cyber insurance outside the U.S. poses a challenge in improving cybersecurity practices on a broader scale.</li>
    <li>RUSI recommends several measures to enhance collaboration between the cyber insurance industry, government agencies, and law enforcement. It suggests tougher policy language mandating the sharing of forensic reports with insurers and the distribution of threat intelligence and government services through insurers. Additionally, there's a call for increased reporting of ransom payments via insurers to improve policy development and law enforcement efforts.</li>
    <li>The report delves into incident response services provided by cyber insurance policies, including legal counsel, digital forensics, crisis management, and more. Different models, such as lawyer-led, insurer-led, and those led by insurer-owned incident response firms, are discussed, highlighting the various approaches insurers take in responding to ransomware incidents.</li>
</ul>
<p>The report contains recommendations to UK policymakers. These include:</p>
<ol style="margin-top: 0cm;">
    <li><strong>Enhanced Oversight:</strong> Insurers should mandate written evidence of negotiation strategies and outcomes, fostering transparency and oversight.</li>
    <li><strong>Best Practices Development:</strong> Select ransomware response firms based on predefined criteria, including a proven track record, operational relationships with law enforcement, and compliance with anti-money laundering laws and FATF (Financial Action Task Force) standards.</li>
    <li><strong>Government-led Study:</strong> Commission a study to understand specialist ransomware response firms better, identifying best practices and fostering industry-wide benchmarking.</li>
    <li><strong>Licensing Regime:</strong> Explore a dedicated licensing regime for firms facilitating cryptocurrency payments. Ensure registration as money service businesses, aligning with national financial crime reporting requirements.</li>
    <li><strong>Market-wide Consensus:</strong> Collaborate to establish a market-wide consensus on conditions and obligations before considering whether to meet a ransom demand.</li>
    <li><strong>Reporting Obligations: </strong>Requiring policyholders to notify Action Fraud and the NCSC before paying a ransom. Regulators should intervene if necessary.</li>
    <li><strong>Integration of NCSC's Early Warning Service:</strong> Trial integration of the NCSC's Early Warning service into ongoing assessments of policyholders, enabling the distribution of intelligence at scale.</li>
    <li><strong>Operational Collaboration:</strong> Recruit secondees from the cyber insurance industry into the NCSC-led Industry100 cybersecurity secondment initiative, fostering deeper operational collaboration.</li>
    <li><strong>Financial Crime Reporting:</strong> Ensure existing financial crime reporting mechanisms are suitable for reporting ransom payments. Encourage cyber insurers to report ransom payments via the NCSC's or other channels.</li>
</ol>
<p>Click <strong><a href="https://static.rusi.org/OP-cyber-insurance-ransomware-challenge-web-final.pdf">here</a></strong> to read RUSI's report.</p>
<p><strong>RPC Annual Insurance Review – Cyber</strong></p>
<p>RPC has now published its Annual Insurance Review, outlining the events that shaped the insurance market in 2023 and discussing what to expect in 2024.</p>
<p>In the chapter focusing on Cyber, RPC looks at the following:</p>
<ul style="margin-top: 0cm; list-style-type: disc;">
    <li>The European and UK cybersecurity regulatory landscape expanded significantly, notably with the introduction of the NIS2 Directive at European level and the passing of the Online Safety Act 2023 in the UK. The NIS2 Directive broadens the scope of network security obligation requirements on to social network platforms, data centres, and managed service providers.  Whilst not implemented into UK law yet, NIS2 will have a direct impact on UK organisations offering services in Europe.  Also, Online Safety Act 2023 seeks to regulate online speech and media over user-generated content.  This will directly impact social media platforms and websites which allow user comments.</li>
    <li>Looking at 2024, organisations can anticipate increased scrutiny on basic security protocols amidst rising cyber threats. Ransomware incidents and business email compromises continue to surge, prompting a focus on implementing stronger cyber resilience measures. Cyber insurance underwriters are emphasising the need for security assessments, with regulators highlighting the importance of enhanced measures to protect personal data. This reflects a growing emphasis on elevated security standards across the market in light of ever-ingenious cyber-attacks.</li>
</ul>
<p>Click <strong><a href="https://www.rpc.co.uk/-/media/rpc/files/perspectives/insurance-reviews/23174_a4pb_annual_insurance_review_2024_whole_book_d5.pdf">here</a></strong> to read RPC's Annual Report.<br />
<br />
<strong>Ransomware 2024: Exploiting Vulnerabilities, Law Enforcement Challenges, and Dark AI Risks</strong></p>
<p>The cyber security consultancy firm S-RM has published an article outlining key cyber trends to watch out for in 2024. These centre around ransomware incidents whose frequency is not expected to abate. </p>
<ol style="margin-top: 0cm;">
    <li><strong>Exploitation of Software Vulnerabilities:</strong> Ransomware groups, focusing on exploiting software vulnerabilities, are anticipated to persist. The automation of exploitation before system patches is a growing concern, exemplified by the mass exploitation of vulnerabilities over 2023 in platforms like Atlassian Confluence and Citrix NetScaler.</li>
    <li><strong>Law Enforcement Actions</strong>: While law enforcement made strides in 2023 targeting ransomware groups like Ragnar Locker and ALPHV, the continuous rebranding and re-emergence of these groups post-takedowns suggests a need for sustained global efforts. Sanctions and disrupting flow of funds are strategies expected to be adopted at national level.</li>
    <li><strong>Evading Defences:</strong> Ransomware groups are likely to enhance methods of bypassing traditional security solutions, such as multifactor authentication (MFA) and endpoint detection and response (EDR). The acquisition of security tools for testing bypasses in dummy environments demonstrates their increasing sophistication.</li>
</ol>
<p>Additionally, the migration of cybercrime to the Cloud is a cause for concern, emphasising the need for robust security measures and data backup strategies in cloud-based environments. Lastly, the use of AI in cybercrime, with the dark web featuring "Dark AI" models for malicious purposes, is expected to gain prominence, posing challenges to organisations in combating sophisticated attacks. Overall, businesses are urged to stay on top of the dynamic cyber threat landscape and fortify their defences accordingly.</p>
<span>Click <strong><a href="https://www.s-rminform.com/latest-insights/whats-next-in-ir-4-key-trends-to-watch-out-for-in-2024">here</a></strong> to read S-RM's article.</span>]]></description><pubDate>Tue, 06 Feb 2024 11:13:00 Z</pubDate><category>Data and privacy</category><authors:names>Richard Breavington, Daniel Guilfoyle, Ian Dinning, Rachel Ford, Christopher Ashton, Elizabeth Zang, Emanuele Santella </authors:names><content:encoded><![CDATA[<p><strong>UK Government Faces Risk of Catastrophic Ransomware Attack, Parliamentary Committee Warns</strong></p>
<p>In the recently released report, "<em>A Hostage to Fortune: Ransomware and UK National Security</em>," the UK Parliamentary Joint Committee on National Security Strategy has issued a warning regarding the elevated risk of catastrophic ransomware attacks. The findings highlight the pressing need for improved planning, increased investment, and enhanced cybersecurity measures.</p>
<p>Key findings from the report:</p>
<ol style="margin-top: 0cm;">
    <li><em>Sophisticated Ransomware Landscape:</em> The report underscores the rise of a sophisticated ransomware ecosystem, with advanced malware becoming more easily accessible by criminals leading to potentially significant attacks.</li>
    <li><em>Critical Infrastructure Vulnerability:</em> Critical national infrastructure, particularly that relying on outdated legacy systems, remains highly susceptible to potential attacks. Supply chains are also identified as weak points, with the interconnectedness posing risks across multiple sectors.</li>
    <li><em>Challenges in Resilience Implementation:</em> Implementing cyber resilience measures involves practical challenges, emphasising the need for a cross-sector regulator. The government is urged to enhance oversight and establish effective regulatory measures to oversee cyber resilience upkeep and implementation.</li>
    <li><em>Support for Local Authorities:</em> Some local authorities lack active support in preventing and responding to cyber-attacks. The report calls for funding to establish a robust cyber resilience program for these entities.</li>
    <li><em>Support for the Wider Public Sector:</em> Ransomware victims, particularly smaller organisations, receive limited support from law enforcement. The report proposes funding for the National Cyber Security Centre and National Crime Agency to offer negotiation and recovery services for public sector victims.</li>
</ol>
<p>In response to the report's findings, businesses in the UK are urged to take immediate action to enhance their cybersecurity measures. This includes the critical need for regular assessment and upgrading of cybersecurity protocols, especially within sectors constituting critical national infrastructure. Allocating resources to modernise legacy infrastructure, particularly in areas vulnerable to cyber threats, is highlighted as a crucial step. Additionally, businesses are advised to ensure compliance with the 2018 Network and Information System Regulations and prepare for upcoming cyber resilience standards for critical national infrastructure by 2025. The active participation in the National Exercise Programme is recommended to effectively prepare for the potential impact of a major national ransomware attack.</p>
<p>Click <strong><a href="https://committees.parliament.uk/publications/42493/documents/211438/default/">here</a></strong> to read the Parliamentary Committee's report.</p>
<p><strong>RUSI's In-Depth Analysis on Cyber Insurance's Impact</strong></p>
<p>A recent report by the Royal United Services Institute (RUSI) sheds light on the growing threat of ransomware and emphasises the need for robust cybersecurity measures.</p>
<p>The key points raised in the report include:</p>
<ul style="margin-top: 0cm; list-style-type: disc;">
    <li>Ransomware-as-a-service (RaaS), a model where criminals sell or rent ransomware to affiliates, is on the rise. These affiliates, equipped with RaaS tools, are responsible for executing ransomware attacks. The report underscores the need for a collective response to tackle this evolving threat.</li>
    <li>The report explores the role of cyber insurance in dealing with ransomware incidents. While cyber insurance is not seen as fuelling the ransomware epidemic, it is criticised for not instilling satisfactory ransom discipline among insureds. The low market penetration of cyber insurance outside the U.S. poses a challenge in improving cybersecurity practices on a broader scale.</li>
    <li>RUSI recommends several measures to enhance collaboration between the cyber insurance industry, government agencies, and law enforcement. It suggests tougher policy language mandating the sharing of forensic reports with insurers and the distribution of threat intelligence and government services through insurers. Additionally, there's a call for increased reporting of ransom payments via insurers to improve policy development and law enforcement efforts.</li>
    <li>The report delves into incident response services provided by cyber insurance policies, including legal counsel, digital forensics, crisis management, and more. Different models, such as lawyer-led, insurer-led, and those led by insurer-owned incident response firms, are discussed, highlighting the various approaches insurers take in responding to ransomware incidents.</li>
</ul>
<p>The report contains recommendations to UK policymakers. These include:</p>
<ol style="margin-top: 0cm;">
    <li><strong>Enhanced Oversight:</strong> Insurers should mandate written evidence of negotiation strategies and outcomes, fostering transparency and oversight.</li>
    <li><strong>Best Practices Development:</strong> Select ransomware response firms based on predefined criteria, including a proven track record, operational relationships with law enforcement, and compliance with anti-money laundering laws and FATF (Financial Action Task Force) standards.</li>
    <li><strong>Government-led Study:</strong> Commission a study to understand specialist ransomware response firms better, identifying best practices and fostering industry-wide benchmarking.</li>
    <li><strong>Licensing Regime:</strong> Explore a dedicated licensing regime for firms facilitating cryptocurrency payments. Ensure registration as money service businesses, aligning with national financial crime reporting requirements.</li>
    <li><strong>Market-wide Consensus:</strong> Collaborate to establish a market-wide consensus on conditions and obligations before considering whether to meet a ransom demand.</li>
    <li><strong>Reporting Obligations: </strong>Requiring policyholders to notify Action Fraud and the NCSC before paying a ransom. Regulators should intervene if necessary.</li>
    <li><strong>Integration of NCSC's Early Warning Service:</strong> Trial integration of the NCSC's Early Warning service into ongoing assessments of policyholders, enabling the distribution of intelligence at scale.</li>
    <li><strong>Operational Collaboration:</strong> Recruit secondees from the cyber insurance industry into the NCSC-led Industry100 cybersecurity secondment initiative, fostering deeper operational collaboration.</li>
    <li><strong>Financial Crime Reporting:</strong> Ensure existing financial crime reporting mechanisms are suitable for reporting ransom payments. Encourage cyber insurers to report ransom payments via the NCSC's or other channels.</li>
</ol>
<p>Click <strong><a href="https://static.rusi.org/OP-cyber-insurance-ransomware-challenge-web-final.pdf">here</a></strong> to read RUSI's report.</p>
<p><strong>RPC Annual Insurance Review – Cyber</strong></p>
<p>RPC has now published its Annual Insurance Review, outlining the events that shaped the insurance market in 2023 and discussing what to expect in 2024.</p>
<p>In the chapter focusing on Cyber, RPC looks at the following:</p>
<ul style="margin-top: 0cm; list-style-type: disc;">
    <li>The European and UK cybersecurity regulatory landscape expanded significantly, notably with the introduction of the NIS2 Directive at European level and the passing of the Online Safety Act 2023 in the UK. The NIS2 Directive broadens the scope of network security obligation requirements on to social network platforms, data centres, and managed service providers.  Whilst not implemented into UK law yet, NIS2 will have a direct impact on UK organisations offering services in Europe.  Also, Online Safety Act 2023 seeks to regulate online speech and media over user-generated content.  This will directly impact social media platforms and websites which allow user comments.</li>
    <li>Looking at 2024, organisations can anticipate increased scrutiny on basic security protocols amidst rising cyber threats. Ransomware incidents and business email compromises continue to surge, prompting a focus on implementing stronger cyber resilience measures. Cyber insurance underwriters are emphasising the need for security assessments, with regulators highlighting the importance of enhanced measures to protect personal data. This reflects a growing emphasis on elevated security standards across the market in light of ever-ingenious cyber-attacks.</li>
</ul>
<p>Click <strong><a href="https://www.rpc.co.uk/-/media/rpc/files/perspectives/insurance-reviews/23174_a4pb_annual_insurance_review_2024_whole_book_d5.pdf">here</a></strong> to read RPC's Annual Report.<br />
<br />
<strong>Ransomware 2024: Exploiting Vulnerabilities, Law Enforcement Challenges, and Dark AI Risks</strong></p>
<p>The cyber security consultancy firm S-RM has published an article outlining key cyber trends to watch out for in 2024. These centre around ransomware incidents whose frequency is not expected to abate. </p>
<ol style="margin-top: 0cm;">
    <li><strong>Exploitation of Software Vulnerabilities:</strong> Ransomware groups, focusing on exploiting software vulnerabilities, are anticipated to persist. The automation of exploitation before system patches is a growing concern, exemplified by the mass exploitation of vulnerabilities over 2023 in platforms like Atlassian Confluence and Citrix NetScaler.</li>
    <li><strong>Law Enforcement Actions</strong>: While law enforcement made strides in 2023 targeting ransomware groups like Ragnar Locker and ALPHV, the continuous rebranding and re-emergence of these groups post-takedowns suggests a need for sustained global efforts. Sanctions and disrupting flow of funds are strategies expected to be adopted at national level.</li>
    <li><strong>Evading Defences:</strong> Ransomware groups are likely to enhance methods of bypassing traditional security solutions, such as multifactor authentication (MFA) and endpoint detection and response (EDR). The acquisition of security tools for testing bypasses in dummy environments demonstrates their increasing sophistication.</li>
</ol>
<p>Additionally, the migration of cybercrime to the Cloud is a cause for concern, emphasising the need for robust security measures and data backup strategies in cloud-based environments. Lastly, the use of AI in cybercrime, with the dark web featuring "Dark AI" models for malicious purposes, is expected to gain prominence, posing challenges to organisations in combating sophisticated attacks. Overall, businesses are urged to stay on top of the dynamic cyber threat landscape and fortify their defences accordingly.</p>
<span>Click <strong><a href="https://www.s-rminform.com/latest-insights/whats-next-in-ir-4-key-trends-to-watch-out-for-in-2024">here</a></strong> to read S-RM's article.</span>]]></content:encoded></item><item><guid isPermaLink="false">{B8EB5045-F5F6-4866-AF9B-920FE654D0CD}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/cyber-bytes-issue-59/</link><title>Cyber_Bytes - Issue 59</title><description><![CDATA[<p><strong>NCSC Annual Review: UK's critical infrastructure faces enduring cyber threats</strong></p>
<p>The National Cyber Security Centre (NCSC) has issued its seventh Annual Review, underscoring key developments, achievements and trends from the past year.</p>
<p>The first chapter of the report discusses threats and risks. This chapter describes an increase in state-aligned groups and aggressive cyber activities, emphasising the need for enhanced cyber resilience in state infrastructure. The NCSC's Incident Management team, who deal with incidents of national significance to the UK, have experienced an increase in reports of cyber incidents in the UK last year of over 64%.</p>
<p>The second chapter of the report discusses resilience and how the NCSC supports the public and private sector to raise awareness about cyber threats and improve resilience generally. This chapter includes an interesting case study about work that has been carried out to bolster the security of the UK's Critical National Infrastructure. There is another case study on the threat of cyber interference that could influence democratic processes such as the next general election. This case study notes that the government has established the Joint Election Security Preparedness Unit to be responsible for coordinating electoral security.</p>
<p>The third chapter of the report discusses the growth of the cyber security market and the NCSC's initiatives to accommodate this.</p>
<p>The fourth chapter of the report discusses the development of technology and the risks associated with such developments. While AI is discussed, the NCSC highlights other advancements that have not been in the headlines as often such as semiconductors, quantum computing, cryptography and radio frequency transmissions.</p>
<p>The NCSC's CEO, Lindy Cameron notes in her foreword that the five main areas of specific interest to the NCSC over the past year has been:</p>
<ol>
    <li>AI cyber security</li>
    <li>Securing the UK's critical national infrastructure</li>
    <li>Defending the UK's democratic processes</li>
    <li>The future of UK cyber security services (including the NCSC's role in their provision)</li>
    <li>Lessons learned from the invasion of Ukraine</li>
</ol>
<p>The NCSC's focus over the coming year will be:</p>
<ol>
    <li>Improving the UK's cyber resilience by improving understanding of threats for both businesses and national infrastructure</li>
    <li>Ensuring that future technology shifts are deployed securely to counteract threats that take advantage of such developments</li>
    <li>Growing the NCSC's expertise</li>
</ol>
<p>Click <a href="https://www.ncsc.gov.uk/files/Annual_Review_2023.pdf">here</a> to read the full 2023 Annual Review published by the NCSC.</p>
<p><strong>Booking.com scam emails threaten hotel reservations</strong></p>
<p>Travellers using Booking.com faced a new threat this month as scam emails were circulated, falsely claiming to be from the popular hotel booking platform. Users report receiving convincing emails, allegedly from <a href="mailto:noreply@booking.com">noreply@booking.com</a>, urging them to confirm hotel payments or risk reservation cancellations. The emails contain personal details, which add to their apparent authenticity.</p>
<p>There have been instances of compromised reservations and unauthorised charges raising concerns. Some customers who followed instructions contained in scam emails might also have unknowingly exposed their bank card details in the process.</p>
<p>Booking.com denies that the issue originates from their systems and emphasises its commitment to safety. The company attributes the issue to sophisticated phishing tactics affecting partner hotels. Users are urged to verify emails, contact Booking.com directly, and scrutinise payment policies of the accommodation that they have booked.</p>
<p>Click <a href="https://www.theguardian.com/money/2023/oct/23/bookingcom-customers-targeted-by-scam-confirmation-emails">here</a> to read the Guardian's full news article.</p>
<p><strong>Ransomware group reports victim to SEC for non-compliance</strong></p>
<p>In a surprising move, the prolific ransomware group AlphV has escalated pressure on one of its victims in the US, publicly traded digital lending company MeridianLink, by reporting the breach to the US Securities and Exchange Commission (SEC). AlphV claims MeridianLink failed to comply with upcoming SEC rules mandating disclosure of cybersecurity incidents within four days of discovery. AlphV's complaint to the SEC was posted on the dark web after it had been made. Although the rules are not yet in effect, the ransomware group accuses MeridianLink of a "material misstatement" for not disclosing a significant breach compromising customer data and operational information.</p>
<p>The tactic is an attempt to exploit industry-wide anxiety following the SEC's recent enforcement action against SolarWinds' Chief Information Security Officer. While MeridianLink confirms a "cybersecurity incident," it asserts that there has been no evidence of unauthorised access to production platforms and minimal business interruption. This incident highlights the evolving strategies of ransomware groups.</p>
<p>Click <a href="https://arstechnica.com/security/2023/11/ransomware-group-reports-victim-it-breached-to-sec-regulators/">here</a> to read Ars Technica's news article.</p>
<p><strong>Information Commissioner seeks appeal in Clearview AI case</strong></p>
<p>The UK Information Commissioner is seeking permission to appeal the 2022 judgment by the First Tier Tribunal relating to Clearview AI Inc. That tribunal decision overturned the ICO's decision to issue a fine of £7.5 million and enforcement notice to the company.</p>
<p>The principal point of contention concerned the ICO's jurisdiction to issue the enforcement and penalty notices to Clearview. Clearview succeeded in appealing against the ICO's fines and enforcement action because it was used by law enforcement outside the UK. The three-member tribunal hearing the appeal concluded that although Clearview did carry out data processing related to monitoring behaviour of people in the UK, this fell outside of the ICO's jurisdiction.</p>
<p>The ICO are appealing the decision on the basis that the law was misinterpreted. The ICO's view is that Clearview was not processing for foreign law enforcement purposes and should not be considered as outside the scope of UK law.</p>
<p>John Edwards, UK Information Commissioner, emphasised the need to protect the data rights of UK citizens amid the alleged widespread impact of Clearview's mass scraping of personal information. The appeal aims to address whether commercial enterprises, profiting from processing digital images of UK individuals, can rightfully claim engagement in "law enforcement."</p>
<p>Click <a href="https://assets.caselaw.nationalarchives.gov.uk/ukftt/grc/2023/819/ukftt_grc_2023_819.pdf">here</a> for the full judgment and for more on the appeal <a href="https://ico.org.uk/about-the-ico/media-centre/news-and-blogs/2023/11/information-commissioner-seeks-permission-to-appeal-clearview-ai-inc-ruling/">here</a>.</p>
<p><strong>ICO and EDPS strengthen collaboration with Memorandum of Understanding</strong></p>
<p>The UK ICO and the European Data Protection Supervisor (EDPS) have formalised their collaboration through a Memorandum of Understanding (MoU).<br />
This agreement solidifies their joint commitment to protecting individuals' data rights and privacy, emphasising international cooperation. The MoU outlines how the authorities will share experiences, best practices, and information, promoting dialogue among data protection authorities and digital regulators. The collaboration builds on their active participation in global forums. John Edwards, UK Information Commissioner, sees the MoU as enhancing existing collaboration, offering pragmatic solutions to support organisations while upholding individuals' information rights. Wojciech Wiewiórowski, European Data Protection Supervisor, emphasises the concrete plans to prioritise fundamental rights across the EU and the UK. The MoU aligns with legal responsibilities and underscores the commitment to safeguarding personal data amidst digital innovation.</p>
<p>Click <a href="https://ico.org.uk/about-the-ico/media-centre/news-and-blogs/2023/11/ico-and-european-data-protection-supervisor-edps-sign-memorandum-of-understanding/">here</a> to read the ICO's news story.</p>
<p><strong>Former NHS secretary fined for illegally accessing patient records</strong></p>
<p>Loretta Alborghetti, a former NHS medical secretary, has been found guilty and fined for unlawfully accessing the medical records of over 150 people. The breach occurred during her tenure in the Ophthalmology department at Worcestershire Acute Hospitals NHS Trust.</p>
<p>An investigation revealed Alborghetti's unauthorised access to patient records, with 156 records viewed over 1800 times within three months. Despite her role requiring access to specific patient information, the accessed records pertained to individuals unrelated to ophthalmology. Alborghetti pleaded guilty to unlawfully obtaining personal data, resulting in a fine of £648 following the ICO's investigation.</p>
<p>Click <a href="https://ico.org.uk/about-the-ico/media-centre/news-and-blogs/2023/11/former-nhs-secretary-found-guilty-of-illegally-accessing-medical-records/">here</a> to read the ICO's news story.</p>]]></description><pubDate>Fri, 08 Dec 2023 13:47:00 Z</pubDate><category>Data and privacy</category><authors:names>Richard Breavington, Daniel Guilfoyle, Ian Dinning, Rachel Ford, Christopher Ashton, Elizabeth Zang, Emanuele Santella </authors:names><content:encoded><![CDATA[<p><strong>NCSC Annual Review: UK's critical infrastructure faces enduring cyber threats</strong></p>
<p>The National Cyber Security Centre (NCSC) has issued its seventh Annual Review, underscoring key developments, achievements and trends from the past year.</p>
<p>The first chapter of the report discusses threats and risks. This chapter describes an increase in state-aligned groups and aggressive cyber activities, emphasising the need for enhanced cyber resilience in state infrastructure. The NCSC's Incident Management team, who deal with incidents of national significance to the UK, have experienced an increase in reports of cyber incidents in the UK last year of over 64%.</p>
<p>The second chapter of the report discusses resilience and how the NCSC supports the public and private sector to raise awareness about cyber threats and improve resilience generally. This chapter includes an interesting case study about work that has been carried out to bolster the security of the UK's Critical National Infrastructure. There is another case study on the threat of cyber interference that could influence democratic processes such as the next general election. This case study notes that the government has established the Joint Election Security Preparedness Unit to be responsible for coordinating electoral security.</p>
<p>The third chapter of the report discusses the growth of the cyber security market and the NCSC's initiatives to accommodate this.</p>
<p>The fourth chapter of the report discusses the development of technology and the risks associated with such developments. While AI is discussed, the NCSC highlights other advancements that have not been in the headlines as often such as semiconductors, quantum computing, cryptography and radio frequency transmissions.</p>
<p>The NCSC's CEO, Lindy Cameron notes in her foreword that the five main areas of specific interest to the NCSC over the past year has been:</p>
<ol>
    <li>AI cyber security</li>
    <li>Securing the UK's critical national infrastructure</li>
    <li>Defending the UK's democratic processes</li>
    <li>The future of UK cyber security services (including the NCSC's role in their provision)</li>
    <li>Lessons learned from the invasion of Ukraine</li>
</ol>
<p>The NCSC's focus over the coming year will be:</p>
<ol>
    <li>Improving the UK's cyber resilience by improving understanding of threats for both businesses and national infrastructure</li>
    <li>Ensuring that future technology shifts are deployed securely to counteract threats that take advantage of such developments</li>
    <li>Growing the NCSC's expertise</li>
</ol>
<p>Click <a href="https://www.ncsc.gov.uk/files/Annual_Review_2023.pdf">here</a> to read the full 2023 Annual Review published by the NCSC.</p>
<p><strong>Booking.com scam emails threaten hotel reservations</strong></p>
<p>Travellers using Booking.com faced a new threat this month as scam emails were circulated, falsely claiming to be from the popular hotel booking platform. Users report receiving convincing emails, allegedly from <a href="mailto:noreply@booking.com">noreply@booking.com</a>, urging them to confirm hotel payments or risk reservation cancellations. The emails contain personal details, which add to their apparent authenticity.</p>
<p>There have been instances of compromised reservations and unauthorised charges raising concerns. Some customers who followed instructions contained in scam emails might also have unknowingly exposed their bank card details in the process.</p>
<p>Booking.com denies that the issue originates from their systems and emphasises its commitment to safety. The company attributes the issue to sophisticated phishing tactics affecting partner hotels. Users are urged to verify emails, contact Booking.com directly, and scrutinise payment policies of the accommodation that they have booked.</p>
<p>Click <a href="https://www.theguardian.com/money/2023/oct/23/bookingcom-customers-targeted-by-scam-confirmation-emails">here</a> to read the Guardian's full news article.</p>
<p><strong>Ransomware group reports victim to SEC for non-compliance</strong></p>
<p>In a surprising move, the prolific ransomware group AlphV has escalated pressure on one of its victims in the US, publicly traded digital lending company MeridianLink, by reporting the breach to the US Securities and Exchange Commission (SEC). AlphV claims MeridianLink failed to comply with upcoming SEC rules mandating disclosure of cybersecurity incidents within four days of discovery. AlphV's complaint to the SEC was posted on the dark web after it had been made. Although the rules are not yet in effect, the ransomware group accuses MeridianLink of a "material misstatement" for not disclosing a significant breach compromising customer data and operational information.</p>
<p>The tactic is an attempt to exploit industry-wide anxiety following the SEC's recent enforcement action against SolarWinds' Chief Information Security Officer. While MeridianLink confirms a "cybersecurity incident," it asserts that there has been no evidence of unauthorised access to production platforms and minimal business interruption. This incident highlights the evolving strategies of ransomware groups.</p>
<p>Click <a href="https://arstechnica.com/security/2023/11/ransomware-group-reports-victim-it-breached-to-sec-regulators/">here</a> to read Ars Technica's news article.</p>
<p><strong>Information Commissioner seeks appeal in Clearview AI case</strong></p>
<p>The UK Information Commissioner is seeking permission to appeal the 2022 judgment by the First Tier Tribunal relating to Clearview AI Inc. That tribunal decision overturned the ICO's decision to issue a fine of £7.5 million and enforcement notice to the company.</p>
<p>The principal point of contention concerned the ICO's jurisdiction to issue the enforcement and penalty notices to Clearview. Clearview succeeded in appealing against the ICO's fines and enforcement action because it was used by law enforcement outside the UK. The three-member tribunal hearing the appeal concluded that although Clearview did carry out data processing related to monitoring behaviour of people in the UK, this fell outside of the ICO's jurisdiction.</p>
<p>The ICO are appealing the decision on the basis that the law was misinterpreted. The ICO's view is that Clearview was not processing for foreign law enforcement purposes and should not be considered as outside the scope of UK law.</p>
<p>John Edwards, UK Information Commissioner, emphasised the need to protect the data rights of UK citizens amid the alleged widespread impact of Clearview's mass scraping of personal information. The appeal aims to address whether commercial enterprises, profiting from processing digital images of UK individuals, can rightfully claim engagement in "law enforcement."</p>
<p>Click <a href="https://assets.caselaw.nationalarchives.gov.uk/ukftt/grc/2023/819/ukftt_grc_2023_819.pdf">here</a> for the full judgment and for more on the appeal <a href="https://ico.org.uk/about-the-ico/media-centre/news-and-blogs/2023/11/information-commissioner-seeks-permission-to-appeal-clearview-ai-inc-ruling/">here</a>.</p>
<p><strong>ICO and EDPS strengthen collaboration with Memorandum of Understanding</strong></p>
<p>The UK ICO and the European Data Protection Supervisor (EDPS) have formalised their collaboration through a Memorandum of Understanding (MoU).<br />
This agreement solidifies their joint commitment to protecting individuals' data rights and privacy, emphasising international cooperation. The MoU outlines how the authorities will share experiences, best practices, and information, promoting dialogue among data protection authorities and digital regulators. The collaboration builds on their active participation in global forums. John Edwards, UK Information Commissioner, sees the MoU as enhancing existing collaboration, offering pragmatic solutions to support organisations while upholding individuals' information rights. Wojciech Wiewiórowski, European Data Protection Supervisor, emphasises the concrete plans to prioritise fundamental rights across the EU and the UK. The MoU aligns with legal responsibilities and underscores the commitment to safeguarding personal data amidst digital innovation.</p>
<p>Click <a href="https://ico.org.uk/about-the-ico/media-centre/news-and-blogs/2023/11/ico-and-european-data-protection-supervisor-edps-sign-memorandum-of-understanding/">here</a> to read the ICO's news story.</p>
<p><strong>Former NHS secretary fined for illegally accessing patient records</strong></p>
<p>Loretta Alborghetti, a former NHS medical secretary, has been found guilty and fined for unlawfully accessing the medical records of over 150 people. The breach occurred during her tenure in the Ophthalmology department at Worcestershire Acute Hospitals NHS Trust.</p>
<p>An investigation revealed Alborghetti's unauthorised access to patient records, with 156 records viewed over 1800 times within three months. Despite her role requiring access to specific patient information, the accessed records pertained to individuals unrelated to ophthalmology. Alborghetti pleaded guilty to unlawfully obtaining personal data, resulting in a fine of £648 following the ICO's investigation.</p>
<p>Click <a href="https://ico.org.uk/about-the-ico/media-centre/news-and-blogs/2023/11/former-nhs-secretary-found-guilty-of-illegally-accessing-medical-records/">here</a> to read the ICO's news story.</p>]]></content:encoded></item><item><guid isPermaLink="false">{DCFE2906-D256-4D1C-BCDA-AFECF1F3983E}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/cyber-bytes-issue-58/</link><title>Cyber_Bytes - Issue 58</title><description><![CDATA[<p><strong>Changes to the One-Stop-Shop</strong></p>
<p>In July 2023, the European Commission proposed regulations to enhance cross-border cooperation under the GDPR. The current position under the European GDPR faces challenges such as unfair outcomes, inconsistent processes, and ineffective dispute resolution.</p>
<p>The proposal aims to improve procedure across EU jurisdiction, including the adoption of a General Form, strengthening the right of defence, and clarifying dispute resolution.</p>
<p>The European Data Protection Board and the European Data Protection Supervisor issued a joint opinion on the proposed regulations.  They set out the following further recommendations: extending the role of Supervisory Authorities; removing unnecessary formalities; safeguarding the right of Supervisory Authorities in one jurisdiction to object to decisions of another; establishing time limits for procedural steps; and address practical collaboration obstacles.</p>
<p>The hope is that accepting these suggestions can consolidate and improve the one-stop-shop mechanism across the EU. </p>
<p>To read RPC's article on this, please click <a href="/thinking/data-and-privacy/changes-to-the-one-stop-shop/">here</a>.</p>
<p><strong>QBE Study Reveals Employee Cybersecurity Gaps</strong></p>
<p>A recent QBE study highlights common employee cybersecurity lapses, urging increased training and security measures. Findings show that:</p>
<ol>
    <li>Nearly a third of employees (31%) have engaged in actions that could jeopardise workplace cybersecurity.</li>
    <li>These actions range from falling victim to phishing scams (5%) to accidentally introducing malware (7%).</li>
    <li>Additionally, incidents of device loss or theft (6% and 7%) and password sharing (13%) were reported.</li>
    <li>Less than half of respondents reported effective cybersecurity measures, including employee training (46%), multifactor authentication (43%), and phishing simulations (29%).</li>
</ol>
<p>The study highlights the need for better employee education and a stronger cybersecurity plan.</p>
<p>Erica Kofie, Head of Cyber Proposition for QBE Europe, stressed the importance of ongoing employee education and sporadic phishing simulations. As cyber threats evolve, businesses must remain vigilant and continually update their strategies.</p>
<p>To read more, please click <a href="https://insurance-edge.net/2023/10/16/qbe-research-highlights-staff-awareness-on-cyber-risks/">here</a>.</p>
<p><strong>Lloyd's of London warns of major $3.5 trillion cyber-attack on payments</strong></p>
<p>According to a scenario modelled by Lloyd's of London and the Cambridge Centre for Risk Studies, 'a hypothetical but plausible cyber-attack would cause widespread disruption to global business. The US would take the biggest hit by losing $1.1 trillion over five years, followed by China and Japan with $470bn and $200bn respectively.</p>
<p>With cyber security breaches against financial services increasing from 187 to 640 across a 3-year period, cyber insurance saw over $9 billion in gross written premiums last year. This is predicted to grow to $25 billion by 2025. There are concerns that financial services firms, especially pension schemes, would be vulnerable to some form of cyber-attack resulting in a data breach. While hackers target pension schemes because of large amounts of valuable, sensitive and financial data, cyber security is fundamental to pension scheme trustees' legal duties.</p>
<p>To launch a payment system attack, hackers could plausibly plant malicious code in critical software used to confirm transactions and verify payments, create a back door to paralyse the payment system and divert any funds to the hacker's accounts.   </p>
<p>To read more, please click the Lloyd's article <a href="https://www.lloyds.com/news-and-insights/futureset/futureset-insights/systemic-risk-scenarios/illuminating-cyber-crime">here</a>. </p>
<p><strong>UK Information Commissioner Warns Data Breaches Endanger Domestic Abuse Victims</strong></p>
<p>The UK Information Commissioner has issued a strong warning to organisations, urging them to handle personal information with utmost care to protect victims of domestic abuse from further harm.</p>
<p>Over the past 14 months, the Information Commissioner's Office (ICO) has reprimanded seven organisations for data breaches affecting domestic abuse victims. These breaches include:</p>
<ol>
    <li>Revealing Safe Addresses: In four cases, organisations disclosed victims' safe addresses to their alleged abusers, necessitating immediate relocation.</li>
    <li>Identity Disclosure: Women seeking information about their partners had their identities disclosed.</li>
    <li>Home Address Disclosure: Home addresses of adopted children were revealed to their birth father, who was incarcerated for offenses against their mother.</li>
    <li>Unredacted Reports: Unredacted assessment reports were sent to individuals who posed risks to children.</li>
</ol>
<p>The organisations involved range from law firms to government departments, and their breaches are reported to have stemmed from inadequate staff training and data protection procedures.</p>
<p>John Edwards, the UK Information Commissioner, urged organisations to implement basic security practices like comprehensive training and double-checking records to prevent further harm to victims. The ICO's revised enforcement approach aims to work closely with the public sector to prevent data protection issues, offering clear instructions for improving data protection practices to prevent similar incidents. For organisations working with domestic abuse victims, key actions include having processes in place to support data privacy requests, regularly verifying contact information to prevent data disclosure to outdated addresses and providing thorough role-specific data protection training for staff.</p>
<p>To read more, please click <a href="https://ico.org.uk/about-the-ico/media-centre/news-and-blogs/2023/09/data-breaches-put-domestic-abuse-victims-lives-at-risk-uk-information-commissioner-warns/">here</a>.</p>
<p><strong>FCA's Insurance Market Priorities for 2023 – 2025</strong></p>
<p>The Financial Conduct Authority (FCA) has identified key priorities and areas of concern for the insurance market in the years 2023-2025, which include a cyber focus. These include addressing governance and culture, operational resilience, embedding the Consumer Duty, and reducing financial crime.</p>
<p><strong>Market-Wide Priorities:</strong></p>
<ol>
    <li>Higher Standards: Enhance governance, culture, diversity, and equity to improve customer outcomes.</li>
    <li>Operational Resilience: Focus on operational resilience, especially concerning third-party services, to prevent customer harm.</li>
    <li>Consumer Duty: Implement the Consumer Duty to ensure positive consumer outcomes for products, price, understanding, and support.</li>
    <li>Preventing Harm: Strengthen oversight of Appointed Representatives to minimise potential harm.</li>
</ol>
<p><strong>Wholesale Insurance Specific Priorities:</strong></p>
<ol>
    <li>Competition and Growth: Foster competitiveness in the London market to provide innovative solutions for customers.</li>
    <li>Standards & Culture: Promote an inclusive culture, address non-financial misconduct, and prioritise diversity, equity, and inclusion.</li>
    <li>Operational Resilience: Ensure effective operational resilience to minimise disruptions.</li>
    <li>Cyber Insurance: Ensure clear policy wordings, fair claims handling, and products that meet customer needs.</li>
    <li>Consumer Duty: Comply with the Consumer Duty, focusing on products, price, consumer understanding, and support.</li>
    <li>Combatting Financial Crime: Implement controls to combat financial crime, especially in the context of international sanctions.</li>
    <li>Financial Stability: Maintain sufficient financial resources to meet threshold conditions and service debt under stress scenarios.</li>
</ol>
<p>These streamlined priorities highlight the FCA's focus on enhancing industry standards, protecting consumers, and ensuring market integrity.</p>
<p>To read the FCA's letter, please click <a href="https://www.fca.org.uk/publication/correspondence/wholesale-insurance-market-priorities-2023.pdf">here</a>.</p>]]></description><pubDate>Wed, 08 Nov 2023 09:26:00 Z</pubDate><category>Data and privacy</category><authors:names>Richard Breavington, Daniel Guilfoyle, Ian Dinning, Rachel Ford, Christopher Ashton, Elizabeth Zang, Emanuele Santella </authors:names><content:encoded><![CDATA[<p><strong>Changes to the One-Stop-Shop</strong></p>
<p>In July 2023, the European Commission proposed regulations to enhance cross-border cooperation under the GDPR. The current position under the European GDPR faces challenges such as unfair outcomes, inconsistent processes, and ineffective dispute resolution.</p>
<p>The proposal aims to improve procedure across EU jurisdiction, including the adoption of a General Form, strengthening the right of defence, and clarifying dispute resolution.</p>
<p>The European Data Protection Board and the European Data Protection Supervisor issued a joint opinion on the proposed regulations.  They set out the following further recommendations: extending the role of Supervisory Authorities; removing unnecessary formalities; safeguarding the right of Supervisory Authorities in one jurisdiction to object to decisions of another; establishing time limits for procedural steps; and address practical collaboration obstacles.</p>
<p>The hope is that accepting these suggestions can consolidate and improve the one-stop-shop mechanism across the EU. </p>
<p>To read RPC's article on this, please click <a href="/thinking/data-and-privacy/changes-to-the-one-stop-shop/">here</a>.</p>
<p><strong>QBE Study Reveals Employee Cybersecurity Gaps</strong></p>
<p>A recent QBE study highlights common employee cybersecurity lapses, urging increased training and security measures. Findings show that:</p>
<ol>
    <li>Nearly a third of employees (31%) have engaged in actions that could jeopardise workplace cybersecurity.</li>
    <li>These actions range from falling victim to phishing scams (5%) to accidentally introducing malware (7%).</li>
    <li>Additionally, incidents of device loss or theft (6% and 7%) and password sharing (13%) were reported.</li>
    <li>Less than half of respondents reported effective cybersecurity measures, including employee training (46%), multifactor authentication (43%), and phishing simulations (29%).</li>
</ol>
<p>The study highlights the need for better employee education and a stronger cybersecurity plan.</p>
<p>Erica Kofie, Head of Cyber Proposition for QBE Europe, stressed the importance of ongoing employee education and sporadic phishing simulations. As cyber threats evolve, businesses must remain vigilant and continually update their strategies.</p>
<p>To read more, please click <a href="https://insurance-edge.net/2023/10/16/qbe-research-highlights-staff-awareness-on-cyber-risks/">here</a>.</p>
<p><strong>Lloyd's of London warns of major $3.5 trillion cyber-attack on payments</strong></p>
<p>According to a scenario modelled by Lloyd's of London and the Cambridge Centre for Risk Studies, 'a hypothetical but plausible cyber-attack would cause widespread disruption to global business. The US would take the biggest hit by losing $1.1 trillion over five years, followed by China and Japan with $470bn and $200bn respectively.</p>
<p>With cyber security breaches against financial services increasing from 187 to 640 across a 3-year period, cyber insurance saw over $9 billion in gross written premiums last year. This is predicted to grow to $25 billion by 2025. There are concerns that financial services firms, especially pension schemes, would be vulnerable to some form of cyber-attack resulting in a data breach. While hackers target pension schemes because of large amounts of valuable, sensitive and financial data, cyber security is fundamental to pension scheme trustees' legal duties.</p>
<p>To launch a payment system attack, hackers could plausibly plant malicious code in critical software used to confirm transactions and verify payments, create a back door to paralyse the payment system and divert any funds to the hacker's accounts.   </p>
<p>To read more, please click the Lloyd's article <a href="https://www.lloyds.com/news-and-insights/futureset/futureset-insights/systemic-risk-scenarios/illuminating-cyber-crime">here</a>. </p>
<p><strong>UK Information Commissioner Warns Data Breaches Endanger Domestic Abuse Victims</strong></p>
<p>The UK Information Commissioner has issued a strong warning to organisations, urging them to handle personal information with utmost care to protect victims of domestic abuse from further harm.</p>
<p>Over the past 14 months, the Information Commissioner's Office (ICO) has reprimanded seven organisations for data breaches affecting domestic abuse victims. These breaches include:</p>
<ol>
    <li>Revealing Safe Addresses: In four cases, organisations disclosed victims' safe addresses to their alleged abusers, necessitating immediate relocation.</li>
    <li>Identity Disclosure: Women seeking information about their partners had their identities disclosed.</li>
    <li>Home Address Disclosure: Home addresses of adopted children were revealed to their birth father, who was incarcerated for offenses against their mother.</li>
    <li>Unredacted Reports: Unredacted assessment reports were sent to individuals who posed risks to children.</li>
</ol>
<p>The organisations involved range from law firms to government departments, and their breaches are reported to have stemmed from inadequate staff training and data protection procedures.</p>
<p>John Edwards, the UK Information Commissioner, urged organisations to implement basic security practices like comprehensive training and double-checking records to prevent further harm to victims. The ICO's revised enforcement approach aims to work closely with the public sector to prevent data protection issues, offering clear instructions for improving data protection practices to prevent similar incidents. For organisations working with domestic abuse victims, key actions include having processes in place to support data privacy requests, regularly verifying contact information to prevent data disclosure to outdated addresses and providing thorough role-specific data protection training for staff.</p>
<p>To read more, please click <a href="https://ico.org.uk/about-the-ico/media-centre/news-and-blogs/2023/09/data-breaches-put-domestic-abuse-victims-lives-at-risk-uk-information-commissioner-warns/">here</a>.</p>
<p><strong>FCA's Insurance Market Priorities for 2023 – 2025</strong></p>
<p>The Financial Conduct Authority (FCA) has identified key priorities and areas of concern for the insurance market in the years 2023-2025, which include a cyber focus. These include addressing governance and culture, operational resilience, embedding the Consumer Duty, and reducing financial crime.</p>
<p><strong>Market-Wide Priorities:</strong></p>
<ol>
    <li>Higher Standards: Enhance governance, culture, diversity, and equity to improve customer outcomes.</li>
    <li>Operational Resilience: Focus on operational resilience, especially concerning third-party services, to prevent customer harm.</li>
    <li>Consumer Duty: Implement the Consumer Duty to ensure positive consumer outcomes for products, price, understanding, and support.</li>
    <li>Preventing Harm: Strengthen oversight of Appointed Representatives to minimise potential harm.</li>
</ol>
<p><strong>Wholesale Insurance Specific Priorities:</strong></p>
<ol>
    <li>Competition and Growth: Foster competitiveness in the London market to provide innovative solutions for customers.</li>
    <li>Standards & Culture: Promote an inclusive culture, address non-financial misconduct, and prioritise diversity, equity, and inclusion.</li>
    <li>Operational Resilience: Ensure effective operational resilience to minimise disruptions.</li>
    <li>Cyber Insurance: Ensure clear policy wordings, fair claims handling, and products that meet customer needs.</li>
    <li>Consumer Duty: Comply with the Consumer Duty, focusing on products, price, consumer understanding, and support.</li>
    <li>Combatting Financial Crime: Implement controls to combat financial crime, especially in the context of international sanctions.</li>
    <li>Financial Stability: Maintain sufficient financial resources to meet threshold conditions and service debt under stress scenarios.</li>
</ol>
<p>These streamlined priorities highlight the FCA's focus on enhancing industry standards, protecting consumers, and ensuring market integrity.</p>
<p>To read the FCA's letter, please click <a href="https://www.fca.org.uk/publication/correspondence/wholesale-insurance-market-priorities-2023.pdf">here</a>.</p>]]></content:encoded></item><item><guid isPermaLink="false">{E1298F58-7840-487C-86AB-F6195B03803F}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/cyber-bytes-issue-57/</link><title>Cyber_Bytes - Issue 57</title><description><![CDATA[<p><strong>Financial Services Firms Experience a Threefold Surge in Reported Cybersecurity Breaches</strong></p>
<p>Cybersecurity breaches in the UK financial services sector have surged threefold between 2021-2022 and 2022-2023, with the pensions sector being hit the hardest, according to research conducted by RPC. Reported incidents to the ICO have risen from 187 to 640, with the pensions sector seeing a significant increase from 6 to 246 reports. This uptick is raising concerns, especially in pension schemes. Richard Breavington, Head of Cyber and Tech Insurance at RPC, emphasises the importance of cybersecurity in fulfilling legal duties for pension scheme trustees, as they can be held liable for inadequate cyber risk management.</p>
<p>You can read RPC's article <a href="/press-and-media/cybersecurity-breaches-at-financial-services-firms-more-than-trebles/">here</a>.</p>
<p><strong>UK National Agencies Publish White Paper On Ransomware</strong></p>
<p>The National Cyber Security Centre (NCSC) and National Crime Agency (NCA) have recently published a new White Paper on the ransomware industry. The paper outlines how it has grown in to one of the key markets for fraudsters and provides background on how the strategies of organised criminal groups (OCGs) have evolved.</p>
<p>The paper examines the entire attack path of the cybercriminal system. This includes how initial access is provided, the methods used to exploit that access and the systems through which OCGs have been able to monetise breaches.</p>
<p>A key focus in the paper is how targeting individual ransomware strains can provide only a limited benefit in preventing attacks. This is largely due to the adaptability of the industry to consistently reinvent their strategies. Instead, the paper proposes that a comprehensive approach is required focusing on threat actors further upstream who are driving the monetisation of ransomware to deal with the root causes of these attacks.</p>
<p>Some of the other key takeaways from the paper are:</p>
<ul>
    <li>Ransomware attacks have significantly increased since the previous 2017 report, with an estimated 745,000 computer misuse offences last year and UK businesses remaining a valuable target for attacks.</li>
    <li>Smaller threat actors have become an increased threat to businesses due to the increased ease of access to ransomware tools creating fewer barriers to entry.</li>
    <li>One of the most significant risks has been the increased focus from criminals on maximising pay-outs by combining data theft with extortion in a bid to increase the pressure on victims to pay out and risking potential reputational damage for businesses.</li>
    <li>Often the initial access is gained not due to sophisticated techniques, but instead as a result of poor cyber hygiene.</li>
</ul>
<p>The published Whitepaper is available <a href="https://www.ncsc.gov.uk/whitepaper/ransomware-extortion-and-the-cyber-crime-ecosystem">here</a>.</p>
<p><strong>Memorandum of Understanding between the National Cyber Security Centre and the Information Commissioner</strong></p>
<p>The Chief Executive of the National Cyber Security Centre, Lindy Cameron, and the Information Commissioner, John Edwards, have jointly signed a Memorandum of Understanding (MoU) outlining how the organisations will work together. This MoU acknowledges that both organisations possess distinct roles but can find common ground on specific issues and resolve conflicts on others.</p>
<p>The key features of the MoU are:</p>
<ul>
    <li>The Commissioner will encourage organisations to work with the NCSC on cyber security matters.</li>
    <li>The ICO commits to considering how it can demonstrate that engagement with the NCSC will help to reduce regulatory penalties.</li>
    <li>The ICO will try to enhance the NCSC's awareness of cyber attacks in the UK by providing information on cyber incidents in an anonymised format.</li>
</ul>
<p>Additionally, when a cyber incident holds national significance, specific incident details will be shared. This collaborative effort aims to contribute to making the UK a secure online environment, maintaining the relevance of NCSC's advice and guidance, and ensuring that NCSC services remain aligned with the threat landscape.</p>
<ul>
    <li>In cases where both the NCSC and ICO are involved in a cyber incident, they will make efforts to coordinate their actions to reduce disruption to an organisation's attempts to control and reduce harm. In this process, the Commissioner will aim to facilitate organisations in focusing their efforts on engaging with the NCSC and its partners immediately, especially when it is crucial for mitigating the situation.</li>
    <li>The NCSC and ICO will encourage feedback to ensure continuous improvement in their collaborative efforts.</li>
    <li>The NCSC and ICO will strive to enhance available cyber security guidance.</li>
</ul>
<p>You can read the Memorandum of Understanding <a href="https://ico.org.uk/media/about-the-ico/mou/4026408/ico-and-ncsc-mou.pdf">here</a>.</p>
<p><strong>Fresh Sanctions Imposed on Russian Ransomware Group</strong></p>
<p>The U.S. Department of Justice is issuing indictments against nine individuals linked to Trickbot malware and Conti ransomware activities. These individuals were allegedly influential members of the group with various key roles.</p>
<p>The group allegedly extorted £27 million from 149 UK victims and caused around $800 million in global extortion attacks.</p>
<p>These sanctions are the latest round of designations following the first joint UK-US sanctions against seven members of the same group earlier this year. All of these cyber criminals are now subject to travel bans and asset freezes.</p>
<p>As well as targeting criminals, the NCA, in collaboration with global partners, actively targets ransomware tools. The NCA recently helped dismantle the Qakbot malware, which caused widespread damage and was previously used by Conti group. Sanctions aim to disrupt ransomware operations and profit-making by such groups.</p>
<p>The NCA advises organisations to assist with obstructing activities of ransomware groups by bolstering online resilience. Ransomware victims should report incidents through the UK Government's Cyber Incident Signposting Site and enhance cybersecurity to prevent attacks.</p>
<p>You can read the article <a href="https://www.adsadvance.co.uk/russian-ransomware-group-hit-with-new-sanctions.html">here</a>.</p>
<p><strong>Former Council Employee Fined for Unlawful Access of Data</strong></p>
<p>On 13 September 2023, the Information Commissioner's Office (ICO) sentenced a former family intervention officer, for the unlawful access of social services records.</p>
<p>The officer previously worked for St Helens Borough Council and, for the period 17 January 2019 and 17 October 2019, was found to have unlawfully accessed the council's case management system without having a business need to do so. An internal audit carried out by the council found that the officer had looked at the records of around 145 people during this period of employment. She has since resigned from her position at the council and pled guilty to the offence of unlawfully obtaining personal data before Wigan and Leigh Magistrates Court. As a result, the officer was fined £92, ordered to pay court costs of £385 and also paid a victim surcharge of £32.</p>
<p>Andy Curry, the head of investigations for the ICO, said that they were pleased with the ruling and that it sent a clear message "that we will take action against people who take it upon themselves to abuse their position of trust."</p>
<p>The full statement from the ICO can be located <a href="https://ico.org.uk/about-the-ico/media-centre/news-and-blogs/2023/09/former-social-services-council-employee-fined-for-unlawfully-accessing-sensitive-personal-data/">here</a>.</p>
<p><strong>Casinos Advised to Stay Vigilant Amid MGM Resorts Cyberattack</strong></p>
<p>MGM Resorts has experienced a more than 6% drop in its stock price, prompting an FBI investigation into a recent cyber incident. The $14 billion company, known for its global hotel and gaming operations, including those in Las Vegas, has encountered disruptions such as malfunctioning slot machines, offline restaurant reservations, hotel bookings, digital room keys, and corporate email systems, as evidenced by social media posts.</p>
<p>Credit rating agency Moody's has cautioned that the cyberattack exposes significant risks within the company, which had suffered a previous attack in 2020 that exposed personal data of 10 million customers. MGM has acknowledged the potential "material effect" of this week's cyber incident on its operations, as reported in a filing with the US Securities and Exchange Commission.</p>
<p>While the FBI's investigation lacks specific details, Reuters sources suggest that a hacking group called Scattered Spider is responsible for the attack. This group, identified last year, has targeted various businesses, earning a reputation as a prominent threat actor in the US, according to Charles Carmakal, Chief Technology Officer at Mandiant Intelligence. Bloomberg also reported that another entertainment company, Caesars, fell victim to the same group.</p>
<p>You can read the article <a href="https://news.sky.com/story/mgm-resorts-cyberattack-casinos-warned-to-be-on-high-alert-as-11bn-firm-remains-crippled-12960944">here</a>. </p>]]></description><pubDate>Wed, 11 Oct 2023 14:12:00 +0100</pubDate><category>Data and privacy</category><authors:names>Richard Breavington, Daniel Guilfoyle, Ian Dinning, Rachel Ford, Christopher Ashton, Elizabeth Zang, Emanuele Santella </authors:names><content:encoded><![CDATA[<p><strong>Financial Services Firms Experience a Threefold Surge in Reported Cybersecurity Breaches</strong></p>
<p>Cybersecurity breaches in the UK financial services sector have surged threefold between 2021-2022 and 2022-2023, with the pensions sector being hit the hardest, according to research conducted by RPC. Reported incidents to the ICO have risen from 187 to 640, with the pensions sector seeing a significant increase from 6 to 246 reports. This uptick is raising concerns, especially in pension schemes. Richard Breavington, Head of Cyber and Tech Insurance at RPC, emphasises the importance of cybersecurity in fulfilling legal duties for pension scheme trustees, as they can be held liable for inadequate cyber risk management.</p>
<p>You can read RPC's article <a href="/press-and-media/cybersecurity-breaches-at-financial-services-firms-more-than-trebles/">here</a>.</p>
<p><strong>UK National Agencies Publish White Paper On Ransomware</strong></p>
<p>The National Cyber Security Centre (NCSC) and National Crime Agency (NCA) have recently published a new White Paper on the ransomware industry. The paper outlines how it has grown in to one of the key markets for fraudsters and provides background on how the strategies of organised criminal groups (OCGs) have evolved.</p>
<p>The paper examines the entire attack path of the cybercriminal system. This includes how initial access is provided, the methods used to exploit that access and the systems through which OCGs have been able to monetise breaches.</p>
<p>A key focus in the paper is how targeting individual ransomware strains can provide only a limited benefit in preventing attacks. This is largely due to the adaptability of the industry to consistently reinvent their strategies. Instead, the paper proposes that a comprehensive approach is required focusing on threat actors further upstream who are driving the monetisation of ransomware to deal with the root causes of these attacks.</p>
<p>Some of the other key takeaways from the paper are:</p>
<ul>
    <li>Ransomware attacks have significantly increased since the previous 2017 report, with an estimated 745,000 computer misuse offences last year and UK businesses remaining a valuable target for attacks.</li>
    <li>Smaller threat actors have become an increased threat to businesses due to the increased ease of access to ransomware tools creating fewer barriers to entry.</li>
    <li>One of the most significant risks has been the increased focus from criminals on maximising pay-outs by combining data theft with extortion in a bid to increase the pressure on victims to pay out and risking potential reputational damage for businesses.</li>
    <li>Often the initial access is gained not due to sophisticated techniques, but instead as a result of poor cyber hygiene.</li>
</ul>
<p>The published Whitepaper is available <a href="https://www.ncsc.gov.uk/whitepaper/ransomware-extortion-and-the-cyber-crime-ecosystem">here</a>.</p>
<p><strong>Memorandum of Understanding between the National Cyber Security Centre and the Information Commissioner</strong></p>
<p>The Chief Executive of the National Cyber Security Centre, Lindy Cameron, and the Information Commissioner, John Edwards, have jointly signed a Memorandum of Understanding (MoU) outlining how the organisations will work together. This MoU acknowledges that both organisations possess distinct roles but can find common ground on specific issues and resolve conflicts on others.</p>
<p>The key features of the MoU are:</p>
<ul>
    <li>The Commissioner will encourage organisations to work with the NCSC on cyber security matters.</li>
    <li>The ICO commits to considering how it can demonstrate that engagement with the NCSC will help to reduce regulatory penalties.</li>
    <li>The ICO will try to enhance the NCSC's awareness of cyber attacks in the UK by providing information on cyber incidents in an anonymised format.</li>
</ul>
<p>Additionally, when a cyber incident holds national significance, specific incident details will be shared. This collaborative effort aims to contribute to making the UK a secure online environment, maintaining the relevance of NCSC's advice and guidance, and ensuring that NCSC services remain aligned with the threat landscape.</p>
<ul>
    <li>In cases where both the NCSC and ICO are involved in a cyber incident, they will make efforts to coordinate their actions to reduce disruption to an organisation's attempts to control and reduce harm. In this process, the Commissioner will aim to facilitate organisations in focusing their efforts on engaging with the NCSC and its partners immediately, especially when it is crucial for mitigating the situation.</li>
    <li>The NCSC and ICO will encourage feedback to ensure continuous improvement in their collaborative efforts.</li>
    <li>The NCSC and ICO will strive to enhance available cyber security guidance.</li>
</ul>
<p>You can read the Memorandum of Understanding <a href="https://ico.org.uk/media/about-the-ico/mou/4026408/ico-and-ncsc-mou.pdf">here</a>.</p>
<p><strong>Fresh Sanctions Imposed on Russian Ransomware Group</strong></p>
<p>The U.S. Department of Justice is issuing indictments against nine individuals linked to Trickbot malware and Conti ransomware activities. These individuals were allegedly influential members of the group with various key roles.</p>
<p>The group allegedly extorted £27 million from 149 UK victims and caused around $800 million in global extortion attacks.</p>
<p>These sanctions are the latest round of designations following the first joint UK-US sanctions against seven members of the same group earlier this year. All of these cyber criminals are now subject to travel bans and asset freezes.</p>
<p>As well as targeting criminals, the NCA, in collaboration with global partners, actively targets ransomware tools. The NCA recently helped dismantle the Qakbot malware, which caused widespread damage and was previously used by Conti group. Sanctions aim to disrupt ransomware operations and profit-making by such groups.</p>
<p>The NCA advises organisations to assist with obstructing activities of ransomware groups by bolstering online resilience. Ransomware victims should report incidents through the UK Government's Cyber Incident Signposting Site and enhance cybersecurity to prevent attacks.</p>
<p>You can read the article <a href="https://www.adsadvance.co.uk/russian-ransomware-group-hit-with-new-sanctions.html">here</a>.</p>
<p><strong>Former Council Employee Fined for Unlawful Access of Data</strong></p>
<p>On 13 September 2023, the Information Commissioner's Office (ICO) sentenced a former family intervention officer, for the unlawful access of social services records.</p>
<p>The officer previously worked for St Helens Borough Council and, for the period 17 January 2019 and 17 October 2019, was found to have unlawfully accessed the council's case management system without having a business need to do so. An internal audit carried out by the council found that the officer had looked at the records of around 145 people during this period of employment. She has since resigned from her position at the council and pled guilty to the offence of unlawfully obtaining personal data before Wigan and Leigh Magistrates Court. As a result, the officer was fined £92, ordered to pay court costs of £385 and also paid a victim surcharge of £32.</p>
<p>Andy Curry, the head of investigations for the ICO, said that they were pleased with the ruling and that it sent a clear message "that we will take action against people who take it upon themselves to abuse their position of trust."</p>
<p>The full statement from the ICO can be located <a href="https://ico.org.uk/about-the-ico/media-centre/news-and-blogs/2023/09/former-social-services-council-employee-fined-for-unlawfully-accessing-sensitive-personal-data/">here</a>.</p>
<p><strong>Casinos Advised to Stay Vigilant Amid MGM Resorts Cyberattack</strong></p>
<p>MGM Resorts has experienced a more than 6% drop in its stock price, prompting an FBI investigation into a recent cyber incident. The $14 billion company, known for its global hotel and gaming operations, including those in Las Vegas, has encountered disruptions such as malfunctioning slot machines, offline restaurant reservations, hotel bookings, digital room keys, and corporate email systems, as evidenced by social media posts.</p>
<p>Credit rating agency Moody's has cautioned that the cyberattack exposes significant risks within the company, which had suffered a previous attack in 2020 that exposed personal data of 10 million customers. MGM has acknowledged the potential "material effect" of this week's cyber incident on its operations, as reported in a filing with the US Securities and Exchange Commission.</p>
<p>While the FBI's investigation lacks specific details, Reuters sources suggest that a hacking group called Scattered Spider is responsible for the attack. This group, identified last year, has targeted various businesses, earning a reputation as a prominent threat actor in the US, according to Charles Carmakal, Chief Technology Officer at Mandiant Intelligence. Bloomberg also reported that another entertainment company, Caesars, fell victim to the same group.</p>
<p>You can read the article <a href="https://news.sky.com/story/mgm-resorts-cyberattack-casinos-warned-to-be-on-high-alert-as-11bn-firm-remains-crippled-12960944">here</a>. </p>]]></content:encoded></item><item><guid isPermaLink="false">{5822EE05-0821-49F4-A58D-8EECD38519C3}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/changes-to-the-one-stop-shop/</link><title>Changes to the One Stop Shop</title><description><![CDATA[In July 2023 the European Commission issued a Proposal for a Regulation of the European Parliament and of the Council laying down additional procedural rules relating to the enforcement of Regulation (EU) 2016/679 (the 'GDPR' Regulations).]]></description><pubDate>Mon, 09 Oct 2023 14:59:00 +0100</pubDate><category>Data and privacy</category><authors:names>Richard Breavington</authors:names><content:encoded><![CDATA[<p> <strong>EU GDPR cross border cooperation: 'the EDPB wish list'</strong></p>
<p>This is with a view to specifying procedural rules, streamlining cooperation and dispute resolutions mechanisms, and harmonising the procedural rights of parties under investigation and complainants respectively in cross border cases. On 19 September 2023 the European Data Protection Board (EDPB) and the European Data Protection Supervisor (EDPS) adopted a Joint Opinion (the Opinion) on the Proposal, which sets out further suggestions as to what should be implemented to enhance these cross-border cooperation procedures.</p>
<p><strong>The Scope and Challenges of the Current Regulations</strong></p>
<p>A key weakness of the current GDPR Regulations is their inability to provide an efficient method to handle cross-border cases in a fair and harmonised way across EU jurisdictions. Such vulnerability has rendered significant challenges including:</p>
<ul>
    <li><em>Unfair Outcomes</em> - The absence of a consistent approach towards management of complaints registered with Supervisory Authorities ('SAs') across various jurisdictions in respect of the same incident has sometimes led to differing and, therefore, unfair outcomes.  For example, complaints being rejected outright by some jurisdictions on the basis that, in the view of the SA, the complaint lacks merit, while accepted by others where the SA fully upholds them as valid complaints.</li>
    <li><em>Inconsistent processes</em> - Under the current regulation, the extent to which parties are heard, the timing and length of the hearing and the recourses available to the parties vary significantly across the Member States. As a result, in some jurisdictions the process will allow for the parties to be heard, whereas in others no such stage exists. Further, some jurisdictions will allow a recourse to the final decision whereas in others, the SA's decision will have no recourse. These are fundamental flaws. </li>
    <li><em>Ineffective Dispute Resolution Process</em> - The current regulations allow SAs to exchange 'relevant information' with a view to seeking a unified resolution to a cross-border case. Once the lead SA reaches a draft decision in the case, other SAs can raise any 'relevant and reasoned objections'. These objections allow for the possibility of dispute resolution. Whilst the process is a positive attempt towards harmonisation of the response from the regulators, it is the lack of cooperation between SAs prior to submission of the draft decision which can lead to complaints by the other SAs.  </li>
    <li><em>Absence of Prescribed Deadlines</em> - The lack of prescribed deadlines has inevitably led to undue delay and confusion in the management of notification procedures for authorities and users alike.</li>
</ul>
<p><strong><a href="https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=celex%3A52023PC0348">The Proposal</a></strong> </p>
<p>The primary objective of the Proposal is to improve upon procedural regulations to enable harmonisation from the SAs' perspective in cases involving multiple Member States. The specific provisions in the Proposal include:</p>
<ul>
    <li><em>General Form</em> -The Proposal calls for the adoption of a General Form which specifies the information required under Article 77 of the GDPR. The aim behind this is for the Form to outline the procedural rules that SAs have to adhere to, in order to reject a complaint in cross-border cases. This should aid the SAs in reaching a consistent outcome once a complaint on the same incident has been received.</li>
    <li><em>Strengthening the Right of Defence</em> – The Proposal suggests clarifying the content of the administrative file and the parties' rights of access to the file. If adopted, this would serve to strengthen the parties' rights of defence whilst promoting consistency and equal access to administration of these complaints and fair exercise of individual rights under GDPR. The Proposal also sets out an obligation on the Chair of the Board to provide parties under investigation with a statement of reasons explaining the reasoning of the Board, prior to adopting the binding and final decision.</li>
    <li><em>Active Inter-Authority Cooperation</em> - The Proposal aims to streamline cooperation between SAs in order to achieve a consensus on matters, to reduce the amount of cases that reach the dispute resolution stage. The Proposal creates a framework for all SAs to provide each other with their views early on in the investigation and make use of the tools available under the GDPR. This should facilitate a time sensitive consensus-building approach across authorities. Notably, the Proposal also sets out requirements for any relevant and reasoned objections raised by SAs. </li>
    <li><em>Dispute Resolution</em> – The Proposal sets out procedural deadlines and clarifies the role of the parties involved in dispute resolution. The aim is to streamline the process so as to ensure a timely completion of the dispute resolution procedure.</li>
</ul>
<p><strong>EDPB/EDSP's  Joint Opinion on the proposal</strong> </p>
<p>While the EDPB/EDSP acknowledge the Commission's efforts set out in the Proposal to standardise the information necessary for a complaint to be deemed admissible, they wish to take these changes further and to that extent, have suggested a few key recommendations, notably the following:</p>
<ul>
    <li><em>Extension of Role of SAs</em> – Recognising the importance of involving concerned SAs more extensively in various stages of the procedure, not least because this should help to avoid possible disputes at a later stage. As an example, the Opinion suggests that the 'preliminary findings' addressed to the parties under investigation and the 'preliminary view' to reject the complaint should be shared with the concerned Sas before they are finalised and submitted. This would help to strengthen the consensus-finding proposals at a timely stage of proceedings. </li>
    <li><em>Removal of Unnecessary Formalities</em> – With regards to the form to be used when making a complaint, the Opinion suggests removing certain requirements (proof of identity, signature and telephone number) as they impose unnecessary barriers for complainants. </li>
    <li><em>Right to Object</em> – With regard to the relevant and reasoned objections that can be raised on a draft decision, the Opinion highlights the importance of ensuring that the proposal does not unfairly restrict the ability of concerned SAs to present relevant and well-founded objections to a draft decision.</li>
    <li><em>Time Limits</em> - A tighter framework for certain procedural steps should be adopted (with the possibility of an extension in special circumstances).</li>
    <li><em>Removal of Article 18: Relevant and Reasoned Objections ('RROs')</em> - Whilst the EDPB/EDPS agree with the Proposal's aim to ensure consensus among SAs on key aspects at an early stage, they also believe it is crucial to grant SAs the right to raise objections to the draft decision. Considering the over restrictive basis of the procedure and limitations to changes in scope of the allegations, the EDPB suggests Article 18 of the Proposal to be deleted.</li>
    <li>Introducing a dedicated provision to address existing practical obstacles to efficient collaboration between national Data Protection Authorities and the EDPS.</li>
</ul>
<p>As rightly noted by the EDPS Supervisor, Wojciech Wiewiórowski, the Proposal is a '<em>welcome attempt to address some of the challenges identified by experts and practitioners related to the governance of the One-Stop-Shop mechanism</em>". Should the Proposal accept the suggestions incorporated in the Opinion, the EU will have taken a great step towards consolidation of the One Stop Shop through harmonisation of the GDPR processes to the benefit of its citizens. </p>]]></content:encoded></item><item><guid isPermaLink="false">{9D50E58C-B826-47E5-A8DE-624C6DCDE902}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/cyber-bytes-issue-56/</link><title>Cyber_Bytes - Issue 56</title><description><![CDATA[<p><strong> No Compelling Evidence That Cyber Insured Victims Pay More</strong><br />
<br />
The cyber insurance industry has sometimes received criticism over the perception that policies could encourage victims to make extortion payments following a ransomware incident. However, a recent research paper sponsored by the U.K.’s National Cyber Security Centre and the Research Institute for Sociotechnical Cyber Security has concluded that there is no "compelling evidence" that having policies increase the risks of extortion.<br />
<br />
The report determined that there was some evidence that exfiltrated policies could be used as leverage in negotiations to request higher ransom demands. But it determined that the idea that ransomware operators were targeting insured organisations had been overstated. Instead, the report identified that there were three main drivers for the continued success of ransomware attacks:</p>
<ol>
    <li>A profitable business model that continues to evolve with new methods of extorting victims.</li>
    <li>Challenges around securing organisations of different sizes.</li>
    <li>Low-cost barriers to obtain ransomware tools alongside limited risks due to the low prospect of punishment which fail to disincentivize potential cybercriminals.</li>
</ol>
<p>The paper also reviewed the British government's current stance on ransomware payments, which outlines that extortion payments should not be paid in any instance. It determined that this approach has not assisted in responding to attacks. The report therefore outlined 9 recommendations to both the insurance industry and the UK government. These include increased oversight, appointing specialist panel firms to assist with breaches and introducing additional ransomware reporting to assist victims in enabling access to law enforcement support.<br />
<br />
Further information can be located <a href="https://therecord.media/ransomware-cyber-insurance-payments-uk-report">here</a> and the full report can be found <a href="https://therecord.media/ransomware-cyber-insurance-payments-uk-report">here</a>.<br />
<br />
<strong>Philipp (Respondent) v Barclays Bank UK PLC (Appellant)</strong><br />
<br />
On 12th July 2023, the Supreme Court ruled in favour of Barclays Bank following an ongoing dispute with their customers, Mr and Mrs Philipp, who fell victim to a fraud, after the Bank, on instructions of the customers, transferred two payments totalling £700,000. <br />
<br />
The Supreme Court held that the Bank did not owe a duty under its contract or under common law not to carry out the payment instructions if, as was alleged, the Bank had reasonable grounds for believing that the customers were being defrauded.<br />
<br />
This case limits the scope of the Quincecare Duty, which established that banks have obligations to protect customers when the bank is on reasonable inquiry that there may be a risk of fraud. Therefore, the case may have a bearing when Insurers and/or Insured clients are considering a recovery against a bank, following successful payment diversion fraud.<br />
<br />
Where a bank customer has been the victim of an authorised push payment fraud and had been deceived into instructing the bank to make a payment to fraudsters, provided the customer's payment instruction had been clear and is given by the customer personally or by an agent acting with apparent authority, the bank is under no duty to make inquiries to clarify or verify such instructions. The bank's duty is to execute the instruction and any refusal or failure to do so would prima facie be a breach of duty.<br />
<br />
Click <a href="https://www.supremecourt.uk/cases/docs/uksc-2022-0075-judgment.pdf">here</a> to read the full judgment.<br />
<br />
<strong>Windows Defender-Pretender Attack Dismantles Flagship Microsoft EDR</strong><br />
<br />
<em>SafeBreach </em>researchers have found a security feature bypass vulnerability in Windows Defender, which they disclosed to Microsoft to patch for the vulnerability in April 2023, that allowed threat actors to hijack the antivirus software, hijack the signature-update process and to obtain access, delete benign files and cause disruption.<br />
<br />
The research goal was to verify 3 concerns:</p>
<ol>
    <li>whether the update process could be used to import known malware into systems that the software is designed to protect; and</li>
    <li>whether Windows Defender could be made to delete signatures of known threats; and</li>
    <li>deleting benign files and triggering a denial-of-service condition on a compromised system</li>
</ol>
<p>The researchers were able to achieve all three objectives. The research was inspired by Flame Cyberespionage Campaign that targeted organisations in the Middle East in 2012.<br />
<br />
Based on the potential for signature update processes to be exploited as a new attack vector, SafeBreach says that more research is needed to ensure the security of this process. Safebreach also outlined that this vulnerability reflects the serious risks involved in data protection and how even the most reliable security tools can be used as loopholes.<br />
<br />
Click <a href="https://www.darkreading.com/attacks-breaches/-researchers-detail-vuln-that-allowed-for-windows-defender-update-process-hijack">here</a> to read the full Dark Reading article.<br />
<br />
<strong>Ransomware Attack Hits Japan’s Biggest Port, Disrupting Cargo Shipments  <br />
</strong><br />
A recent ransomware attack caused a container terminal at the Port of Nagoya in Aichi Prefecture to suffer an outage that lasted from the morning of Tuesday 4 July to the morning of Thursday 6 July.<br />
<br />
Nagoya port authority claimed that ransomware group Lockbit 3.0 was responsible for the hack.  It is one of the several ports to be recently targeted globally, alongside Portugal's Port of Lisbon and Jawaharlal Nehru Port Trust in India in 2022. These attacks pose increased risks for the ports due to more ports moving towards automated data systems creating new potential vulnerabilities for hacking organisations to exploit.<br />
<br />
Click <a href="https://amp.insurancejournal.com/news/international/2023/07/05/728654.htm">here</a> to read more from the insurance journal.<br />
<br />
<strong>GDPR fine calculation: A look at the EDPB's new guidelines and the UK's approach<br />
</strong><br />
New <a href="https://protect-eu.mimecast.com/s/A46ZCoYRPIXAjjOS195_U?domain=edpb.europa.eu">guidelines</a> seek to harmonise the methods of calculating administrative fines adopted across EU Member States.<br />
<br />
Five key steps have been introduced for authorities to consider before imposing an administrative fine for breach of the GDPR: </p>
<ol>
    <li>identify the processing operations in the case and evaluate the application of Art 83(3) GDPR (intentional or negligent infringement of several provisions in the GDPR;)</li>
    <li>identify the starting point for further clarification of the fine by evaluating the classification of the infringement in the GDPR, considering the seriousness of the infringement, the circumstances of the case and evaluating the turnover of the undertaking; </li>
    <li>evaluate the aggravating and mitigating circumstances related to past or present behaviour of the controller/processor;</li>
    <li>identify the relevant legal maximums for the different infringements – increases applied on the previous or next steps cannot exceed this maximum;</li>
    <li>analyse whether the calculated final amount meets the requirements of effectiveness, dissuasiveness, and proportionality.</li>
</ol>
<p>To summarise the principles involved:</p>
<ul>
    <li>The calculation of the amount of the fine is at the discretion of the supervisory authority, subject to the GDPR</li>
    <li>The GDPR requires that the amount of the fine shall in each individual case be effective, proportionate, and dissuasive (Article 83(1) GDPR).</li>
    <li>When setting the amount of the fine, supervisory authorities shall consider a list of circumstances that refer to features of the infringement or of the character of the perpetrator in accordance with Article 83(2) GDPR.</li>
    <li>The amount of the fine shall not exceed the maximum amounts provided for in Articles 83(4) (5) and (6) GDPR.</li>
    <li>The quantification of the amount of the fine is therefore based on a specific evaluation carried out in each case, within the parameters provided for by the GDPR.</li>
</ul>
<p>These steps are under continuous review and may be subject to change in the future. <br />
<br />
<span style="text-align: justify;">Click </span><a href="file:///C:/Users/LK07/AppData/Local/Microsoft/Windows/INetCache/Content.Outlook/DCTTUPAN/1.%09https:/iapp.org/news/a/gdpr-fine-calculation-a-look-at-the-edpbs-new-guidelines-and-the-uks-approach/" style="text-align: justify;">here</a><span style="text-align: justify;"> to see the breakdown published by iapp and full guidelines </span><a href="https://edpb.europa.eu/system/files/2023-06/edpb_guidelines_042022_calculationofadministrativefines_en.pdf" style="text-align: justify;">here</a><span style="text-align: justify;">.</span></p>
<p>
<br />
<strong>New Legal Framework for EU-US Data Privacy Rules<br />
</strong><br />
On 10 July 2023, the European Commission issued its adequacy decision for the EU-US Data Privacy Framework. The decision determines that the US now ensures an adequate level of data protection, comparable to that of the EU. This decision will enable companies participating in the framework to transfer data from the EU to the US without requiring additional safeguards or risking GDPR enforcement.<br />
<br />
Previously the EU and US had a Privacy Shield agreement in place, which had allowed businesses to freely share data. However, this had changed following the Schrems II ruling which invalidated the Privacy Shield by determining that the level of access allowed by US surveillance programmes were not permitted under EU law. Following this ruling, on 7 October 2022 President Biden signed an executive order introducing enhanced safeguards for the US, limiting data access so that it is only when necessary and proportionate to resolve the issues previous raised in the Schrems II ruling and paving way for the adequacy decision.<br />
<br />
There is some potential for this adequacy decision to be challenged, with criticisms arising over how US organisations may interpret the "proportionate" requirements. It is therefore possible that the CJEU may consider a further decision on the new framework. However, until a further ruling is made, EU and US organisations can continue to rely on the framework to transfer data.<br />
<br />
As the UK does not fall under this framework, businesses transferring data to the US from the UK will need to continue to rely on other transfer mechanisms. However, the UK government is currently working on its own adequacy decision for the US announcing in June an intention to establish a 'data bridge'.<br />
<br />
Further information from the Law Society Gazette can be located <a href="https://www.lawgazette.co.uk/legal-updates/the-eu-us-data-privacy-framework/5116818.article?utm_source=gazette_newsletter&utm_medium=email&utm_campaign=Final%20Metamorph%20firm%20forced%20to%20close%20%7C%20Post%20Office%20worried%20about%20truth%20precedent%20%7C%20ULEZ_07%2F31%2F2023">here</a>.<br />
<br />
<strong>Data Breach for Norfolk and Suffolk Police<br />
</strong><br />
The Norfolk and Suffolk police have issued apologies following the accidental publication of 1,230 victims of abuse. This accidental publication occurred when this information was included in a Freedom of Information response as a result of a technical issue.<br />
<br />
The published data included personal data relating to the victims, witnesses and suspects along with descriptions of the offences investigated. The police have confirmed that immediate steps were taken to remove the data and they have subsequently contacted all impacted parties to inform them of the breach. The ICO has confirmed that the breach is under investigation and have stressed how significant it is for organisations to ensure that robust measures are in place to protect data, especially where an organisation holds sensitive data.<br />
<br />
This is the second time in the past year the Suffolk police has been involved in a personal data breach. The previous breach occurred back in November 2022 when the personal details of sexual abuse victims briefly appeared on their website. Norfolk's chief constable has confirmed that they have updated their processes to prevent future similar breaches but acknowledges that the breach may impact people's trust in their organisation. <br />
<br />
Further information can be located <a href="https://www.bbc.co.uk/news/uk-england-norfolk-66528244">here</a>. </p>]]></description><pubDate>Fri, 01 Sep 2023 11:15:00 +0100</pubDate><category>Data and privacy</category><authors:names>Richard Breavington, Daniel Guilfoyle, Ian Dinning, Rachel Ford, Christopher Ashton, Elizabeth Zang, Emanuele Santella </authors:names><content:encoded><![CDATA[<p><strong> No Compelling Evidence That Cyber Insured Victims Pay More</strong><br />
<br />
The cyber insurance industry has sometimes received criticism over the perception that policies could encourage victims to make extortion payments following a ransomware incident. However, a recent research paper sponsored by the U.K.’s National Cyber Security Centre and the Research Institute for Sociotechnical Cyber Security has concluded that there is no "compelling evidence" that having policies increase the risks of extortion.<br />
<br />
The report determined that there was some evidence that exfiltrated policies could be used as leverage in negotiations to request higher ransom demands. But it determined that the idea that ransomware operators were targeting insured organisations had been overstated. Instead, the report identified that there were three main drivers for the continued success of ransomware attacks:</p>
<ol>
    <li>A profitable business model that continues to evolve with new methods of extorting victims.</li>
    <li>Challenges around securing organisations of different sizes.</li>
    <li>Low-cost barriers to obtain ransomware tools alongside limited risks due to the low prospect of punishment which fail to disincentivize potential cybercriminals.</li>
</ol>
<p>The paper also reviewed the British government's current stance on ransomware payments, which outlines that extortion payments should not be paid in any instance. It determined that this approach has not assisted in responding to attacks. The report therefore outlined 9 recommendations to both the insurance industry and the UK government. These include increased oversight, appointing specialist panel firms to assist with breaches and introducing additional ransomware reporting to assist victims in enabling access to law enforcement support.<br />
<br />
Further information can be located <a href="https://therecord.media/ransomware-cyber-insurance-payments-uk-report">here</a> and the full report can be found <a href="https://therecord.media/ransomware-cyber-insurance-payments-uk-report">here</a>.<br />
<br />
<strong>Philipp (Respondent) v Barclays Bank UK PLC (Appellant)</strong><br />
<br />
On 12th July 2023, the Supreme Court ruled in favour of Barclays Bank following an ongoing dispute with their customers, Mr and Mrs Philipp, who fell victim to a fraud, after the Bank, on instructions of the customers, transferred two payments totalling £700,000. <br />
<br />
The Supreme Court held that the Bank did not owe a duty under its contract or under common law not to carry out the payment instructions if, as was alleged, the Bank had reasonable grounds for believing that the customers were being defrauded.<br />
<br />
This case limits the scope of the Quincecare Duty, which established that banks have obligations to protect customers when the bank is on reasonable inquiry that there may be a risk of fraud. Therefore, the case may have a bearing when Insurers and/or Insured clients are considering a recovery against a bank, following successful payment diversion fraud.<br />
<br />
Where a bank customer has been the victim of an authorised push payment fraud and had been deceived into instructing the bank to make a payment to fraudsters, provided the customer's payment instruction had been clear and is given by the customer personally or by an agent acting with apparent authority, the bank is under no duty to make inquiries to clarify or verify such instructions. The bank's duty is to execute the instruction and any refusal or failure to do so would prima facie be a breach of duty.<br />
<br />
Click <a href="https://www.supremecourt.uk/cases/docs/uksc-2022-0075-judgment.pdf">here</a> to read the full judgment.<br />
<br />
<strong>Windows Defender-Pretender Attack Dismantles Flagship Microsoft EDR</strong><br />
<br />
<em>SafeBreach </em>researchers have found a security feature bypass vulnerability in Windows Defender, which they disclosed to Microsoft to patch for the vulnerability in April 2023, that allowed threat actors to hijack the antivirus software, hijack the signature-update process and to obtain access, delete benign files and cause disruption.<br />
<br />
The research goal was to verify 3 concerns:</p>
<ol>
    <li>whether the update process could be used to import known malware into systems that the software is designed to protect; and</li>
    <li>whether Windows Defender could be made to delete signatures of known threats; and</li>
    <li>deleting benign files and triggering a denial-of-service condition on a compromised system</li>
</ol>
<p>The researchers were able to achieve all three objectives. The research was inspired by Flame Cyberespionage Campaign that targeted organisations in the Middle East in 2012.<br />
<br />
Based on the potential for signature update processes to be exploited as a new attack vector, SafeBreach says that more research is needed to ensure the security of this process. Safebreach also outlined that this vulnerability reflects the serious risks involved in data protection and how even the most reliable security tools can be used as loopholes.<br />
<br />
Click <a href="https://www.darkreading.com/attacks-breaches/-researchers-detail-vuln-that-allowed-for-windows-defender-update-process-hijack">here</a> to read the full Dark Reading article.<br />
<br />
<strong>Ransomware Attack Hits Japan’s Biggest Port, Disrupting Cargo Shipments  <br />
</strong><br />
A recent ransomware attack caused a container terminal at the Port of Nagoya in Aichi Prefecture to suffer an outage that lasted from the morning of Tuesday 4 July to the morning of Thursday 6 July.<br />
<br />
Nagoya port authority claimed that ransomware group Lockbit 3.0 was responsible for the hack.  It is one of the several ports to be recently targeted globally, alongside Portugal's Port of Lisbon and Jawaharlal Nehru Port Trust in India in 2022. These attacks pose increased risks for the ports due to more ports moving towards automated data systems creating new potential vulnerabilities for hacking organisations to exploit.<br />
<br />
Click <a href="https://amp.insurancejournal.com/news/international/2023/07/05/728654.htm">here</a> to read more from the insurance journal.<br />
<br />
<strong>GDPR fine calculation: A look at the EDPB's new guidelines and the UK's approach<br />
</strong><br />
New <a href="https://protect-eu.mimecast.com/s/A46ZCoYRPIXAjjOS195_U?domain=edpb.europa.eu">guidelines</a> seek to harmonise the methods of calculating administrative fines adopted across EU Member States.<br />
<br />
Five key steps have been introduced for authorities to consider before imposing an administrative fine for breach of the GDPR: </p>
<ol>
    <li>identify the processing operations in the case and evaluate the application of Art 83(3) GDPR (intentional or negligent infringement of several provisions in the GDPR;)</li>
    <li>identify the starting point for further clarification of the fine by evaluating the classification of the infringement in the GDPR, considering the seriousness of the infringement, the circumstances of the case and evaluating the turnover of the undertaking; </li>
    <li>evaluate the aggravating and mitigating circumstances related to past or present behaviour of the controller/processor;</li>
    <li>identify the relevant legal maximums for the different infringements – increases applied on the previous or next steps cannot exceed this maximum;</li>
    <li>analyse whether the calculated final amount meets the requirements of effectiveness, dissuasiveness, and proportionality.</li>
</ol>
<p>To summarise the principles involved:</p>
<ul>
    <li>The calculation of the amount of the fine is at the discretion of the supervisory authority, subject to the GDPR</li>
    <li>The GDPR requires that the amount of the fine shall in each individual case be effective, proportionate, and dissuasive (Article 83(1) GDPR).</li>
    <li>When setting the amount of the fine, supervisory authorities shall consider a list of circumstances that refer to features of the infringement or of the character of the perpetrator in accordance with Article 83(2) GDPR.</li>
    <li>The amount of the fine shall not exceed the maximum amounts provided for in Articles 83(4) (5) and (6) GDPR.</li>
    <li>The quantification of the amount of the fine is therefore based on a specific evaluation carried out in each case, within the parameters provided for by the GDPR.</li>
</ul>
<p>These steps are under continuous review and may be subject to change in the future. <br />
<br />
<span style="text-align: justify;">Click </span><a href="file:///C:/Users/LK07/AppData/Local/Microsoft/Windows/INetCache/Content.Outlook/DCTTUPAN/1.%09https:/iapp.org/news/a/gdpr-fine-calculation-a-look-at-the-edpbs-new-guidelines-and-the-uks-approach/" style="text-align: justify;">here</a><span style="text-align: justify;"> to see the breakdown published by iapp and full guidelines </span><a href="https://edpb.europa.eu/system/files/2023-06/edpb_guidelines_042022_calculationofadministrativefines_en.pdf" style="text-align: justify;">here</a><span style="text-align: justify;">.</span></p>
<p>
<br />
<strong>New Legal Framework for EU-US Data Privacy Rules<br />
</strong><br />
On 10 July 2023, the European Commission issued its adequacy decision for the EU-US Data Privacy Framework. The decision determines that the US now ensures an adequate level of data protection, comparable to that of the EU. This decision will enable companies participating in the framework to transfer data from the EU to the US without requiring additional safeguards or risking GDPR enforcement.<br />
<br />
Previously the EU and US had a Privacy Shield agreement in place, which had allowed businesses to freely share data. However, this had changed following the Schrems II ruling which invalidated the Privacy Shield by determining that the level of access allowed by US surveillance programmes were not permitted under EU law. Following this ruling, on 7 October 2022 President Biden signed an executive order introducing enhanced safeguards for the US, limiting data access so that it is only when necessary and proportionate to resolve the issues previous raised in the Schrems II ruling and paving way for the adequacy decision.<br />
<br />
There is some potential for this adequacy decision to be challenged, with criticisms arising over how US organisations may interpret the "proportionate" requirements. It is therefore possible that the CJEU may consider a further decision on the new framework. However, until a further ruling is made, EU and US organisations can continue to rely on the framework to transfer data.<br />
<br />
As the UK does not fall under this framework, businesses transferring data to the US from the UK will need to continue to rely on other transfer mechanisms. However, the UK government is currently working on its own adequacy decision for the US announcing in June an intention to establish a 'data bridge'.<br />
<br />
Further information from the Law Society Gazette can be located <a href="https://www.lawgazette.co.uk/legal-updates/the-eu-us-data-privacy-framework/5116818.article?utm_source=gazette_newsletter&utm_medium=email&utm_campaign=Final%20Metamorph%20firm%20forced%20to%20close%20%7C%20Post%20Office%20worried%20about%20truth%20precedent%20%7C%20ULEZ_07%2F31%2F2023">here</a>.<br />
<br />
<strong>Data Breach for Norfolk and Suffolk Police<br />
</strong><br />
The Norfolk and Suffolk police have issued apologies following the accidental publication of 1,230 victims of abuse. This accidental publication occurred when this information was included in a Freedom of Information response as a result of a technical issue.<br />
<br />
The published data included personal data relating to the victims, witnesses and suspects along with descriptions of the offences investigated. The police have confirmed that immediate steps were taken to remove the data and they have subsequently contacted all impacted parties to inform them of the breach. The ICO has confirmed that the breach is under investigation and have stressed how significant it is for organisations to ensure that robust measures are in place to protect data, especially where an organisation holds sensitive data.<br />
<br />
This is the second time in the past year the Suffolk police has been involved in a personal data breach. The previous breach occurred back in November 2022 when the personal details of sexual abuse victims briefly appeared on their website. Norfolk's chief constable has confirmed that they have updated their processes to prevent future similar breaches but acknowledges that the breach may impact people's trust in their organisation. <br />
<br />
Further information can be located <a href="https://www.bbc.co.uk/news/uk-england-norfolk-66528244">here</a>. </p>]]></content:encoded></item><item><guid isPermaLink="false">{4E7102F2-6DF2-4163-BBD4-2C7D9C6D5E82}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/cyber-bytes-issue-55/</link><title>Cyber_Bytes - Issue 55</title><description><![CDATA[<p><strong>Persistent Ransomware threats</strong></p>
<p>Ransomware remains a persistent challenge for organisations despite the efforts of government agencies and cybersecurity professionals. In the first quarter of 2023, 838 organisations fell victim to ransomware attacks and were named on dark-web data-leak sites. Cyber professionals anticipate that ransomware attacks will continue to remain a key driver for cyber risk. This is due to the large financial gain which cybercriminals continue to reap from their relatively low efforts. </p>
<p>Reports suggest that the first quarter of 2023 saw a resurgence in the number of ransomware attacks.  This was largely due to an increase in supply chain attacks, as cybercriminals pivot towards exploiting vulnerabilities in third-party vendors. This method enables threat actors to hit multiple targets in one attack (a form of cyber risk aggregation). It serves as an effective reminder that an organisation is only as secure as the weakest link in its supply chain.</p>
<p>Additionally, the enhanced organisation and resource management of cybercriminals means that they are continuously seeking out novel methods of refining their business models and techniques. This has led to the development of innovative ways to infiltrate systems and extort money from their victims. A good example of this is Ransomware-as-a-service (RaaS), whereby cybercriminals provide affiliated groups with all the technical advice and tools they need. Purchasers of these services are in turn supported by a host of ransomware attack services, including customer service hotlines, leak-websites, extortion negotiation and payment services. The average cost of a ransomware attack has reached the $4.5m mark in 2022, as per <a href="https://www.ibm.com/downloads/cas/3R8N1DZJ">IBM’s <em>Cost of a Data Breach Report</em></a>.</p>
<p>Click <a href="https://www.commercialriskonline.com/persistent-ransomware-threat-requires-holistic-solution/">here</a> to read the Commercial Risk Online article.</p>
<p><strong>Active Cyber Defence report published by the NCSC</strong></p>
<p>The National Cyber Security Centre (NCSC) has produced its sixth annual report on findings from the Active Cyber Defence (ACD) programme. The report is part of the NCSC's commitment to transparency, and its aim to better understand the reality of cyber-attacks, as well as the efficacy of its products and services.</p>
<p>Despite the types of vulnerabilities being exploited by threat actors evolving over time, the NCSC's ACD initiatives continue to address enduring cyber security challenges. This is said to be achieved by sharing knowledge of threats, closing down vulnerabilities and responding to breaches. As the evolution of artificial intelligence continues to transform the landscape of cybersecurity, the NCSC is seeking to tackle challenges through increased automation.  This is with a view towards generating the scale and reach required to tackle emerging cybersecurity threats.</p>
<p>Whilst ACD services were initially concentrated on building the cyber resilience of the public sector, the NCSC is now adopting a ‘whole of society’ approach.  For example, its Early Warning service can now be accessed by all organisations. The service is designed to automatically inform an organisation of potential cyber attacks on their network, as soon as possible. Additionally, the NCSC is continuing its rollout of simple, free-to-use government services which can be used by organisations that might not have access to cyber security expertise.</p>
<p>Click <a href="https://www.ncsc.gov.uk/files/ACD6-full-report.pdf">here</a> to read the NCSC's sixth annual report.</p>
<p><strong>AI must have better Cyber Security according to CEO of the NCSC</strong></p>
<p>Top cybersecurity officials have issued warnings surrounding the urgent need for cybersecurity to be built into AI systems. Implementing robust systems during the early stages of AI development will inevitably be key. Robert Hannigan, former head of the UK's GCHQ, has said that as the increasing automation of everyday activities grows in tandem with our dependence on AI, an attack on these AI-run systems could ultimately have a "devastating effect". For example, concerns have already emerged around the potential for AI systems to generate malicious code to hack into devices, write fake messages to be spread at a large scale across social media or formulate convincing emails in different languages for use in phishing attacks.</p>
<p>Experts are also fearful that companies who are competing to secure their position in a growing market will inevitably focus on getting their systems out for sale as fast as possible without considering the risks of misuse. Lindy Cameron, CEO of the NCSC, warned that "the scale and complexity of these models is such that if we don't apply the right basic principles as they are being developed in the early stages it will be much more difficult to retrofit security".</p>
<p>Whilst threat actors continue to seek out novel ways to utilise AI alongside malicious software to subvert traditional cybersecurity systems undetected, cybersecurity experts must correspondingly explore the potential use of AI in detecting these attacks. </p>
<p>Click <a href="https://www.bbc.co.uk/news/technology-66166824">here</a> to read the BBC news article.</p>
<p><strong>Microsoft to offer free cyber security tools following major hack</strong></p>
<p>Microsoft is offering free cybersecurity tools to some government and commercial customers following criticism of the tech giant’s handling of a major hack that compromised US government email accounts.  Coming under increasing pressure from US cybersecurity officials, Microsoft announced that it would provide free cloud security logs in the next few months.</p>
<p>Whilst these logs do not themselves prevent attacks, they can form a critical component of digital forensics and incident response in the aftermath of a cyber breach. Such logs help incident response teams to conduct more complete investigations which provide greater clarity around cyberattacks.  This in turn contributes towards the improvement of systems aimed at thwarting future cyberattacks.  </p>
<p>Lack of available logging has impacted high profile incidents in the past. For instance, a lack of logging was cited as complicating the investigation into the SolarWinds attack of 2020, which involved state-sponsored hackers installing malicious code in a software update from SolarWinds Corp to infiltrate US federal agencies and commercial companies.  </p>
<p>Microsoft's usual business model has involved charging customers extra for access to these security logs. Microsoft's customer base and monopoly on data across the cybersecurity industry, means this decision will likely have a broad impact.</p>
<p>Click <a href="https://edition.cnn.com/2023/07/19/tech/microsoft-free-cybersecurity-tools-china-hack/index.html">here</a> to read the CNN news article.</p>
<p><strong>Crimeware tool WormGPT: AI for BEC attacks  </strong></p>
<p>Cybercriminals have developed a generative AI tool called WormGPT designed to help grammatically challenged criminals craft convincing business email compromise (BEC) messages. The crimeware tool is being promoted across illicit online forums for use as a subscription-based model. The tools creators claim that the product has no ethical constraints and can be used to generate content for urgently soliciting funds from targeted victims as well as customisable malware code.</p>
<p>The FBI's Internet Crime Complaint Center reported a rise in BEC scams across 2022, totalling $2.7 billion in losses. This contrasts with figures of $2.4 billion in 2021 and $1.8 billion in 2020. According to Daniel Kelley, cybersecurity expert at SlashNext, the use of generative AI will help to democratise the execution of sophisticated BEC attacks. This will enable attackers with limited skills to use this technology and so broaden the existing spectrum of cybercriminals. Organisations should be alert to the trend of AI crimeware tools, which mimic human intelligence to complete illegal tasks. </p>
<p>Click <a href="https://www.scmagazine.com/news/crimeware-tool-wormgpt-ai-bec">here</a> to read the full SC Media article.</p>
<p><strong>London Borough found to misuse private information and breach the UK GDPR from accessing and sharing information about an individual's finances</strong> (<em>Yae Bekoe v London Borough of Islington [2023] EWHC 1668 (KB)</em>)</p>
<p>On 5 July 2023, a High Court awarded a Claimant, Mr Bekoe, £6,000 for misuse of private information and breach of the provisions of the UK GDPR.</p>
<p>The factual background to the claim was that in 2015, London Borough of Islington (the 'LBI') commenced possession proceedings against Mr Bekoe for possession of property belonging to his deceased neighbour. During these proceedings, LBI disclosed to the court evidence of Mr Bekoe's bank accounts, mortgage accounts and mortgage balances.  </p>
<p>Mr Bekoe claimed that LBI had misused his private and confidential information and brought a claim against LBI for misuse of private information and breach of rights under the UK General Data Protection Regulation ("GDPR") as a result of significant delay in responding to a Subject Access Request and alleged destruction of his data by LBI.</p>
<p>The Judge upheld the claim and noted that Mr Bekoe had a reasonable expectation of privacy in relation to his financial details. It was held that LBI had misused Mr Bekoe's private information and breached several provisions of the UK GDPR.</p>
<p>Click <a href="https://www.bailii.org/ew/cases/EWHC/KB/2023/1668.html">here</a> to read the full judgment.</p>
<p><strong>Government and industry meet to progress the fight against fraud</strong></p>
<p>A Joint Fraud Taskforce ('JFT') meeting took place on 11 July 2023 to consider tackling fraud and protect the public from scams, following the commitments made in the <a href="https://www.gov.uk/government/publications/fraud-strategy">Fraud Strategy</a> which was published on 3 May 2023.</p>
<p>Committee members discussed the growing volume of fraud originating on social media platforms and the development of an online fraud charter which will ensure that tech companies take action to block scams, make it easier to report frauds and ensure that fraudulent content is removed swiftly.</p>
<p>The development of a cross-government anti-fraud public awareness campaign was also on the agenda to consider the best way to streamline messages to the public in respect of fighting against fraud.</p>
<p>The security minister also called for tech firms to implement stronger measures to tackle fraud ahead of the Online Safety Bill.</p>
<p>Click <a href="https://www.gov.uk/government/news/government-and-industry-meet-to-progress-the-fight-against-fraud">here</a> to read the Home Office news story.</p>]]></description><pubDate>Tue, 01 Aug 2023 11:41:00 +0100</pubDate><category>Data and privacy</category><authors:names>Richard Breavington, Daniel Guilfoyle, Ian Dinning, Rachel Ford, Christopher Ashton, Elizabeth Zang, Emanuele Santella </authors:names><content:encoded><![CDATA[<p><strong>Persistent Ransomware threats</strong></p>
<p>Ransomware remains a persistent challenge for organisations despite the efforts of government agencies and cybersecurity professionals. In the first quarter of 2023, 838 organisations fell victim to ransomware attacks and were named on dark-web data-leak sites. Cyber professionals anticipate that ransomware attacks will continue to remain a key driver for cyber risk. This is due to the large financial gain which cybercriminals continue to reap from their relatively low efforts. </p>
<p>Reports suggest that the first quarter of 2023 saw a resurgence in the number of ransomware attacks.  This was largely due to an increase in supply chain attacks, as cybercriminals pivot towards exploiting vulnerabilities in third-party vendors. This method enables threat actors to hit multiple targets in one attack (a form of cyber risk aggregation). It serves as an effective reminder that an organisation is only as secure as the weakest link in its supply chain.</p>
<p>Additionally, the enhanced organisation and resource management of cybercriminals means that they are continuously seeking out novel methods of refining their business models and techniques. This has led to the development of innovative ways to infiltrate systems and extort money from their victims. A good example of this is Ransomware-as-a-service (RaaS), whereby cybercriminals provide affiliated groups with all the technical advice and tools they need. Purchasers of these services are in turn supported by a host of ransomware attack services, including customer service hotlines, leak-websites, extortion negotiation and payment services. The average cost of a ransomware attack has reached the $4.5m mark in 2022, as per <a href="https://www.ibm.com/downloads/cas/3R8N1DZJ">IBM’s <em>Cost of a Data Breach Report</em></a>.</p>
<p>Click <a href="https://www.commercialriskonline.com/persistent-ransomware-threat-requires-holistic-solution/">here</a> to read the Commercial Risk Online article.</p>
<p><strong>Active Cyber Defence report published by the NCSC</strong></p>
<p>The National Cyber Security Centre (NCSC) has produced its sixth annual report on findings from the Active Cyber Defence (ACD) programme. The report is part of the NCSC's commitment to transparency, and its aim to better understand the reality of cyber-attacks, as well as the efficacy of its products and services.</p>
<p>Despite the types of vulnerabilities being exploited by threat actors evolving over time, the NCSC's ACD initiatives continue to address enduring cyber security challenges. This is said to be achieved by sharing knowledge of threats, closing down vulnerabilities and responding to breaches. As the evolution of artificial intelligence continues to transform the landscape of cybersecurity, the NCSC is seeking to tackle challenges through increased automation.  This is with a view towards generating the scale and reach required to tackle emerging cybersecurity threats.</p>
<p>Whilst ACD services were initially concentrated on building the cyber resilience of the public sector, the NCSC is now adopting a ‘whole of society’ approach.  For example, its Early Warning service can now be accessed by all organisations. The service is designed to automatically inform an organisation of potential cyber attacks on their network, as soon as possible. Additionally, the NCSC is continuing its rollout of simple, free-to-use government services which can be used by organisations that might not have access to cyber security expertise.</p>
<p>Click <a href="https://www.ncsc.gov.uk/files/ACD6-full-report.pdf">here</a> to read the NCSC's sixth annual report.</p>
<p><strong>AI must have better Cyber Security according to CEO of the NCSC</strong></p>
<p>Top cybersecurity officials have issued warnings surrounding the urgent need for cybersecurity to be built into AI systems. Implementing robust systems during the early stages of AI development will inevitably be key. Robert Hannigan, former head of the UK's GCHQ, has said that as the increasing automation of everyday activities grows in tandem with our dependence on AI, an attack on these AI-run systems could ultimately have a "devastating effect". For example, concerns have already emerged around the potential for AI systems to generate malicious code to hack into devices, write fake messages to be spread at a large scale across social media or formulate convincing emails in different languages for use in phishing attacks.</p>
<p>Experts are also fearful that companies who are competing to secure their position in a growing market will inevitably focus on getting their systems out for sale as fast as possible without considering the risks of misuse. Lindy Cameron, CEO of the NCSC, warned that "the scale and complexity of these models is such that if we don't apply the right basic principles as they are being developed in the early stages it will be much more difficult to retrofit security".</p>
<p>Whilst threat actors continue to seek out novel ways to utilise AI alongside malicious software to subvert traditional cybersecurity systems undetected, cybersecurity experts must correspondingly explore the potential use of AI in detecting these attacks. </p>
<p>Click <a href="https://www.bbc.co.uk/news/technology-66166824">here</a> to read the BBC news article.</p>
<p><strong>Microsoft to offer free cyber security tools following major hack</strong></p>
<p>Microsoft is offering free cybersecurity tools to some government and commercial customers following criticism of the tech giant’s handling of a major hack that compromised US government email accounts.  Coming under increasing pressure from US cybersecurity officials, Microsoft announced that it would provide free cloud security logs in the next few months.</p>
<p>Whilst these logs do not themselves prevent attacks, they can form a critical component of digital forensics and incident response in the aftermath of a cyber breach. Such logs help incident response teams to conduct more complete investigations which provide greater clarity around cyberattacks.  This in turn contributes towards the improvement of systems aimed at thwarting future cyberattacks.  </p>
<p>Lack of available logging has impacted high profile incidents in the past. For instance, a lack of logging was cited as complicating the investigation into the SolarWinds attack of 2020, which involved state-sponsored hackers installing malicious code in a software update from SolarWinds Corp to infiltrate US federal agencies and commercial companies.  </p>
<p>Microsoft's usual business model has involved charging customers extra for access to these security logs. Microsoft's customer base and monopoly on data across the cybersecurity industry, means this decision will likely have a broad impact.</p>
<p>Click <a href="https://edition.cnn.com/2023/07/19/tech/microsoft-free-cybersecurity-tools-china-hack/index.html">here</a> to read the CNN news article.</p>
<p><strong>Crimeware tool WormGPT: AI for BEC attacks  </strong></p>
<p>Cybercriminals have developed a generative AI tool called WormGPT designed to help grammatically challenged criminals craft convincing business email compromise (BEC) messages. The crimeware tool is being promoted across illicit online forums for use as a subscription-based model. The tools creators claim that the product has no ethical constraints and can be used to generate content for urgently soliciting funds from targeted victims as well as customisable malware code.</p>
<p>The FBI's Internet Crime Complaint Center reported a rise in BEC scams across 2022, totalling $2.7 billion in losses. This contrasts with figures of $2.4 billion in 2021 and $1.8 billion in 2020. According to Daniel Kelley, cybersecurity expert at SlashNext, the use of generative AI will help to democratise the execution of sophisticated BEC attacks. This will enable attackers with limited skills to use this technology and so broaden the existing spectrum of cybercriminals. Organisations should be alert to the trend of AI crimeware tools, which mimic human intelligence to complete illegal tasks. </p>
<p>Click <a href="https://www.scmagazine.com/news/crimeware-tool-wormgpt-ai-bec">here</a> to read the full SC Media article.</p>
<p><strong>London Borough found to misuse private information and breach the UK GDPR from accessing and sharing information about an individual's finances</strong> (<em>Yae Bekoe v London Borough of Islington [2023] EWHC 1668 (KB)</em>)</p>
<p>On 5 July 2023, a High Court awarded a Claimant, Mr Bekoe, £6,000 for misuse of private information and breach of the provisions of the UK GDPR.</p>
<p>The factual background to the claim was that in 2015, London Borough of Islington (the 'LBI') commenced possession proceedings against Mr Bekoe for possession of property belonging to his deceased neighbour. During these proceedings, LBI disclosed to the court evidence of Mr Bekoe's bank accounts, mortgage accounts and mortgage balances.  </p>
<p>Mr Bekoe claimed that LBI had misused his private and confidential information and brought a claim against LBI for misuse of private information and breach of rights under the UK General Data Protection Regulation ("GDPR") as a result of significant delay in responding to a Subject Access Request and alleged destruction of his data by LBI.</p>
<p>The Judge upheld the claim and noted that Mr Bekoe had a reasonable expectation of privacy in relation to his financial details. It was held that LBI had misused Mr Bekoe's private information and breached several provisions of the UK GDPR.</p>
<p>Click <a href="https://www.bailii.org/ew/cases/EWHC/KB/2023/1668.html">here</a> to read the full judgment.</p>
<p><strong>Government and industry meet to progress the fight against fraud</strong></p>
<p>A Joint Fraud Taskforce ('JFT') meeting took place on 11 July 2023 to consider tackling fraud and protect the public from scams, following the commitments made in the <a href="https://www.gov.uk/government/publications/fraud-strategy">Fraud Strategy</a> which was published on 3 May 2023.</p>
<p>Committee members discussed the growing volume of fraud originating on social media platforms and the development of an online fraud charter which will ensure that tech companies take action to block scams, make it easier to report frauds and ensure that fraudulent content is removed swiftly.</p>
<p>The development of a cross-government anti-fraud public awareness campaign was also on the agenda to consider the best way to streamline messages to the public in respect of fighting against fraud.</p>
<p>The security minister also called for tech firms to implement stronger measures to tackle fraud ahead of the Online Safety Bill.</p>
<p>Click <a href="https://www.gov.uk/government/news/government-and-industry-meet-to-progress-the-fight-against-fraud">here</a> to read the Home Office news story.</p>]]></content:encoded></item><item><guid isPermaLink="false">{40D068BA-3D33-432F-87AB-B76D99D2B9E4}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/cyber-bytes-issue-54/</link><title>Cyber_Bytes - Issue 54</title><description><![CDATA[<p><strong>NCSC's Cyber Threat Report on the UK Legal Sector</strong></p>
<p>The UK's National Cyber Security Centre (NCSC) partnered with the Solicitors Regulation Authority (SRA), Action Fraud, and the National Crime Agency (NCA) to produce a report analysing current cyber security threats faced by the legal community. The report provides practical guidance on how organisations can remain alert to these growing threats.</p>
<p>Legal practices and lawyers have become an increasingly attractive target for cyber criminals. This is due to the essential role they play in the UK economy and wider society, as organisations in the legal sector routinely handle large amounts of money and highly sensitive client information.</p>
<p>The most common forms of attack which the report warns against include phishing, business email compromise and ransomware. Supply chain attacks have also been identified as a key threat against which organisations must remain alert. Many smaller firms outsource their IT and data responsibilities to specialist support companies. As recently highlighted by the MOVEit compromise (click <a href="/thinking/data-and-privacy/cyber-bytes-issue-53/">here</a> for our previous coverage on this), this can potentially have far-reaching ramifications on companies if a data breach occurs.</p>
<p>The report places an emphasis on organisations reporting cyber-attacks. This will allow the NCSC to provide support and incident response to mitigate harm and protect an organisation from future attacks.</p>
<p>Click <a href="https://www.ncsc.gov.uk/files/Cyber-Threat-Report_UK-Legal-Sector.pdf">here</a> to read the full NCSC report.</p>
<p><strong>Clop ransomware claims responsibility for MOVEit extortion attacks</strong></p>
<p>The Clop ransomware group has claimed responsibility for the recent ransomware attack which exploited a zero-day vulnerability in the MOVEit Transfer tool designed to securely transfer sensitive files. The attack is estimated to have affected hundreds of companies globally which used this software.</p>
<p>The group began its attacks on 27 May, taking advantage of low staff presence at MOVEit over the US Memorial Day weekend. Servers belonging to corporations utilising the software were ultimately breached. The Clop group claims to have deleted all stolen data relating to governmental, military and hospital bodies, however these claims cannot be verified.</p>
<p>Zellis, a UK-based HR and payroll solutions provider has confirmed that a small number of its customer base has been affected by the data breach. This includes airline company Aer Lingus, who has however confirmed that no financial or bank details relating to current or former employees were stolen.</p>
<p>British Airways also confirmed that some of its data had been stolen as part of the Zellis breach. However, the British airline provider is yet to disclose any further details as to the nature of the affected data.</p>
<p>The Clop group stated on 6 June that it would begin to publish stolen data from 'hundreds of companies' on 14 June if a ransom was not paid, encouraging affected corporations to contact them to commence negotiations.</p>
<p>Click <a href="https://www.bleepingcomputer.com/news/security/clop-ransomware-claims-responsibility-for-moveit-extortion-attacks/">here</a> to read the Bleeping Computer article.</p>
<p><strong>Cyber risk firm, Resilience, evaluates the recent wave of attacks</strong></p>
<p>A recent report from cyber risk firm Resilience has found that despite an increasing number of ransomware attacks, 80% of affected organisations are able to recover data and systems without giving in to ransom payment demands. Over the last quarter of 2022 and the start of the first quarter of 2023, the number of attacks is reported to have doubled.</p>
<p>However, new approaches to cyber risk such as balancing risk acceptance, mitigation and transfer, have prevented ransom payments from increasing in line with the rate of cyber-attacks.</p>
<p>Resilience reports that none of its clients made an extortion payment in 2022 and that they were half as likely to pay a ransom to recover systems during a cyberattack compared to industry averages. The company's new approach centres around bringing together risk, finance and security roles that have previously operated in silos to create "cyber resilience".</p>
<p>According to its annual claims report, the leading cause of loss is ransomware at 17.8%, transfer fraud at 17%, vendor data breaches at 11.8% and business email compromise at 10.4%. With regards to the leading point of failure, based on primary claim notices, phishing attacks are in the lead at 23.4%, followed by risk from third-party vendors at 22.1% of claims.</p>
<p>Click <a href="https://www.commercialriskonline.com/organisations-refuse-to-pay-ransoms-in-fresh-wave-of-attacks-resilience/?utm_source=slipcase&utm_medium=affiliate&utm_campaign=slipcase">here</a> to read the full article by Commercial Risk.</p>
<p><strong>Cyber Threat Advisory: Fortinet Vulnerability</strong></p>
<p>Cybersecurity solutions provider Fortinet has released a security advisory for a critical vulnerability in its SSL VPN. The service is widely used for gaining remote access in the public and private sectors. The vulnerability affects both the iOS and Android versions of the software and was identified during an internal audit of Fortinet’s codebase. Security experts believe that the vulnerability is being exploited to compromise affected devices remotely.</p>
<p>Incidents relating to the vulnerability have so far been associated to a Chinese-nation-state cyber group, Volt Typhoon (Insidious Taurus). A proof-of-concept exploit for the vulnerability has subsequently been published online, increasing the likelihood that a broader range of nation state and financially motivated cybercriminals will imminently begin to exploit it.</p>
<p>Corporations using the SSL VPN are being urged to consider disabling the service if it is not critical to business operations, or to apply Fortinet recommendations for hardening of FortiOS applications. In addition, corporations have been advised to review their systems for signs of exploit of the vulnerability. Potential indicators of compromise include an abnormal amount of ‘/remote/logincheck’ and ‘/remote/hostcheck_validate’ requests as well as suspicious reboots.</p>
<p>Click <a href="https://insights.s-rminform.com/cyber-threat-advisory-fortinet-vulnerability">here</a> to read the full S-RM article.<a title="Italic" class="reTool" href="/EditorPage.aspx?da=core&id=%7B40D068BA-3D33-432F-87AB-B76D99D2B9E4%7D&ed=FIELD214402840&vs&la=en&fld=%7B4BDA002B-D7DD-41EC-8DA1-2913197DD056%7D&so&di=0&hdl=H214403023&mo&pe=0&fbd=1#" unselectable="on"><span class="Italic" unselectable="on"> </span></a></p>
<p><strong>UAE: ChatGPT used to launch cyber and ransomware attacks, says head of cybersecurity</strong></p>
<p>Dr Mohamed Al Kuwaiti, Head of Cybersecurity at the UAE Government, recently appeared on a panel at the Cybersecurity Innovation Series Conference in Dubai. During the discussion, Dr Al Kuwaiti issued warnings surrounding the increased use of AI tools such as ChatGPT by threat actors.</p>
<p>AI services are being used to draft ransomware scripts and phishing emails which assist threat actors in curating more convincing attacks. With the use of generative AI on the rise, corporations must be alert to the rapid information processing capabilities of these tools and their ability to assist threat actors in the automation of their processes. This has the potential to contribute to a proliferation in the number of cyberattack attempts taking place globally.</p>
<p>Dr Al Kuwaiti confirmed that the UAE government had been the victim of recent cyberattack attempts. These attacks impacted crucial infrastructure such as electrical, energy, transportation, aviation, education and healthcare sectors, with the main focus of the attacks being the financial sector. In response to these growing threats, the UAE government has begun utilising AI tools in its cyber defence mechanisms alongside cloud security systems.</p>
<p>Raising public awareness of cybersecurity across the state will also be a key objective of the UAE government in the near-term future.</p>
<p>Click <a href="https://www.msn.com/en-ae/news/national/uae-chatgpt-used-to-launch-cyber-and-ransomware-attacks-says-head-of-cybersecurity/ar-AA1cesSs">here</a> to read the full MSN article.</p>]]></description><pubDate>Tue, 04 Jul 2023 15:02:00 +0100</pubDate><category>Data and privacy</category><authors:names>Richard Breavington, Daniel Guilfoyle, Ian Dinning, Rachel Ford, Christopher Ashton, Elizabeth Zang, Emanuele Santella </authors:names><content:encoded><![CDATA[<p><strong>NCSC's Cyber Threat Report on the UK Legal Sector</strong></p>
<p>The UK's National Cyber Security Centre (NCSC) partnered with the Solicitors Regulation Authority (SRA), Action Fraud, and the National Crime Agency (NCA) to produce a report analysing current cyber security threats faced by the legal community. The report provides practical guidance on how organisations can remain alert to these growing threats.</p>
<p>Legal practices and lawyers have become an increasingly attractive target for cyber criminals. This is due to the essential role they play in the UK economy and wider society, as organisations in the legal sector routinely handle large amounts of money and highly sensitive client information.</p>
<p>The most common forms of attack which the report warns against include phishing, business email compromise and ransomware. Supply chain attacks have also been identified as a key threat against which organisations must remain alert. Many smaller firms outsource their IT and data responsibilities to specialist support companies. As recently highlighted by the MOVEit compromise (click <a href="/thinking/data-and-privacy/cyber-bytes-issue-53/">here</a> for our previous coverage on this), this can potentially have far-reaching ramifications on companies if a data breach occurs.</p>
<p>The report places an emphasis on organisations reporting cyber-attacks. This will allow the NCSC to provide support and incident response to mitigate harm and protect an organisation from future attacks.</p>
<p>Click <a href="https://www.ncsc.gov.uk/files/Cyber-Threat-Report_UK-Legal-Sector.pdf">here</a> to read the full NCSC report.</p>
<p><strong>Clop ransomware claims responsibility for MOVEit extortion attacks</strong></p>
<p>The Clop ransomware group has claimed responsibility for the recent ransomware attack which exploited a zero-day vulnerability in the MOVEit Transfer tool designed to securely transfer sensitive files. The attack is estimated to have affected hundreds of companies globally which used this software.</p>
<p>The group began its attacks on 27 May, taking advantage of low staff presence at MOVEit over the US Memorial Day weekend. Servers belonging to corporations utilising the software were ultimately breached. The Clop group claims to have deleted all stolen data relating to governmental, military and hospital bodies, however these claims cannot be verified.</p>
<p>Zellis, a UK-based HR and payroll solutions provider has confirmed that a small number of its customer base has been affected by the data breach. This includes airline company Aer Lingus, who has however confirmed that no financial or bank details relating to current or former employees were stolen.</p>
<p>British Airways also confirmed that some of its data had been stolen as part of the Zellis breach. However, the British airline provider is yet to disclose any further details as to the nature of the affected data.</p>
<p>The Clop group stated on 6 June that it would begin to publish stolen data from 'hundreds of companies' on 14 June if a ransom was not paid, encouraging affected corporations to contact them to commence negotiations.</p>
<p>Click <a href="https://www.bleepingcomputer.com/news/security/clop-ransomware-claims-responsibility-for-moveit-extortion-attacks/">here</a> to read the Bleeping Computer article.</p>
<p><strong>Cyber risk firm, Resilience, evaluates the recent wave of attacks</strong></p>
<p>A recent report from cyber risk firm Resilience has found that despite an increasing number of ransomware attacks, 80% of affected organisations are able to recover data and systems without giving in to ransom payment demands. Over the last quarter of 2022 and the start of the first quarter of 2023, the number of attacks is reported to have doubled.</p>
<p>However, new approaches to cyber risk such as balancing risk acceptance, mitigation and transfer, have prevented ransom payments from increasing in line with the rate of cyber-attacks.</p>
<p>Resilience reports that none of its clients made an extortion payment in 2022 and that they were half as likely to pay a ransom to recover systems during a cyberattack compared to industry averages. The company's new approach centres around bringing together risk, finance and security roles that have previously operated in silos to create "cyber resilience".</p>
<p>According to its annual claims report, the leading cause of loss is ransomware at 17.8%, transfer fraud at 17%, vendor data breaches at 11.8% and business email compromise at 10.4%. With regards to the leading point of failure, based on primary claim notices, phishing attacks are in the lead at 23.4%, followed by risk from third-party vendors at 22.1% of claims.</p>
<p>Click <a href="https://www.commercialriskonline.com/organisations-refuse-to-pay-ransoms-in-fresh-wave-of-attacks-resilience/?utm_source=slipcase&utm_medium=affiliate&utm_campaign=slipcase">here</a> to read the full article by Commercial Risk.</p>
<p><strong>Cyber Threat Advisory: Fortinet Vulnerability</strong></p>
<p>Cybersecurity solutions provider Fortinet has released a security advisory for a critical vulnerability in its SSL VPN. The service is widely used for gaining remote access in the public and private sectors. The vulnerability affects both the iOS and Android versions of the software and was identified during an internal audit of Fortinet’s codebase. Security experts believe that the vulnerability is being exploited to compromise affected devices remotely.</p>
<p>Incidents relating to the vulnerability have so far been associated to a Chinese-nation-state cyber group, Volt Typhoon (Insidious Taurus). A proof-of-concept exploit for the vulnerability has subsequently been published online, increasing the likelihood that a broader range of nation state and financially motivated cybercriminals will imminently begin to exploit it.</p>
<p>Corporations using the SSL VPN are being urged to consider disabling the service if it is not critical to business operations, or to apply Fortinet recommendations for hardening of FortiOS applications. In addition, corporations have been advised to review their systems for signs of exploit of the vulnerability. Potential indicators of compromise include an abnormal amount of ‘/remote/logincheck’ and ‘/remote/hostcheck_validate’ requests as well as suspicious reboots.</p>
<p>Click <a href="https://insights.s-rminform.com/cyber-threat-advisory-fortinet-vulnerability">here</a> to read the full S-RM article.<a title="Italic" class="reTool" href="/EditorPage.aspx?da=core&id=%7B40D068BA-3D33-432F-87AB-B76D99D2B9E4%7D&ed=FIELD214402840&vs&la=en&fld=%7B4BDA002B-D7DD-41EC-8DA1-2913197DD056%7D&so&di=0&hdl=H214403023&mo&pe=0&fbd=1#" unselectable="on"><span class="Italic" unselectable="on"> </span></a></p>
<p><strong>UAE: ChatGPT used to launch cyber and ransomware attacks, says head of cybersecurity</strong></p>
<p>Dr Mohamed Al Kuwaiti, Head of Cybersecurity at the UAE Government, recently appeared on a panel at the Cybersecurity Innovation Series Conference in Dubai. During the discussion, Dr Al Kuwaiti issued warnings surrounding the increased use of AI tools such as ChatGPT by threat actors.</p>
<p>AI services are being used to draft ransomware scripts and phishing emails which assist threat actors in curating more convincing attacks. With the use of generative AI on the rise, corporations must be alert to the rapid information processing capabilities of these tools and their ability to assist threat actors in the automation of their processes. This has the potential to contribute to a proliferation in the number of cyberattack attempts taking place globally.</p>
<p>Dr Al Kuwaiti confirmed that the UAE government had been the victim of recent cyberattack attempts. These attacks impacted crucial infrastructure such as electrical, energy, transportation, aviation, education and healthcare sectors, with the main focus of the attacks being the financial sector. In response to these growing threats, the UAE government has begun utilising AI tools in its cyber defence mechanisms alongside cloud security systems.</p>
<p>Raising public awareness of cybersecurity across the state will also be a key objective of the UAE government in the near-term future.</p>
<p>Click <a href="https://www.msn.com/en-ae/news/national/uae-chatgpt-used-to-launch-cyber-and-ransomware-attacks-says-head-of-cybersecurity/ar-AA1cesSs">here</a> to read the full MSN article.</p>]]></content:encoded></item><item><guid isPermaLink="false">{0595AE3B-49E1-48B6-A997-E1383A5D2A95}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/cyber-bytes-issue-53/</link><title>Cyber_Bytes - Issue 53</title><description><![CDATA[<p><strong>New fixed recoverable costs for professional negligence claims</strong></p>
<p>The new fixed recoverable costs regime ('FRC') is due to come into force on 1 October 2023, despite opposing opinions from various legal associations.</p>
<p>Under the new rules, professional negligence claims issued on or after 1 October 2023 where £100,000 or less is sought, will be subject to a sliding scale of FRC. The new limits on recovering costs will apply to claims allocated to the fast or newly created intermediate track, regardless of whether the actual sums incurred by the parties are higher or lower than the FRC.</p>
<p>In practice, the new rules are likely to apply to less complex cases where:</p>
<ul>
    <li>The sum sought is between £25,000 and £100,000.</li>
    <li>The trial will last 3 days or less.</li>
    <li>There are no more than 2 experts giving oral evidence per party.</li>
    <li>There are no more than 3 parties (2 claimants and 1 defendant or 1 claimant and 2 defendants); and</li>
    <li>There are no allegations of fraud.</li>
</ul>
<p>
These changes are likely to have a significant impact on litigants and insurers, which will give rise to new tactical considerations and impact the likelihood of claimants pursuing litigation, if they are unable to recover a significant portion of their legal costs.</p>
<p>See RPC's full article <a href="/thinking/professional-and-financial-risks/what-the-fix/">here</a> and Lawyer's Covered publication <a href="/thinking/professional-and-financial-risks/lawyers-covered-may-2023/">here</a>.</p>
<p><strong>Big names caught up in big cyber attack</strong></p>
<p><strong></strong>British Airways (BA), Boots, BBC and Air Lingus are among the latest companies caught up in a recent mass hack. The exploit at the root of this mass hack was disclosed last week by US company Progress Software. Progress Software warned that hackers were able to access its MOVEit Transfer tool, which is designed to move sensitive files securely and is utilised globally. It is suspected that the ransomware group, Cl0p, is responsible for the hack, who are alleged to be based in Russia.</p>
<p>Staff at BA have been warned that personal data, including possible bank details, may have been stolen by the group. Other personal data relating to staff at the BBC has also reportedly been compromised.<br />
<br />
The National Cyber Security Centre has urged organisations using the compromised software to carry out security updates that have been provided by Progress Software. The National Crime Agency is aware of a number of UK-based organisations that have been impacted by a cyber incident as a result of the security flaw and is "working with partners to support those organisations and understand the full impact on the UK."</p>
<p>Click <a href="https://www.bbc.co.uk/news/technology-65814104">here</a> for the full article.</p>
<p><strong>Cyber-attack costs conveyancers £7m<br />
</strong></p>
<p>
In November 2021, conveyancing services giant, Simplify, suffered a cyber-attack when a threat actor gained unauthorised access to their systems, including internal files containing personal data. This incident led to a major IT systems outage. Simplify spent 10 weeks restoring their systems and had to significantly reduce their level of new cases. The group complied with all relevant obligations required by the Information Commissioner's Office (ICO), which does not intend to take any further action against the group.</p>
<p>According to the parent company, UKLS Acquisitions Limited, this impacted Simplify's results for the financial year which, had it not been for the cyber-attack, would have been on track to turn around a record number of completions.</p>
<p>Simplify also suffered from a one-off cost of £7.3m and exceptional income of £6.8m arising from the cyber-attack alone. Although the giant successfully recovered from its insurers in relation to lost business, they had to enter discussions with its funders to fulfil long-term funding and capital structure of the group. Shareholders have since injected a further £15m of working capital into the company.</p>
<p>This provides a stark example of the impact than ransomware can have on professional services businesses. Please see Lawyer's Covered publication <a href="/thinking/professional-and-financial-risks/lawyers-covered-may-2023/">here</a> and Legal Gazette's full article <a href="https://www.lawgazette.co.uk/news/cyber-attack-cost-conveyancing-giant-7m-but-the-insurers-paid-up/5115931.article?">here</a>.</p>
<p><strong>AI and "Friday Afternoon Frauds" on Law firms</strong></p>
<p>Law firms are under continuous pressure to stay aware of fraud risks. The rapid progress of AI technology gives new rise to more uncertain risks of phishing fraud. There is particular concern about GPT-4, the successor of Open AI's ChatGPT, where there have been reports of scammers using generative AI to clone voices to perpetrate frauds.</p>
<p>Although law firms aim to keep up to date with possible fraud risks, new technology assists in undermining routine checks that law firms tend to rely on. For example, following up with a client on the telephone following the receipt of a suspicious email. The use of new technology will mean that scammers can clone voices and potentially undermine routine checks employed by firms.</p>
<p>The Law Society presently has guidance including warning signs to make firms familiar with ongoing fraudster activity, which can be found <a href="https://www.lawsociety.org.uk/Topics/Cybersecurity/Guides/Cybersecurity-for-solicitors">here</a>. However, this guidance does not take the impacts of generative AI into account.</p>
<p>RPC have prepared a blog suggesting that the Law Society will need to strike a balance between addressing specific risks as they emerge and putting in place flexible guidance which can respond to a variety of novel, and yet unknown, risks.</p>
<p>See our full article <a href="/thinking/professional-and-financial-risks/new-developments-in-ai-may-put-law-firms-at-greater-risk-of-phishing-fraud/">here</a>.</p>
<p><strong>The "Unicorn Kingdom's" AI White Paper</strong></p>
<p><strong></strong>The UK's AI White Paper has recently been published, heralding a pro innovation and light regulation approach. However, the Future of Life Institute almost simultaneously published an open letter calling for a six-month halt in work on AI systems more powerful than the generative AI system: GPT-4.</p>
<p>The White Paper suggests a wait and see approach to allow regulation to be appropriate for innovators of AI to progress and thrive. There is no intention to introduce legislation and the framework will be principles-based. There are also no current plans to appoint a separate AI regulator. The Government suggests monitoring functions to determine how the regulatory framework can be performed. This monitoring will include test beds, sandbox initiatives, conducting horizon scanning, and promoting interoperability with international regulatory frameworks. This approach differs from the US and EU's more formal risk-based focus.</p>
<p>The current Government consultation is ongoing and due to close on 21 June 2023. We await further details as to the implementation of the regulatory framework. However, the concern is that with such a tentative approach to regulation, businesses, large and small, operating in the UK's AI landscape could require more immediate regulatory certainty to protect them.</p>
<p>See our full article <a href="/thinking/tech/the-unicorn-kingdoms-ai-white-paper/">here</a>.</p>
<p><strong>Joint blog post by the NCSC and ICO on transparency around cyber attacks</strong></p>
<p>The National Cyber Security Centre (NCSC) and the ICO have co-produced a blog post which aims to dispel common misconceptions that can discourage organisations from reporting a cyber-attack. This follows concerns that unreported incidents are denying organisations the opportunity to learn from them and prevent future attacks. The post focuses on six misconceptions that often discourage organisations from reporting attacks, particularly ransomware attacks, and sets out to dispel them.</p>
<p>The six ‘myths’ which the NCSC and the ICO have identified as commonly held by organisations that have fallen victim to cyber incidents are:</p>
<ol>
    <li>If I cover up the attack, everything will be ok</li>
    <li>Reporting to the authorities makes it more likely your incident will go public</li>
    <li>Paying a ransom makes the incident go away</li>
    <li>I’ve got good offline backups, I won’t need to pay a ransom</li>
    <li>If there is no evidence of data theft, you don’t need to report to the ICO</li>
    <li>You’ll only get a fine if your data is leaked</li>
</ol>
<p>
This latest press release comes amidst threat actors continuing to cause significant disruption through cyber attacks. The NCSC and ICO are growing increasingly concerned that silent incidents make future attacks more likely, while sharing information amongst communities about an attack can ultimately improve the threat landscape for everyone.</p>
<p>The NCSC and ICO have also stressed the importance of transparency in the aftermath of an attack, highlighting that a lack of evidence that data has been stolen does not mean theft did not take place. Reporting incidents in accordance with regulatory responsibilities can help improve wider awareness and cyber resilience.</p>
<p>Click <a href="https://www.ncsc.gov.uk/news/experts-challenge-myths-around-reporting-cyber-attacks-in-bid-to-help-break-cycle-of-crime">here</a> to read the full NCSC publication or <a href="https://www.ncsc.gov.uk/blog-post/why-more-transparency-around-cyber-attacks-is-a-good-thing-for-everyone">here</a> to access the blog post.</p>
<p><strong>The need for cybersecurity</strong></p>
<p>The argument that 'cyber-attacks won't happen to me, they only target big companies' is unsustainable for smaller businesses in today's climate.</p>
<p>Smaller companies ("SMEs") can be the victim of security incidents on the basis of the security vulnerabilities that they might have, rather on the basis of any specific targeting. It can also be more profitable to carry out a simple, less risky attack on a small company than a large corporation with a dedicated security team. The NCSC, supported by BT, are taking clear steps to tackle this issue as apart of the Cyber Aware campaign.</p>
<p>SMEs should remain vigilant and keep a firm focus on getting their basic security protocols right, to reduce the risk of falling victim to a cyber-attack. For example, ensuring that antivirus protection is in place for all systems and devices, securing back-up data, implementing regular patching across systems and keeping passwords secure. Further, using business-grade Wi-Fi with built-in security and protection should be standard for SMEs to ensure total security across the firm and updating all relevant business devices to guarantee that everything has the correct protection.</p>
<p>BT has noted that the NCSC is offering support to them as a CNI operator and targeted guidance and tools for smaller companies as part of the Cyber Aware campaign.</p>
<p>See BT's full article <a href="https://newsroom.bt.com/cybersecurity-is-critical-for-businesses-big-and-small/">here</a>.</p>
<p><strong>Global ransomware payments double in one year</strong></p>
<p>A recent survey by British cybersecurity firm Sophos has revealed that the average global ransomware payment rose to £1.2 million over the past year. The average payment by UK organisations in 2023 is also higher than the global average. The Sophos report was drawn from a survey of 3,000 senior IT and cybersecurity professionals across a range of organisations, such as schools, retailers, and healthcare providers.</p>
<p>The two main trends identified in the report concern the targeting of high grossing companies as well as sectors with a lower level of resources and technology. The average pay-out by companies with revenues of more than $5bn a year was approximately $2.5m. Sophos have warned that this illustrates the tendency of threat actors to adjust the amount they will accept based on an organisation's ability to pay. The education sector was the most likely to have experienced an attack last year. IT, tech and telecoms companies reported the lowest level of attack, likely indicating a higher level of cyber readiness.</p>
<p>The Sophos report acts as a good reminder to organisations to ensure that they are regularly engaging in sound cyber practices. The report noted that nearly all organisations that had their data encrypted were able to retrieve it, largely through backup systems. Having proper backups for data recovery as well as general cyber readiness is imperative for all companies, and especially those without the annual revenue to consider funding a ransom payment.</p>
<p>Click <a href="https://www.theguardian.com/technology/2023/may/10/ransomware-payments-nearly-double-in-one-year">here</a> to read the full Guardian article.</p>]]></description><pubDate>Thu, 08 Jun 2023 14:30:00 +0100</pubDate><category>Data and privacy</category><authors:names>Richard Breavington, Daniel Guilfoyle, Ian Dinning, Rachel Ford, Christopher Ashton, Elizabeth Zang, Emanuele Santella </authors:names><content:encoded><![CDATA[<p><strong>New fixed recoverable costs for professional negligence claims</strong></p>
<p>The new fixed recoverable costs regime ('FRC') is due to come into force on 1 October 2023, despite opposing opinions from various legal associations.</p>
<p>Under the new rules, professional negligence claims issued on or after 1 October 2023 where £100,000 or less is sought, will be subject to a sliding scale of FRC. The new limits on recovering costs will apply to claims allocated to the fast or newly created intermediate track, regardless of whether the actual sums incurred by the parties are higher or lower than the FRC.</p>
<p>In practice, the new rules are likely to apply to less complex cases where:</p>
<ul>
    <li>The sum sought is between £25,000 and £100,000.</li>
    <li>The trial will last 3 days or less.</li>
    <li>There are no more than 2 experts giving oral evidence per party.</li>
    <li>There are no more than 3 parties (2 claimants and 1 defendant or 1 claimant and 2 defendants); and</li>
    <li>There are no allegations of fraud.</li>
</ul>
<p>
These changes are likely to have a significant impact on litigants and insurers, which will give rise to new tactical considerations and impact the likelihood of claimants pursuing litigation, if they are unable to recover a significant portion of their legal costs.</p>
<p>See RPC's full article <a href="/thinking/professional-and-financial-risks/what-the-fix/">here</a> and Lawyer's Covered publication <a href="/thinking/professional-and-financial-risks/lawyers-covered-may-2023/">here</a>.</p>
<p><strong>Big names caught up in big cyber attack</strong></p>
<p><strong></strong>British Airways (BA), Boots, BBC and Air Lingus are among the latest companies caught up in a recent mass hack. The exploit at the root of this mass hack was disclosed last week by US company Progress Software. Progress Software warned that hackers were able to access its MOVEit Transfer tool, which is designed to move sensitive files securely and is utilised globally. It is suspected that the ransomware group, Cl0p, is responsible for the hack, who are alleged to be based in Russia.</p>
<p>Staff at BA have been warned that personal data, including possible bank details, may have been stolen by the group. Other personal data relating to staff at the BBC has also reportedly been compromised.<br />
<br />
The National Cyber Security Centre has urged organisations using the compromised software to carry out security updates that have been provided by Progress Software. The National Crime Agency is aware of a number of UK-based organisations that have been impacted by a cyber incident as a result of the security flaw and is "working with partners to support those organisations and understand the full impact on the UK."</p>
<p>Click <a href="https://www.bbc.co.uk/news/technology-65814104">here</a> for the full article.</p>
<p><strong>Cyber-attack costs conveyancers £7m<br />
</strong></p>
<p>
In November 2021, conveyancing services giant, Simplify, suffered a cyber-attack when a threat actor gained unauthorised access to their systems, including internal files containing personal data. This incident led to a major IT systems outage. Simplify spent 10 weeks restoring their systems and had to significantly reduce their level of new cases. The group complied with all relevant obligations required by the Information Commissioner's Office (ICO), which does not intend to take any further action against the group.</p>
<p>According to the parent company, UKLS Acquisitions Limited, this impacted Simplify's results for the financial year which, had it not been for the cyber-attack, would have been on track to turn around a record number of completions.</p>
<p>Simplify also suffered from a one-off cost of £7.3m and exceptional income of £6.8m arising from the cyber-attack alone. Although the giant successfully recovered from its insurers in relation to lost business, they had to enter discussions with its funders to fulfil long-term funding and capital structure of the group. Shareholders have since injected a further £15m of working capital into the company.</p>
<p>This provides a stark example of the impact than ransomware can have on professional services businesses. Please see Lawyer's Covered publication <a href="/thinking/professional-and-financial-risks/lawyers-covered-may-2023/">here</a> and Legal Gazette's full article <a href="https://www.lawgazette.co.uk/news/cyber-attack-cost-conveyancing-giant-7m-but-the-insurers-paid-up/5115931.article?">here</a>.</p>
<p><strong>AI and "Friday Afternoon Frauds" on Law firms</strong></p>
<p>Law firms are under continuous pressure to stay aware of fraud risks. The rapid progress of AI technology gives new rise to more uncertain risks of phishing fraud. There is particular concern about GPT-4, the successor of Open AI's ChatGPT, where there have been reports of scammers using generative AI to clone voices to perpetrate frauds.</p>
<p>Although law firms aim to keep up to date with possible fraud risks, new technology assists in undermining routine checks that law firms tend to rely on. For example, following up with a client on the telephone following the receipt of a suspicious email. The use of new technology will mean that scammers can clone voices and potentially undermine routine checks employed by firms.</p>
<p>The Law Society presently has guidance including warning signs to make firms familiar with ongoing fraudster activity, which can be found <a href="https://www.lawsociety.org.uk/Topics/Cybersecurity/Guides/Cybersecurity-for-solicitors">here</a>. However, this guidance does not take the impacts of generative AI into account.</p>
<p>RPC have prepared a blog suggesting that the Law Society will need to strike a balance between addressing specific risks as they emerge and putting in place flexible guidance which can respond to a variety of novel, and yet unknown, risks.</p>
<p>See our full article <a href="/thinking/professional-and-financial-risks/new-developments-in-ai-may-put-law-firms-at-greater-risk-of-phishing-fraud/">here</a>.</p>
<p><strong>The "Unicorn Kingdom's" AI White Paper</strong></p>
<p><strong></strong>The UK's AI White Paper has recently been published, heralding a pro innovation and light regulation approach. However, the Future of Life Institute almost simultaneously published an open letter calling for a six-month halt in work on AI systems more powerful than the generative AI system: GPT-4.</p>
<p>The White Paper suggests a wait and see approach to allow regulation to be appropriate for innovators of AI to progress and thrive. There is no intention to introduce legislation and the framework will be principles-based. There are also no current plans to appoint a separate AI regulator. The Government suggests monitoring functions to determine how the regulatory framework can be performed. This monitoring will include test beds, sandbox initiatives, conducting horizon scanning, and promoting interoperability with international regulatory frameworks. This approach differs from the US and EU's more formal risk-based focus.</p>
<p>The current Government consultation is ongoing and due to close on 21 June 2023. We await further details as to the implementation of the regulatory framework. However, the concern is that with such a tentative approach to regulation, businesses, large and small, operating in the UK's AI landscape could require more immediate regulatory certainty to protect them.</p>
<p>See our full article <a href="/thinking/tech/the-unicorn-kingdoms-ai-white-paper/">here</a>.</p>
<p><strong>Joint blog post by the NCSC and ICO on transparency around cyber attacks</strong></p>
<p>The National Cyber Security Centre (NCSC) and the ICO have co-produced a blog post which aims to dispel common misconceptions that can discourage organisations from reporting a cyber-attack. This follows concerns that unreported incidents are denying organisations the opportunity to learn from them and prevent future attacks. The post focuses on six misconceptions that often discourage organisations from reporting attacks, particularly ransomware attacks, and sets out to dispel them.</p>
<p>The six ‘myths’ which the NCSC and the ICO have identified as commonly held by organisations that have fallen victim to cyber incidents are:</p>
<ol>
    <li>If I cover up the attack, everything will be ok</li>
    <li>Reporting to the authorities makes it more likely your incident will go public</li>
    <li>Paying a ransom makes the incident go away</li>
    <li>I’ve got good offline backups, I won’t need to pay a ransom</li>
    <li>If there is no evidence of data theft, you don’t need to report to the ICO</li>
    <li>You’ll only get a fine if your data is leaked</li>
</ol>
<p>
This latest press release comes amidst threat actors continuing to cause significant disruption through cyber attacks. The NCSC and ICO are growing increasingly concerned that silent incidents make future attacks more likely, while sharing information amongst communities about an attack can ultimately improve the threat landscape for everyone.</p>
<p>The NCSC and ICO have also stressed the importance of transparency in the aftermath of an attack, highlighting that a lack of evidence that data has been stolen does not mean theft did not take place. Reporting incidents in accordance with regulatory responsibilities can help improve wider awareness and cyber resilience.</p>
<p>Click <a href="https://www.ncsc.gov.uk/news/experts-challenge-myths-around-reporting-cyber-attacks-in-bid-to-help-break-cycle-of-crime">here</a> to read the full NCSC publication or <a href="https://www.ncsc.gov.uk/blog-post/why-more-transparency-around-cyber-attacks-is-a-good-thing-for-everyone">here</a> to access the blog post.</p>
<p><strong>The need for cybersecurity</strong></p>
<p>The argument that 'cyber-attacks won't happen to me, they only target big companies' is unsustainable for smaller businesses in today's climate.</p>
<p>Smaller companies ("SMEs") can be the victim of security incidents on the basis of the security vulnerabilities that they might have, rather on the basis of any specific targeting. It can also be more profitable to carry out a simple, less risky attack on a small company than a large corporation with a dedicated security team. The NCSC, supported by BT, are taking clear steps to tackle this issue as apart of the Cyber Aware campaign.</p>
<p>SMEs should remain vigilant and keep a firm focus on getting their basic security protocols right, to reduce the risk of falling victim to a cyber-attack. For example, ensuring that antivirus protection is in place for all systems and devices, securing back-up data, implementing regular patching across systems and keeping passwords secure. Further, using business-grade Wi-Fi with built-in security and protection should be standard for SMEs to ensure total security across the firm and updating all relevant business devices to guarantee that everything has the correct protection.</p>
<p>BT has noted that the NCSC is offering support to them as a CNI operator and targeted guidance and tools for smaller companies as part of the Cyber Aware campaign.</p>
<p>See BT's full article <a href="https://newsroom.bt.com/cybersecurity-is-critical-for-businesses-big-and-small/">here</a>.</p>
<p><strong>Global ransomware payments double in one year</strong></p>
<p>A recent survey by British cybersecurity firm Sophos has revealed that the average global ransomware payment rose to £1.2 million over the past year. The average payment by UK organisations in 2023 is also higher than the global average. The Sophos report was drawn from a survey of 3,000 senior IT and cybersecurity professionals across a range of organisations, such as schools, retailers, and healthcare providers.</p>
<p>The two main trends identified in the report concern the targeting of high grossing companies as well as sectors with a lower level of resources and technology. The average pay-out by companies with revenues of more than $5bn a year was approximately $2.5m. Sophos have warned that this illustrates the tendency of threat actors to adjust the amount they will accept based on an organisation's ability to pay. The education sector was the most likely to have experienced an attack last year. IT, tech and telecoms companies reported the lowest level of attack, likely indicating a higher level of cyber readiness.</p>
<p>The Sophos report acts as a good reminder to organisations to ensure that they are regularly engaging in sound cyber practices. The report noted that nearly all organisations that had their data encrypted were able to retrieve it, largely through backup systems. Having proper backups for data recovery as well as general cyber readiness is imperative for all companies, and especially those without the annual revenue to consider funding a ransom payment.</p>
<p>Click <a href="https://www.theguardian.com/technology/2023/may/10/ransomware-payments-nearly-double-in-one-year">here</a> to read the full Guardian article.</p>]]></content:encoded></item><item><guid isPermaLink="false">{46DC3161-6E6F-4EB4-BFFB-F09B55BD1930}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/cyber-bytes-issue-52/</link><title>Cyber_Bytes - Issue 52</title><description><![CDATA[<div style="text-align: center;">
<table border="0" cellspacing="0" cellpadding="0" width="100%" style="width: 100%;">
    <tbody>
        <tr>
            <td valign="top" style="width: 100%; padding: 0cm; text-align: left;">
            <p><strong> Russia-linked hackers a threat to UK infrastructure</strong> </p>
            <p>Oliver Dowden, a minister in the Cabinet Office, has warned that Russia-aligned hackers are seeking to "disrupt or destroy" Britain's critical national infrastructure. The head of the National Cyber Security Centre (<strong>NCSC</strong>), Lindsey Cameron, has raised similar concerns, warning that the UK is not doing enough to protect its infrastructure from cyber threats. </p>
            <p>The NCSC has issued an official threat alert to critical businesses, warning of the unpredictability of independent hackers who are "not subject to formal state control" and are primarily ideologically motivated, as opposed to seeking financial gain. </p>
            <p>With a significant rise in cyber activity across Ukraine following the ongoing conflict with Russia, UK government agencies are preparing for a scenario where threat actors look to expand their efforts outside of the region. In response to these emerging threats, UK policymakers are considering plans to introduce cyber resilience targets for critical sectors such as UK energy and water suppliers as well as bringing private sector businesses working on critical infrastructure into the scope of resilience regulations. </p>
            <p>Following recent malware attacks such as the 2017 NotPetya virus which infiltrated IT systems across more than 60 countries, governments across the globe must remain increasingly vigilant of emerging cyber threats. </p>
            <p>Click here to <a href="https://www.bbc.co.uk/news/uk-65319771">read</a> the BBC news article.</p>
            </td>
        </tr>
    </tbody>
</table>
</div>
<p>        <strong>Royal Mail Ransomware Negotiation Analysis</strong></p>
<p>Cyber security consultants, STORM Guidance have produced a detailed report analysing the negotiation transcript released by LockBit in the wake of its ransomware attack on Royal Mail International (Royal Mail). The attack caused a notable outage and delays across the UK. The key findings from the transcript revolve around the lack of formal negotiation techniques used by those negotiating on behalf of Royal Mail as well as the emotiveness of the negotiators. </p>
<p>LockBit's release of the Royal Mail ransom transcript is likely a retaliatory attempt to cause Royal Mail as much damage as possible. This is following what STORM Guidance refer to as the potentially "antagonising" approach taken in the negotiation. Reducing the risk of antagonising can be achieved through short, polite, and specific posts with careful wording and attention to posting cadence. </p>
<p>STORM have issued a warning to companies engaging negotiators when faced with a ransomware attack as many providers of ransomware negotiation services are not formally trained. This could pose a risk. An untrained ransom negotiator might potentially make mistakes that result in unnecessary loss such as the early release of breached data or the victim being exposed to further attacks by an antagonised threat actor. </p>
<p>Click <a href="https://www.stormguidance.com/single-post/royal-mail-ransomware-negotiation-analysis">here</a> to read STORM's article. You can then download the full report by following the simple instructions on STORM's website.</p>
<p>    <strong>Ransomware Driving SOC Modernization Requirements</strong> </p>
<p>A new global research study has explored the direct impact of ransomware threats on the investment decisions of organisations regarding their Security Operations Centres (<strong>SOC</strong>s). The report follows a global survey of 1,203 security professionals from eight countries across a dozen industries.</p>
<p> More than 58% of respondents said that their SOC spends a large proportion of its time responding to ransomware and supply chain attacks. With a rise in ransomware threats increasing the need for automation across the sector, many respondents are now focusing their efforts on leveraging industry-leading detection, prevention, visibility, and automation technologies. The report proposes that modernisation in the realm of SOCs will be focused across specific areas such as deploying new detection capabilities with better efficacy and looking for ways to augment staffing by contracting for managed services. </p>
<p>Managed Detection and Response (MDR) services have been earmarked as a key tool for the future, helping to remove the burden and arduous process of alert triaging and prioritization which in turn gives time back to security teams to conduct remediation and focus on other priorities. </p>
<p>Click <a href="https://www.cybereason.com/hubfs/dam/collateral/reports/Ransomware_and_the_Modern_SOC_2023.pdf">here</a> to read the full Cybereason report.</p>
<p>    <strong>Windows zero-day vulnerability exploited in ransomware attacks</strong></p>
<p>Tech giant Microsoft has issued a software update remedying a zero-day vulnerability in the Windows Common Log File System (<strong>CLFS</strong>). The vulnerability was being actively exploited by cybercriminals to escalate privileges and deploy ransomware payloads. </p>
<p>Security researchers warned that the Nokoyawa ransomware gang has used other exploits targeting the CLFS driver since June 2022, with similar yet distinct characteristics, linking them all to a single exploit developer. Industries targeted by the threat actors include retail and wholesale, energy, manufacturing, healthcare, and software development. The use of zero-day attacks by cybercrime groups illustrates their growing sophistication. Organisations should remain alert and ensure that their systems are running the most up-to-date software versions. </p>
<p>Click <a href="https://www-bleepingcomputer-com.cdn.ampproject.org/c/s/www.bleepingcomputer.com/news/security/windows-zero-day-vulnerability-exploited-in-ransomware-attacks/amp/">here</a> to read the full Bleeping Computer post.</p>
<p>    <strong>Study shows how fast AI can crack passwords</strong></p>
<p>Security experts have issued warnings over the security risks being posed by new generative AI services. Password Generative Adversarial Network (<strong>PassGAN</strong>) uses machine learning algorithms instead of having to run manual password analysis on leaked password databases. These PassGANs generate password guesses after autonomously learning the distribution of passwords by processing previous real-world security breaches. </p>
<p>In a recent study published by Home Security Heroes, PassGAN processed a list of over 150,000 credentials and was able to crack 51% of all common passwords in less than one minute, 65% in less than an hour, 71% in less than a day, and 81% in less than a month. With growing concerns amongst industry experts, Microsoft announced its new Security Co-pilot suite that will help security researchers protect against malicious use of modern technology. </p>
<p>The following key tips on password security remain more relevant than ever:</p>
<ul>
    <li>Use at least 12 (and ideally 18+) characters or more, with upper and lowercase letters as well as numbers and symbols. All passwords with 18 characters that include both letters and numbers were found to be safe from AI cracking for now.</li>
    <li>Use non-SMS based two-factor authentication / multi-factor authentication.</li>
    <li>Use auto-generated passwords where possible.</li>
    <li>Refrain from re-using passwords across accounts.</li>
    <li>Refrain from using public Wi-Fi, especially for banking and similar accounts.</li>
</ul>
<p>Finally, do not enter any of your real passwords if using an AI tool to test the strength of your own passwords. This follows wider concerns around inputted "prompts" remaining visible to server hosts. </p>
<p>Click <a href="https://9to5mac.com/2023/04/07/ai-cracks-passwords-this-fast-how-to-protect/">here</a> to read the full 9to5Mac article.</p>
<div style="text-align: center;">
<table border="0" cellspacing="0" cellpadding="0" width="100%" style="width: 100%;">
    <tbody>
        <tr>
            <td valign="top" style="width: 100%; padding: 0cm; text-align: left;">
            <p><strong> "Operation Cookie Monster": International police action seizes dark web market</strong> </p>
            <p>International law enforcement agencies have seized a sprawling dark web marketplace referred to as "Genesis Market" (Genesis) in a multinational crackdown dubbed "Operation Cookie Monster." The site, which the U.S. Treasury believed to operate from Russia, was popular amongst cybercriminals. Domains belonging to the organisation have now been seized by the FBI, with around 120 arrests made and almost 100 pieces of "preventative activity." </p>
            <p>Britain's National Crime Agency (<strong>NCA</strong>) has estimated that the service hosted around 80 million credentials and digital fingerprints stolen from more than 2 million people. Genesis specialised in the sale of digital products, with a particular focus on "browser fingerprints" harvested from computers infected with malicious software. These fingerprints often included credentials, cookies, internet protocol addresses and other browser or operating system details which criminals could use to bypass anti-fraud solutions such as multi-factor authentication or device fingerprinting. </p>
            <p>The closure of this marketplace will likely contribute to a significant reduction in cybercriminal activity and highlights the need for continued international co-operation between countries in the fight against criminal cyber activity.
            </p>
            <p style="margin: 0cm 0cm 7.5pt; text-align: justify;">Click <a href="https://www.reuters.com/world/uk/operation-cookie-monster-international-police-action-seizes-dark-web-market-2023-04-05/">here</a> to read the full Reuters article.</p>
            </td>
        </tr>
    </tbody>
</table>
</div>]]></description><pubDate>Tue, 09 May 2023 14:12:00 +0100</pubDate><category>Data and privacy</category><authors:names>Richard Breavington, Daniel Guilfoyle, Ian Dinning, Rachel Ford, Christopher Ashton, Elizabeth Zang, Emanuele Santella </authors:names><content:encoded><![CDATA[<div style="text-align: center;">
<table border="0" cellspacing="0" cellpadding="0" width="100%" style="width: 100%;">
    <tbody>
        <tr>
            <td valign="top" style="width: 100%; padding: 0cm; text-align: left;">
            <p><strong> Russia-linked hackers a threat to UK infrastructure</strong> </p>
            <p>Oliver Dowden, a minister in the Cabinet Office, has warned that Russia-aligned hackers are seeking to "disrupt or destroy" Britain's critical national infrastructure. The head of the National Cyber Security Centre (<strong>NCSC</strong>), Lindsey Cameron, has raised similar concerns, warning that the UK is not doing enough to protect its infrastructure from cyber threats. </p>
            <p>The NCSC has issued an official threat alert to critical businesses, warning of the unpredictability of independent hackers who are "not subject to formal state control" and are primarily ideologically motivated, as opposed to seeking financial gain. </p>
            <p>With a significant rise in cyber activity across Ukraine following the ongoing conflict with Russia, UK government agencies are preparing for a scenario where threat actors look to expand their efforts outside of the region. In response to these emerging threats, UK policymakers are considering plans to introduce cyber resilience targets for critical sectors such as UK energy and water suppliers as well as bringing private sector businesses working on critical infrastructure into the scope of resilience regulations. </p>
            <p>Following recent malware attacks such as the 2017 NotPetya virus which infiltrated IT systems across more than 60 countries, governments across the globe must remain increasingly vigilant of emerging cyber threats. </p>
            <p>Click here to <a href="https://www.bbc.co.uk/news/uk-65319771">read</a> the BBC news article.</p>
            </td>
        </tr>
    </tbody>
</table>
</div>
<p>        <strong>Royal Mail Ransomware Negotiation Analysis</strong></p>
<p>Cyber security consultants, STORM Guidance have produced a detailed report analysing the negotiation transcript released by LockBit in the wake of its ransomware attack on Royal Mail International (Royal Mail). The attack caused a notable outage and delays across the UK. The key findings from the transcript revolve around the lack of formal negotiation techniques used by those negotiating on behalf of Royal Mail as well as the emotiveness of the negotiators. </p>
<p>LockBit's release of the Royal Mail ransom transcript is likely a retaliatory attempt to cause Royal Mail as much damage as possible. This is following what STORM Guidance refer to as the potentially "antagonising" approach taken in the negotiation. Reducing the risk of antagonising can be achieved through short, polite, and specific posts with careful wording and attention to posting cadence. </p>
<p>STORM have issued a warning to companies engaging negotiators when faced with a ransomware attack as many providers of ransomware negotiation services are not formally trained. This could pose a risk. An untrained ransom negotiator might potentially make mistakes that result in unnecessary loss such as the early release of breached data or the victim being exposed to further attacks by an antagonised threat actor. </p>
<p>Click <a href="https://www.stormguidance.com/single-post/royal-mail-ransomware-negotiation-analysis">here</a> to read STORM's article. You can then download the full report by following the simple instructions on STORM's website.</p>
<p>    <strong>Ransomware Driving SOC Modernization Requirements</strong> </p>
<p>A new global research study has explored the direct impact of ransomware threats on the investment decisions of organisations regarding their Security Operations Centres (<strong>SOC</strong>s). The report follows a global survey of 1,203 security professionals from eight countries across a dozen industries.</p>
<p> More than 58% of respondents said that their SOC spends a large proportion of its time responding to ransomware and supply chain attacks. With a rise in ransomware threats increasing the need for automation across the sector, many respondents are now focusing their efforts on leveraging industry-leading detection, prevention, visibility, and automation technologies. The report proposes that modernisation in the realm of SOCs will be focused across specific areas such as deploying new detection capabilities with better efficacy and looking for ways to augment staffing by contracting for managed services. </p>
<p>Managed Detection and Response (MDR) services have been earmarked as a key tool for the future, helping to remove the burden and arduous process of alert triaging and prioritization which in turn gives time back to security teams to conduct remediation and focus on other priorities. </p>
<p>Click <a href="https://www.cybereason.com/hubfs/dam/collateral/reports/Ransomware_and_the_Modern_SOC_2023.pdf">here</a> to read the full Cybereason report.</p>
<p>    <strong>Windows zero-day vulnerability exploited in ransomware attacks</strong></p>
<p>Tech giant Microsoft has issued a software update remedying a zero-day vulnerability in the Windows Common Log File System (<strong>CLFS</strong>). The vulnerability was being actively exploited by cybercriminals to escalate privileges and deploy ransomware payloads. </p>
<p>Security researchers warned that the Nokoyawa ransomware gang has used other exploits targeting the CLFS driver since June 2022, with similar yet distinct characteristics, linking them all to a single exploit developer. Industries targeted by the threat actors include retail and wholesale, energy, manufacturing, healthcare, and software development. The use of zero-day attacks by cybercrime groups illustrates their growing sophistication. Organisations should remain alert and ensure that their systems are running the most up-to-date software versions. </p>
<p>Click <a href="https://www-bleepingcomputer-com.cdn.ampproject.org/c/s/www.bleepingcomputer.com/news/security/windows-zero-day-vulnerability-exploited-in-ransomware-attacks/amp/">here</a> to read the full Bleeping Computer post.</p>
<p>    <strong>Study shows how fast AI can crack passwords</strong></p>
<p>Security experts have issued warnings over the security risks being posed by new generative AI services. Password Generative Adversarial Network (<strong>PassGAN</strong>) uses machine learning algorithms instead of having to run manual password analysis on leaked password databases. These PassGANs generate password guesses after autonomously learning the distribution of passwords by processing previous real-world security breaches. </p>
<p>In a recent study published by Home Security Heroes, PassGAN processed a list of over 150,000 credentials and was able to crack 51% of all common passwords in less than one minute, 65% in less than an hour, 71% in less than a day, and 81% in less than a month. With growing concerns amongst industry experts, Microsoft announced its new Security Co-pilot suite that will help security researchers protect against malicious use of modern technology. </p>
<p>The following key tips on password security remain more relevant than ever:</p>
<ul>
    <li>Use at least 12 (and ideally 18+) characters or more, with upper and lowercase letters as well as numbers and symbols. All passwords with 18 characters that include both letters and numbers were found to be safe from AI cracking for now.</li>
    <li>Use non-SMS based two-factor authentication / multi-factor authentication.</li>
    <li>Use auto-generated passwords where possible.</li>
    <li>Refrain from re-using passwords across accounts.</li>
    <li>Refrain from using public Wi-Fi, especially for banking and similar accounts.</li>
</ul>
<p>Finally, do not enter any of your real passwords if using an AI tool to test the strength of your own passwords. This follows wider concerns around inputted "prompts" remaining visible to server hosts. </p>
<p>Click <a href="https://9to5mac.com/2023/04/07/ai-cracks-passwords-this-fast-how-to-protect/">here</a> to read the full 9to5Mac article.</p>
<div style="text-align: center;">
<table border="0" cellspacing="0" cellpadding="0" width="100%" style="width: 100%;">
    <tbody>
        <tr>
            <td valign="top" style="width: 100%; padding: 0cm; text-align: left;">
            <p><strong> "Operation Cookie Monster": International police action seizes dark web market</strong> </p>
            <p>International law enforcement agencies have seized a sprawling dark web marketplace referred to as "Genesis Market" (Genesis) in a multinational crackdown dubbed "Operation Cookie Monster." The site, which the U.S. Treasury believed to operate from Russia, was popular amongst cybercriminals. Domains belonging to the organisation have now been seized by the FBI, with around 120 arrests made and almost 100 pieces of "preventative activity." </p>
            <p>Britain's National Crime Agency (<strong>NCA</strong>) has estimated that the service hosted around 80 million credentials and digital fingerprints stolen from more than 2 million people. Genesis specialised in the sale of digital products, with a particular focus on "browser fingerprints" harvested from computers infected with malicious software. These fingerprints often included credentials, cookies, internet protocol addresses and other browser or operating system details which criminals could use to bypass anti-fraud solutions such as multi-factor authentication or device fingerprinting. </p>
            <p>The closure of this marketplace will likely contribute to a significant reduction in cybercriminal activity and highlights the need for continued international co-operation between countries in the fight against criminal cyber activity.
            </p>
            <p style="margin: 0cm 0cm 7.5pt; text-align: justify;">Click <a href="https://www.reuters.com/world/uk/operation-cookie-monster-international-police-action-seizes-dark-web-market-2023-04-05/">here</a> to read the full Reuters article.</p>
            </td>
        </tr>
    </tbody>
</table>
</div>]]></content:encoded></item><item><guid isPermaLink="false">{40E7A55B-2154-4A6E-ABCB-09DCD4F8F903}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/cyber-bytes-issue-51/</link><title>Cyber_Bytes - Issue 51</title><description><![CDATA[<p><strong>Lack of data raises concern around how to define emerging risks</strong></p>
<p style="color: #454040; background-color: #ffffff; margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; text-align: justify;">Peter Mansfield, partner at RPC, recently chaired a panel on digital risks at RPC's Global Access Week. During the discussion, Mansfield warned that new and emerging risks, which arise as we move into the fourth industrial age (the digital transition), will make it increasingly difficult for insurers to price and understand future exposures. Typically, insurers use historical data in order to quantify risks. However, Mansfield underlined that the market was ultimately entering an age of unknown risks.</p>
<p style="color: #454040; background-color: #ffffff; margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; text-align: justify;">The panel also explored the potential for cyber insurance to improve commercial cyber security as company's engage in the security-related "<em style="margin: 0px; padding: 0px;">basic hygiene</em>" required by their insuring policies. However, Eleonora Sorribes, partner at French law firm, HMN & Partners, warned that organisations would need to be careful not to adopt an increasingly lax approach to their engagement with safety protocols simply because they are covered by a cybersecurity policy.</p>
<p style="color: #454040; background-color: #ffffff; margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; text-align: justify;">Click <a rel="noopener noreferrer" href="https://www.theinsurer.com/news/lack-of-data-raises-concern-around-how-to-define-emerging-risks-rpcs-mansfield/" target="_blank"><span>here</span></a> to read the Insurer article.</p>
<p style="color: #454040; background-color: #ffffff; margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; text-align: justify;"><strong><strong>"Same Interest" test clarification for representative actions under CPR 19.6</strong></strong></p>
<p style="color: #454040; background-color: #ffffff; margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; text-align: justify;">CPR 19.6 provides that where more than one person has the same interest in a claim, that claim may be brought by or against one or more of the persons as representatives if they have the same interest as other parties.</p>
<p style="color: #454040; background-color: #ffffff; margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; text-align: justify;">The High Court in <em style="margin: 0px; padding: 0px;">Commission Recovery Ltd v Marks & Clerk LLP [2023] EWHC 398 (Comm)</em>, has recently revisited the "same interest" test for representative actions under CPR 19.6. The Court had to decide whether the entitlement of the Claimant class could be calculated on a common basis. The claim in question was for secret commission. There were some differences in the claims and the remedies sought.</p>
<p style="color: #454040; background-color: #ffffff; margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; text-align: justify;">The High Court held that the "same interest" test does not require claimants to have identical claims or interests. It relied heavily on the Supreme Court's decision in <em style="margin: 0px; padding: 0px;">Lloyd v Google [2021] UKSC 50</em>. That case affirmed that the entirety of a class may be represented by a sole representative in circumstances where the position of other class members would not be prejudiced.</p>
<p style="color: #454040; background-color: #ffffff; margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; text-align: justify;">The High Court's ruling solidifies the existing position and potentially leaves room for further development as to the system of collective redress. In circumstances where a data breach may cause mass harm to a collective group of individuals, the "same interest" test may be relevant to a group of claimants potentially seeking to bring a claim through a sole representative.</p>
<p style="color: #454040; background-color: #ffffff; margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; text-align: justify;">Click <a rel="noopener noreferrer" href="https://www.bailii.org/ew/cases/EWHC/Comm/2023/398.html" target="_blank"><span>here</span></a> to read the full Judgment.</p>
<p style="color: #454040; background-color: #ffffff; margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; text-align: justify;"><strong>The Data Protection and Digital Information (No.2) Bill introduced in the House of Commons</strong></p>
<p style="color: #454040; background-color: #ffffff; margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; text-align: justify;">On 8 March 2023, the UK government introduced the Data Protection and Digital Information (No.2) Bill (the "<span style="margin: 0px; padding: 0px; color: #575a5d;"><strong style="margin: 0px; padding: 0px;">Bill</strong></span>") to Parliament. The first version of the Bill was prepared in July 2022 and paused in September 2022 to allow for further consideration with businesses and data experts.</p>
<p style="color: #454040; background-color: #ffffff; margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; text-align: justify;">The changes seek to amend current legislation that the UK "inherited" from the EU in the form of the GDPR. The new data laws are set to "cut down pointless paper work for businesses" according to the UK government's <a rel="noopener noreferrer" href="https://www.gov.uk/government/news/british-businesses-to-save-billions-under-new-uk-version-of-gdpr" target="_blank"><span>press release</span></a>.</p>
<p style="color: #454040; background-color: #ffffff; margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; text-align: justify;"><span style="margin: 0px; padding: 0px; text-decoration: underline; color: #575a5d;">Key changes from a cyber breach response perspective</span></p>
<p style="color: #454040; background-color: #ffffff; margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; text-align: justify;">The Bill includes the following changes:</p>
<ul style="background-color: #ffffff; margin: 0px 0px 15px 25px; padding: 0px;">
    <li style="color: #454040; margin: 0px 0px 2px; padding: 0px; text-align: justify;">Article 5(1)(b) - This Article prohibits data processing that is not compatible with the original purpose for which the personal data was collected. The amendments clarify the rules around compatibility of further processing of personal data.<br style="margin: 0px; padding: 0px;" />
    <br style="margin: 0px; padding: 0px;" />
    </li>
    <li style="color: #454040; margin: 0px 0px 2px; padding: 0px; text-align: justify;">Article 6 - The Bill provides new examples of legitimate interests in processing personal data, including "national security, preventing crime, direct marketing, intra-group transmission of personal data where necessary for administrative purposes and ensuring security of network and information systems".<br style="margin: 0px; padding: 0px;" />
    <br style="margin: 0px; padding: 0px;" />
    </li>
    <li style="color: #454040; margin: 0px 0px 2px; padding: 0px; text-align: justify;">Article 12A - Requests from data subjects under Articles 14-22 and 34 can be rejected where they are found to be "vexatious or excessive". The Bill provides examples of such requests, including requests which are "intended to cause distress, are not made in good faith, or are an abuse of process".<br style="margin: 0px; padding: 0px;" />
    <br style="margin: 0px; padding: 0px;" />
    </li>
    <li style="color: #454040; margin: 0px 0px 2px; padding: 0px; text-align: justify;">Article 30A - The Bill extends record keeping requirements to include all controllers/processors (including small businesses) that carry out processing of personal data which is likely to result in a high risk to the rights and freedoms of individuals. These controllers/processers must maintain appropriate records of processing. The Bill specifies exactly what the controller's and processor's records must include.<br style="margin: 0px; padding: 0px;" />
    <br style="margin: 0px; padding: 0px;" />
    </li>
    <li style="color: #454040; margin: 0px 0px 2px; padding: 0px; text-align: justify;">Article 33 - A personal data breach notification to the ICO shall communicate the name and contact details of the "senior responsible individual" rather than the "data protection officer", following amendments made by the Bill. The senior responsible individual is a "designated individual [who] must be part of the organisation’s senior management". Notification obligations to the ICO do <span style="margin: 0px; padding: 0px; color: #575a5d;"><strong style="margin: 0px; padding: 0px;">not</strong></span> apply to personal data processed for law enforcement purposes if it is for the purposes of safeguarding national security.<br style="margin: 0px; padding: 0px;" />
    <br style="margin: 0px; padding: 0px;" />
    </li>
    <li style="color: #454040; margin: 0px 0px 2px; padding: 0px; text-align: justify;">Article 34 - Data subject notifications obligations relating to personal data breaches do <span style="margin: 0px; padding: 0px; color: #575a5d;"><strong style="margin: 0px; padding: 0px;">not</strong></span> apply to personal data processed for law enforcement purposes if it is for the purpose of safeguarding national security.<br style="margin: 0px; padding: 0px;" />
    <br style="margin: 0px; padding: 0px;" />
    </li>
    <li style="color: #454040; margin: 0px 0px 15px; padding: 0px; text-align: justify;">The ICO has been granted new power to issue a new notice compelling a person to attend an interview to answer questions for the purposes of investigating a suspected offence under data protection legislation. Failure to comply with an interview notice can result in a monetary penalty. It will be a criminal offence to knowingly or recklessly make a false statement in response to an interview notice.<br style="margin: 0px; padding: 0px;" />
    </li>
</ul>
<p style="color: #454040; background-color: #ffffff; margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; text-align: justify;">Click <a rel="noopener noreferrer" href="https://www.gov.uk/government/news/british-businesses-to-save-billions-under-new-uk-version-of-gdpr" target="_blank"><span>here</span></a> to read the UK Gov press release.</p>
<p style="color: #454040; background-color: #ffffff; margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; text-align: justify;"><strong>The NCSC discusses the cyber security risk of Chat GPT and large language models</strong></p>
<p style="color: #454040; background-color: #ffffff; margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; text-align: justify;">Artificial Intelligence (AI) has been trending across the past 12 months, with OpenAI's ChatGPT (an AI chatbot that uses deep learning to produce human-like text) claiming headlines. The platform operates on large language models (LLM), an algorithm which can be trained on a large amount of text-based data. The LLM technology can analyse the relationship between different words and accordingly execute a probability model. Users can then proceed to "prompt" the algorithm by asking it questions that lead to the provision of an answer based on the relationships of the words in its model.</p>
<p style="color: #454040; background-color: #ffffff; margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; text-align: justify;">ChatGPT can allow users to ask an LLM questions as if holding a conversation with a chatbot. This includes the ability to use "prompt augmentation" which involves providing context information about the question.</p>
<p style="color: #454040; background-color: #ffffff; margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; text-align: justify;">Privacy concerns have begun to emerge since query "prompts" remain visible to the LLM host (this being OpenAI in the case of ChatGPT). These companies tend to store queries and use them as a foundation to develop the LLM service/model at a future point in time. Users of these products are being encouraged to thoroughly understand the use and privacy policies of public LLM platforms prior to asking sensitive questions which may include user-identifiable information.</p>
<p style="color: #454040; background-color: #ffffff; margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; text-align: justify;">Additional concerns include the potential for threat actors to coax an LLM into writing highly capable malware or assisting in escalating privileges and finding data once a threat actor has gained access to a network. There is also scope for LLM's to assist threat actors in carrying out social engineering attacks by helping to write convincing phishing emails in the native language of a target. Although AI remains an exciting development which has the potential to boost efficiency within society, organisations and individuals must remain vigilant of bad faith actors who seek to exploit new systems for their own malicious gain.</p>
<p style="color: #454040; background-color: #ffffff; margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; text-align: justify;">Click <a rel="noopener noreferrer" href="https://www.ncsc.gov.uk/blog-post/chatgpt-and-large-language-models-whats-the-risk" target="_blank"><span>here</span></a> to read the NCSC blog post.</p>
<p style="color: #454040; background-color: #ffffff; margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; text-align: justify;"><strong>Ransomware gang claims to have breached Amazon-owned Ring</strong></p>
<p style="color: #454040; background-color: #ffffff; margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; text-align: justify;">The infamous ransomware group known as ALPHV claims to have compromised Ring, the Amazon-owned company that builds smart doorbells with cameras. ALPHV became popularised following the group's use of the BlackCat encryptor malware. Ring's logo recently appeared on the groups "leak site", alongside a threat to publicly leak the smart doorbell operator's data.</p>
<p style="color: #454040; background-color: #ffffff; margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; text-align: justify;">Amazon itself has remained silent on the matter, issuing a short statement that it has "no indications" of Ring experiencing any ransomware attacks. The US tech giant did however announce that a third-party vendor fell victim to a ransomware attack and that Ring is now engaged in an effort to learn more about the incident. Amazon reiterated that the impacted vendor does not have access to its own customer records.</p>
<p style="color: #454040; background-color: #ffffff; margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; text-align: justify;">Questions have emerged regarding the data which ALPHV has accessed and is now leveraging, as well as how the group was able to compromise the target network. It is not yet clear which third-party vendor has been compromised and whether it is considering negotiating with hackers or paying a ransom. No further details will likely be known until ALPHV leaks the data, or the targeted company files a report with the Securities and Exchange Commission (SEC).</p>
<p style="color: #454040; background-color: #ffffff; margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; text-align: justify;">Click <a rel="noopener noreferrer" href="https://www.techradar.com/news/a-ransomware-gang-claims-it-has-breached-ring-and-is-threatening-to-leak-data" target="_blank"><span>here</span></a> to read the Tech Radar article.</p>
<p style="color: #454040; background-color: #ffffff; margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; text-align: justify;"><strong>ICO shares resources to help designers embed data protection by default</strong></p>
<p style="color: #454040; background-color: #ffffff; margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; text-align: justify;">The Information Commissioner's Office (ICO) has produced new guidance which aims to assist tech service providers in embedding data protection into their products and services from their inception.</p>
<p style="color: #454040; background-color: #ffffff; margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; text-align: justify;">The guidance deals with key privacy considerations for each stage of product design, covering "kick-off" up until the "post-launch" period. It includes examples of good practice as well as practical steps which the ICO would expect organisations to take, when designing products and services, in order to comply effectively with data protection laws. Key takeaways for organisations include the need to involve other stakeholders in privacy discussions, as well as ensuring that there is a lawful reason for processing any personal information, in line with a Data Protection Impact Assessment (DPIA) and keeping track of personal information that is handled. The guidance also recommends that organisations should always check whether any privacy risks arise from new products or features which involve new uses of personal information. Organisations should think about how threat actors could use these new sources maliciously.</p>
<p style="color: #454040; background-color: #ffffff; margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; text-align: justify;">Whilst the ICO has recommended technical privacy-enhancing methods such as hashing or encryption, there remains no substitute for a genuine consideration of privacy during the design process. Especially in the light of the potential consequences where leaked information and personal data end up in unauthorised hands.</p>
<p style="color: #454040; background-color: #ffffff; margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; text-align: justify;">Click <a rel="noopener noreferrer" href="https://ico.org.uk/about-the-ico/media-centre/news-and-blogs/2023/03/ico-shares-resources-to-help-designers-embed-data-protection-by-default/" target="_blank"><span>here</span></a> to read the full ICO blog post.</p>
<p style="color: #454040; background-color: #ffffff; margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; text-align: justify;"><strong>Artificial intelligence in the role of assessing cyber risk</strong></p>
<p style="color: #454040; background-color: #ffffff; margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; text-align: justify;">The University of Warwick has produced a review assessing the opportunities for using AI to help reduce cyber risk and threat exposure within the insurance sector. Cybercrime has been on the rise since the onset of the COVID-19 pandemic, with the emergence of sophisticated new methods of attacks. The integration of an efficient digital form of cyber security through the use of AI could help. If employed effectively, AI could help combat cyber risks and perform tasks such as detecting and preventing cyber-attacks in real-time, resisting novel cybercrime and increasing the effectiveness of cyber security teams.</p>
<p style="color: #454040; background-color: #ffffff; margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; text-align: justify;">AI is already used in back-end functions such as fraud detection. Machine Learning (ML) techniques are also being used. For example, Support Vector Machines used a ML algorithm that learns from examples of fraudulent and non-fraudulent activity reports to identify credit card fraud.</p>
<p style="color: #454040; background-color: #ffffff; margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; text-align: justify;">There are further opportunities that the insurance sector can take with AI. Natural Language Processing has been earmarked as a leading interdisciplinary focus which, when applied to cybersecurity, can encourage interactions in the insurance industry between people and machines. This can assist in identifying the risk of a phishing attack by scanning vast amounts of datasets for email conversations or tracking emails that enter an organisation's network in order to identify patterns of malicious behaviour.</p>
<p style="color: #454040; background-color: #ffffff; margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; text-align: justify;">AI and ML could also help defend against DDoS attacks by comparing network traffic with real-time data streams collected from threat-intelligence sources to spot attack trends.</p>
<p style="color: #454040; background-color: #ffffff; margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; text-align: justify;">Click <a rel="noopener noreferrer" href="https://www.wtwco.com/en-GB/insights/2023/03/artificial-intelligence-in-the-role-of-assessing-cyber-risk?utm_source=slipcase&utm_medium=affiliate&utm_campaign=slipcase" target="_blank"><span>here</span></a> to read the full WTW post.</p>
<p style="color: #454040; background-color: #ffffff; margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; text-align: justify;"><strong>Countering Ransomware Financing</strong></p>
<p style="color: #454040; background-color: #ffffff; margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; text-align: justify;">The Finance Action Task Force (FATF) has produced a report analysing the methods used by criminals to carry out ransomware attacks. The study also covers how payments are made and laundered, with the aim to improve global understanding of the financial flows linked to ransomware and highlight actions that countries can take to effectively disrupt ransomware-related money laundering.</p>
<p style="color: #454040; background-color: #ffffff; margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; text-align: justify;">The report explores how ransomware criminals tend to opt for virtual assets such as cryptocurrencies to facilitate large-scale cross-border transactions. This circumvents the involvement of traditional financial institutions that have anti-money laundering and counter terrorist financing (AML/CFT) programs. Of particular concern therefore are jurisdictions with weak or non-existent AML/CFT controls. The FATF report proceeds to explore potential solutions to the problem, with the key takeaway being a need to regulate the virtual asset service provider (VASP) sector and build upon and leverage existing international cooperation and information exchange mechanisms. This is due to the globalised nature of ransomware attacks which necessitate an increased focus on rapid cross-border funds tracing and effective asset recovery.</p>
<p style="color: #454040; background-color: #ffffff; margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; text-align: justify;">Finally, ransomware attacks have been found to be generally underreported, with detection potentially a challenge in the private sector alongside the negative potential reputational impacts to the victim’s business. Moving forward, the key objective for regulators will be to create an environment where victims feel encouraged to report incidents. This is even more crucial given the current state of underreporting hampering regulators' ability to substantively investigate money laundering related to ransomware.</p>
<p style="color: #454040; background-color: #ffffff; margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; text-align: justify;">Click <a rel="noopener noreferrer" href="https://www.fatf-gafi.org/en/publications/Methodsandtrends/countering-ransomware-financing.html" target="_blank"><span>here</span></a> to read the full FATF publication.</p>]]></description><pubDate>Tue, 28 Mar 2023 14:15:00 +0100</pubDate><category>Data and privacy</category><authors:names>Richard Breavington, Daniel Guilfoyle, Ian Dinning, Rachel Ford, Christopher Ashton, Elizabeth Zang, Emanuele Santella </authors:names><content:encoded><![CDATA[<p><strong>Lack of data raises concern around how to define emerging risks</strong></p>
<p style="color: #454040; background-color: #ffffff; margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; text-align: justify;">Peter Mansfield, partner at RPC, recently chaired a panel on digital risks at RPC's Global Access Week. During the discussion, Mansfield warned that new and emerging risks, which arise as we move into the fourth industrial age (the digital transition), will make it increasingly difficult for insurers to price and understand future exposures. Typically, insurers use historical data in order to quantify risks. However, Mansfield underlined that the market was ultimately entering an age of unknown risks.</p>
<p style="color: #454040; background-color: #ffffff; margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; text-align: justify;">The panel also explored the potential for cyber insurance to improve commercial cyber security as company's engage in the security-related "<em style="margin: 0px; padding: 0px;">basic hygiene</em>" required by their insuring policies. However, Eleonora Sorribes, partner at French law firm, HMN & Partners, warned that organisations would need to be careful not to adopt an increasingly lax approach to their engagement with safety protocols simply because they are covered by a cybersecurity policy.</p>
<p style="color: #454040; background-color: #ffffff; margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; text-align: justify;">Click <a rel="noopener noreferrer" href="https://www.theinsurer.com/news/lack-of-data-raises-concern-around-how-to-define-emerging-risks-rpcs-mansfield/" target="_blank"><span>here</span></a> to read the Insurer article.</p>
<p style="color: #454040; background-color: #ffffff; margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; text-align: justify;"><strong><strong>"Same Interest" test clarification for representative actions under CPR 19.6</strong></strong></p>
<p style="color: #454040; background-color: #ffffff; margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; text-align: justify;">CPR 19.6 provides that where more than one person has the same interest in a claim, that claim may be brought by or against one or more of the persons as representatives if they have the same interest as other parties.</p>
<p style="color: #454040; background-color: #ffffff; margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; text-align: justify;">The High Court in <em style="margin: 0px; padding: 0px;">Commission Recovery Ltd v Marks & Clerk LLP [2023] EWHC 398 (Comm)</em>, has recently revisited the "same interest" test for representative actions under CPR 19.6. The Court had to decide whether the entitlement of the Claimant class could be calculated on a common basis. The claim in question was for secret commission. There were some differences in the claims and the remedies sought.</p>
<p style="color: #454040; background-color: #ffffff; margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; text-align: justify;">The High Court held that the "same interest" test does not require claimants to have identical claims or interests. It relied heavily on the Supreme Court's decision in <em style="margin: 0px; padding: 0px;">Lloyd v Google [2021] UKSC 50</em>. That case affirmed that the entirety of a class may be represented by a sole representative in circumstances where the position of other class members would not be prejudiced.</p>
<p style="color: #454040; background-color: #ffffff; margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; text-align: justify;">The High Court's ruling solidifies the existing position and potentially leaves room for further development as to the system of collective redress. In circumstances where a data breach may cause mass harm to a collective group of individuals, the "same interest" test may be relevant to a group of claimants potentially seeking to bring a claim through a sole representative.</p>
<p style="color: #454040; background-color: #ffffff; margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; text-align: justify;">Click <a rel="noopener noreferrer" href="https://www.bailii.org/ew/cases/EWHC/Comm/2023/398.html" target="_blank"><span>here</span></a> to read the full Judgment.</p>
<p style="color: #454040; background-color: #ffffff; margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; text-align: justify;"><strong>The Data Protection and Digital Information (No.2) Bill introduced in the House of Commons</strong></p>
<p style="color: #454040; background-color: #ffffff; margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; text-align: justify;">On 8 March 2023, the UK government introduced the Data Protection and Digital Information (No.2) Bill (the "<span style="margin: 0px; padding: 0px; color: #575a5d;"><strong style="margin: 0px; padding: 0px;">Bill</strong></span>") to Parliament. The first version of the Bill was prepared in July 2022 and paused in September 2022 to allow for further consideration with businesses and data experts.</p>
<p style="color: #454040; background-color: #ffffff; margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; text-align: justify;">The changes seek to amend current legislation that the UK "inherited" from the EU in the form of the GDPR. The new data laws are set to "cut down pointless paper work for businesses" according to the UK government's <a rel="noopener noreferrer" href="https://www.gov.uk/government/news/british-businesses-to-save-billions-under-new-uk-version-of-gdpr" target="_blank"><span>press release</span></a>.</p>
<p style="color: #454040; background-color: #ffffff; margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; text-align: justify;"><span style="margin: 0px; padding: 0px; text-decoration: underline; color: #575a5d;">Key changes from a cyber breach response perspective</span></p>
<p style="color: #454040; background-color: #ffffff; margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; text-align: justify;">The Bill includes the following changes:</p>
<ul style="background-color: #ffffff; margin: 0px 0px 15px 25px; padding: 0px;">
    <li style="color: #454040; margin: 0px 0px 2px; padding: 0px; text-align: justify;">Article 5(1)(b) - This Article prohibits data processing that is not compatible with the original purpose for which the personal data was collected. The amendments clarify the rules around compatibility of further processing of personal data.<br style="margin: 0px; padding: 0px;" />
    <br style="margin: 0px; padding: 0px;" />
    </li>
    <li style="color: #454040; margin: 0px 0px 2px; padding: 0px; text-align: justify;">Article 6 - The Bill provides new examples of legitimate interests in processing personal data, including "national security, preventing crime, direct marketing, intra-group transmission of personal data where necessary for administrative purposes and ensuring security of network and information systems".<br style="margin: 0px; padding: 0px;" />
    <br style="margin: 0px; padding: 0px;" />
    </li>
    <li style="color: #454040; margin: 0px 0px 2px; padding: 0px; text-align: justify;">Article 12A - Requests from data subjects under Articles 14-22 and 34 can be rejected where they are found to be "vexatious or excessive". The Bill provides examples of such requests, including requests which are "intended to cause distress, are not made in good faith, or are an abuse of process".<br style="margin: 0px; padding: 0px;" />
    <br style="margin: 0px; padding: 0px;" />
    </li>
    <li style="color: #454040; margin: 0px 0px 2px; padding: 0px; text-align: justify;">Article 30A - The Bill extends record keeping requirements to include all controllers/processors (including small businesses) that carry out processing of personal data which is likely to result in a high risk to the rights and freedoms of individuals. These controllers/processers must maintain appropriate records of processing. The Bill specifies exactly what the controller's and processor's records must include.<br style="margin: 0px; padding: 0px;" />
    <br style="margin: 0px; padding: 0px;" />
    </li>
    <li style="color: #454040; margin: 0px 0px 2px; padding: 0px; text-align: justify;">Article 33 - A personal data breach notification to the ICO shall communicate the name and contact details of the "senior responsible individual" rather than the "data protection officer", following amendments made by the Bill. The senior responsible individual is a "designated individual [who] must be part of the organisation’s senior management". Notification obligations to the ICO do <span style="margin: 0px; padding: 0px; color: #575a5d;"><strong style="margin: 0px; padding: 0px;">not</strong></span> apply to personal data processed for law enforcement purposes if it is for the purposes of safeguarding national security.<br style="margin: 0px; padding: 0px;" />
    <br style="margin: 0px; padding: 0px;" />
    </li>
    <li style="color: #454040; margin: 0px 0px 2px; padding: 0px; text-align: justify;">Article 34 - Data subject notifications obligations relating to personal data breaches do <span style="margin: 0px; padding: 0px; color: #575a5d;"><strong style="margin: 0px; padding: 0px;">not</strong></span> apply to personal data processed for law enforcement purposes if it is for the purpose of safeguarding national security.<br style="margin: 0px; padding: 0px;" />
    <br style="margin: 0px; padding: 0px;" />
    </li>
    <li style="color: #454040; margin: 0px 0px 15px; padding: 0px; text-align: justify;">The ICO has been granted new power to issue a new notice compelling a person to attend an interview to answer questions for the purposes of investigating a suspected offence under data protection legislation. Failure to comply with an interview notice can result in a monetary penalty. It will be a criminal offence to knowingly or recklessly make a false statement in response to an interview notice.<br style="margin: 0px; padding: 0px;" />
    </li>
</ul>
<p style="color: #454040; background-color: #ffffff; margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; text-align: justify;">Click <a rel="noopener noreferrer" href="https://www.gov.uk/government/news/british-businesses-to-save-billions-under-new-uk-version-of-gdpr" target="_blank"><span>here</span></a> to read the UK Gov press release.</p>
<p style="color: #454040; background-color: #ffffff; margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; text-align: justify;"><strong>The NCSC discusses the cyber security risk of Chat GPT and large language models</strong></p>
<p style="color: #454040; background-color: #ffffff; margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; text-align: justify;">Artificial Intelligence (AI) has been trending across the past 12 months, with OpenAI's ChatGPT (an AI chatbot that uses deep learning to produce human-like text) claiming headlines. The platform operates on large language models (LLM), an algorithm which can be trained on a large amount of text-based data. The LLM technology can analyse the relationship between different words and accordingly execute a probability model. Users can then proceed to "prompt" the algorithm by asking it questions that lead to the provision of an answer based on the relationships of the words in its model.</p>
<p style="color: #454040; background-color: #ffffff; margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; text-align: justify;">ChatGPT can allow users to ask an LLM questions as if holding a conversation with a chatbot. This includes the ability to use "prompt augmentation" which involves providing context information about the question.</p>
<p style="color: #454040; background-color: #ffffff; margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; text-align: justify;">Privacy concerns have begun to emerge since query "prompts" remain visible to the LLM host (this being OpenAI in the case of ChatGPT). These companies tend to store queries and use them as a foundation to develop the LLM service/model at a future point in time. Users of these products are being encouraged to thoroughly understand the use and privacy policies of public LLM platforms prior to asking sensitive questions which may include user-identifiable information.</p>
<p style="color: #454040; background-color: #ffffff; margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; text-align: justify;">Additional concerns include the potential for threat actors to coax an LLM into writing highly capable malware or assisting in escalating privileges and finding data once a threat actor has gained access to a network. There is also scope for LLM's to assist threat actors in carrying out social engineering attacks by helping to write convincing phishing emails in the native language of a target. Although AI remains an exciting development which has the potential to boost efficiency within society, organisations and individuals must remain vigilant of bad faith actors who seek to exploit new systems for their own malicious gain.</p>
<p style="color: #454040; background-color: #ffffff; margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; text-align: justify;">Click <a rel="noopener noreferrer" href="https://www.ncsc.gov.uk/blog-post/chatgpt-and-large-language-models-whats-the-risk" target="_blank"><span>here</span></a> to read the NCSC blog post.</p>
<p style="color: #454040; background-color: #ffffff; margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; text-align: justify;"><strong>Ransomware gang claims to have breached Amazon-owned Ring</strong></p>
<p style="color: #454040; background-color: #ffffff; margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; text-align: justify;">The infamous ransomware group known as ALPHV claims to have compromised Ring, the Amazon-owned company that builds smart doorbells with cameras. ALPHV became popularised following the group's use of the BlackCat encryptor malware. Ring's logo recently appeared on the groups "leak site", alongside a threat to publicly leak the smart doorbell operator's data.</p>
<p style="color: #454040; background-color: #ffffff; margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; text-align: justify;">Amazon itself has remained silent on the matter, issuing a short statement that it has "no indications" of Ring experiencing any ransomware attacks. The US tech giant did however announce that a third-party vendor fell victim to a ransomware attack and that Ring is now engaged in an effort to learn more about the incident. Amazon reiterated that the impacted vendor does not have access to its own customer records.</p>
<p style="color: #454040; background-color: #ffffff; margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; text-align: justify;">Questions have emerged regarding the data which ALPHV has accessed and is now leveraging, as well as how the group was able to compromise the target network. It is not yet clear which third-party vendor has been compromised and whether it is considering negotiating with hackers or paying a ransom. No further details will likely be known until ALPHV leaks the data, or the targeted company files a report with the Securities and Exchange Commission (SEC).</p>
<p style="color: #454040; background-color: #ffffff; margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; text-align: justify;">Click <a rel="noopener noreferrer" href="https://www.techradar.com/news/a-ransomware-gang-claims-it-has-breached-ring-and-is-threatening-to-leak-data" target="_blank"><span>here</span></a> to read the Tech Radar article.</p>
<p style="color: #454040; background-color: #ffffff; margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; text-align: justify;"><strong>ICO shares resources to help designers embed data protection by default</strong></p>
<p style="color: #454040; background-color: #ffffff; margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; text-align: justify;">The Information Commissioner's Office (ICO) has produced new guidance which aims to assist tech service providers in embedding data protection into their products and services from their inception.</p>
<p style="color: #454040; background-color: #ffffff; margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; text-align: justify;">The guidance deals with key privacy considerations for each stage of product design, covering "kick-off" up until the "post-launch" period. It includes examples of good practice as well as practical steps which the ICO would expect organisations to take, when designing products and services, in order to comply effectively with data protection laws. Key takeaways for organisations include the need to involve other stakeholders in privacy discussions, as well as ensuring that there is a lawful reason for processing any personal information, in line with a Data Protection Impact Assessment (DPIA) and keeping track of personal information that is handled. The guidance also recommends that organisations should always check whether any privacy risks arise from new products or features which involve new uses of personal information. Organisations should think about how threat actors could use these new sources maliciously.</p>
<p style="color: #454040; background-color: #ffffff; margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; text-align: justify;">Whilst the ICO has recommended technical privacy-enhancing methods such as hashing or encryption, there remains no substitute for a genuine consideration of privacy during the design process. Especially in the light of the potential consequences where leaked information and personal data end up in unauthorised hands.</p>
<p style="color: #454040; background-color: #ffffff; margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; text-align: justify;">Click <a rel="noopener noreferrer" href="https://ico.org.uk/about-the-ico/media-centre/news-and-blogs/2023/03/ico-shares-resources-to-help-designers-embed-data-protection-by-default/" target="_blank"><span>here</span></a> to read the full ICO blog post.</p>
<p style="color: #454040; background-color: #ffffff; margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; text-align: justify;"><strong>Artificial intelligence in the role of assessing cyber risk</strong></p>
<p style="color: #454040; background-color: #ffffff; margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; text-align: justify;">The University of Warwick has produced a review assessing the opportunities for using AI to help reduce cyber risk and threat exposure within the insurance sector. Cybercrime has been on the rise since the onset of the COVID-19 pandemic, with the emergence of sophisticated new methods of attacks. The integration of an efficient digital form of cyber security through the use of AI could help. If employed effectively, AI could help combat cyber risks and perform tasks such as detecting and preventing cyber-attacks in real-time, resisting novel cybercrime and increasing the effectiveness of cyber security teams.</p>
<p style="color: #454040; background-color: #ffffff; margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; text-align: justify;">AI is already used in back-end functions such as fraud detection. Machine Learning (ML) techniques are also being used. For example, Support Vector Machines used a ML algorithm that learns from examples of fraudulent and non-fraudulent activity reports to identify credit card fraud.</p>
<p style="color: #454040; background-color: #ffffff; margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; text-align: justify;">There are further opportunities that the insurance sector can take with AI. Natural Language Processing has been earmarked as a leading interdisciplinary focus which, when applied to cybersecurity, can encourage interactions in the insurance industry between people and machines. This can assist in identifying the risk of a phishing attack by scanning vast amounts of datasets for email conversations or tracking emails that enter an organisation's network in order to identify patterns of malicious behaviour.</p>
<p style="color: #454040; background-color: #ffffff; margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; text-align: justify;">AI and ML could also help defend against DDoS attacks by comparing network traffic with real-time data streams collected from threat-intelligence sources to spot attack trends.</p>
<p style="color: #454040; background-color: #ffffff; margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; text-align: justify;">Click <a rel="noopener noreferrer" href="https://www.wtwco.com/en-GB/insights/2023/03/artificial-intelligence-in-the-role-of-assessing-cyber-risk?utm_source=slipcase&utm_medium=affiliate&utm_campaign=slipcase" target="_blank"><span>here</span></a> to read the full WTW post.</p>
<p style="color: #454040; background-color: #ffffff; margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; text-align: justify;"><strong>Countering Ransomware Financing</strong></p>
<p style="color: #454040; background-color: #ffffff; margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; text-align: justify;">The Finance Action Task Force (FATF) has produced a report analysing the methods used by criminals to carry out ransomware attacks. The study also covers how payments are made and laundered, with the aim to improve global understanding of the financial flows linked to ransomware and highlight actions that countries can take to effectively disrupt ransomware-related money laundering.</p>
<p style="color: #454040; background-color: #ffffff; margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; text-align: justify;">The report explores how ransomware criminals tend to opt for virtual assets such as cryptocurrencies to facilitate large-scale cross-border transactions. This circumvents the involvement of traditional financial institutions that have anti-money laundering and counter terrorist financing (AML/CFT) programs. Of particular concern therefore are jurisdictions with weak or non-existent AML/CFT controls. The FATF report proceeds to explore potential solutions to the problem, with the key takeaway being a need to regulate the virtual asset service provider (VASP) sector and build upon and leverage existing international cooperation and information exchange mechanisms. This is due to the globalised nature of ransomware attacks which necessitate an increased focus on rapid cross-border funds tracing and effective asset recovery.</p>
<p style="color: #454040; background-color: #ffffff; margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; text-align: justify;">Finally, ransomware attacks have been found to be generally underreported, with detection potentially a challenge in the private sector alongside the negative potential reputational impacts to the victim’s business. Moving forward, the key objective for regulators will be to create an environment where victims feel encouraged to report incidents. This is even more crucial given the current state of underreporting hampering regulators' ability to substantively investigate money laundering related to ransomware.</p>
<p style="color: #454040; background-color: #ffffff; margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; text-align: justify;">Click <a rel="noopener noreferrer" href="https://www.fatf-gafi.org/en/publications/Methodsandtrends/countering-ransomware-financing.html" target="_blank"><span>here</span></a> to read the full FATF publication.</p>]]></content:encoded></item><item><guid isPermaLink="false">{776360B1-EA6F-4A97-B2C9-4020F129C738}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/cyber-bytes-issue-50/</link><title>Cyber_Bytes - Issue 50</title><description><![CDATA[<p style="color: #454040; background-color: #ffffff; margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; text-align: justify;"><strong>HM Treasury Office of Financial Sanctions Implementation (OFSI) releases fresh guidance on ransomware and sanctions</strong></p>
<p style="color: #454040; background-color: #ffffff; margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; text-align: justify;">The OFSI has reiterated that payment of ransomware demands could constitute a breach of financial sanctions, carrying heavy penalties. Nevertheless, new guidance published by OFSI provides some comfort for organisations who feel to be in a position where paying the ransom is the only choice available. Several mitigating factors will be taken into account when assessing a ransom payment in a ransomware situation which is discovered after the event to have been in breach of financial sanctions. Those measures include the following:</p>
<ul style="background-color: #ffffff; margin: 0px 0px 15px 25px; padding: 0px;">
    <li style="color: #454040; margin: 0px 0px 2px; padding: 0px; text-align: justify;">Early reporting and cooperation with law enforcement (including Action Fraud and the NCSC) and regulatory bodies (such as the ICO).</li>
    <li style="color: #454040; margin: 0px 0px 2px; padding: 0px; text-align: justify;">Early self-reporting if it becomes suspected that a payment was made to a designated individual or organisation.</li>
    <li style="color: #454040; margin: 0px 0px 15px; padding: 0px; text-align: justify;">Carrying out appropriate checks at the time of payment to ensure the transfer is not made to a sanctioned entity as far as it is possible to check.<br style="margin: 0px; padding: 0px;" />
    </li>
</ul>
<p style="color: #454040; background-color: #ffffff; margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; text-align: justify;">This new guidance should be welcomed by organisations faced with the undesirable option of having to pay a ransom demand. While enforcement is still a possibility in those situations if the payment turns out to have been made to a designated individual or organisation, the guidance from OFSI indicates that fines or criminal sanctions are less likely if the mitigating steps set out in the guidance have been followed.</p>
<p style="color: #454040; background-color: #ffffff; margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; text-align: justify;">Click <span style="margin: 0px; padding: 0px;"><a href="https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/1135587/Ransomware___Sanctions_guidance__Feb_2023_.pdf">here</a></span> to read the OFSI guidance post.</p>
<p style="color: #454040; background-color: #ffffff; margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; text-align: justify;"><strong>LockBit releases entire negotiation history with Royal Mail</strong></p>
<p style="color: #454040; background-color: #ffffff; margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; text-align: justify;">High profile ransomware organisation Lockbit recently leaked the entire negotiation history between it and Royal Mail International, revealing a ransom demand of $80 million.</p>
<p style="color: #454040; background-color: #ffffff; margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; text-align: justify;">This rare release sheds light on key negotiation tactics from the National Cyber Security Centre (NCSC) and the National Crime Agency (NCA) when dealing with threat actors.</p>
<p style="color: #454040; background-color: #ffffff; margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; text-align: justify;">LockBit set the ransom at £65.7 million, a sum it calculated to be 0.5% of Royal Mail International's annual revenue. They also went on to say that this was eight times less than the cost of a regulatory fine in the UK.</p>
<p style="color: #454040; background-color: #ffffff; margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; text-align: justify;">Royal Mail International's negotiator relayed the message that "<em style="margin: 0px; padding: 0px;">under no circumstances will we pay you the absurd amount of money you have demanded</em>". Royal Mail has never publicly confirmed that the cyber incident it suffered was ransomware in nature, or even an ‘attack’, despite sources speaking to multiple news outlets indicating that to be the case. The NCSC and the NCA have both confirmed their involvement in assisting with the attack. LockBit initially distanced itself from the incident but has admitted that one of its affiliates carried out the attack.</p>
<p style="color: #454040; background-color: #ffffff; margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; text-align: justify;">Click <span style="margin: 0px; padding: 0px;"><a href="https://www.itpro.co.uk/security/ransomware/370067/lockbit-releases-negotiation-history-royal-mail-ransom-65-million">here</a></span> to read the full IT Pro article.</p>
<p style="color: #454040; background-color: #ffffff; margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; text-align: justify;"><strong>UK cracks down on ransomware actors</strong></p>
<p style="color: #454040; background-color: #ffffff; margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; text-align: justify;">On 9 February the UK, in collaboration with the US Government, sanctioned a group of seven Russian criminals in the first wave of new coordinated action against international cybercrime. UK Foreign Secretary James Cleverly said: "<em style="margin: 0px; padding: 0px;">By sanctioning these cyber criminals, we are sending a clear signal to them and others involved in ransomware that they will be held to account</em>". The NCA assessed that the sanctioned group was responsible for extorting at least £27 million from 149 UK victims, including hospitals, schools, businesses and local authorities, although their full impact is believed to be much higher.</p>
<p style="color: #454040; background-color: #ffffff; margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; text-align: justify;">National Crime Agency Director-General Graeme Biggar called the crackdown a hugely significant moment for the UK and collaborative efforts with the US to disrupt international cyber criminals. It is highly likely that the recently sanctioned individuals evolved from previous cyber organised crime groups and likely have extensive links to other cyber criminals, notably EvilCorp and those responsible for Ryuk ransomware. NCA's CEO Lindy Cameron confirmed that, “<em style="margin: 0px; padding: 0px;">ransomware is the most acute cyber threat facing the UK, and attacks by criminal groups show just how devastating its impact can be</em>". By working with key partners, the NCSC is helping to "<em style="margin: 0px; padding: 0px;">improve collective resilience</em>".</p>
<p style="color: #454040; background-color: #ffffff; margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; text-align: justify;">Click <a href="https://www.nationalcrimeagency.gov.uk/news/ransomware-criminals-sanctioned-in-joint-uk-us-crackdown-on-international-cyber-crime">here</a> to read the NCA article.</p>
<p style="color: #454040; background-color: #ffffff; margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; text-align: justify;"><strong>NCA takes down HIVE ransomware organisation</strong></p>
<p style="color: #454040; background-color: #ffffff; margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; text-align: justify;">In association with the FBI and German law enforcement, the NCA has taken down servers used by the HIVE ransomware group. Anyone attempting to access HIVE infrastructure will now be met with a law enforcement splash page, explaining that the network has been seized and is no longer available for use.</p>
<p style="color: #454040; background-color: #ffffff; margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; text-align: justify;">HIVE resources were previously available on the dark web, allowing users to deploy ransomware attacks on their targets. From June 2021, the HIVE ransomware group had targeted over 1,300 victims, receiving more than $100m in ransom payments. The FBI developed the capability to avoid HIVE encryption and NCA investigators supported a number of victims in the UK to remove the impact of the ransomware from their systems. Paul Foster, Deputy Director of the NCA’s National Cyber Crime Unit commented that, while HIVE was a service which enabled cyber criminals to steal millions from businesses across the globe, with several UK organisations suffering significant disruption and financial losses, the combined might of international law enforcement, is "<em style="margin: 0px; padding: 0px;">a tremendous example of action to take down illegal IT infrastructure</em>".</p>
<p style="color: #454040; background-color: #ffffff; margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; text-align: justify;">Click <a href="https://www.nationalcrimeagency.gov.uk/news/hive-takedown-nca-in-international-operation-to-shut-down-100m-ransomware-threat">here</a> to read the NCA article.</p>]]></description><pubDate>Thu, 09 Mar 2023 14:35:00 Z</pubDate><category>Data and privacy</category><authors:names>Richard Breavington, Daniel Guilfoyle, Ian Dinning, Rachel Ford, Christopher Ashton, Elizabeth Zang, Emanuele Santella </authors:names><content:encoded><![CDATA[<p style="color: #454040; background-color: #ffffff; margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; text-align: justify;"><strong>HM Treasury Office of Financial Sanctions Implementation (OFSI) releases fresh guidance on ransomware and sanctions</strong></p>
<p style="color: #454040; background-color: #ffffff; margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; text-align: justify;">The OFSI has reiterated that payment of ransomware demands could constitute a breach of financial sanctions, carrying heavy penalties. Nevertheless, new guidance published by OFSI provides some comfort for organisations who feel to be in a position where paying the ransom is the only choice available. Several mitigating factors will be taken into account when assessing a ransom payment in a ransomware situation which is discovered after the event to have been in breach of financial sanctions. Those measures include the following:</p>
<ul style="background-color: #ffffff; margin: 0px 0px 15px 25px; padding: 0px;">
    <li style="color: #454040; margin: 0px 0px 2px; padding: 0px; text-align: justify;">Early reporting and cooperation with law enforcement (including Action Fraud and the NCSC) and regulatory bodies (such as the ICO).</li>
    <li style="color: #454040; margin: 0px 0px 2px; padding: 0px; text-align: justify;">Early self-reporting if it becomes suspected that a payment was made to a designated individual or organisation.</li>
    <li style="color: #454040; margin: 0px 0px 15px; padding: 0px; text-align: justify;">Carrying out appropriate checks at the time of payment to ensure the transfer is not made to a sanctioned entity as far as it is possible to check.<br style="margin: 0px; padding: 0px;" />
    </li>
</ul>
<p style="color: #454040; background-color: #ffffff; margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; text-align: justify;">This new guidance should be welcomed by organisations faced with the undesirable option of having to pay a ransom demand. While enforcement is still a possibility in those situations if the payment turns out to have been made to a designated individual or organisation, the guidance from OFSI indicates that fines or criminal sanctions are less likely if the mitigating steps set out in the guidance have been followed.</p>
<p style="color: #454040; background-color: #ffffff; margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; text-align: justify;">Click <span style="margin: 0px; padding: 0px;"><a href="https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/1135587/Ransomware___Sanctions_guidance__Feb_2023_.pdf">here</a></span> to read the OFSI guidance post.</p>
<p style="color: #454040; background-color: #ffffff; margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; text-align: justify;"><strong>LockBit releases entire negotiation history with Royal Mail</strong></p>
<p style="color: #454040; background-color: #ffffff; margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; text-align: justify;">High profile ransomware organisation Lockbit recently leaked the entire negotiation history between it and Royal Mail International, revealing a ransom demand of $80 million.</p>
<p style="color: #454040; background-color: #ffffff; margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; text-align: justify;">This rare release sheds light on key negotiation tactics from the National Cyber Security Centre (NCSC) and the National Crime Agency (NCA) when dealing with threat actors.</p>
<p style="color: #454040; background-color: #ffffff; margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; text-align: justify;">LockBit set the ransom at £65.7 million, a sum it calculated to be 0.5% of Royal Mail International's annual revenue. They also went on to say that this was eight times less than the cost of a regulatory fine in the UK.</p>
<p style="color: #454040; background-color: #ffffff; margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; text-align: justify;">Royal Mail International's negotiator relayed the message that "<em style="margin: 0px; padding: 0px;">under no circumstances will we pay you the absurd amount of money you have demanded</em>". Royal Mail has never publicly confirmed that the cyber incident it suffered was ransomware in nature, or even an ‘attack’, despite sources speaking to multiple news outlets indicating that to be the case. The NCSC and the NCA have both confirmed their involvement in assisting with the attack. LockBit initially distanced itself from the incident but has admitted that one of its affiliates carried out the attack.</p>
<p style="color: #454040; background-color: #ffffff; margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; text-align: justify;">Click <span style="margin: 0px; padding: 0px;"><a href="https://www.itpro.co.uk/security/ransomware/370067/lockbit-releases-negotiation-history-royal-mail-ransom-65-million">here</a></span> to read the full IT Pro article.</p>
<p style="color: #454040; background-color: #ffffff; margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; text-align: justify;"><strong>UK cracks down on ransomware actors</strong></p>
<p style="color: #454040; background-color: #ffffff; margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; text-align: justify;">On 9 February the UK, in collaboration with the US Government, sanctioned a group of seven Russian criminals in the first wave of new coordinated action against international cybercrime. UK Foreign Secretary James Cleverly said: "<em style="margin: 0px; padding: 0px;">By sanctioning these cyber criminals, we are sending a clear signal to them and others involved in ransomware that they will be held to account</em>". The NCA assessed that the sanctioned group was responsible for extorting at least £27 million from 149 UK victims, including hospitals, schools, businesses and local authorities, although their full impact is believed to be much higher.</p>
<p style="color: #454040; background-color: #ffffff; margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; text-align: justify;">National Crime Agency Director-General Graeme Biggar called the crackdown a hugely significant moment for the UK and collaborative efforts with the US to disrupt international cyber criminals. It is highly likely that the recently sanctioned individuals evolved from previous cyber organised crime groups and likely have extensive links to other cyber criminals, notably EvilCorp and those responsible for Ryuk ransomware. NCA's CEO Lindy Cameron confirmed that, “<em style="margin: 0px; padding: 0px;">ransomware is the most acute cyber threat facing the UK, and attacks by criminal groups show just how devastating its impact can be</em>". By working with key partners, the NCSC is helping to "<em style="margin: 0px; padding: 0px;">improve collective resilience</em>".</p>
<p style="color: #454040; background-color: #ffffff; margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; text-align: justify;">Click <a href="https://www.nationalcrimeagency.gov.uk/news/ransomware-criminals-sanctioned-in-joint-uk-us-crackdown-on-international-cyber-crime">here</a> to read the NCA article.</p>
<p style="color: #454040; background-color: #ffffff; margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; text-align: justify;"><strong>NCA takes down HIVE ransomware organisation</strong></p>
<p style="color: #454040; background-color: #ffffff; margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; text-align: justify;">In association with the FBI and German law enforcement, the NCA has taken down servers used by the HIVE ransomware group. Anyone attempting to access HIVE infrastructure will now be met with a law enforcement splash page, explaining that the network has been seized and is no longer available for use.</p>
<p style="color: #454040; background-color: #ffffff; margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; text-align: justify;">HIVE resources were previously available on the dark web, allowing users to deploy ransomware attacks on their targets. From June 2021, the HIVE ransomware group had targeted over 1,300 victims, receiving more than $100m in ransom payments. The FBI developed the capability to avoid HIVE encryption and NCA investigators supported a number of victims in the UK to remove the impact of the ransomware from their systems. Paul Foster, Deputy Director of the NCA’s National Cyber Crime Unit commented that, while HIVE was a service which enabled cyber criminals to steal millions from businesses across the globe, with several UK organisations suffering significant disruption and financial losses, the combined might of international law enforcement, is "<em style="margin: 0px; padding: 0px;">a tremendous example of action to take down illegal IT infrastructure</em>".</p>
<p style="color: #454040; background-color: #ffffff; margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; text-align: justify;">Click <a href="https://www.nationalcrimeagency.gov.uk/news/hive-takedown-nca-in-international-operation-to-shut-down-100m-ransomware-threat">here</a> to read the NCA article.</p>]]></content:encoded></item><item><guid isPermaLink="false">{D569A729-9024-40A3-960B-0DB8FD0A594C}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/cyber-bytes-issue-49/</link><title>Cyber_Bytes - Issue 49</title><description><![CDATA[<p><strong>ICO confirms focus on prevention rather than punishment</strong><br />
<br />
John Edwards, head of the ICO, recently spoke at fireside conference held at CMS' London office, convened by RPC's Data partner, Jon Bartley.<br />
<br />
During the conversation, Edwards said he will not seek to match EU regulators in racking up a “stack of fines” as he advocated for taking a “bold” approach to regulation. The ICO's focus will be to make UK privacy laws clearer and prevent data breaches from happening in the first place.<br />
<br />
He warned that focusing on punishing breaches rather than preventing them from happening is a “really inefficient way of regulating.” Edwards promised to "work alongside organisations to assist them achieve their objectives" in laying out a new regulatory framework. He also reassured that there is no need for concerns around a radical shake-up of data privacy rules, adding that he is "not here to be the architect of the deconstruction of the data protection framework.”<br />
<br />
Click <a href="https://www.cityam.com/uks-data-watchdog-to-shift-away-from-big-fines-to-focus-on-prevention/">here</a> to read the City AM article.<br />
<strong><br />
UK schools are well built for cyber resilience</strong><br />
<br />
New research by London Grid for Learning, in collaboration with the NCSC, surveyed over 800 schools across the UK and showed that over half the schools in the research (53%) felt prepared for a cyber-attack.<br />
<br />
All schools surveyed now use firewall protection, two thirds use two step verification for important accounts, and over half of the school leaders and governors felt more informed about the cyber security issues within their schools. The NCSC's 'cyber security for schools' website contains free cyber security training for school staff, and almost half of the surveyed schools were aware of this service. The pandemic and widespread adoption of home schooling has meant schools are more reliant on IT-related services for both administrative and learning functions.<br />
<br />
Almost 78% of schools surveyed had experienced at least one type of cyber security incident, confirming that the threat is still out there, with ransomware attacks in particular increasing across the sector. The NCSC, working alongside the education sector has plans to design accessible, practical guidance for schools wanting to build their cyber security resilience.<br />
<br />
Click <a href="https://www.ncsc.gov.uk/blog-post/uk-schools-build-cyber-resilience">here</a> to read the NCSC blog post.<br />
<br />
<strong>Companies warned to step up cyber security to become insurable<br />
</strong><br />
The World Economic Forum (WEF) published its Global risk report 2023, and identified cyber insecurity as one of the top 10 risks facing governments and organisations over the next 10 years. The report rates cyberwarfare as a more serious threat to stability than risks of military confrontation. The reason is that cyber-attacks can dramatically destabilise critical infrastructure, such as healthcare and public institutions. Greater numbers of employees working from home and the increased use of digital technologies have opened-up new paths for malicious actors to break into computer systems.<br />
<br />
Businesses are at risk of finding they are unable to secure cyber insurance cover as the volume of cyber-attacks reaches new levels. High levels of cyber protection are increasingly becoming a prerequisite for cyber insurance. The cost of cyber risks insurance continues to rise as demand for cover outstrips supply.<br />
<br />
Carolina Klint, European Risk management leader for insurance broker Marsh, and one of the contributors to the report, said that some insurance companies are now saying that “cyber risk is systemic and uninsurable”. It’s up to the insurance industry and to capital markets to decide whether or not they find the risk palatable. Businesses are currently tackling multiple risks at once. Spending more on cyber security will give organisations greater resilience to survive other shocks, such as failures in the supply chain. Klint confirms that “cyber resilience and supply chain resilience are really closely interlinked, meaning investment in resilience will have a positive impact on more than one risk."<br />
<br />
Organisations will need to look at the effectiveness of their current risk mitigation and risk management strategies and invest up-front in cyber security to be insurable, said Klint. John Scott, head of sustainability risk at Zurich Insurance Group, comments that its “astonishing”, that many companies have not put basic IT security protection in place, such as ensuring software is regularly patched and using two-factor authentication. He pointed out that organisations should also be working with their suppliers and datacentres to make sure that their supply chains are protected from cyber-attacks.</p>
<p>Click <a href="http://https://www.computerweekly.com/news/252529132/Companies-warned-to-step-up-cyber-security-to-become-insurable">here</a> to read the Computer Weekly article.<br />
<br />
<strong>Royal mail restarts limited overseas post after cyber- attack<br />
</strong><br />
Royal mail has started clearing its backlog of overseas post and has started receiving new international letters, following ransomware attack earlier this month. In a bid to mitigate impacts of the attack, Royal mail continues to work with authorities and is trying 'operational workarounds.' Royal Mail, as a private company, is required to keep authorities and regulators informed, however it has said little to the public.<br />
<br />
The ransomware used in the attack is Lockbit. Computer security firms say the software involved has been developed and used by criminal gangs with links to Russia. The ransom demand is expected to be in the millions, although sources close to the investigation say there are "workarounds" to get the systems going again. This attack is significant, as Royal Mail is deemed part of the UK's "critical national infrastructure". The back-office system that has been affected is used by Royal Mail to prepare mail for despatch abroad, and to track and trace overseas items. The threat actors are likely to be threatening Royal Mail with the prospect of having potentially sensitive data published by a certain deadline.<br />
<br />
It is not yet clear whether Royal Mail is considering negotiating with hackers or paying a ransom. However, firms that rely on posting items overseas have seen ongoing impacts to their businesses. Royal Mail has apologised and asked companies not to send international parcels or any mail that requires a customs declaration for the time being. Domestic postal services remain unaffected.<br />
<br />
Click <a href="https://www.bbc.co.uk/news/business-64324000?at_medium=RSS&at_campaign=KARANGA">here</a> to read the full BBC article.<br />
<br />
<strong>Cyberattacks triple in last year according to Ukraine cybersecurity agency<br />
</strong><br />
The UK Government's security minister Tom Tugendhat warns of a ‘persistent threat’ of Russian attacks on Ukraine's critical infrastructure. Ukraine's cybersecurity agency says Russian hacking is, at times, deployed in combination with missile strikes. Russian hackers carried out 10 attacks a day against “critical infrastructure” during November 2022, as part of the wider effort to leave millions without power amid plunging temperatures.<br />
<br />
The Ukrainian cybersecurity agency stated that Russian cyber-attacks were also coordinated in conjunction with “information-psychological and propaganda operations" trying to “shift responsibility for the consequences [of power outages] to Ukrainian state authorities, local governments or large Ukrainian businesses”. The UK has provided a £6.35m package of support, helping Ukraine with incident response, information sharing, hardware and software.<br />
<br />
Russia's "near abroad" have also been targeted. In late October 2022, Poland’s senate was hit by a cyber-attack, a day after the country’s upper house had unanimously adopted a resolution describing the Russian government as a terrorist regime. Poland later blamed the pro-Russian group NoName057(16) for a denial-of-service attack aimed at shutting down its website. British organisations are urged to continue to review their digital security during what the NCSC considers to be an “extended period of heightened threat”.<br />
<br />
Click <a href="https://www.theguardian.com/world/2023/jan/19/cyber-attacks-have-tripled-in-past-year-says-ukraine-cybersecurity-agency">here</a> to read the Guardian article.<br />
<br />
<strong>The darker side of ChatGPT<br />
</strong><br />
Since its debut less than two months ago, ChatGPT has become well-known and is used worldwide for a wide range of jobs. For anyone working in the software industry, its amazing capabilities provide quick and understandable code samples. On the flip side ChatGPT is advanced in its capacity to construct sophisticated malware that contains dangerous code.<br />
<br />
ChatGPT could be used to create polymorphic malware. This malware’s advanced capabilities can evade security products and make mitigation cumbersome with very little effort or investment by the adversary. Cyber Ark ran a test using ChatGPT and found that it is possible to create a polymorphic program that is highly evasive and difficult to detect. This creates significant issues for security professionals.<br />
<br />
The concept of creating polymorphic malware using ChatGPT has been shown to be relatively straightforward. By utilizing ChatGPT’s ability to generate various persistence techniques, Anti-VM modules and other malicious payloads, the possibilities for malware development are vast. This is a field that is constantly evolving.<br />
<br />
Click <a href="https://www.cyberark.com/resources/threat-research-blog/chatting-our-way-into-creating-a-polymorphic-malware">here</a> to read the Cyber Ark article.<br />
<br />
<strong>New program offers most vulnerable in society free cyber security support<br />
</strong><br />
The NCSC offer charities and legal aid firms free support to put cyber protections in place. The new government Funded Cyber Essentials Programme offers some small organisations in high-risk sectors practical support at no cost to help put baseline cyber security controls in place. The information held by these organisations can be highly sensitive – including, for example, personal data relating to vulnerable individuals. Eligible organisations will receive 20 hours of expert support to help implement the five technical measures needed to gain Cyber Essentials certification – firewalls, secure settings, access controls, malware and software updates. Cyber Essentials is a government-backed certification scheme which helps organisations of all sizes guard against online threats and demonstrate a commitment to cyber security.<br />
<br />
The offer is currently available to micro or small businesses that offer legal aid services and micro or small charities that process personal data, for example those working in safeguarding such as domestic abuse charities or online chat support services.<br />
<br />
Click <a href="https://www.ncsc.gov.uk/information/funded-cyber-essentials-programme">here</a> to read the NCSC blog post.</p>]]></description><pubDate>Wed, 01 Feb 2023 10:30:00 Z</pubDate><category>Data and privacy</category><authors:names>Richard Breavington, Daniel Guilfoyle, Ian Dinning, Rachel Ford, Christopher Ashton, Elizabeth Zang, Emanuele Santella </authors:names><content:encoded><![CDATA[<p><strong>ICO confirms focus on prevention rather than punishment</strong><br />
<br />
John Edwards, head of the ICO, recently spoke at fireside conference held at CMS' London office, convened by RPC's Data partner, Jon Bartley.<br />
<br />
During the conversation, Edwards said he will not seek to match EU regulators in racking up a “stack of fines” as he advocated for taking a “bold” approach to regulation. The ICO's focus will be to make UK privacy laws clearer and prevent data breaches from happening in the first place.<br />
<br />
He warned that focusing on punishing breaches rather than preventing them from happening is a “really inefficient way of regulating.” Edwards promised to "work alongside organisations to assist them achieve their objectives" in laying out a new regulatory framework. He also reassured that there is no need for concerns around a radical shake-up of data privacy rules, adding that he is "not here to be the architect of the deconstruction of the data protection framework.”<br />
<br />
Click <a href="https://www.cityam.com/uks-data-watchdog-to-shift-away-from-big-fines-to-focus-on-prevention/">here</a> to read the City AM article.<br />
<strong><br />
UK schools are well built for cyber resilience</strong><br />
<br />
New research by London Grid for Learning, in collaboration with the NCSC, surveyed over 800 schools across the UK and showed that over half the schools in the research (53%) felt prepared for a cyber-attack.<br />
<br />
All schools surveyed now use firewall protection, two thirds use two step verification for important accounts, and over half of the school leaders and governors felt more informed about the cyber security issues within their schools. The NCSC's 'cyber security for schools' website contains free cyber security training for school staff, and almost half of the surveyed schools were aware of this service. The pandemic and widespread adoption of home schooling has meant schools are more reliant on IT-related services for both administrative and learning functions.<br />
<br />
Almost 78% of schools surveyed had experienced at least one type of cyber security incident, confirming that the threat is still out there, with ransomware attacks in particular increasing across the sector. The NCSC, working alongside the education sector has plans to design accessible, practical guidance for schools wanting to build their cyber security resilience.<br />
<br />
Click <a href="https://www.ncsc.gov.uk/blog-post/uk-schools-build-cyber-resilience">here</a> to read the NCSC blog post.<br />
<br />
<strong>Companies warned to step up cyber security to become insurable<br />
</strong><br />
The World Economic Forum (WEF) published its Global risk report 2023, and identified cyber insecurity as one of the top 10 risks facing governments and organisations over the next 10 years. The report rates cyberwarfare as a more serious threat to stability than risks of military confrontation. The reason is that cyber-attacks can dramatically destabilise critical infrastructure, such as healthcare and public institutions. Greater numbers of employees working from home and the increased use of digital technologies have opened-up new paths for malicious actors to break into computer systems.<br />
<br />
Businesses are at risk of finding they are unable to secure cyber insurance cover as the volume of cyber-attacks reaches new levels. High levels of cyber protection are increasingly becoming a prerequisite for cyber insurance. The cost of cyber risks insurance continues to rise as demand for cover outstrips supply.<br />
<br />
Carolina Klint, European Risk management leader for insurance broker Marsh, and one of the contributors to the report, said that some insurance companies are now saying that “cyber risk is systemic and uninsurable”. It’s up to the insurance industry and to capital markets to decide whether or not they find the risk palatable. Businesses are currently tackling multiple risks at once. Spending more on cyber security will give organisations greater resilience to survive other shocks, such as failures in the supply chain. Klint confirms that “cyber resilience and supply chain resilience are really closely interlinked, meaning investment in resilience will have a positive impact on more than one risk."<br />
<br />
Organisations will need to look at the effectiveness of their current risk mitigation and risk management strategies and invest up-front in cyber security to be insurable, said Klint. John Scott, head of sustainability risk at Zurich Insurance Group, comments that its “astonishing”, that many companies have not put basic IT security protection in place, such as ensuring software is regularly patched and using two-factor authentication. He pointed out that organisations should also be working with their suppliers and datacentres to make sure that their supply chains are protected from cyber-attacks.</p>
<p>Click <a href="http://https://www.computerweekly.com/news/252529132/Companies-warned-to-step-up-cyber-security-to-become-insurable">here</a> to read the Computer Weekly article.<br />
<br />
<strong>Royal mail restarts limited overseas post after cyber- attack<br />
</strong><br />
Royal mail has started clearing its backlog of overseas post and has started receiving new international letters, following ransomware attack earlier this month. In a bid to mitigate impacts of the attack, Royal mail continues to work with authorities and is trying 'operational workarounds.' Royal Mail, as a private company, is required to keep authorities and regulators informed, however it has said little to the public.<br />
<br />
The ransomware used in the attack is Lockbit. Computer security firms say the software involved has been developed and used by criminal gangs with links to Russia. The ransom demand is expected to be in the millions, although sources close to the investigation say there are "workarounds" to get the systems going again. This attack is significant, as Royal Mail is deemed part of the UK's "critical national infrastructure". The back-office system that has been affected is used by Royal Mail to prepare mail for despatch abroad, and to track and trace overseas items. The threat actors are likely to be threatening Royal Mail with the prospect of having potentially sensitive data published by a certain deadline.<br />
<br />
It is not yet clear whether Royal Mail is considering negotiating with hackers or paying a ransom. However, firms that rely on posting items overseas have seen ongoing impacts to their businesses. Royal Mail has apologised and asked companies not to send international parcels or any mail that requires a customs declaration for the time being. Domestic postal services remain unaffected.<br />
<br />
Click <a href="https://www.bbc.co.uk/news/business-64324000?at_medium=RSS&at_campaign=KARANGA">here</a> to read the full BBC article.<br />
<br />
<strong>Cyberattacks triple in last year according to Ukraine cybersecurity agency<br />
</strong><br />
The UK Government's security minister Tom Tugendhat warns of a ‘persistent threat’ of Russian attacks on Ukraine's critical infrastructure. Ukraine's cybersecurity agency says Russian hacking is, at times, deployed in combination with missile strikes. Russian hackers carried out 10 attacks a day against “critical infrastructure” during November 2022, as part of the wider effort to leave millions without power amid plunging temperatures.<br />
<br />
The Ukrainian cybersecurity agency stated that Russian cyber-attacks were also coordinated in conjunction with “information-psychological and propaganda operations" trying to “shift responsibility for the consequences [of power outages] to Ukrainian state authorities, local governments or large Ukrainian businesses”. The UK has provided a £6.35m package of support, helping Ukraine with incident response, information sharing, hardware and software.<br />
<br />
Russia's "near abroad" have also been targeted. In late October 2022, Poland’s senate was hit by a cyber-attack, a day after the country’s upper house had unanimously adopted a resolution describing the Russian government as a terrorist regime. Poland later blamed the pro-Russian group NoName057(16) for a denial-of-service attack aimed at shutting down its website. British organisations are urged to continue to review their digital security during what the NCSC considers to be an “extended period of heightened threat”.<br />
<br />
Click <a href="https://www.theguardian.com/world/2023/jan/19/cyber-attacks-have-tripled-in-past-year-says-ukraine-cybersecurity-agency">here</a> to read the Guardian article.<br />
<br />
<strong>The darker side of ChatGPT<br />
</strong><br />
Since its debut less than two months ago, ChatGPT has become well-known and is used worldwide for a wide range of jobs. For anyone working in the software industry, its amazing capabilities provide quick and understandable code samples. On the flip side ChatGPT is advanced in its capacity to construct sophisticated malware that contains dangerous code.<br />
<br />
ChatGPT could be used to create polymorphic malware. This malware’s advanced capabilities can evade security products and make mitigation cumbersome with very little effort or investment by the adversary. Cyber Ark ran a test using ChatGPT and found that it is possible to create a polymorphic program that is highly evasive and difficult to detect. This creates significant issues for security professionals.<br />
<br />
The concept of creating polymorphic malware using ChatGPT has been shown to be relatively straightforward. By utilizing ChatGPT’s ability to generate various persistence techniques, Anti-VM modules and other malicious payloads, the possibilities for malware development are vast. This is a field that is constantly evolving.<br />
<br />
Click <a href="https://www.cyberark.com/resources/threat-research-blog/chatting-our-way-into-creating-a-polymorphic-malware">here</a> to read the Cyber Ark article.<br />
<br />
<strong>New program offers most vulnerable in society free cyber security support<br />
</strong><br />
The NCSC offer charities and legal aid firms free support to put cyber protections in place. The new government Funded Cyber Essentials Programme offers some small organisations in high-risk sectors practical support at no cost to help put baseline cyber security controls in place. The information held by these organisations can be highly sensitive – including, for example, personal data relating to vulnerable individuals. Eligible organisations will receive 20 hours of expert support to help implement the five technical measures needed to gain Cyber Essentials certification – firewalls, secure settings, access controls, malware and software updates. Cyber Essentials is a government-backed certification scheme which helps organisations of all sizes guard against online threats and demonstrate a commitment to cyber security.<br />
<br />
The offer is currently available to micro or small businesses that offer legal aid services and micro or small charities that process personal data, for example those working in safeguarding such as domestic abuse charities or online chat support services.<br />
<br />
Click <a href="https://www.ncsc.gov.uk/information/funded-cyber-essentials-programme">here</a> to read the NCSC blog post.</p>]]></content:encoded></item><item><guid isPermaLink="false">{18117C76-CBC6-467E-9E12-6B4B3212358C}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/nis-regulations-expand-to-bring-outsourced-it-providers-managed-service-providers-into-scope/</link><title>The NIS Regulations to expand to bring outsourced IT providers and managed service providers into scope</title><description><![CDATA[The UK's Network and Information Systems ("NIS") Regulations came into force in May 2018 to boost the level of security of network and information systems for the provision of essential services, such as transport, energy, water, health and digital infrastructure ("operators of essential services (OES)"). These Regulations also applied to digital services, such as online marketplaces, online search engines and cloud computing services ("relevant digital service providers (RDSPs)"). ]]></description><pubDate>Thu, 05 Jan 2023 11:38:00 Z</pubDate><category>Data and privacy</category><authors:names>Richard Breavington</authors:names><content:encoded><![CDATA[<p><strong>Background</strong><br />
<br />
The UK's Network and Information Systems ("NIS") Regulations came into force in May 2018 to boost the level of security of network and information systems for the provision of essential services, such as transport, energy, water, health and digital infrastructure ("operators of essential services (OES)"). These Regulations also applied to digital services, such as online marketplaces, online search engines and cloud computing services ("relevant digital service providers (RDSPs)"). The NIS Regulations were introduced as a response to the security threat, resulting from essential industries becoming more reliant on technology.<br />
<br />
The NIS Regulations were intended to create a common level of security for network and information systems to provide adequate protection against cyber-attacks. <br />
<br />
The past few years have resulted in a rapid move to digitalisation, due in part to the impact of COVID-19. Accordingly, essential services are increasingly dependent on network and information systems and digital supply chains. There has also been a wave of high-profile cyber-attacks on critical industries, such as the December 2020 SolarWinds supply chain compromise, the May 2021 ransomware attack on the US Colonial Pipeline, and the July 2021 attack on Kaseya. These incidents demonstrated how a country's national security and wider economy could be disrupted via attacks on single providers. <br />
<br />
Entities such as outsourced IT providers and managed service providers ("MSPs"), to the extent they existed at all, played a different role when the first NIS Regulations were drafted. Some MSPs now have automatic access to networks of thousands of other companies. Threat actors could target just one of these entities and be able to access a significant number of other company networks as a result. <br />
<br />
The new proposals bring outsourced IT providers and MSPs within scope of the regulatory framework to ensure that these entities have appropriate cyber security measures in place and can be regulated effectively. The measures are due to be implemented as soon as parliamentary time will allow. <br />
 <br />
<strong>Supply chain security risks<br />
</strong><br />
Cyber security risks can be found within an organisation's supply chain as well as in direct threats to its own environment. This challenge is particularly relevant, given the growing reliance of many organisations on companies who provide essential outsourced services with privileged access to internal systems.<br />
<br />
We see instances of supply chain security risks on a day-to-day basis, while providing advice to different companies who are impacted by cyber-attacks. For example, we have assisted organisations that provide managed services to numerous customers. We have seen instances of those clients suffering a ransomware attack involving encryption, which meant that the services are unavailable to customers. This impacts the clients' operations and has a potential knock-on effect on the customers who relied upon the clients' services to manage their own businesses.  The net result can be a significant impact on the clients in terms of substantial losses in profits and staff time. But also, a wider impact on customers which, whilst harder to quantify, could in some cases be significant.<br />
<br />
In other situations, we have seen clients, who have relied on cloud services providers to host their emails, impacted when the service provider has been hit by a ransomware attack.  In these circumstances, the clients' historic emails have been lost. This can impact day-to-day operations and also their ability to receive new business. The service provider may be a large company with considerable bargaining power. In such cases, the contracts with the service provider might provide the clients with only limited recourse against the service provider.  <br />
<br />
For many businesses that suffer from the inability to negotiate terms with MSPs for improved cyber security measures, there is arguably a need for legislation to enforce such measures outside of contractual provisions. Of course, the potential impact is even greater where clients of the MSPs and outsourced providers include Government departments and/or critical infrastructure. <br />
<br />
<strong>Proposed approach<br />
</strong><br />
The UK Government is keen to tackle this new cyber security threat in a way that does not stunt the valuable growth that is propagated by MSPs and outsourced IT services. The measures outlined in the initial consultation have been divided into three "Pillars." However, only the first two pillars have been consulted on: <br />
<br />
<strong>Pillar I: Proposals to bring additional critical providers of digital services into the UK’s cyber security regulatory framework</strong>. This is intended to ensure that those providers who frequently have privileged access and provide critical support to essential UK services have adequate cyber security protections in place and can be regulated effectively and proactively. Previously, with no baseline in place, it was difficult for UK companies to demand increased security measures or oversight of MSPs, especially when dealing with large suppliers. The proposed measures will expand the scope of "digital service" to include "managed services," which play an essential role in supporting the UK economy and are critical to the functioning of essential services in the UK.<br />
<br />
MSPs will be required to register with the relevant competent authority (the ICO) and have appropriate and proportionate security measures in place to ensure their networks are secure. <br />
<br />
Further changes will require essential and digital services to improve cyber incident reporting to regulators such as Ofcom, Ofgem and the ICO.  This will include notifying regulators of a wider range of incidents that disrupt service, or which could have a high risk or impact to their service, even if they don’t immediately cause disruption.<br />
<br />
The Government proposes to establish a two-tier supervisory regime for digital service providers within the scope of the updated NIS Regulations. This will involve a proactive supervisory regime for the most critical digital services and a reactive supervisory regime for the remaining digital services regulated under the NIS Regulations. <br />
<br />
Digital service providers regulated on a more proactive basis would be required to actively demonstrate to the ICO that they have fulfilled their duties under NIS, including maintaining appropriate and proportionate security measures. Digital service providers under a reactive regime would have the same duties but would be subjected to a lighter-touch supervision – with regulatory action only being taken when there has been an incident, or a credible report of an incident or failure to implement the requirements of the NIS Regulations.<br />
<br />
There is an existing exemption for small and micro-businesses from the digital service provisions. However, due to risks highlighted by recent incidents the department for Digital, Culture, Media & Sport are considering whether this exemption is still proportionate to the risk.<br />
<br />
<strong>Pillar II: Proposals to future-proof the UK’s existing cyber security legislation</strong>. The UK government currently has no power to make policy updates to the NIS Regulations directly and all amendments must be done via primary regulation. These processes do not complement the everchanging sectors that the NIS Regulations regulate. Without power to make changes through secondary legislation, the concern is that the NIS Regulations could be less effective, as emerging threats to the security of networks and information systems might not be counteracted as effectively if regulators cannot intervene promptly. This proposal therefore assists in the Government's ability to adapt to potential changes in threat and technological developments.<br />
<br />
The proposed measure would take the form of a delegated power, by which the UK government may make amendments to the NIS Regulations in order to vary the sectors and sub-sectors which are in scope. The power would be subject to safeguards and limitations, to ensure that it is appropriate, proportionate, and does not go beyond its intended objective.<br />
<br />
<strong>Who this impacts and when changes will be implemented<br />
</strong><br />
The changes bring providers of outsourced IT and MSPs that are key to the functioning of essential services into scope of the NIS Regulations. The updates to the NIS Regulations are to be made as soon as parliamentary time allows, according to the UK Government. <br />
<br />
MSP and outsourced IT are defined as those services which:</p>
<ul>
    <li>are supplied to a client by an external supplier.</li>
    <li>involve regular and ongoing service management of data, IT infrastructure, IT networks and/or IT systems;</li>
    <li>are categorised as business to business (B2B) rather than business to consumer (B2C) services; and</li>
    <li>rely on network and information systems. </li>
</ul>
<p>There is also to be further consideration of introducing risk-based characteristics into the definition of a managed service. The hope in doing so would be to ensure that the managed services brought into scope are those which would have the most substantial impact on the UK’s resilience should they be disrupted.<br />
<br />
Under this approach, as well as having the above characteristics, to be regulated as “digital services” under the NIS Regulations 2018, a service would have to:</p>
<ul>
    <li>have privileged access or connectivity to a customer’s data, IT infrastructure, IT networks and/or IT systems; or</li>
    <li>perform essential or sensitive functions, such as the processing and/or storage of confidential or business-critical data</li>
</ul>
<p>Services that meet these characteristics will be required to comply with the requirements and duties set out in NIS Regulations 2018.  Examples of MSPs include providers of remote security operations, automatic patching, digital accounts and billing.<br />
<br />
Once amendments to the NIS Regulations are enforced, many companies who provide the broad range of services described above will need to react to the NIS Regulations by considering their cyber security measures and reporting to relevant authorities when certain incidents occur. While complying with these Regulations may appear burdensome, doing so could improve security for both MSPs and the companies they assist. If so, this could go some way towards addressing a supply chain issue which has become an increasing concern.</p>]]></content:encoded></item><item><guid isPermaLink="false">{30E8687C-1581-4A2F-91BF-B54688F1E879}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/cyber-bytes-issue-48/</link><title>Cyber_Bytes - Issue 48</title><description><![CDATA[<p><strong>ICO fines reach £15 million in 2022 - triple the value of 2021 penalties<br />
</strong><br />
A recent analysis by RPC revealed a three-fold increase in the value of ICO fines, from a figure of £4,848,000 in 2021 to a figure of £15,249,200 between 1st November 2021 and 31st October 2022. This increase is partly attributable to larger one-off fines, such as the ones levied against Clearview AI for £7.5m due to a violation of privacy laws and Interserve for £4.4m for failing to protect employee data in the wake of a data breach.<br />
<br />
Clearview AI was fined in May for using images of people in the UK and other countries without permission to build a global online facial recognition database. As part of Clearview's sanctions, the ICO issued an enforcement notice requiring Clearview to stop collecting and to remove all readily accessible online personal information relating to UK citizens. Construction business Interserve was fined £4.4m for failing to take reasonable precautions to safeguard the data of its customers in the wake of a data breach in 2020.<br />
<br />
RPC's analysis also revealed a four-fold increase in fines related to personal data stolen via a cyber-attack. This figure rose from £1,285,000 in 2021 to £4,998,000 in November this year. Richard Breavington, RPC's Head of Cyber & Tech Insurance Team, commented that the increase in fines could be reflective of a tougher stance by the ICO post-COVID on businesses in respect of taking appropriate measures to protect customer and employee data. As the value of ICO fines creep up, the regulator's "<em>measured approach to sanctions seen in the pandemic, and the attitude of forbearance seems to be changing</em>".<br />
<br />
Click <a href="https://www.law360.com/articles/1558568/fines-by-uk-data-breach-watchdog-triple-to-15-2m">here</a> to read the full article from Law360.<br />
<br />
<strong>Key points from the UK Online Safety Bill<br />
</strong><br />
The UK Online Safety Bill is the UK Government's ambitious attempt to regulate the internet. If the Bill becomes law it will apply to any service or site that has users in the UK or targets the UK as a market, even if not based in the UK. Failures to comply with the new bill will lead to potential fines of up to 10% of global turnover or £18m whichever is higher.<br />
<br />
Ofcom will be the appointed regulator with powers to enforce the Online Safety regime. The Bill particularly focuses on preventing children from accessing potentially harmful material and places enhanced requirements on how online platforms assess and delete illegal material deemed to be injurious. The Bill would be applicable to search engines, hosting platforms, social media platforms, some online gaming sites, and pornographic sites.<br />
<br />
Currently, intermediary hosting platforms have a liability shield when users post illegal or harmful content online until they are made aware of the content. The Bill contains a proposed requirement on companies to actively look for illegal content, rather than waiting for someone to report it before acting. If Ofcom take regulatory action against a service provider, details of that disciplinary measure would be made public.<br />
<br />
Critics remain sceptical about the proposed backdoors into private content such as encrypted messaging. These backdoors could also be exploited by threat actors, said Matthew Hodgson, co-founder of Element, a decentralized British messaging app. Hodgson argues that the UK Government should not facilitate the introduction of privacy-eroding infrastructure, but rather prevent it from becoming a reality which could potentially be adopted by authoritarian regimes around the world.<br />
<br />
Click <a href="https://www.computerworld.com/article/3681832/what-you-need-to-know-about-the-uks-online-safety-bill.html">here</a> to read the full article from Computerworld.<br />
<br />
<strong>ICO sheds light on how it ensures enforcement certainty<br />
</strong><br />
The ICO's John Edwards comments that "<em>members of the public, and those affected by a breach or infringement, are entitled to know that we have held the business or organisation to account, and that they have changed their practices as a result</em>”. As of 6 December 2022, in addition to publishing enforcement notices, the ICO has committed to publishing all reprimands going forward including historic reprimands issued from January 2022, unless there is good reason not to (such as national security, or potentially jeopardising an ongoing investigation).<br />
<br />
The ICO's Director of Investigations, Stephen Eckersley, praised reprimands as a way of showing action to raise data protection standards in addition to issuing fines. Example of when reprimands have been used include helping a local council improve its cyber security, warning a telecommunications company to improve its responses to the public when asked for personal information held about them, and ordering the police to improve how they handle victims’ personal information. Publishing reprimands is hoped to improve public transparency and provide more certainty to businesses as to how to improve and stay compliant.<br />
<br />
Ultimately the ICO's goal for private and public bodies is to adopt privacy by design putting people at the heart of all their practices.<br />
<br />
Click <a href="https://ico.org.uk/about-the-ico/media-centre/news-and-blogs/2022/12/blog-providing-certainty-on-how-we-enforce-the-laws-we-regulate/">here</a> to read the full ICO blog post.<br />
<br />
<strong>Increase in cost of phishing attacks<br />
</strong><br />
A recent report by Acronis has revealed that phishing and malicious email threats have gone up by 60%. The use of phishing methods such as multi-factor authentication fatigue attacks is on the rise. Social engineering attacks have also increased, accounting for 3% of all attacks.<br />
<br />
Candid Wüest, Acronis VP of Cyber Protection Research, commented that malicious actors continue to use the same proven playbook for big pay-outs, and "<em>organisations must prioritise all-encompassing solutions when looking to mitigate phishing and other hacking attempts in the new year</em>". Businesses need to re-evaluate their security strategies as the technologies used by threat actors keep evolving.<br />
<br />
The report found that ransomware retained the top spot as the biggest threat to businesses including government, healthcare, and education. Phishing and malicious emails also remain successful. Between July 2022 and October 2022, phishing emails accounted for 76% of all email attacks, up from 58% in the first half of 2022. The most email-borne-attacked industries are construction, retail, real estate, professional services (computers & IT), and finance.<br />
<br />
The Acronis Cyberthreat Report also highlighted that malicious actors continue to target unpatched systems. Zero-day vulnerabilities and old unpatched vulnerabilities still carry the highest system compromise risk.<br />
<br />
Click <a href="https://bit.ly/3GFnF4y">here</a> to read the full article from Acronis.<br />
<br />
<strong>Global law enforcement operation shuts down around 50 DDoS attack platforms<br />
</strong><br />
Around 50 of the most popular platforms available for hire to launch distributed denial-of-service (DDoS) attacks have been shut down during an international law enforcement crackdown called Operation Power Off. The takedown saw international participation from Europol, UK, US, Netherlands, Poland, and Germany. Europol announced that just one of the services shut down by Operation Power Off was responsible for more than 30 million DDoS attacks. Seven website administrators have also been arrested. This is a welcome development as the Europol announcement flagged that DDoS booter services have effectively lowered the entry barrier into cybercrime. For a fee as low as Euro 10, any low-skilled individual can launch DDoS attacks with one click, knocking offline whole websites and networks by barraging them with traffic.<br />
<br />
Click <a href="https://www.darkreading.com/attacks-breaches/ddos-attack-platforms-shut-down-in-global-law-enforcement-crackdown">here</a> to read the full article from Dark Reading.</p>]]></description><pubDate>Wed, 04 Jan 2023 14:04:00 Z</pubDate><category>Data and privacy</category><authors:names>Richard Breavington, Daniel Guilfoyle, Ian Dinning, Rachel Ford, Christopher Ashton, Elizabeth Zang, Emanuele Santella </authors:names><content:encoded><![CDATA[<p><strong>ICO fines reach £15 million in 2022 - triple the value of 2021 penalties<br />
</strong><br />
A recent analysis by RPC revealed a three-fold increase in the value of ICO fines, from a figure of £4,848,000 in 2021 to a figure of £15,249,200 between 1st November 2021 and 31st October 2022. This increase is partly attributable to larger one-off fines, such as the ones levied against Clearview AI for £7.5m due to a violation of privacy laws and Interserve for £4.4m for failing to protect employee data in the wake of a data breach.<br />
<br />
Clearview AI was fined in May for using images of people in the UK and other countries without permission to build a global online facial recognition database. As part of Clearview's sanctions, the ICO issued an enforcement notice requiring Clearview to stop collecting and to remove all readily accessible online personal information relating to UK citizens. Construction business Interserve was fined £4.4m for failing to take reasonable precautions to safeguard the data of its customers in the wake of a data breach in 2020.<br />
<br />
RPC's analysis also revealed a four-fold increase in fines related to personal data stolen via a cyber-attack. This figure rose from £1,285,000 in 2021 to £4,998,000 in November this year. Richard Breavington, RPC's Head of Cyber & Tech Insurance Team, commented that the increase in fines could be reflective of a tougher stance by the ICO post-COVID on businesses in respect of taking appropriate measures to protect customer and employee data. As the value of ICO fines creep up, the regulator's "<em>measured approach to sanctions seen in the pandemic, and the attitude of forbearance seems to be changing</em>".<br />
<br />
Click <a href="https://www.law360.com/articles/1558568/fines-by-uk-data-breach-watchdog-triple-to-15-2m">here</a> to read the full article from Law360.<br />
<br />
<strong>Key points from the UK Online Safety Bill<br />
</strong><br />
The UK Online Safety Bill is the UK Government's ambitious attempt to regulate the internet. If the Bill becomes law it will apply to any service or site that has users in the UK or targets the UK as a market, even if not based in the UK. Failures to comply with the new bill will lead to potential fines of up to 10% of global turnover or £18m whichever is higher.<br />
<br />
Ofcom will be the appointed regulator with powers to enforce the Online Safety regime. The Bill particularly focuses on preventing children from accessing potentially harmful material and places enhanced requirements on how online platforms assess and delete illegal material deemed to be injurious. The Bill would be applicable to search engines, hosting platforms, social media platforms, some online gaming sites, and pornographic sites.<br />
<br />
Currently, intermediary hosting platforms have a liability shield when users post illegal or harmful content online until they are made aware of the content. The Bill contains a proposed requirement on companies to actively look for illegal content, rather than waiting for someone to report it before acting. If Ofcom take regulatory action against a service provider, details of that disciplinary measure would be made public.<br />
<br />
Critics remain sceptical about the proposed backdoors into private content such as encrypted messaging. These backdoors could also be exploited by threat actors, said Matthew Hodgson, co-founder of Element, a decentralized British messaging app. Hodgson argues that the UK Government should not facilitate the introduction of privacy-eroding infrastructure, but rather prevent it from becoming a reality which could potentially be adopted by authoritarian regimes around the world.<br />
<br />
Click <a href="https://www.computerworld.com/article/3681832/what-you-need-to-know-about-the-uks-online-safety-bill.html">here</a> to read the full article from Computerworld.<br />
<br />
<strong>ICO sheds light on how it ensures enforcement certainty<br />
</strong><br />
The ICO's John Edwards comments that "<em>members of the public, and those affected by a breach or infringement, are entitled to know that we have held the business or organisation to account, and that they have changed their practices as a result</em>”. As of 6 December 2022, in addition to publishing enforcement notices, the ICO has committed to publishing all reprimands going forward including historic reprimands issued from January 2022, unless there is good reason not to (such as national security, or potentially jeopardising an ongoing investigation).<br />
<br />
The ICO's Director of Investigations, Stephen Eckersley, praised reprimands as a way of showing action to raise data protection standards in addition to issuing fines. Example of when reprimands have been used include helping a local council improve its cyber security, warning a telecommunications company to improve its responses to the public when asked for personal information held about them, and ordering the police to improve how they handle victims’ personal information. Publishing reprimands is hoped to improve public transparency and provide more certainty to businesses as to how to improve and stay compliant.<br />
<br />
Ultimately the ICO's goal for private and public bodies is to adopt privacy by design putting people at the heart of all their practices.<br />
<br />
Click <a href="https://ico.org.uk/about-the-ico/media-centre/news-and-blogs/2022/12/blog-providing-certainty-on-how-we-enforce-the-laws-we-regulate/">here</a> to read the full ICO blog post.<br />
<br />
<strong>Increase in cost of phishing attacks<br />
</strong><br />
A recent report by Acronis has revealed that phishing and malicious email threats have gone up by 60%. The use of phishing methods such as multi-factor authentication fatigue attacks is on the rise. Social engineering attacks have also increased, accounting for 3% of all attacks.<br />
<br />
Candid Wüest, Acronis VP of Cyber Protection Research, commented that malicious actors continue to use the same proven playbook for big pay-outs, and "<em>organisations must prioritise all-encompassing solutions when looking to mitigate phishing and other hacking attempts in the new year</em>". Businesses need to re-evaluate their security strategies as the technologies used by threat actors keep evolving.<br />
<br />
The report found that ransomware retained the top spot as the biggest threat to businesses including government, healthcare, and education. Phishing and malicious emails also remain successful. Between July 2022 and October 2022, phishing emails accounted for 76% of all email attacks, up from 58% in the first half of 2022. The most email-borne-attacked industries are construction, retail, real estate, professional services (computers & IT), and finance.<br />
<br />
The Acronis Cyberthreat Report also highlighted that malicious actors continue to target unpatched systems. Zero-day vulnerabilities and old unpatched vulnerabilities still carry the highest system compromise risk.<br />
<br />
Click <a href="https://bit.ly/3GFnF4y">here</a> to read the full article from Acronis.<br />
<br />
<strong>Global law enforcement operation shuts down around 50 DDoS attack platforms<br />
</strong><br />
Around 50 of the most popular platforms available for hire to launch distributed denial-of-service (DDoS) attacks have been shut down during an international law enforcement crackdown called Operation Power Off. The takedown saw international participation from Europol, UK, US, Netherlands, Poland, and Germany. Europol announced that just one of the services shut down by Operation Power Off was responsible for more than 30 million DDoS attacks. Seven website administrators have also been arrested. This is a welcome development as the Europol announcement flagged that DDoS booter services have effectively lowered the entry barrier into cybercrime. For a fee as low as Euro 10, any low-skilled individual can launch DDoS attacks with one click, knocking offline whole websites and networks by barraging them with traffic.<br />
<br />
Click <a href="https://www.darkreading.com/attacks-breaches/ddos-attack-platforms-shut-down-in-global-law-enforcement-crackdown">here</a> to read the full article from Dark Reading.</p>]]></content:encoded></item><item><guid isPermaLink="false">{C5C9C655-0B60-4C11-AD7A-270A1A52D857}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/cyber-bytes-issue-47/</link><title>Cyber_Bytes - Issue 47</title><description><![CDATA[<p><strong>Can hacking victims retain anonymity using a 'persons unknown' action in court?</strong></p>
<p>A company working in 'security-sensitive and highly classified projects of national significance' has successfully withheld its identity when obtaining summary judgment against the unknown perpetrators of a $6.8m 'ransomware' attack. In XXX v Persons Unknown, Mr Justice Cavanagh agreed, in paragraph 29 of the judgment, that a derogation from open justice was needed to prevent the court itself becoming 'the instrument of harm'. National firm Weightmans LLP, who acted for the company identified as XXX, said the verdict shows the value of 'persons unknown' injunctions in managing the fallout from cyberattacks. Previous injunctions have required the victims to be named in open court. In making their judgement the Court had to balance the overarching and fundamental public interest in open justice with the risk that disclosure of the Claimant's identity and of details of the evidence, might facilitate the very injury that the proceedings were intended to restrain.</p>
<p>The judgment, which followed a private hearing, cited paragraph 36 of <em>Various Claimants v The Independent Parliamentary Standards Authority</em> [2021] EWHC 2020 (QB) noting that derogations from open justice can be justified as necessary on two grounds: maintenance of the administration of justice and harm to other legitimate interests. The judge found that the mere fact that a business would suffer negative consequences if a cyberattack becomes public knowledge would not automatically justify secrecy (paragraph 25). However, in this case, anonymity was justified by the nature of its work and the risk that, if its identity was known, 'third parties with malign intent' might locate the stolen information on the so-called 'Dark Web'. ' The company in question was a 'multi-discipline company'... whose clients 'require the utmost discretion, secrecy and protection from external threats'. Some of the company's data was also protected by the Official Secrets Act (paragraph 28).</p>
<p>Industry professionals regularly debate the value of an injunction in cases of cyberattacks. There’s always the risk that, by virtue of seeking the injunction in open court, businesses draw attention to the fact their IT systems have been breached or that data has been stolen and give others an indicator of where the data can be found. However, this judgment provides authority that in certain circumstances at least, the risk of publicity arising from the making of the injunction application itself could be possible to navigate.</p>
<p>Click <a href="https://www.bailii.org/ew/cases/EWHC/KB/2022/2776.html">here</a> to read the full case on Bailii.</p>
<p><strong>Client losses from cyber-attacks on law firms continue to fall</strong></p>
<p>The Solicitors Regulation Authority (SRA) has revealed that client losses resulting from cyber-attacks on law firms have fallen to £700,000 in the first 10 months of this year. This compares to £10m in 2017, a figure that has dropped most years since. A panel discussion at an SRA compliance officer conference in Birmingham on 8 November 2022, revealed an 'improving picture', adding that it tended to be clients who were targeted by email<br />
fraudsters, rather than their solicitors.</p>
<p>Ransomware was identified as the main form of cyber-attack against law firms and the conference speakers maintained the stance that firms should not pay up. Rachel Clements, a regulatory speaker at the conference mentioned, 'not only are you essentially paying a criminal… but it could expose you, your firm, and your clients to additional risks'. Research cited indicated that 80% of businesses that paid ransoms were targeted again, often by<br />
same attacker.</p>
<p>The GDPR requires firms to implement 'appropriate measures' to restore data, but the ICO's legal director confirmed that paying a ransom does not constitute an appropriate measure. William Wright, a partner at Paragon International Insurance Brokers, noted that cyber-insurers expect to see a raft of controls in place before issuing a law firm with an insurance policy, ranging from encryption and email scanning to intrusion detection and patch management. He also emphasised the importance of multi-factor authentication as increasingly becoming a pre-requisite to obtaining insurance. Lastly, he flagged the need for segregated back-ups and staff training, given that “most cyber-attacks we see are<br />
human related”.</p>
<p>Click <a href="https://www.legalfutures.co.uk/latest-news/client-losses-from-cyber-attacks-on-law-firms-continue-to-fall">here</a> to read the Legal Futures article.</p>
<p><strong>EU boosts action against cyber threats</strong></p>
<p>On 10 November 2022, the European Commission and the High Representative put fforward a Joint Communication on an EU Cyber Defence policy and an Action Plan on Military Mobility. This is in a bid to address the deteriorating security environment following the unstable Russia and Ukraine conflict and to boost the EU's capacity to protect its citizens and infrastructure.</p>
<p>Recent cyber-attacks on energy networks, transport infrastructure and space assets show the risks that they pose to both civilian and military actors. The new EU Cyber Defence Policy aims to strengthen coordination between military and civilian cyber communities. The aim is to reduce dependence on critical cyber technology while enhancing efficient cyber crisis management across the EU. The four pillars making up the policy are: increased coordination between cyber defence players, standardisation and certification across the whole cyber defence ecosystem (including non-critical software), investment in cyber capabilities in a collaborative way and partnering to address common challenges.</p>
<p>The Commission and the High Representative, including in his capacity as Head of the European Defence Agency (EDA), will present an annual report to the Council of the EU to monitor. They will also assess the progress of implementing the actions in the Joint Communication on the EU Cyber Defence Policy. Member states are invited to provide contributions on the progress of implementation measures taking place in the national<br />
context.</p>
<p>Click <a href="https://ec.europa.eu/commission/presscorner/detail/en/ip_22_6642">here</a> to read the European Commission article.</p>
<p><strong>Ex-NATO general classifies cyber defences as important as missile defences</strong></p>
<p>Retired U.S. General Ben Hodges commanded U.S. Army forces in Europe from 2014 until 2017 and has long argued that civilian infrastructure is an essential pillar of military strategy. He has now added that cyber protection is just as important as missile defence systems to guard the German North Sea ports. He highlights that a cyber-attack on the German ports of Bremerhaven or Hamburg would severely impede NATO efforts to send<br />
military reinforcements to allies.</p>
<p>With Russia increasingly threatening attacks on quasi-civilian infrastructure as part of its ongoing conflict with Ukraine, Hodges has flagged Bremerhaven and Hamburg as the most important seaports on which the alliance depends, for both military equipment and commercial cargo. A 2017 cyber-attack (NotPetya) attributed to Russia, first targeted Ukraine but rapidly spread to suppliers with operations across eastern Europe. Outages in computer systems meant Danish shipping giant, Maersk, lost track of its freight.</p>
<p>In light of this, Hodges has reacted with anxiety to Berlin's decision to allow Chinese group COSCO Shipping Holdings Co. Ltd to buy a stake in a terminal in Hamburg, noting that the Chinese may now be able to influence and disrupt activities at critical transportation infrastructure. The Chinese foreign ministry has however, confirmed that 'cooperation between China and Germany is a matter for the two countries and third parties have no right to meddle and intervene'. The threat of nation sponsored attacks on critical infrastructure continues to be watched closely across all nations.</p>
<p>Click <a href="https://www.reuters.com/world/cyber-important-missile-defences-ex-nato-general-2022-11-21/">here</a> to read the Reuters article.</p>
<p><strong>Current trends in ransom payments</strong></p>
<p>Ransomware attacks which were prevalent in 2020 and 2021, partly due to increased remote working, have now decreased. In its mid-year 2022 Cyber Threat Report, US security company SonicWall identified a 23 per cent drop in the number of ransomware attempts. It attributed this to several factors, including a 'downward' trend in the number of organisations willing to pay cyber criminals.</p>
<p>Cyber security group Coveware, confirmed that 85 per cent of ransomware cases they handled in 2019 ended in payment, however by Q1 of 2022, the proportion had fallen to 46 per cent. Many organisations are now finding ways to recover their data via backups or establishing that certain data is not critical. Other factors contributing to the decrease in ransomware payments, include the slump in the price of difficult-to-trace cryptocurrencies which were the preferred pay-out method of threat actors. Russia's invasion of Ukraine has also hit the sector, as many Russian threat actors have been disrupted by sanctions or have focused on conflict related attacks rather than ransomware on private organisations. UK and US governments firmly advise against ransom payments as it does not necessarily guarantee victims will get their data back but rather emboldens attackers by rewarding them.</p>
<p>The US states of North Carolina and Florida have now explicitly banned state and local government agencies from paying hackers and other states are exploring similar policies. Deciding to pay is often on a case-by-case basis, involving an exercise of weighing up the price tag of the ransom demand against the potential cost of not paying.</p>
<p>For example, organisations with confidential client data, can opt to pay to avoid potential reputational damage. In some cases, it makes more economic sense to pay the ransom than to recover the data or systems from backups. IBM's Cost of Data Breach Report showed that average costs for victims opting to pay ransoms were $630,000 lower than those who chose not to pay.</p>
<p>Due to the fear of threat actor links to Russia, many are opting not to pay on ethical grounds, and also from fear of violating sanctions. According to Sophos, only 4% of victims were able to retrieve all their data from hackers. Hackers could also sell or leak stolen data at points in the future, leaving no guarantees. Deciding to pay relies on an element of trust in threat actors to delete data, which there is no reliable evidence that they will do. Many<br />
experts warn that the total ransoms paid may be far higher than is currently known as there are no rules around disclosing payments.</p>
<p>Click <a href="https://www.ft.com/content/14de7a07-cc4f-483c-915f-d0b5cfc00a32">here</a> to read the FT article.</p>
<p><strong>ICO and Cabinet Office reach agreement on New Year Honours data breach fine</strong></p>
<p>On 15 November 2021 the ICO issued a fine to the Cabinet Office following an investigation into the 2019 data breach, where the Cabinet Office published a file a file on GOV.UK containing the names and unredacted addresses of more than 1,000 people announced in the New Year Honours list. The personal data was available online for a period of two hours and 21 minutes and it was accessed 3,872 times.</p>
<p>The Cabinet Office appealed against the amount of the fine to the First-tier Tribunal (General Regulatory Chamber) in December 2021, alleging the level of penalty was “wholly disproportionate”. The penalty was for failing to implement appropriate technical and organisational measures to keep personal data secure, in contravention of Articles 5(1)(f) and 32(1) of the GDPR. The appeal related solely to the amount of the fine and the facts leading up to the imposition of the penalty were not in dispute.</p>
<p>On 3 November 2022, the ICO announced its agreement to reduce the £500,000 Monetary Penalty Notice (MPN) imposed on the Cabinet Office in 2021 to £50,000, which the Cabinet Office has agreed to pay. In a bid to work more effectively with public authorities, the ICO's John Edwards commented that they acted pragmatically recognising 'the current economic pressures public bodies are facing' and the fact that 'in certain cases fines may be less critical in achieving deterrence'. He added that the ICO will continue to work with the Cabinet Office to ensure people’s information are being looked after. Edwards confirmed that the ICO is willing to use discretion to reduce the amount of fines on the public sector in appropriate cases, coupled with better engagement including publicising lessons learned and sharing good practice.</p>
<p>Click <a href="https://ico.org.uk/about-the-ico/media-centre/news-and-blogs/2022/11/ico-and-cabinet-office-reach-agreement-on-new-year-honours-data-breach-fine/">here</a> to read the ICO press release.</p>]]></description><pubDate>Fri, 02 Dec 2022 15:12:25 Z</pubDate><category>Data and privacy</category><authors:names>Richard Breavington, Daniel Guilfoyle, Ian Dinning, Rachel Ford, Christopher Ashton, Elizabeth Zang, Emanuele Santella </authors:names><content:encoded><![CDATA[<p><strong>Can hacking victims retain anonymity using a 'persons unknown' action in court?</strong></p>
<p>A company working in 'security-sensitive and highly classified projects of national significance' has successfully withheld its identity when obtaining summary judgment against the unknown perpetrators of a $6.8m 'ransomware' attack. In XXX v Persons Unknown, Mr Justice Cavanagh agreed, in paragraph 29 of the judgment, that a derogation from open justice was needed to prevent the court itself becoming 'the instrument of harm'. National firm Weightmans LLP, who acted for the company identified as XXX, said the verdict shows the value of 'persons unknown' injunctions in managing the fallout from cyberattacks. Previous injunctions have required the victims to be named in open court. In making their judgement the Court had to balance the overarching and fundamental public interest in open justice with the risk that disclosure of the Claimant's identity and of details of the evidence, might facilitate the very injury that the proceedings were intended to restrain.</p>
<p>The judgment, which followed a private hearing, cited paragraph 36 of <em>Various Claimants v The Independent Parliamentary Standards Authority</em> [2021] EWHC 2020 (QB) noting that derogations from open justice can be justified as necessary on two grounds: maintenance of the administration of justice and harm to other legitimate interests. The judge found that the mere fact that a business would suffer negative consequences if a cyberattack becomes public knowledge would not automatically justify secrecy (paragraph 25). However, in this case, anonymity was justified by the nature of its work and the risk that, if its identity was known, 'third parties with malign intent' might locate the stolen information on the so-called 'Dark Web'. ' The company in question was a 'multi-discipline company'... whose clients 'require the utmost discretion, secrecy and protection from external threats'. Some of the company's data was also protected by the Official Secrets Act (paragraph 28).</p>
<p>Industry professionals regularly debate the value of an injunction in cases of cyberattacks. There’s always the risk that, by virtue of seeking the injunction in open court, businesses draw attention to the fact their IT systems have been breached or that data has been stolen and give others an indicator of where the data can be found. However, this judgment provides authority that in certain circumstances at least, the risk of publicity arising from the making of the injunction application itself could be possible to navigate.</p>
<p>Click <a href="https://www.bailii.org/ew/cases/EWHC/KB/2022/2776.html">here</a> to read the full case on Bailii.</p>
<p><strong>Client losses from cyber-attacks on law firms continue to fall</strong></p>
<p>The Solicitors Regulation Authority (SRA) has revealed that client losses resulting from cyber-attacks on law firms have fallen to £700,000 in the first 10 months of this year. This compares to £10m in 2017, a figure that has dropped most years since. A panel discussion at an SRA compliance officer conference in Birmingham on 8 November 2022, revealed an 'improving picture', adding that it tended to be clients who were targeted by email<br />
fraudsters, rather than their solicitors.</p>
<p>Ransomware was identified as the main form of cyber-attack against law firms and the conference speakers maintained the stance that firms should not pay up. Rachel Clements, a regulatory speaker at the conference mentioned, 'not only are you essentially paying a criminal… but it could expose you, your firm, and your clients to additional risks'. Research cited indicated that 80% of businesses that paid ransoms were targeted again, often by<br />
same attacker.</p>
<p>The GDPR requires firms to implement 'appropriate measures' to restore data, but the ICO's legal director confirmed that paying a ransom does not constitute an appropriate measure. William Wright, a partner at Paragon International Insurance Brokers, noted that cyber-insurers expect to see a raft of controls in place before issuing a law firm with an insurance policy, ranging from encryption and email scanning to intrusion detection and patch management. He also emphasised the importance of multi-factor authentication as increasingly becoming a pre-requisite to obtaining insurance. Lastly, he flagged the need for segregated back-ups and staff training, given that “most cyber-attacks we see are<br />
human related”.</p>
<p>Click <a href="https://www.legalfutures.co.uk/latest-news/client-losses-from-cyber-attacks-on-law-firms-continue-to-fall">here</a> to read the Legal Futures article.</p>
<p><strong>EU boosts action against cyber threats</strong></p>
<p>On 10 November 2022, the European Commission and the High Representative put fforward a Joint Communication on an EU Cyber Defence policy and an Action Plan on Military Mobility. This is in a bid to address the deteriorating security environment following the unstable Russia and Ukraine conflict and to boost the EU's capacity to protect its citizens and infrastructure.</p>
<p>Recent cyber-attacks on energy networks, transport infrastructure and space assets show the risks that they pose to both civilian and military actors. The new EU Cyber Defence Policy aims to strengthen coordination between military and civilian cyber communities. The aim is to reduce dependence on critical cyber technology while enhancing efficient cyber crisis management across the EU. The four pillars making up the policy are: increased coordination between cyber defence players, standardisation and certification across the whole cyber defence ecosystem (including non-critical software), investment in cyber capabilities in a collaborative way and partnering to address common challenges.</p>
<p>The Commission and the High Representative, including in his capacity as Head of the European Defence Agency (EDA), will present an annual report to the Council of the EU to monitor. They will also assess the progress of implementing the actions in the Joint Communication on the EU Cyber Defence Policy. Member states are invited to provide contributions on the progress of implementation measures taking place in the national<br />
context.</p>
<p>Click <a href="https://ec.europa.eu/commission/presscorner/detail/en/ip_22_6642">here</a> to read the European Commission article.</p>
<p><strong>Ex-NATO general classifies cyber defences as important as missile defences</strong></p>
<p>Retired U.S. General Ben Hodges commanded U.S. Army forces in Europe from 2014 until 2017 and has long argued that civilian infrastructure is an essential pillar of military strategy. He has now added that cyber protection is just as important as missile defence systems to guard the German North Sea ports. He highlights that a cyber-attack on the German ports of Bremerhaven or Hamburg would severely impede NATO efforts to send<br />
military reinforcements to allies.</p>
<p>With Russia increasingly threatening attacks on quasi-civilian infrastructure as part of its ongoing conflict with Ukraine, Hodges has flagged Bremerhaven and Hamburg as the most important seaports on which the alliance depends, for both military equipment and commercial cargo. A 2017 cyber-attack (NotPetya) attributed to Russia, first targeted Ukraine but rapidly spread to suppliers with operations across eastern Europe. Outages in computer systems meant Danish shipping giant, Maersk, lost track of its freight.</p>
<p>In light of this, Hodges has reacted with anxiety to Berlin's decision to allow Chinese group COSCO Shipping Holdings Co. Ltd to buy a stake in a terminal in Hamburg, noting that the Chinese may now be able to influence and disrupt activities at critical transportation infrastructure. The Chinese foreign ministry has however, confirmed that 'cooperation between China and Germany is a matter for the two countries and third parties have no right to meddle and intervene'. The threat of nation sponsored attacks on critical infrastructure continues to be watched closely across all nations.</p>
<p>Click <a href="https://www.reuters.com/world/cyber-important-missile-defences-ex-nato-general-2022-11-21/">here</a> to read the Reuters article.</p>
<p><strong>Current trends in ransom payments</strong></p>
<p>Ransomware attacks which were prevalent in 2020 and 2021, partly due to increased remote working, have now decreased. In its mid-year 2022 Cyber Threat Report, US security company SonicWall identified a 23 per cent drop in the number of ransomware attempts. It attributed this to several factors, including a 'downward' trend in the number of organisations willing to pay cyber criminals.</p>
<p>Cyber security group Coveware, confirmed that 85 per cent of ransomware cases they handled in 2019 ended in payment, however by Q1 of 2022, the proportion had fallen to 46 per cent. Many organisations are now finding ways to recover their data via backups or establishing that certain data is not critical. Other factors contributing to the decrease in ransomware payments, include the slump in the price of difficult-to-trace cryptocurrencies which were the preferred pay-out method of threat actors. Russia's invasion of Ukraine has also hit the sector, as many Russian threat actors have been disrupted by sanctions or have focused on conflict related attacks rather than ransomware on private organisations. UK and US governments firmly advise against ransom payments as it does not necessarily guarantee victims will get their data back but rather emboldens attackers by rewarding them.</p>
<p>The US states of North Carolina and Florida have now explicitly banned state and local government agencies from paying hackers and other states are exploring similar policies. Deciding to pay is often on a case-by-case basis, involving an exercise of weighing up the price tag of the ransom demand against the potential cost of not paying.</p>
<p>For example, organisations with confidential client data, can opt to pay to avoid potential reputational damage. In some cases, it makes more economic sense to pay the ransom than to recover the data or systems from backups. IBM's Cost of Data Breach Report showed that average costs for victims opting to pay ransoms were $630,000 lower than those who chose not to pay.</p>
<p>Due to the fear of threat actor links to Russia, many are opting not to pay on ethical grounds, and also from fear of violating sanctions. According to Sophos, only 4% of victims were able to retrieve all their data from hackers. Hackers could also sell or leak stolen data at points in the future, leaving no guarantees. Deciding to pay relies on an element of trust in threat actors to delete data, which there is no reliable evidence that they will do. Many<br />
experts warn that the total ransoms paid may be far higher than is currently known as there are no rules around disclosing payments.</p>
<p>Click <a href="https://www.ft.com/content/14de7a07-cc4f-483c-915f-d0b5cfc00a32">here</a> to read the FT article.</p>
<p><strong>ICO and Cabinet Office reach agreement on New Year Honours data breach fine</strong></p>
<p>On 15 November 2021 the ICO issued a fine to the Cabinet Office following an investigation into the 2019 data breach, where the Cabinet Office published a file a file on GOV.UK containing the names and unredacted addresses of more than 1,000 people announced in the New Year Honours list. The personal data was available online for a period of two hours and 21 minutes and it was accessed 3,872 times.</p>
<p>The Cabinet Office appealed against the amount of the fine to the First-tier Tribunal (General Regulatory Chamber) in December 2021, alleging the level of penalty was “wholly disproportionate”. The penalty was for failing to implement appropriate technical and organisational measures to keep personal data secure, in contravention of Articles 5(1)(f) and 32(1) of the GDPR. The appeal related solely to the amount of the fine and the facts leading up to the imposition of the penalty were not in dispute.</p>
<p>On 3 November 2022, the ICO announced its agreement to reduce the £500,000 Monetary Penalty Notice (MPN) imposed on the Cabinet Office in 2021 to £50,000, which the Cabinet Office has agreed to pay. In a bid to work more effectively with public authorities, the ICO's John Edwards commented that they acted pragmatically recognising 'the current economic pressures public bodies are facing' and the fact that 'in certain cases fines may be less critical in achieving deterrence'. He added that the ICO will continue to work with the Cabinet Office to ensure people’s information are being looked after. Edwards confirmed that the ICO is willing to use discretion to reduce the amount of fines on the public sector in appropriate cases, coupled with better engagement including publicising lessons learned and sharing good practice.</p>
<p>Click <a href="https://ico.org.uk/about-the-ico/media-centre/news-and-blogs/2022/11/ico-and-cabinet-office-reach-agreement-on-new-year-honours-data-breach-fine/">here</a> to read the ICO press release.</p>]]></content:encoded></item><item><guid isPermaLink="false">{4A7C7594-4447-436D-9135-C8FAC260AD63}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/rpc-law-x-web3-considerations-for-nft-founders-building-communities/</link><title>RPC Law x Web3: Considerations for NFT Founders Building Communities and Providing Utility to Holders</title><description><![CDATA[In the past when one purchased an NFT, the only expectation was that he, she, or they was purchasing rights in an asset (usually a digital artwork). ]]></description><pubDate>Wed, 09 Nov 2022 09:56:00 Z</pubDate><category>Data and privacy</category><authors:names>Nick Lauw</authors:names><content:encoded><![CDATA[<p>These days however, NFT projects offer holders of their NFTs ("Holders") membership in a community and various real-life benefits. Some NFT projects have gone so far as to offer physical space to Holders and market themselves as social clubs with curated memberships. In other projects, groups of Holders have come together to form committees to arrange events for other Holders.<br />
<br />
As NFT projects move further in this direction, there is a need for founders of these projects ("Founders") to consider legal requirements relating to societies and the implementation of a set of terms governing the relationship between themselves and their Holders to protect themselves from legal risk, and to provide certainty to their Holders.</p>
<h4>As a Founder, why do I have to care about implementing a set of terms? </h4>
<p>Where an NFT Project only involves the sale of digital art in the form of an NFT, a full terms and conditions are arguably less critical to adopt than if you are offering services as part of the sale of your NFT. In the latter, parties are now engaging each other for the provision of services over an extended period of time and it is important for each parties' rights and obligations to be set out clearly at the outset. <br />
<br />
A clear set of terms and conditions can provide legal certainty in relation to the following (just to name a few):</p>
<ul>
    <li>The objective of the community;</li>
    <li>The Founder's rights to amend or remove benefits;</li>
    <li>The Founder's rights make decisions on behalf of the community;</li>
    <li>Whether there can be an election of a committee of Holders;</li>
    <li>When a Holder is considered eligible to enjoy the physical space or utility;</li>
    <li>The different classes of Holders and their respective rights and benefits;</li>
    <li>General rules relating to the use of the physical space, the Discord channel or any other community space;</li>
    <li>Limitations of liability; </li>
    <li>Dispute resolution procedure; and</li>
    <li>Right to dissolution of the community.</li>
</ul>
<p>Some of these terms mirror those found within a constitution and rules and regulations of a regular club, but the nature of NFT project-driven communities require the consideration of various scenarios that a regular club would not encounter.<br />
<br />
Take for example a situation where there are pre-approved Holders who have been issued "soul-bound" NFTs (i.e. NFTs that are wallet-specific and cannot be transferred), and Founders intend for only Holders who are pre-approved to enjoy the physical space or other benefits and utility. Without a proper set of terms, the Founder may have difficulty claiming that someone who was not pre-approved but possesses the "soul-bound" NFT by obtaining the wallet of someone who was pre-approved is not entitled to the benefits of any other Holder.<br />
<br />
Another consideration relates to the international reach of NFTs. There is a trend of Holders within a specific country banding together to arrange events and utility for the other Holders within the jurisdiction. As a Founder, you may want to set out guidelines and boundaries to the Holders' abilities to do this to prevent dilution to your brand.</p>
<h4>I have stated some of these rules on my website, Discord channel community rules and in my marketing material. Isn't that enough?</h4>
<p>In short, no. Variations in the wording used on your website, tweets and Discord posts can affect your case in the event of a dispute. In addition, a Holder who purchased your NFT from a third-party marketplace such as Opensea may claim to not be bound by the wording on your website as he, she or they has not seen or agreed to them.<br />
<br />
If well implemented, a single set of terms will enable you to avoid disputes as to whether a statement made is in fact binding, and prevent claims of misrepresentation. Steps would need to be taken to ensure that Holders agreed to the terms before being offered the community benefits. This is a process well established in Web2 which should not be forsaken by Web3 communities.</p>
<h4>Is there anything else that as an NFT Founder I need to think about when creating a community with physical club premises?</h4>
Regulatory approvals may be required for the establishment of physical club premises. In Singapore, an NFT community may have to register as a society under the Societies Act if it starts to take on the characteristics of a club. Depending on the services that you intend to offer on the premises there may be other regulatory approvals required. ]]></content:encoded></item><item><guid isPermaLink="false">{F3443C50-7358-4888-9344-75A513CB1A91}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/cyber-bytes-issue-46/</link><title>Cyber_Bytes - Issue 46</title><description><![CDATA[<strong>ICO highlights complacency as major cyber risk for UK Companies</strong><br />
<br />
Information Commissioner John Edwards warns that organisational complacency poses a greater risk to UK businesses than the actions of cyber criminals. As an example, construction company Interserve was recently fined £4.4m over a 2020 ransomware incident that saw the data of 113,000 employees being stolen.<br />
<br />
During the pandemic, a phishing email slipped through Interserve's secure internet gateway system. This led to an attack that compromised two employee accounts exposing 283 systems and 16 company accounts. The threat actors were then able to uninstall the company's antivirus software. It transpired that one of the initial phishing victims had not undertaken any IT training and the company had operated on outdated software systems. Further, Interserve's IT teams were notified of some suspicious activity on the servers but took no further action.<br />
<br />
By issuing such a large fine, the ICO has sent a strong message to businesses that may be reluctant to monitor suspicious activity, fail to act on warnings, defer software updates, and/or shelve recommended IT training. Interserve's actions (or inactions) resulted in a breach of data protection law by “<em>failing to put appropriate technical and organisational measures in place to prevent the unauthorised access of people’s information</em>”. Even though Interserve was in administration shortly before the incident, the ICO will levy the fine against the successor parent company in an approach it describes as "<em>robust and fair</em>".<br />
<br />
Click <a href="https://ico.org.uk/action-weve-taken/enforcement/interserve-group-limited/">here</a> to read the ICO's penalty notice and <a href="https://www.computerweekly.com/news/252526431/Complacency-biggest-cyber-risk-to-UK-plc-says-ICO">here</a> to read the Computerweek article.<br />
<br />
<strong>High Court offers helpful guidance on damages for claimants in data disputes<br />
</strong><br />
The latest judgement of Knowles J in <em>Driver v Crown Prosecution Service </em>[2022] EWHC 2500 (KB) has provided some clarification as to the awards which claimants can receive when seeking damages for distress.<br />
<br />
The Claimant was a local politician in Lancaster. An email was sent to a member of the public in relation to an ongoing police investigation in which the Claimant was a known suspect. That member of the public was a political opponent who allegedly had a grievance against the Claimant and subsequently leaked the email to the press. The fact that the Claimant was a suspect in police investigations was already in the public domain at the time of the disclosure to the press.<br />
<br />
The Court found that this was not a GDPR claim, but that it did fall within the law enforcement provisions of the Data Protection Act 2018 (Section 31). The leak was seen as a limited disclosure as people would have been likely to have already known this information due to previous widespread media reporting. The claimant sought damages of up to £2,000 but was awarded £250 for a “<em>lowest end of spectrum</em>” data breach that did not involve information with any privacy connotations. The judge concluded that the disclosure would not have changed the outcome of the police investigation and could not "<em>reasonably or properly have caused the claimant anything like the level of anguish which he claimed</em>".<br />
<br />
Click <a href="https://panopticonblog.com/2022/10/17/dpa-breach-at-lowest-end-of-spectrum-high-court-awards-250/">here</a> to read the full article published by 11 King's Bench Walk Panopticon blog.<br />
<br />
<strong>New UK version of GDPR is on the horizon<br />
</strong><br />
UK's Culture Secretary Michelle Donelan announced that the UK will have its own version of the GDPR. The Government announced a Data Protection and Digital Information Bill to replace GDPR last June, but that has been put on hold and reconsidered. Donelan has stated that the new UK version of the GDPR will give British businesses a say and will be built on “<em>common sense, helping to prevent losses from cyberattacks and data breaches, while protecting data privacy</em>”.<br />
<br />
Tina McKenzie, Policy and Advocacy chair at the Federation of Small Businesses (FSB) notes that "small firms are looking for more support and flexibility in compliance, easy-to-use and accessible guidance, and fewer prescriptive requirements. Divergence from the EU GDPR must both work domestically, as well as protecting small businesses’ ability to trade". She added that: “<em>The UK GDPR in its current form is notoriously bureaucratic and is disproportionately onerous on small businesses, where there is often excessive caution in handling data at the expense of growth and innovation</em>".<br />
<br />
The core principles of data protection law and current data security requirements are expected to remain in the new bill. However, more peripheral areas such as EU Cookie policy and data retention could be simplified.<br />
<br />
Click <a href="https://smallbusiness.co.uk/what-will-a-uk-version-of-gdpr-look-like-2563479/">here</a> to read the full Small Business article.<br />
<br />
<strong>Supply chain cyber-attacks are on the rise – NCSC offers fresh guidance<br />
</strong><br />
The National Cyber Security Centre (NCSC) has offered new guidance on ways organisations can work with suppliers to identify weaknesses and boost resilience in the wake of growing numbers of supply chain attacks. It aims to help cyber security professionals, risk managers and procurement specialists put into practice the NCSC’s 12 supply chain security principles.<br />
<br />
Government research has found only one in ten businesses consider their immediate supply chain risks and vulnerabilities as part of their wider data risk review. The guidance is designed to help medium and larger organisations better assess the cyber risks of working with their suppliers. It describes typical supplier relationships, and ways that organisations are exposed to vulnerabilities and cyber-attacks via the supply chain.<br />
<br />
Ian McCormack, NCSC Deputy Director for Government Cyber Resilience commented that supply chain attacks are a "<em>major cyber threat facing organisations, with profound long-lasting impacts on businesses and customers</em>". A collaborative effort between organisations and stakeholders is therefore needed to ensure appropriate security measures.<br />
<br />
Click <a href="https://www.ncsc.gov.uk/collection/assess-supply-chain-cyber-security">here</a> to read the guidance published by the NCSC.<br />
<br />
<strong>EvilProxy expands advanced phishing options for threat actors<br />
</strong><br />
EvilProxy is the new service promising to provide a reverse-proxy phishing-as-a-service platform (PaaS) to help users steal authentication tokens to defeat multi-factor authentication processes of large organisations. The service allows low-skill cyber criminals a low-cost option for stealing otherwise well-protected internet facing accounts.<br />
<br />
The process of reverse proxy phishing involves intercepting session cookies on servers between the intended victim and a genuine authentication endpoint, such as a company’s login form. Threat actors can then utilize this intercepted authentication cookie to log in to the site as the user, circumventing multi-factor authentication measures that have been enabled.<br />
<br />
EvilProxy is promoted on darkweb forums and appears to be intended as a service directly to hackers, even offering user friendly instructional videos. Payments for the PaaS services are made individually using the Telegram app. The service promises to steal usernames, passwords, and session cookies, for a cost of $150 for ten days, $250 for 20 days, or $400 for a month-long campaign.<br />
<br />
As MFA adoption continues to increase, and is even mandated in some cyber insurance policies, the growth of a platform that automates advanced options for low skilled threat actors is an unwelcome development and is one to watch.<br />
<br />
Click <a href="http://https://www.bleepingcomputer.com/news/security/new-evilproxy-service-lets-all-hackers-use-advanced-phishing-tactics/">here</a> to read the full article by Bleeping Computer.<br />
<br />
<strong>Internet of Things (IoT) and global smart cities hinge on security by design models<br />
</strong><br />
Lindy Cameron, NCSC CEO, calls for international standards to improve the cybersecurity of IoT, connected devices, and smart cities. At the Singapore International Cyber Week, Cameron encouraged swift action to ensure connected devices are designed, built, deployed, and managed securely to prevent attacks from cyber criminals.<br />
<br />
Consumers have a growing dependency on connected devices and now is the time to make sure they are designed and built properly. Cameron stated that "<em>connected places are an evolving ecosystem, comprising a range of systems that exchange, process, and store sensitive data, as well as controlling critical operational technology. Unfortunately, this makes these systems an attractive target for a range of threat actors</em>”.<br />
<br />
State sponsored cyber-attacks may succeed in stealing sensitive commercial and personal data from other nations, including the UK. Nations may also try to influence specific suppliers or compromise overseas services to disrupt nations by exfiltrating data.<br />
<br />
The upcoming UK Product Security and Telecommunications Infrastructure Bill seeks to enshrine security by design principles in law. The bill places new cybersecurity standards on manufacturers, importers, and distributors of internet-connectable devices, along with ensuring the security of connected devices on the market.<br />
<br />
NCSC comments that the effectiveness and enforcement of the proposed Bill, coupled with new international IoT standards, will depend on global collaboration from governments and manufacturers. Delayed action may only prove more expensive down the line considering the rate of dependence on insecure connected devices.<br />
<br />
Click <a href="https://www.csoonline.com/article/3677850/security-by-design-vital-to-protecting-iot-smart-cities-around-the-world-says-ceo-of-uk-ncsc.html">here</a> to read the full article by CSO.]]></description><pubDate>Tue, 01 Nov 2022 17:04:00 Z</pubDate><category>Data and privacy</category><authors:names>Richard Breavington, Daniel Guilfoyle, Ian Dinning, Rachel Ford, Christopher Ashton, Elizabeth Zang, Emanuele Santella </authors:names><content:encoded><![CDATA[<strong>ICO highlights complacency as major cyber risk for UK Companies</strong><br />
<br />
Information Commissioner John Edwards warns that organisational complacency poses a greater risk to UK businesses than the actions of cyber criminals. As an example, construction company Interserve was recently fined £4.4m over a 2020 ransomware incident that saw the data of 113,000 employees being stolen.<br />
<br />
During the pandemic, a phishing email slipped through Interserve's secure internet gateway system. This led to an attack that compromised two employee accounts exposing 283 systems and 16 company accounts. The threat actors were then able to uninstall the company's antivirus software. It transpired that one of the initial phishing victims had not undertaken any IT training and the company had operated on outdated software systems. Further, Interserve's IT teams were notified of some suspicious activity on the servers but took no further action.<br />
<br />
By issuing such a large fine, the ICO has sent a strong message to businesses that may be reluctant to monitor suspicious activity, fail to act on warnings, defer software updates, and/or shelve recommended IT training. Interserve's actions (or inactions) resulted in a breach of data protection law by “<em>failing to put appropriate technical and organisational measures in place to prevent the unauthorised access of people’s information</em>”. Even though Interserve was in administration shortly before the incident, the ICO will levy the fine against the successor parent company in an approach it describes as "<em>robust and fair</em>".<br />
<br />
Click <a href="https://ico.org.uk/action-weve-taken/enforcement/interserve-group-limited/">here</a> to read the ICO's penalty notice and <a href="https://www.computerweekly.com/news/252526431/Complacency-biggest-cyber-risk-to-UK-plc-says-ICO">here</a> to read the Computerweek article.<br />
<br />
<strong>High Court offers helpful guidance on damages for claimants in data disputes<br />
</strong><br />
The latest judgement of Knowles J in <em>Driver v Crown Prosecution Service </em>[2022] EWHC 2500 (KB) has provided some clarification as to the awards which claimants can receive when seeking damages for distress.<br />
<br />
The Claimant was a local politician in Lancaster. An email was sent to a member of the public in relation to an ongoing police investigation in which the Claimant was a known suspect. That member of the public was a political opponent who allegedly had a grievance against the Claimant and subsequently leaked the email to the press. The fact that the Claimant was a suspect in police investigations was already in the public domain at the time of the disclosure to the press.<br />
<br />
The Court found that this was not a GDPR claim, but that it did fall within the law enforcement provisions of the Data Protection Act 2018 (Section 31). The leak was seen as a limited disclosure as people would have been likely to have already known this information due to previous widespread media reporting. The claimant sought damages of up to £2,000 but was awarded £250 for a “<em>lowest end of spectrum</em>” data breach that did not involve information with any privacy connotations. The judge concluded that the disclosure would not have changed the outcome of the police investigation and could not "<em>reasonably or properly have caused the claimant anything like the level of anguish which he claimed</em>".<br />
<br />
Click <a href="https://panopticonblog.com/2022/10/17/dpa-breach-at-lowest-end-of-spectrum-high-court-awards-250/">here</a> to read the full article published by 11 King's Bench Walk Panopticon blog.<br />
<br />
<strong>New UK version of GDPR is on the horizon<br />
</strong><br />
UK's Culture Secretary Michelle Donelan announced that the UK will have its own version of the GDPR. The Government announced a Data Protection and Digital Information Bill to replace GDPR last June, but that has been put on hold and reconsidered. Donelan has stated that the new UK version of the GDPR will give British businesses a say and will be built on “<em>common sense, helping to prevent losses from cyberattacks and data breaches, while protecting data privacy</em>”.<br />
<br />
Tina McKenzie, Policy and Advocacy chair at the Federation of Small Businesses (FSB) notes that "small firms are looking for more support and flexibility in compliance, easy-to-use and accessible guidance, and fewer prescriptive requirements. Divergence from the EU GDPR must both work domestically, as well as protecting small businesses’ ability to trade". She added that: “<em>The UK GDPR in its current form is notoriously bureaucratic and is disproportionately onerous on small businesses, where there is often excessive caution in handling data at the expense of growth and innovation</em>".<br />
<br />
The core principles of data protection law and current data security requirements are expected to remain in the new bill. However, more peripheral areas such as EU Cookie policy and data retention could be simplified.<br />
<br />
Click <a href="https://smallbusiness.co.uk/what-will-a-uk-version-of-gdpr-look-like-2563479/">here</a> to read the full Small Business article.<br />
<br />
<strong>Supply chain cyber-attacks are on the rise – NCSC offers fresh guidance<br />
</strong><br />
The National Cyber Security Centre (NCSC) has offered new guidance on ways organisations can work with suppliers to identify weaknesses and boost resilience in the wake of growing numbers of supply chain attacks. It aims to help cyber security professionals, risk managers and procurement specialists put into practice the NCSC’s 12 supply chain security principles.<br />
<br />
Government research has found only one in ten businesses consider their immediate supply chain risks and vulnerabilities as part of their wider data risk review. The guidance is designed to help medium and larger organisations better assess the cyber risks of working with their suppliers. It describes typical supplier relationships, and ways that organisations are exposed to vulnerabilities and cyber-attacks via the supply chain.<br />
<br />
Ian McCormack, NCSC Deputy Director for Government Cyber Resilience commented that supply chain attacks are a "<em>major cyber threat facing organisations, with profound long-lasting impacts on businesses and customers</em>". A collaborative effort between organisations and stakeholders is therefore needed to ensure appropriate security measures.<br />
<br />
Click <a href="https://www.ncsc.gov.uk/collection/assess-supply-chain-cyber-security">here</a> to read the guidance published by the NCSC.<br />
<br />
<strong>EvilProxy expands advanced phishing options for threat actors<br />
</strong><br />
EvilProxy is the new service promising to provide a reverse-proxy phishing-as-a-service platform (PaaS) to help users steal authentication tokens to defeat multi-factor authentication processes of large organisations. The service allows low-skill cyber criminals a low-cost option for stealing otherwise well-protected internet facing accounts.<br />
<br />
The process of reverse proxy phishing involves intercepting session cookies on servers between the intended victim and a genuine authentication endpoint, such as a company’s login form. Threat actors can then utilize this intercepted authentication cookie to log in to the site as the user, circumventing multi-factor authentication measures that have been enabled.<br />
<br />
EvilProxy is promoted on darkweb forums and appears to be intended as a service directly to hackers, even offering user friendly instructional videos. Payments for the PaaS services are made individually using the Telegram app. The service promises to steal usernames, passwords, and session cookies, for a cost of $150 for ten days, $250 for 20 days, or $400 for a month-long campaign.<br />
<br />
As MFA adoption continues to increase, and is even mandated in some cyber insurance policies, the growth of a platform that automates advanced options for low skilled threat actors is an unwelcome development and is one to watch.<br />
<br />
Click <a href="http://https://www.bleepingcomputer.com/news/security/new-evilproxy-service-lets-all-hackers-use-advanced-phishing-tactics/">here</a> to read the full article by Bleeping Computer.<br />
<br />
<strong>Internet of Things (IoT) and global smart cities hinge on security by design models<br />
</strong><br />
Lindy Cameron, NCSC CEO, calls for international standards to improve the cybersecurity of IoT, connected devices, and smart cities. At the Singapore International Cyber Week, Cameron encouraged swift action to ensure connected devices are designed, built, deployed, and managed securely to prevent attacks from cyber criminals.<br />
<br />
Consumers have a growing dependency on connected devices and now is the time to make sure they are designed and built properly. Cameron stated that "<em>connected places are an evolving ecosystem, comprising a range of systems that exchange, process, and store sensitive data, as well as controlling critical operational technology. Unfortunately, this makes these systems an attractive target for a range of threat actors</em>”.<br />
<br />
State sponsored cyber-attacks may succeed in stealing sensitive commercial and personal data from other nations, including the UK. Nations may also try to influence specific suppliers or compromise overseas services to disrupt nations by exfiltrating data.<br />
<br />
The upcoming UK Product Security and Telecommunications Infrastructure Bill seeks to enshrine security by design principles in law. The bill places new cybersecurity standards on manufacturers, importers, and distributors of internet-connectable devices, along with ensuring the security of connected devices on the market.<br />
<br />
NCSC comments that the effectiveness and enforcement of the proposed Bill, coupled with new international IoT standards, will depend on global collaboration from governments and manufacturers. Delayed action may only prove more expensive down the line considering the rate of dependence on insecure connected devices.<br />
<br />
Click <a href="https://www.csoonline.com/article/3677850/security-by-design-vital-to-protecting-iot-smart-cities-around-the-world-says-ceo-of-uk-ncsc.html">here</a> to read the full article by CSO.]]></content:encoded></item><item><guid isPermaLink="false">{7BB52718-90AD-4B5A-A21C-63976C32E4CA}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/cyber-bytes-issue-45/</link><title>Cyber_Bytes - Issue 45</title><description><![CDATA[<strong>Reverse proxy phishing is on the rise<br />
</strong><br />
EvilProxy is an example of a reverse-proxy phishing-as-a-service platform (PaaS) that purports to help users steal authentication tokens to defeat multi-factor authentication processes of large organisations, at a fee. The service allows low-skill threat actors, who don’t necessarily know how to set up reverse proxies, a low-cost option for stealing otherwise well-protected internet accounts.<br />
<br />
The process of reverse proxy phishing involves intercepting session cookies on servers between the intended victim and a genuine authentication endpoint, such as a company’s login form. Threat actors can then utilize this intercepted authentication cookie to log in to the site as the user, circumventing multi-factor authentication measures that have been enabled.<br />
<br />
EvilProxy appears to be intended as a service directly to hackers, even offering instructional videos. Payments for the PaaS services are made individually using Telegram.<br />
<br />
Click <a href="https://dataconomy.com/2022/09/evilproxy-paas-advanced-phishing-tactics/">here</a> to read the Dataconomy article.<br />
<br />
<strong>Cyber-attack hits hotel chain<br />
</strong><br />
The parent company of Holiday Inn, Intercontinental Hotels Group (IHG) confirmed "unauthorised access" to its technology systems as of 5 September 2022. IHG, which also manages Crowne Plaza and Regent hotels issued a statement within 24 hours confirming booking channels and other applications were affected and that it was investigating and working to restore its systems. IHG also made the relevant notifications to regulators.<br />
<br />
Several users took to social media to complain about difficulties faced when using IHG booking services. Though IHG did not specify loss of customer data, much of the user commentary and speculation pointed to tell-tale signs of a ransomware attack impacting customers. In 2017 the hotel chain dealt with a three-month security breach affecting over 1,200 US franchised hotels.<br />
<br />
Click <a href="https://www.bbc.co.uk/news/technology-62814943">here</a> to read the BBC article.<br />
<br />
<strong>Stricter cybersecurity rules on the horizon for EU digital product makers<br />
</strong><br />
New draft EU proposals, introduced on 8 September, are intended to reduce hacking risks in a range of products, from home appliances and wearable devices to software and computers. The proposed legislation will exclude medical devices and cars which are regulated by other laws.<br />
<br />
The draft rules have listed 38 critical technology products which will be required to obtain cybersecurity assessments from an independent body, these include password managers, firewalls, industrial internet-of-things devices, and smart meters. Under the proposed plans 90% of companies will be able to self-certify. Manufacturers that do business in the EU will also be required to provide regular security patches and updates for the shorter of the product's lifetime or 5 years after going to market. In the spirit of transparency there will also be a new requirement to produce a software bill of materials listing the components of each product to help more easily track security vulnerabilities. Products with digital parts will need to display labels saying they comply with the new rules and stating how long cyber support will be provided. Under proposed rules, companies that break the rules would face fines of up to 15 million euros, or 2.5% of global revenue.<br />
<br />
Industry players have reacted negatively to news of the proposed legislation. Nils Scherrer, a manager in digitization at ZVEI, an association of German electrical and digital companies, said complying with the proposed legislation would be a "massive undertaking" with increased costs and administration for companies. Paolo Falcioni, director general of Applia, a Brussels-based association for home appliance makers called the development, "essentially a time-to-market restriction,” as third-party security reviews have the potential to stall product launches.<br />
<br />
Consumer supporters welcomed the proposals, calling for expansion of the critical technology products list covered, citing heightened risks to consumers from hackers gaining access to their common everyday products. Thierry Breton, EU commissioner called the legislation a breakthrough, making Europe the first continent to propose required cybersecurity assessments for software.<br />
<br />
Click <a href="https://www.wsj.com/articles/eu-proposes-strict-cybersecurity-rules-for-digital-product-makers-11663234266?mod=newsviewer_click">here</a> to read the full article by Wall Street Journal.<br />
<br />
<strong>UK’s financial sector sees new wave of Distributed Denial of Service, (DDoS) attacks<br />
</strong><br />
DDoS attacks accounted for 25 per cent of all hacking incidents reported to the Financial Conduct Authority (FCA) in the first half of the year compared to just four per cent in 2021. Hackers appear to be relying on the losses threatened by immediate interruption, in the hope that companies may be willing to pay ransoms to restore access to services, if they assess the ransom payments to be less than the cost of losing any business.<br />
<br />
Cybersecurity experts attribute these increases to a shift in the priorities of state-backed hackers who now prefer targeting critical infrastructure.<br />
<br />
Click <a href="https://www.msn.com/en-us/news/world/uk-e2-80-99s-financial-sector-faces-new-wave-of-brute-force-ddos-attacks/ar-AA11Q7oZ">here</a> to read the full City AM article.<br />
<br />
<strong>ICO publishes guidance on privacy enhancing technologies (PETs)<br />
</strong><br />
PETs are technologies that help organisations share and use people’s data responsibly, lawfully, and securely, including by minimising the amount of data used and by encrypting or anonymising personal information.<br />
<br />
The ICO has released draft guidance on PETs shedding light on ways companies can put a data protection by design approach into practice.<br />
<br />
As part of the ICO’s draft guidance on anonymisation and pseudonymisation, the ICO explains the types of PETs currently available along with their different benefits in aiding compliance with data protection law. A key benefit is that PETs can assist with the analysis of personal data without a controller sharing it, or a processor having access to it. This ability to share, link and analyse data can provide valuable insights while ensuring compliance. The ICO is still seeking feedback to help improve its final guidance.<br />
<br />
Common use cases for PETs are already seen in the anti-money laundering space and in the healthcare sector to drive better health outcomes. The ICO encourages more collaboration to analyse personal data in a privacy preserving manner. The UK government's efforts in harnessing the potential for technology to tackle global societal changes are also being matched in the US with both nations offering prize challenges to successful collaborators.<br />
<br />
The extent of the collaborative effort needed from organisations is further highlighted in the ICO's call for industry led codes of conduct and certification schemes, to help organisations use PETs responsibly and to help PET developers and providers build technology with data protection and privacy at the forefront.<br />
<br />
The outcomes of further discussions and consultations will likely impact the final guidance, so this is a development for all organisations to keep an eye on.<br />
<br />
Click <a href="https://ico.org.uk/about-the-ico/media-centre/news-and-blogs/2022/09/ico-publishes-guidance-on-privacy-enhancing-technologies/">here</a> to read the full ICO press release.]]></description><pubDate>Thu, 29 Sep 2022 14:13:00 +0100</pubDate><category>Data and privacy</category><authors:names>Richard Breavington, Daniel Guilfoyle, Ian Dinning, Rachel Ford, Christopher Ashton, Elizabeth Zang, Emanuele Santella </authors:names><content:encoded><![CDATA[<strong>Reverse proxy phishing is on the rise<br />
</strong><br />
EvilProxy is an example of a reverse-proxy phishing-as-a-service platform (PaaS) that purports to help users steal authentication tokens to defeat multi-factor authentication processes of large organisations, at a fee. The service allows low-skill threat actors, who don’t necessarily know how to set up reverse proxies, a low-cost option for stealing otherwise well-protected internet accounts.<br />
<br />
The process of reverse proxy phishing involves intercepting session cookies on servers between the intended victim and a genuine authentication endpoint, such as a company’s login form. Threat actors can then utilize this intercepted authentication cookie to log in to the site as the user, circumventing multi-factor authentication measures that have been enabled.<br />
<br />
EvilProxy appears to be intended as a service directly to hackers, even offering instructional videos. Payments for the PaaS services are made individually using Telegram.<br />
<br />
Click <a href="https://dataconomy.com/2022/09/evilproxy-paas-advanced-phishing-tactics/">here</a> to read the Dataconomy article.<br />
<br />
<strong>Cyber-attack hits hotel chain<br />
</strong><br />
The parent company of Holiday Inn, Intercontinental Hotels Group (IHG) confirmed "unauthorised access" to its technology systems as of 5 September 2022. IHG, which also manages Crowne Plaza and Regent hotels issued a statement within 24 hours confirming booking channels and other applications were affected and that it was investigating and working to restore its systems. IHG also made the relevant notifications to regulators.<br />
<br />
Several users took to social media to complain about difficulties faced when using IHG booking services. Though IHG did not specify loss of customer data, much of the user commentary and speculation pointed to tell-tale signs of a ransomware attack impacting customers. In 2017 the hotel chain dealt with a three-month security breach affecting over 1,200 US franchised hotels.<br />
<br />
Click <a href="https://www.bbc.co.uk/news/technology-62814943">here</a> to read the BBC article.<br />
<br />
<strong>Stricter cybersecurity rules on the horizon for EU digital product makers<br />
</strong><br />
New draft EU proposals, introduced on 8 September, are intended to reduce hacking risks in a range of products, from home appliances and wearable devices to software and computers. The proposed legislation will exclude medical devices and cars which are regulated by other laws.<br />
<br />
The draft rules have listed 38 critical technology products which will be required to obtain cybersecurity assessments from an independent body, these include password managers, firewalls, industrial internet-of-things devices, and smart meters. Under the proposed plans 90% of companies will be able to self-certify. Manufacturers that do business in the EU will also be required to provide regular security patches and updates for the shorter of the product's lifetime or 5 years after going to market. In the spirit of transparency there will also be a new requirement to produce a software bill of materials listing the components of each product to help more easily track security vulnerabilities. Products with digital parts will need to display labels saying they comply with the new rules and stating how long cyber support will be provided. Under proposed rules, companies that break the rules would face fines of up to 15 million euros, or 2.5% of global revenue.<br />
<br />
Industry players have reacted negatively to news of the proposed legislation. Nils Scherrer, a manager in digitization at ZVEI, an association of German electrical and digital companies, said complying with the proposed legislation would be a "massive undertaking" with increased costs and administration for companies. Paolo Falcioni, director general of Applia, a Brussels-based association for home appliance makers called the development, "essentially a time-to-market restriction,” as third-party security reviews have the potential to stall product launches.<br />
<br />
Consumer supporters welcomed the proposals, calling for expansion of the critical technology products list covered, citing heightened risks to consumers from hackers gaining access to their common everyday products. Thierry Breton, EU commissioner called the legislation a breakthrough, making Europe the first continent to propose required cybersecurity assessments for software.<br />
<br />
Click <a href="https://www.wsj.com/articles/eu-proposes-strict-cybersecurity-rules-for-digital-product-makers-11663234266?mod=newsviewer_click">here</a> to read the full article by Wall Street Journal.<br />
<br />
<strong>UK’s financial sector sees new wave of Distributed Denial of Service, (DDoS) attacks<br />
</strong><br />
DDoS attacks accounted for 25 per cent of all hacking incidents reported to the Financial Conduct Authority (FCA) in the first half of the year compared to just four per cent in 2021. Hackers appear to be relying on the losses threatened by immediate interruption, in the hope that companies may be willing to pay ransoms to restore access to services, if they assess the ransom payments to be less than the cost of losing any business.<br />
<br />
Cybersecurity experts attribute these increases to a shift in the priorities of state-backed hackers who now prefer targeting critical infrastructure.<br />
<br />
Click <a href="https://www.msn.com/en-us/news/world/uk-e2-80-99s-financial-sector-faces-new-wave-of-brute-force-ddos-attacks/ar-AA11Q7oZ">here</a> to read the full City AM article.<br />
<br />
<strong>ICO publishes guidance on privacy enhancing technologies (PETs)<br />
</strong><br />
PETs are technologies that help organisations share and use people’s data responsibly, lawfully, and securely, including by minimising the amount of data used and by encrypting or anonymising personal information.<br />
<br />
The ICO has released draft guidance on PETs shedding light on ways companies can put a data protection by design approach into practice.<br />
<br />
As part of the ICO’s draft guidance on anonymisation and pseudonymisation, the ICO explains the types of PETs currently available along with their different benefits in aiding compliance with data protection law. A key benefit is that PETs can assist with the analysis of personal data without a controller sharing it, or a processor having access to it. This ability to share, link and analyse data can provide valuable insights while ensuring compliance. The ICO is still seeking feedback to help improve its final guidance.<br />
<br />
Common use cases for PETs are already seen in the anti-money laundering space and in the healthcare sector to drive better health outcomes. The ICO encourages more collaboration to analyse personal data in a privacy preserving manner. The UK government's efforts in harnessing the potential for technology to tackle global societal changes are also being matched in the US with both nations offering prize challenges to successful collaborators.<br />
<br />
The extent of the collaborative effort needed from organisations is further highlighted in the ICO's call for industry led codes of conduct and certification schemes, to help organisations use PETs responsibly and to help PET developers and providers build technology with data protection and privacy at the forefront.<br />
<br />
The outcomes of further discussions and consultations will likely impact the final guidance, so this is a development for all organisations to keep an eye on.<br />
<br />
Click <a href="https://ico.org.uk/about-the-ico/media-centre/news-and-blogs/2022/09/ico-publishes-guidance-on-privacy-enhancing-technologies/">here</a> to read the full ICO press release.]]></content:encoded></item><item><guid isPermaLink="false">{E5C725A9-9CFD-4153-A4B8-DE59F97E643F}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/rpc-law-x-web3---ownership-of-digital-assets-in-web3/</link><title>RPC Law x Web3: Ownership of Digital Assets in Web3</title><description><![CDATA[This is the inaugural part of a series of articles relating to legal issues around Web3. Over the course of the next few months, will hope to provide you with some thoughts and insights on the areas of Web3 where potential legal issues may arise based on current laws.]]></description><pubDate>Tue, 27 Sep 2022 10:22:00 +0100</pubDate><category>Data and privacy</category><authors:names>Nick Lauw</authors:names><content:encoded><![CDATA[<p>In this article, we hope to shed light on what one actually owns when he or she buys a non-fungible token or NFT, and pointers for both founders and holders of NFTs to consider.<br />
<br />
<strong>What is Web3 and how is ownership of digital assets represented?<br />
</strong><br />
In very simple terms, Web3 is an evolution of the internet that is blockchain-based and decentralised. Creators would post their content directly on the blockchain and digital tokens recorded on the blockchain would be used to represent ownership of assets in decentralised networks.<br />
<br />
It is this movement towards Web3 that has partially driven the interest and adoption of NFTs, which are commonly seen as the digital tokens that represent ownership of specific assets on the blockchain. While there has been a shift in focus of NFTs from solely being representations of digital art, to what are now increasingly badges of community membership, it is still important to consider what it is NFTs truly represent by way of ownership.<br />
<br />
<strong>So does an NFT constitute a deed of ownership of the asset it is linked to?<br />
</strong><br />
The answer in practice is mostly no. In a recent report by Galaxy Digital<sup>1</sup> found that out of the top 25 NFT projects considered, only one purported to give true ownership of the underlying artwork to the NFT holder.<br />
<br />
To understand how this has occurred, it is important from a legal perspective to separate ownership of the token, and ownership of the associated asset. <br />
<br />
The most common asset tied to NFTs today are works protected by copyright such as digital art or music. Copyright vests in such works by virtue of the Copyright Act, giving their creators ownership rights. However, until the Copyright Act expressly stipulates that ownership of a work is represented by an NFT, and an assignment of such ownership takes place when the NFT is transferred, one cannot assume that ownership of the NFT guarantees anything other than ownership of the token.<br />
<br />
Ultimately, the rights that you obtain in the associated asset by buying an NFT are determined by the rights initially granted by the NFT Project itself. When one considers the various NFT Projects out there, it is clear that there is no uniformity in the rights granted to NFT holders. <br />
<br />
Looking at a few popular projects as examples:</p>
<ul>
    <li>Projects such as Azuki or Doodles retain ownership and offer a limited license for the NFT holder to use the associated image. This license (the terms of which can be found online) usually covers use of the associated image as a profile picture, and may provide for commercial use up to a certain value and use in a metaverse. </li>
    <li>Some projects stipulate terms which are unclear. While the "terms & conditions" published by Bored Ape Yacht Club (BAYC) states that a holder "owns the underlying Board Ape, the Art, completely", it then confusingly goes on to stipulate the terms of a license, which should not be required if ownership had in fact been transferred. While some holders of BAYC apes have utilised the art in a manner consistent with ownership, it is in reality unclear as to whether a holder of a BAYC NFT actually has full ownership of the associated image.</li>
    <li>Many NFT Projects don't publish any license terms whatsoever. In such situations, it must be presumed that the NFT creator retains all intellectual property rights, and at best the only license granted with the NFT is an implied license to use the associated image as a profile picture. </li>
</ul>
<p>Alarmingly, some NFT projects launch with no license terms, only to impose a set of terms some time after the NFTs have been minted. In some situations, these terms may not be what NFT holders expect. In the case of Moonbirds, the creator announced (months after the launch) that both projects were going to move to a "CC0 public license" where no rights are reserved on the intellectual property. This leaves Moonbirds NFT holders owning what is in essence a bare NFT, as there is nothing to stop a person who does not hold the NFT from exploiting the associated Moonbirds image.<br />
<br />
<strong>I'm into NFTs for community and utility, why should I care about whether I own or have a license in the associated asset?<br />
</strong><br />
There are 2 main reasons why you should care about this as an NFT holder.<br />
<br />
The first relates to the value of your asset. Assuming that an NFT only derives its value from the value of the associated asset, arguably whether you own that asset outright or only have a limited license in it ought to have a bearing on the overall value of your NFT.<br />
<br />
The second relates to your ability to use the asset. If the associated asset of your NFT is an image, you will need either ownership or a suitable license in the copyright to make any copy of that image. Without a proper license, can't do simple things like use the image as a profile picture, "accessorise" it incorporating other images, make copies for use on your watch face, or create a variation of the image for use on the metaverse.<br />
<br />
It goes without saying that if you want to go further and exploit the asset commercially, you will need a license to do so, and be aware of the limitations of your license. The usual limitations relate to the amount you can earn from commercialisation before you have to pay royalties back to the creator.<br />
<br />
<strong>I'm an NFT project founder, what should I think about when associating intellectual property rights with my NFTs?<br />
</strong><br />
First you need to make sure you have your rights secured as you can only grant rights that you yourself possess. Complexities can arise when a third party created your artwork, or if your artwork was created by an AI. It is also important to ensure that the entity that you intend to release the NFTs either owns or has a license in the intellectual property in the associated artwork. <br />
<br />
On the assumption that you own the copyright in the associated artwork, you will need to consider whether to assign ownership or grant a license. While assigning ownership would be more in line with the Web3 ethos, there are a couple of things for founders to consider before going down this path.</p>
<ol>
    <li>Unless there is a license back of rights to you, you will lose your rights to not just collaborate with Web2 entities, but to potentially create further adaptations or copies of your own art.</li>
    <li>Perfecting an assignment of ownership may require certain formalities depending on the copyright law in your country.</li>
</ol>
<p>These issues may be why most NFT projects grant NFT holders a mere license instead of outright ownership. <br />
<br />
Even when granting a license there are things to consider. Just as an example:</p>
<ol>
    <li>Do you want your holders to be able to commercialise your art?</li>
    <li>Are there any limitations on the manner in which holders can adapt your art, eg. Can holders release their own NFTs based on adaptations of the art?</li>
</ol>
<p>It is important that licensing terms are set out in a proper license agreement, and it should not be assumed that these can be contained within the smart contracts embedded in the NFT. This is because a smart contract cannot be programmed to cater to the nuances required in enforcing a license. In any event you do not want to be relying on reading computer code if you have to enforce your license terms in Court.<br />
<br />
Ultimately, whether you assign ownership or grant a license to your works, these terms should be made clear at the point that your project is launched. NFT holders may have certain impressions on the rights they believe they have when they mint, and you do not want to be accused of "rugging" them if you impose different terms a few months or even years after launch.<br />
<br />
<strong>Summary</strong><br />
<br />
Attempts have been made to try to standardise the license regime for NFTs with a concept similar to open-source licensing<sup>2</sup>. If a fixed set of licenses is adopted, this would likely reduce the chances of accidental infringement. For now it is important for Web3 proponents to be aware that there is a wide variance in the rights you get by owning an NFT, and it will be some time yet before NFTs definitively represent "deeds of ownership" in their associated assets.   </p>
<div><sup>1</sup>https://www.galaxy.com/research/insights/a-survey-of-nft-licenses-facts-and-fictions/</div>
<p><sup>2</sup>https://a16zcrypto.com/introducing-nft-licenses/</p>]]></content:encoded></item><item><guid isPermaLink="false">{C9B5377C-6B9A-4982-B285-A2B69211622E}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/singapore-data-protection-update-sep-2022/</link><title>Singapore data protection update</title><description><![CDATA[<p>On 9 of September 2022, the Singapore Court of Appeal (“CA”) released its decision in <em>Reed Michael v Bellingham, Alex (Attorney-General, Intervener)</em> [2022] SGCA 60 This is the first decision by the CA relating to the Personal Data Protection Act (“PDPA”), and has provided significant guidance, not just for individuals looking to commence actions under the PDPA, but also for employers where an employee is trying to allege that the employer is responsible as the contravention was carried out within the course of his employment.</p>
<p><strong>Brief facts</strong></p>
<p>The respondent AB was employed as marketing consultant by entities that were part of a group called IP Global (“Ex-Employers”). As part of that role, the respondent managed an investment fund known as the “Edinburgh Fund”. </p>
<p>In the second half of 2017, the respondent left his role and joined a competitor QIP as “Head of Fund Raising”. In August 2018, the respondent contacted the appellant MR (who was an investor in the Edinburgh Fund) on the latter’s personal email address with a view to offering the appellant further investment opportunities by QIP.</p>
<p>The appellant was concerned that the respondent knew his name, personal email address and investment activity in the Edinburgh Fund (collectively, the “Personal Data”). Among other things, the appellant responded to the respondent’s email wanting to know how the respondent had come to access the Personal Data and what steps he would take to protect it.</p>
<p>The respondent claimed that he obtained some of the Personal Data from Linkedin, but did not provide the appellant with any further assurances relating to the Personal Data.</p>
<p>The appellant was joined as plaintiff to an action commenced by the Ex-Employers against the respondent under what was then s32 of the PDPA (which we shall refer to by its current section number, s48O) for an injunction restraining the respondent from using the appellant’s personal data, and an order that the respondent undertake to destroy the appellant’s personal data that was in his possession.</p>
<p>This was granted by the District Judge, but overturned on appeal to the High Court. The matter was then referred to the CA who largely affirmed the District Judge’s decision.</p>
<p><strong>What is s48(O) of the PDPA</strong></p>
<p>S48(O) of the PDPA grants a person who suffers loss or damage directly as a result of a contravention of certain parts of the PDPA, a civil action for relief in Court. Many issues were considered by the CA. We will summarise the key parts of the CA’s decision in terms of what they mean for</p>
<p>1. individuals commencing actions under s48(O)</p>
<p>2. individuals facing a claim under s48(O), and</p>
<p>3. corporations who employed the individuals in (2). </p>
<p><strong>For Individuals commencing actions under s48(O)</strong></p>
<p>The first important point to note is that the CA affirmed that a claimant could rely on emotional distress as part of “loss or damage”. This aligns the position in Singapore with the UK position expressed in<em> Vidal-Hall and others v Google Inc (Information Commissioner intervening)</em> [2016] QB 1003 where it was recognised that “distress… is often the only real damage that is caused by a contravention.”</p>
<p>The second point relates the test such individuals need to meet in order to prove their case for loss or damage, which the CA enunciated for the first time. The CA identified a multi-factorial approach considering (1) the nature of the personal data involved in the breach, (2) whether<br />
the breach was one-off or continuing, (3) the nature of the defendant’s conduct, (4) the risk of future breaches causing emotional distress and (5) the actual impact of the breach on the claimant.</p>
<p>In finding in favour of the appellant, the CA placed particular emphasis on the fact that the respondent refused to give the appellant an undertaking not to use the Personal Data in the future. The CA appeared to take the view that the matter would have been resolved if the respondent had given such an undertaking in the course of his email exchange with the appellant. The CA also considered the actions taken by the appellant after receiving the initial email from the respondent (confronting the Ex-Employers and writing to the respondent) in considering whether emotional distress was in fact suffered.</p>
<p><strong>For individuals defending actions under s48O</strong></p>
<p>The first point to note relates to whether individuals are subject to obligations under the PDPA which apply to “organisations”. The respondent sought to argue that such obligations should only apply to business entities, not individuals. The CA swiftly rejected this position on the basis that the definition of an “organisation” in the PDPA included natural persons. One therefore should be careful when assuming that only corporate entities are subject to the obligations under the PDPA. </p>
<p>The second point to consider is the respondent’s attempt to rely on a defence in s4(1)(b) of the PDPA, which provides that the specific sections of the PDPA do not impose obligations on employees acting in the course of their employment. The CA held that it was too late for the respondent to try to rely on this provision as he had not adduced evidence of (1) what was done, (2) what the employment required him to do as an employee (3) whether the employee deliberately evaded practices set up by the employer to deter such action. It is therefore important for defendants to consider the defences in s4 of the PDPA early with their counsel.</p>
<p>Finally, we reiterate the finding that the respondent never undertook to not use the Personal Data in future. It is puzzling why the respondent did not do this in this case, as he had stated over email to the appellant that he would not be contacting the appellant again. Potential defendants should immediately obtain advice from legal counsel when faced with a potential claim under s48O so that appropriate remedial measures can be taken.</p>
<p><strong>For employers</strong></p>
<p>The CA considered the question of when it is that an employer would be liable for the actions of an employee. It held that an employer’s liability under the PDPA was not strict, but fault based. It reiterated that an employer would only be in breach of the PDPA if it fails to do what a reasonable person would consider appropriate in the circumstances.</p>
<p>As an example, the CA suggested that if an employer has developed and implemented policies and practices necessary for the organisation to meet its obligations under the PDPA, but a rogue employee takes pains to evade such supervision and thereby breaches the PDPA, it would be artificial to say that the employee was acting within the course of his employment.</p>
<p>This once again underscores the importance of employers ensuring that they have taken sufficient steps to ensure that their processes with regards to personal data collection, storage and use are compliant with the PDPA.</p>
<div> </div>]]></description><pubDate>Thu, 15 Sep 2022 10:50:56 +0100</pubDate><category>Data and privacy</category><authors:names>Nick Lauw</authors:names><content:encoded><![CDATA[<p>On 9 of September 2022, the Singapore Court of Appeal (“CA”) released its decision in <em>Reed Michael v Bellingham, Alex (Attorney-General, Intervener)</em> [2022] SGCA 60 This is the first decision by the CA relating to the Personal Data Protection Act (“PDPA”), and has provided significant guidance, not just for individuals looking to commence actions under the PDPA, but also for employers where an employee is trying to allege that the employer is responsible as the contravention was carried out within the course of his employment.</p>
<p><strong>Brief facts</strong></p>
<p>The respondent AB was employed as marketing consultant by entities that were part of a group called IP Global (“Ex-Employers”). As part of that role, the respondent managed an investment fund known as the “Edinburgh Fund”. </p>
<p>In the second half of 2017, the respondent left his role and joined a competitor QIP as “Head of Fund Raising”. In August 2018, the respondent contacted the appellant MR (who was an investor in the Edinburgh Fund) on the latter’s personal email address with a view to offering the appellant further investment opportunities by QIP.</p>
<p>The appellant was concerned that the respondent knew his name, personal email address and investment activity in the Edinburgh Fund (collectively, the “Personal Data”). Among other things, the appellant responded to the respondent’s email wanting to know how the respondent had come to access the Personal Data and what steps he would take to protect it.</p>
<p>The respondent claimed that he obtained some of the Personal Data from Linkedin, but did not provide the appellant with any further assurances relating to the Personal Data.</p>
<p>The appellant was joined as plaintiff to an action commenced by the Ex-Employers against the respondent under what was then s32 of the PDPA (which we shall refer to by its current section number, s48O) for an injunction restraining the respondent from using the appellant’s personal data, and an order that the respondent undertake to destroy the appellant’s personal data that was in his possession.</p>
<p>This was granted by the District Judge, but overturned on appeal to the High Court. The matter was then referred to the CA who largely affirmed the District Judge’s decision.</p>
<p><strong>What is s48(O) of the PDPA</strong></p>
<p>S48(O) of the PDPA grants a person who suffers loss or damage directly as a result of a contravention of certain parts of the PDPA, a civil action for relief in Court. Many issues were considered by the CA. We will summarise the key parts of the CA’s decision in terms of what they mean for</p>
<p>1. individuals commencing actions under s48(O)</p>
<p>2. individuals facing a claim under s48(O), and</p>
<p>3. corporations who employed the individuals in (2). </p>
<p><strong>For Individuals commencing actions under s48(O)</strong></p>
<p>The first important point to note is that the CA affirmed that a claimant could rely on emotional distress as part of “loss or damage”. This aligns the position in Singapore with the UK position expressed in<em> Vidal-Hall and others v Google Inc (Information Commissioner intervening)</em> [2016] QB 1003 where it was recognised that “distress… is often the only real damage that is caused by a contravention.”</p>
<p>The second point relates the test such individuals need to meet in order to prove their case for loss or damage, which the CA enunciated for the first time. The CA identified a multi-factorial approach considering (1) the nature of the personal data involved in the breach, (2) whether<br />
the breach was one-off or continuing, (3) the nature of the defendant’s conduct, (4) the risk of future breaches causing emotional distress and (5) the actual impact of the breach on the claimant.</p>
<p>In finding in favour of the appellant, the CA placed particular emphasis on the fact that the respondent refused to give the appellant an undertaking not to use the Personal Data in the future. The CA appeared to take the view that the matter would have been resolved if the respondent had given such an undertaking in the course of his email exchange with the appellant. The CA also considered the actions taken by the appellant after receiving the initial email from the respondent (confronting the Ex-Employers and writing to the respondent) in considering whether emotional distress was in fact suffered.</p>
<p><strong>For individuals defending actions under s48O</strong></p>
<p>The first point to note relates to whether individuals are subject to obligations under the PDPA which apply to “organisations”. The respondent sought to argue that such obligations should only apply to business entities, not individuals. The CA swiftly rejected this position on the basis that the definition of an “organisation” in the PDPA included natural persons. One therefore should be careful when assuming that only corporate entities are subject to the obligations under the PDPA. </p>
<p>The second point to consider is the respondent’s attempt to rely on a defence in s4(1)(b) of the PDPA, which provides that the specific sections of the PDPA do not impose obligations on employees acting in the course of their employment. The CA held that it was too late for the respondent to try to rely on this provision as he had not adduced evidence of (1) what was done, (2) what the employment required him to do as an employee (3) whether the employee deliberately evaded practices set up by the employer to deter such action. It is therefore important for defendants to consider the defences in s4 of the PDPA early with their counsel.</p>
<p>Finally, we reiterate the finding that the respondent never undertook to not use the Personal Data in future. It is puzzling why the respondent did not do this in this case, as he had stated over email to the appellant that he would not be contacting the appellant again. Potential defendants should immediately obtain advice from legal counsel when faced with a potential claim under s48O so that appropriate remedial measures can be taken.</p>
<p><strong>For employers</strong></p>
<p>The CA considered the question of when it is that an employer would be liable for the actions of an employee. It held that an employer’s liability under the PDPA was not strict, but fault based. It reiterated that an employer would only be in breach of the PDPA if it fails to do what a reasonable person would consider appropriate in the circumstances.</p>
<p>As an example, the CA suggested that if an employer has developed and implemented policies and practices necessary for the organisation to meet its obligations under the PDPA, but a rogue employee takes pains to evade such supervision and thereby breaches the PDPA, it would be artificial to say that the employee was acting within the course of his employment.</p>
<p>This once again underscores the importance of employers ensuring that they have taken sufficient steps to ensure that their processes with regards to personal data collection, storage and use are compliant with the PDPA.</p>
<div> </div>]]></content:encoded></item><item><guid isPermaLink="false">{9144EED4-612C-40CD-8B8E-A6751F72C06E}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/cyber-bytes-issue-44/</link><title>Cyber_Bytes - Issue 44</title><description><![CDATA[<p><strong>Suspected Russian cyber attack on British soil as firm subjected to ‘daily’ hacks</strong></p>
<p>The National Cyber Security Centre (NCSC) and the police have been investigating a series of attacks attempting to take down a London-based cryptocurrency exchange, Currency.com. The attack involved coercing millions of computers worldwide to bombard the company's website with numerous requests in a bid to crash its systems.</p>
<p>The attack commenced within hours of Currency.com founder's announcement that he was pulling the company out of Russia following Russia's invasion of Ukraine. This is believed to be the first suspected Russian war-linked cyber attack on a UK company.</p>
<p>The NCSC believes that the attack has not been orchestrated by the Kremlin, but instead is likely to have been carried out by criminals who are possibly Russian in origin. Evaluation by Currency.com suggests that between 18 and 32 percent of the attacks stemmed from Russia and Belarus.</p>
<p>The attack follows warnings by Liz Truss, the Foreign Secretary, of “significant consequences on normal people and businesses in Ukraine and across Europe”, with a further announcement from the NCSC reiterating that organisations should follow their guidance on protecting themselves against attacks of this nature (see <a rel="noopener noreferrer" href="https://www.ncsc.gov.uk/guidance/putting-staff-welfare-at-the-heart-of-incident-response" target="_blank">here</a>).</p>
<p>Click <a rel="noopener noreferrer" href="https://www.vtlnews.com/suspected-russian-cyber-attack-on-british-soil-as-firm-subjected-to-daily-hacks/" target="_blank">here</a> to read the full article as published by VTL News.</p>
<p><strong>Five things we learned from DPPC 2022</strong></p>
<p>More than 3000 data protection professionals from across the country attended this year's Data Protection Practitioners' Conference. The key takeaways include:</p>
<ul>
    <li><strong>Training materials for business and organisations</strong>: John Edwards has highlighted the publication of the ICO information governance and legislation training modules, which it provides to its staff as part of its internal training. He has encouraged organisations and staff to take a look at these materials in the coming weeks to improve their data protection and information rights expertise.</li>
    <li><strong>Privacy professionals</strong>: John Edwards has reiterated the importance of data protection professionals' role within organisations, adding that the ICO could take further steps to connect DPOs with other members of the community to pool expertise and experience.</li>
    <li><strong>Safeguarding children</strong>: it is imperative that businesses and organisations have the confidence and know-how to share data in circumstances where this would safeguard children and young people.</li>
    <li><strong>Personal data and equality in a digital age</strong>: the key issue of how data protection sits alongside inequality was also considered, particularly in the context of supporting organisations to make good decisions about collecting good-quality data to address this. For example, artificial intelligence, if poorly implemented, can perpetuate biases as the processes rely on existing data which may already be entrenched with inequality.</li>
    <li><strong>The future of data protection reform</strong>: the UK Government's introduction of the new Data Protection and Digital Information Bill to Parliament is believed to strike a good balance between reducing regulatory burdens on businesses and recognising the value of rigorous data protection.</li>
</ul>
<p>Click <a rel="noopener noreferrer" href="https://ico.org.uk/about-the-ico/media-centre/news-and-blogs/2022/07/five-things-we-learned-from-dppc-2022/" target="_blank">here</a> to read the full article as published by the ICO.</p>
<p><strong>Cyber attack targets IT firm used by Northern Ireland's health service</strong></p>
<p><strong></strong>Health officials in Northern Ireland have disabled the health system's access to services provided by an NHS IT supplier, Advanced, after a cyber-attack caused a significant outage across the NHS computer system. The cyber criminals are suspected to have made demands for payments in exchange for not leaking information and removing the malware. The perpetrators are understood to be independent cybercriminals rather than being state-sponsored.</p>
<p>Advanced offers digital services to patients, including patient records, emergency prescriptions and support for NHS 111. It also provides the IT system that supports finance, procurement and logistics across Northern Ireland's health and social services. As such, there were concerns that the threat actors could have gained access to confidential health records, including mental health records, and leak them if the ransom demands were not met.</p>
<p>The Department of Health confirmed that "contingency measures" had been put in place following the attack. As of yet, there is no direct effect on services, including payroll and patient records; however, access was shut off as a precaution and to avoid exposing other critical systems to a risk of attack. At this stage, the incident could take weeks or months to be fully resolved.</p>
<p>Click <a rel="noopener noreferrer" href="https://www.bbc.com/news/uk-northern-ireland-62509303" target="_blank">here</a> to read the BBC's full article and <a rel="noopener noreferrer" href="https://www.theguardian.com/society/2022/aug/06/ministers-coordinate-response-cyberattack-nhs" target="_blank">here</a> to read the Guardian's full article on this news.</p>
<p><strong>Microsoft warns about SEABORGIUM phishing attack that befriends you first to rob you later</strong></p>
<p>The Microsoft Threat Intelligence Centre (MSTIC) has released a warning about a highly persistent phishing campaign known as "SEABORGIUM". Despite this campaign having existed since at least 2017, Microsoft believes that it has now collated sufficient information on SEABORGIUM and its operation in practice to publish detailed guidance describing the ways in which potential victims can protect themselves against it.</p>
<p>Typically, the threat actors involved in SEABORGIUM initiate an attack by observing their potential targets through the use of fake social media profiles. In addition to this, email addresses are often set up to impersonate real individuals in order to contact their victims, gain trust, and develop rapport.</p>
<p>If the target replies, SEABORGIUM proceeds to send a weaponized email, with the malicious website links inserted directly into the body of the email or via email attachments. These links in turn direct the target to a phishing portal mirroring the sign-in page for a genuine provider and invite them to insert their login information. In this way, SEABORGIUM is able to intercept any credentials.</p>
<p>SEABORGIUM has been observed to use stolen credentials to sign directly into victims' email accounts. Once they have gained access, the threat actors are then able to exfiltrate emails and attachments from inboxes, set up forwarding rules to accounts where the threat actors have long-term access to collected data and using fake accounts to communicate with people of interest attempting to gain access to sensitive information.</p>
<p>Click <a rel="noopener noreferrer" href="https://www.microsoft.com/security/blog/2022/08/15/disrupting-seaborgiums-ongoing-phishing-operations/" target="_blank">here</a> to read Microsoft's full article and <a rel="noopener noreferrer" href="https://www.neowin.net/news/microsoft-warns-about-seaborgium-phishing-attack-that-befriends-you-first-to-rob-you-later/" target="_blank">here</a> to read  Neowin's full article on this news.</p>
<p><strong>Bad for Privacy, but Great for Security: Apple AirTag Used to Identify Airport Staff Thief</strong></p>
<p>An air traveller used an Apple AirTag to locate her missing luggage, which resulted in the arrest of an airline worker with over $16,000 worth of luggage recovered. The introduction of tracking devices such as the Apple AirTag enable users to track the position of their possessions in real time.</p>
<p>Unlike a typical tracker which may use GPS signal to identify location, AirTags use a combination of Bluetooth and UWB that can be picked up by other UWB-supporting Apple products (such as iPhones, iPads, and MacBooks). Once an AirTag has been picked up by another Apple device, the location details are streamed to the iCloud so that the device's owner can identify where their AirTag is.</p>
<p>Although Apple AirTags have shown themselves to be a useful tool in certain circumstances, their tracking ability has raised considerable privacy and security concerns. There have been various reports of people discovering AirTags in their bags, cars, and other possessions without their knowledge, which has many worried that criminals are using them to track valuable targets.</p>
<p>Click <a rel="noopener noreferrer" href="https://www.electropages.com/blog/2022/08/bad-privacy-great-security-apple-airtag-used-identify-airport-staff-thief" target="_blank">here</a> to read the full article as published by Electropages.</p>]]></description><pubDate>Fri, 26 Aug 2022 12:31:00 +0100</pubDate><category>Data and privacy</category><authors:names>Richard Breavington, Daniel Guilfoyle, Ian Dinning, Rachel Ford, Christopher Ashton, Elizabeth Zang, Emanuele Santella </authors:names><content:encoded><![CDATA[<p><strong>Suspected Russian cyber attack on British soil as firm subjected to ‘daily’ hacks</strong></p>
<p>The National Cyber Security Centre (NCSC) and the police have been investigating a series of attacks attempting to take down a London-based cryptocurrency exchange, Currency.com. The attack involved coercing millions of computers worldwide to bombard the company's website with numerous requests in a bid to crash its systems.</p>
<p>The attack commenced within hours of Currency.com founder's announcement that he was pulling the company out of Russia following Russia's invasion of Ukraine. This is believed to be the first suspected Russian war-linked cyber attack on a UK company.</p>
<p>The NCSC believes that the attack has not been orchestrated by the Kremlin, but instead is likely to have been carried out by criminals who are possibly Russian in origin. Evaluation by Currency.com suggests that between 18 and 32 percent of the attacks stemmed from Russia and Belarus.</p>
<p>The attack follows warnings by Liz Truss, the Foreign Secretary, of “significant consequences on normal people and businesses in Ukraine and across Europe”, with a further announcement from the NCSC reiterating that organisations should follow their guidance on protecting themselves against attacks of this nature (see <a rel="noopener noreferrer" href="https://www.ncsc.gov.uk/guidance/putting-staff-welfare-at-the-heart-of-incident-response" target="_blank">here</a>).</p>
<p>Click <a rel="noopener noreferrer" href="https://www.vtlnews.com/suspected-russian-cyber-attack-on-british-soil-as-firm-subjected-to-daily-hacks/" target="_blank">here</a> to read the full article as published by VTL News.</p>
<p><strong>Five things we learned from DPPC 2022</strong></p>
<p>More than 3000 data protection professionals from across the country attended this year's Data Protection Practitioners' Conference. The key takeaways include:</p>
<ul>
    <li><strong>Training materials for business and organisations</strong>: John Edwards has highlighted the publication of the ICO information governance and legislation training modules, which it provides to its staff as part of its internal training. He has encouraged organisations and staff to take a look at these materials in the coming weeks to improve their data protection and information rights expertise.</li>
    <li><strong>Privacy professionals</strong>: John Edwards has reiterated the importance of data protection professionals' role within organisations, adding that the ICO could take further steps to connect DPOs with other members of the community to pool expertise and experience.</li>
    <li><strong>Safeguarding children</strong>: it is imperative that businesses and organisations have the confidence and know-how to share data in circumstances where this would safeguard children and young people.</li>
    <li><strong>Personal data and equality in a digital age</strong>: the key issue of how data protection sits alongside inequality was also considered, particularly in the context of supporting organisations to make good decisions about collecting good-quality data to address this. For example, artificial intelligence, if poorly implemented, can perpetuate biases as the processes rely on existing data which may already be entrenched with inequality.</li>
    <li><strong>The future of data protection reform</strong>: the UK Government's introduction of the new Data Protection and Digital Information Bill to Parliament is believed to strike a good balance between reducing regulatory burdens on businesses and recognising the value of rigorous data protection.</li>
</ul>
<p>Click <a rel="noopener noreferrer" href="https://ico.org.uk/about-the-ico/media-centre/news-and-blogs/2022/07/five-things-we-learned-from-dppc-2022/" target="_blank">here</a> to read the full article as published by the ICO.</p>
<p><strong>Cyber attack targets IT firm used by Northern Ireland's health service</strong></p>
<p><strong></strong>Health officials in Northern Ireland have disabled the health system's access to services provided by an NHS IT supplier, Advanced, after a cyber-attack caused a significant outage across the NHS computer system. The cyber criminals are suspected to have made demands for payments in exchange for not leaking information and removing the malware. The perpetrators are understood to be independent cybercriminals rather than being state-sponsored.</p>
<p>Advanced offers digital services to patients, including patient records, emergency prescriptions and support for NHS 111. It also provides the IT system that supports finance, procurement and logistics across Northern Ireland's health and social services. As such, there were concerns that the threat actors could have gained access to confidential health records, including mental health records, and leak them if the ransom demands were not met.</p>
<p>The Department of Health confirmed that "contingency measures" had been put in place following the attack. As of yet, there is no direct effect on services, including payroll and patient records; however, access was shut off as a precaution and to avoid exposing other critical systems to a risk of attack. At this stage, the incident could take weeks or months to be fully resolved.</p>
<p>Click <a rel="noopener noreferrer" href="https://www.bbc.com/news/uk-northern-ireland-62509303" target="_blank">here</a> to read the BBC's full article and <a rel="noopener noreferrer" href="https://www.theguardian.com/society/2022/aug/06/ministers-coordinate-response-cyberattack-nhs" target="_blank">here</a> to read the Guardian's full article on this news.</p>
<p><strong>Microsoft warns about SEABORGIUM phishing attack that befriends you first to rob you later</strong></p>
<p>The Microsoft Threat Intelligence Centre (MSTIC) has released a warning about a highly persistent phishing campaign known as "SEABORGIUM". Despite this campaign having existed since at least 2017, Microsoft believes that it has now collated sufficient information on SEABORGIUM and its operation in practice to publish detailed guidance describing the ways in which potential victims can protect themselves against it.</p>
<p>Typically, the threat actors involved in SEABORGIUM initiate an attack by observing their potential targets through the use of fake social media profiles. In addition to this, email addresses are often set up to impersonate real individuals in order to contact their victims, gain trust, and develop rapport.</p>
<p>If the target replies, SEABORGIUM proceeds to send a weaponized email, with the malicious website links inserted directly into the body of the email or via email attachments. These links in turn direct the target to a phishing portal mirroring the sign-in page for a genuine provider and invite them to insert their login information. In this way, SEABORGIUM is able to intercept any credentials.</p>
<p>SEABORGIUM has been observed to use stolen credentials to sign directly into victims' email accounts. Once they have gained access, the threat actors are then able to exfiltrate emails and attachments from inboxes, set up forwarding rules to accounts where the threat actors have long-term access to collected data and using fake accounts to communicate with people of interest attempting to gain access to sensitive information.</p>
<p>Click <a rel="noopener noreferrer" href="https://www.microsoft.com/security/blog/2022/08/15/disrupting-seaborgiums-ongoing-phishing-operations/" target="_blank">here</a> to read Microsoft's full article and <a rel="noopener noreferrer" href="https://www.neowin.net/news/microsoft-warns-about-seaborgium-phishing-attack-that-befriends-you-first-to-rob-you-later/" target="_blank">here</a> to read  Neowin's full article on this news.</p>
<p><strong>Bad for Privacy, but Great for Security: Apple AirTag Used to Identify Airport Staff Thief</strong></p>
<p>An air traveller used an Apple AirTag to locate her missing luggage, which resulted in the arrest of an airline worker with over $16,000 worth of luggage recovered. The introduction of tracking devices such as the Apple AirTag enable users to track the position of their possessions in real time.</p>
<p>Unlike a typical tracker which may use GPS signal to identify location, AirTags use a combination of Bluetooth and UWB that can be picked up by other UWB-supporting Apple products (such as iPhones, iPads, and MacBooks). Once an AirTag has been picked up by another Apple device, the location details are streamed to the iCloud so that the device's owner can identify where their AirTag is.</p>
<p>Although Apple AirTags have shown themselves to be a useful tool in certain circumstances, their tracking ability has raised considerable privacy and security concerns. There have been various reports of people discovering AirTags in their bags, cars, and other possessions without their knowledge, which has many worried that criminals are using them to track valuable targets.</p>
<p>Click <a rel="noopener noreferrer" href="https://www.electropages.com/blog/2022/08/bad-privacy-great-security-apple-airtag-used-identify-airport-staff-thief" target="_blank">here</a> to read the full article as published by Electropages.</p>]]></content:encoded></item><item><guid isPermaLink="false">{BD2B14AC-DF1E-4F93-97E9-3E904A93E617}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/cyber-bytes-issue-43/</link><title>Cyber_Bytes - Issue 43</title><description><![CDATA[<p><strong>Solicitors urged to help stem the rising tide of ransomware payments</strong></p>
<p>Solicitors have been asked to help combat a rise in payments being made to ransomware criminals. In some cases, solicitors have been advising clients to pay in the belief that it will safeguard data or lead to a lower penalty from the ICO.</p>
<p>The National Cyber Security Centre (<strong>NCSC</strong>) has requested that the Law Society reiterate to its members its advice on ransomware and highlight that paying a ransom will not keep data secure or be considered by the ICO as a mitigation in regulator action. Conversely, the ICO and NCSC have stated that paying ransoms can further incentivise criminals and will not guarantee that data is safely returned.</p>
<p>This advice comes as ransomware attacks are becoming more sophisticated and destructive, with the UK government working with partners across the board to mitigate the threat. In December 2021, the National Cyber Strategy was launched to strengthen the UK's role as a responsible cyber power.<br />
Tackling cybercrime is at the heart of this plan, with the legal sector playing a key role in helping reduce the impact and scale of this threat.</p>
<p>
Click <a href="https://www.ncsc.gov.uk/news/solicitors-urged-to-help-stem-the-rising-tide-of-ransomware-payments">here</a> to read the NCSC's press release.</p>
<p><strong>International data protection and privacy authorities provide guidance against the threat of credential stuffing attacks</strong></p>
<p>The latest report from international data protection and privacy authorities, including the ICO, has recognised "credential stuffing" as a substantial growing cyber threat to personal information.</p>
<p>This cyber-attack method exploits people's propensity to use the same username and password combination across multiple online accounts. The attacks are automated and most commonly take place on a large scale, making use of credentials obtained from unrelated data breaches in order to gain access to online accounts across different websites or applications.</p>
<p>The report provides guidance for organisations (<a href="https://globalprivacyassembly.org/wp-content/uploads/2022/06/22-06-27-Credential-stuffing-guidelines.pdf">here</a>) and the public (<a href="https://globalprivacyassembly.org/wp-content/uploads/2022/06/22-06-27-Credential-Stuffing-General-Public-Awareness.pdf">here</a>) on how to prevent, detect and lessen the risk of these attacks. The guidance to organisations notes that the implementation of measures to protect personal data from credential stuffing attacks will generally be required, at least implicitly, under data protection and privacy laws. Among the recommended security measures listed, multi-factor authentication is identified as the most efficient method in securing online accounts against credential stuffing.</p>
<p>Click <a href="https://ico.org.uk/about-the-ico/media-centre/news-and-blogs/2022/06/international-data-protection-and-privacy-authorities-provide-guidance-against-the-threat-of-credential-stuffing-attacks/">here</a> to read the ICO's press release.</p>
<p><strong>Commercial cyber capabilities must be used legally and responsibly, says UK NCSC CEO</strong></p>
<p>The head of the UK's NCSC, Lindy Cameron, has highlighted the significance of legal and responsible use of commercial cyber capabilities.<br />
In a speech delivered at the Cyber Week hosted by Tel Aviv University, Cameron has identified that the intersection between academia, industry and governments hold the key to responding to the latest cyber threats. Cameron commended Israel's sophisticated cyber capabilities, where export controls are tightened, making it more difficult for nations with troubling records on privacy and human rights to acquire intrusive spyware.</p>
<p>Cameron discussed the rising trend in ransomware and how the commercialisation of such capabilities dramatically lowers the technical knowhow required to conduct criminal operations. Cameron pointed out that ransomware remains the most significant global cyber threat most organisations have to contend with. Ransomware is now being offered by gangs as a service, making it easier than ever to perpetrate this type of crime.</p>
<p>In order to counteract these attacks, Cameron stressed the need to form partnerships, as well as to pool resources and skills in order to develop a network which is naturally resilient.</p>
<p>Click <a href="https://www.ncsc.gov.uk/news/lindy-cameron-at-tel-aviv-cyber-week">here</a> to read the NCSC's press release.</p>
<p><strong>Cyber-attack causes a fire in steel factory in Iran</strong></p>
<p>On 27 June 2022, a cyber-attack on a steel maker in Iran caused a serious fire in a steel factory and damage to equipment.<br />
A hacking group known as Predatory Sparrow has stated that it is behind the attack and has released a video to support this claim. The video footage of the incident shows factory workers escaping the plant before the machine started spewing molten steel and fire, as well as people pouring water on the fire with hoses.</p>
<p>Predatory Sparrow claimed that this attack was one of three attacks it had carried out against Iranian steel makers on the same day in protest of unspecified acts of "aggression" by the Islamic Republic. The group has since gone on to share data allegedly stolen from the companies, including confidential emails. The sophisticated nature of the attack, including apparent efforts by the group to shield people at the scene of the incident from injury, has led many to believe that Predatory Sparrow is either operated or sponsored by a nation state. If a state is proven to have caused physical damage to the Iranian factory, it may have violated international laws prohibiting the use of force and provided Iran with legal grounds to hit back. Investigations by the Iranian authorities are currently taking place in efforts to identify the state perpetrator behind the attack.</p>
<p>Despite there being previous incidents that have had a physical impact in the real world, such as the 2010 Stuxnet attack, nothing as serious as this has previously taken place, with there being very few confirmed cases of cyber-attacks causing physical damage.</p>
<p>Click <a href="https://www.bbc.co.uk/news/technology-62072480">here</a> to read the BBC article.</p>
<p><strong>Speech introducing the ICO's plan for the next three years: ICO25</strong></p>
<p>On 14 July 2022, Information Commissioner John Edwards delivered a speech at Woburn House to introduce ICO25, the ICO's strategic plan outlining its regulatory approach and priorities for the next three years.</p>
<p>The plan includes a pledge to protect the information rights of vulnerable individuals, whilst affording organisations higher levels of certainty and flexibility to enable "businesses to invest and innovate with confidence". In terms of providing greater certainty, the aim is to clearly set out legal requirements and the approach that the ICO will take when enforcing these.</p>
<p>There are also plans to introduce "a series of services, tools and initiatives, allowing organisations to benefit from ICO advice and the experience of others".</p>
<p>The ICO25 plan's priorities over the upcoming three years include:</p>
<ul>
    <li>Examining how the benefits system utilises algorithms;</li>
    <li>Tackling predatory marketing calls;</li>
    <li>Considering whether the use of AI within the recruitment sector adversely impacts ethnic minorities and neurodiverse individuals; and</li>
    <li>Continuing its support of children's privacy.</li>
</ul>
<p>
Click <a href="https://ico.org.uk/about-the-ico/media-centre/news-and-blogs/2022/07/john-edwards-speech-introducing-ico25/">here</a> to read the full speech by John Edwards.</p>
<p><strong>Data Protection and Digital Information Bill introduced into Parliament</strong></p>
<p>On 18 July 2022, the Data Protection and Digital Information Bill was introduced into Parliament. This followed publication of the government's response to its consultation, "Data: a new direction".</p>
<p>The Bill has been designed to update and streamline the UK GDPR and Data Protection Act 2018 in order to reduce legislative burdens on organisations whilst still preserving a good standard of data protection regulation. The purpose of the Bill will be to bring in higher levels of flexibility and introduce various measures involving personal data and other types of information, such as digital information.</p>
<p>Some various proposed amendments to the Bill as it stands, include:</p>
<ul>
    <li>Reforming the ICO;</li>
    <li>Changes to PECR, relating to cookie rules, unsolicited direct marketing and communications security (for example, network traffic and location data);</li>
    <li>Clarification of the rules on international transfers and cross-border flows of personal data;</li>
    <li>Establishing a framework for the provision of digital verification services;</li>
    <li>Changes to Part 3 (law enforcement) and Part 4 (processing by the intelligence services) of the Data Protection Act 2018; and</li>
    <li>Changes to police use of biometrics.</li>
</ul>
<p>The second reading is due to take place on 5 September 2022.</p>
<p>Click <a href="https://www.gov.uk/government/publications/data-protection-and-digital-information-bill-impact-assessments">here</a> to read the UK Government publication.</p>]]></description><pubDate>Tue, 02 Aug 2022 15:47:00 +0100</pubDate><category>Data and privacy</category><authors:names>Richard Breavington, Daniel Guilfoyle, Ian Dinning, Rachel Ford, Christopher Ashton, Elizabeth Zang, Emanuele Santella </authors:names><content:encoded><![CDATA[<p><strong>Solicitors urged to help stem the rising tide of ransomware payments</strong></p>
<p>Solicitors have been asked to help combat a rise in payments being made to ransomware criminals. In some cases, solicitors have been advising clients to pay in the belief that it will safeguard data or lead to a lower penalty from the ICO.</p>
<p>The National Cyber Security Centre (<strong>NCSC</strong>) has requested that the Law Society reiterate to its members its advice on ransomware and highlight that paying a ransom will not keep data secure or be considered by the ICO as a mitigation in regulator action. Conversely, the ICO and NCSC have stated that paying ransoms can further incentivise criminals and will not guarantee that data is safely returned.</p>
<p>This advice comes as ransomware attacks are becoming more sophisticated and destructive, with the UK government working with partners across the board to mitigate the threat. In December 2021, the National Cyber Strategy was launched to strengthen the UK's role as a responsible cyber power.<br />
Tackling cybercrime is at the heart of this plan, with the legal sector playing a key role in helping reduce the impact and scale of this threat.</p>
<p>
Click <a href="https://www.ncsc.gov.uk/news/solicitors-urged-to-help-stem-the-rising-tide-of-ransomware-payments">here</a> to read the NCSC's press release.</p>
<p><strong>International data protection and privacy authorities provide guidance against the threat of credential stuffing attacks</strong></p>
<p>The latest report from international data protection and privacy authorities, including the ICO, has recognised "credential stuffing" as a substantial growing cyber threat to personal information.</p>
<p>This cyber-attack method exploits people's propensity to use the same username and password combination across multiple online accounts. The attacks are automated and most commonly take place on a large scale, making use of credentials obtained from unrelated data breaches in order to gain access to online accounts across different websites or applications.</p>
<p>The report provides guidance for organisations (<a href="https://globalprivacyassembly.org/wp-content/uploads/2022/06/22-06-27-Credential-stuffing-guidelines.pdf">here</a>) and the public (<a href="https://globalprivacyassembly.org/wp-content/uploads/2022/06/22-06-27-Credential-Stuffing-General-Public-Awareness.pdf">here</a>) on how to prevent, detect and lessen the risk of these attacks. The guidance to organisations notes that the implementation of measures to protect personal data from credential stuffing attacks will generally be required, at least implicitly, under data protection and privacy laws. Among the recommended security measures listed, multi-factor authentication is identified as the most efficient method in securing online accounts against credential stuffing.</p>
<p>Click <a href="https://ico.org.uk/about-the-ico/media-centre/news-and-blogs/2022/06/international-data-protection-and-privacy-authorities-provide-guidance-against-the-threat-of-credential-stuffing-attacks/">here</a> to read the ICO's press release.</p>
<p><strong>Commercial cyber capabilities must be used legally and responsibly, says UK NCSC CEO</strong></p>
<p>The head of the UK's NCSC, Lindy Cameron, has highlighted the significance of legal and responsible use of commercial cyber capabilities.<br />
In a speech delivered at the Cyber Week hosted by Tel Aviv University, Cameron has identified that the intersection between academia, industry and governments hold the key to responding to the latest cyber threats. Cameron commended Israel's sophisticated cyber capabilities, where export controls are tightened, making it more difficult for nations with troubling records on privacy and human rights to acquire intrusive spyware.</p>
<p>Cameron discussed the rising trend in ransomware and how the commercialisation of such capabilities dramatically lowers the technical knowhow required to conduct criminal operations. Cameron pointed out that ransomware remains the most significant global cyber threat most organisations have to contend with. Ransomware is now being offered by gangs as a service, making it easier than ever to perpetrate this type of crime.</p>
<p>In order to counteract these attacks, Cameron stressed the need to form partnerships, as well as to pool resources and skills in order to develop a network which is naturally resilient.</p>
<p>Click <a href="https://www.ncsc.gov.uk/news/lindy-cameron-at-tel-aviv-cyber-week">here</a> to read the NCSC's press release.</p>
<p><strong>Cyber-attack causes a fire in steel factory in Iran</strong></p>
<p>On 27 June 2022, a cyber-attack on a steel maker in Iran caused a serious fire in a steel factory and damage to equipment.<br />
A hacking group known as Predatory Sparrow has stated that it is behind the attack and has released a video to support this claim. The video footage of the incident shows factory workers escaping the plant before the machine started spewing molten steel and fire, as well as people pouring water on the fire with hoses.</p>
<p>Predatory Sparrow claimed that this attack was one of three attacks it had carried out against Iranian steel makers on the same day in protest of unspecified acts of "aggression" by the Islamic Republic. The group has since gone on to share data allegedly stolen from the companies, including confidential emails. The sophisticated nature of the attack, including apparent efforts by the group to shield people at the scene of the incident from injury, has led many to believe that Predatory Sparrow is either operated or sponsored by a nation state. If a state is proven to have caused physical damage to the Iranian factory, it may have violated international laws prohibiting the use of force and provided Iran with legal grounds to hit back. Investigations by the Iranian authorities are currently taking place in efforts to identify the state perpetrator behind the attack.</p>
<p>Despite there being previous incidents that have had a physical impact in the real world, such as the 2010 Stuxnet attack, nothing as serious as this has previously taken place, with there being very few confirmed cases of cyber-attacks causing physical damage.</p>
<p>Click <a href="https://www.bbc.co.uk/news/technology-62072480">here</a> to read the BBC article.</p>
<p><strong>Speech introducing the ICO's plan for the next three years: ICO25</strong></p>
<p>On 14 July 2022, Information Commissioner John Edwards delivered a speech at Woburn House to introduce ICO25, the ICO's strategic plan outlining its regulatory approach and priorities for the next three years.</p>
<p>The plan includes a pledge to protect the information rights of vulnerable individuals, whilst affording organisations higher levels of certainty and flexibility to enable "businesses to invest and innovate with confidence". In terms of providing greater certainty, the aim is to clearly set out legal requirements and the approach that the ICO will take when enforcing these.</p>
<p>There are also plans to introduce "a series of services, tools and initiatives, allowing organisations to benefit from ICO advice and the experience of others".</p>
<p>The ICO25 plan's priorities over the upcoming three years include:</p>
<ul>
    <li>Examining how the benefits system utilises algorithms;</li>
    <li>Tackling predatory marketing calls;</li>
    <li>Considering whether the use of AI within the recruitment sector adversely impacts ethnic minorities and neurodiverse individuals; and</li>
    <li>Continuing its support of children's privacy.</li>
</ul>
<p>
Click <a href="https://ico.org.uk/about-the-ico/media-centre/news-and-blogs/2022/07/john-edwards-speech-introducing-ico25/">here</a> to read the full speech by John Edwards.</p>
<p><strong>Data Protection and Digital Information Bill introduced into Parliament</strong></p>
<p>On 18 July 2022, the Data Protection and Digital Information Bill was introduced into Parliament. This followed publication of the government's response to its consultation, "Data: a new direction".</p>
<p>The Bill has been designed to update and streamline the UK GDPR and Data Protection Act 2018 in order to reduce legislative burdens on organisations whilst still preserving a good standard of data protection regulation. The purpose of the Bill will be to bring in higher levels of flexibility and introduce various measures involving personal data and other types of information, such as digital information.</p>
<p>Some various proposed amendments to the Bill as it stands, include:</p>
<ul>
    <li>Reforming the ICO;</li>
    <li>Changes to PECR, relating to cookie rules, unsolicited direct marketing and communications security (for example, network traffic and location data);</li>
    <li>Clarification of the rules on international transfers and cross-border flows of personal data;</li>
    <li>Establishing a framework for the provision of digital verification services;</li>
    <li>Changes to Part 3 (law enforcement) and Part 4 (processing by the intelligence services) of the Data Protection Act 2018; and</li>
    <li>Changes to police use of biometrics.</li>
</ul>
<p>The second reading is due to take place on 5 September 2022.</p>
<p>Click <a href="https://www.gov.uk/government/publications/data-protection-and-digital-information-bill-impact-assessments">here</a> to read the UK Government publication.</p>]]></content:encoded></item><item><guid isPermaLink="false">{9824DE5F-6983-4A66-AAD4-3DA5E6F2C908}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/changes-to-data-protection-legislation-in-asia-2022-update-including-mainland-china/</link><title>Changes to data protection legislation in Asia – 2022 update (including Mainland China)</title><description><![CDATA[<p>This update follows on from our original article <a href="https://www.rpc.co.uk/perspectives/data-and-privacy/upcoming-changes-to-data-protection-legislation-in-asia/">Upcoming changes to data protection legislation in Asia</a>. </p>
<p>Looking back on the last 18 months, the data privacy laws of several Asian jurisdictions have been updated to incorporate stronger protections for individuals’ personal data. This article provides an update on a handful of jurisdictions in Asia and summarises some of those main changes, including the far-reaching implications of the new data protection law in Mainland China. </p>
<p><strong>Introduction</strong></p>
<p>Many jurisdictions in Asia are in the process of updating, or have already updated, their data protection regimes. Many of these changes were expected developments following a lengthy period of legislative debate, as a part of incremental steps towards strengthening data protection. For example, in Hong Kong, the Personal Data (Privacy) Ordinance has been amended include new provisions regarding ‘doxxing’. </p>
<p>Other jurisdictions have made more wholescale changes which represent a shakeup of the data protection regime, with both territorial and extra-territorial effects. For example, the Personal Information Protection Law in Mainland China, which came into effect on 1 November 2021, appears to reflect the European GDPR in its commitments to data protection and introduces a new standard for data protection – it also has broad extra-territorial application.</p>
<p>This article provides a brief overview of some of the key changes made, or expected shortly, in Hong Kong, Singapore, Japan, Taiwan and Mainland China. </p>
<p>Organisations operating in Asian markets will need to assess the impact of these changes on their businesses and take steps to ensure compliance. The data protection regimes in Asia are catching up to the GDPR in the EU, although there is no common data protection regime. Asian jurisdictions protect data differently, but increasingly with greater care and greater pro-active steps needed by those who use and process data. Failure to adhere to these stricter requirements could result in substantial penalties and, perhaps more importantly, significant reputational damage.</p>
<h2><strong>Hong Kong</strong></h2>
<p>Our previous article listed a number of proposed amendments to Hong Kong’s Personal Data (Privacy) Ordinance (PDPO). On 29 September 2021, the Hong Kong Legislative Council passed an amendment bill which focusses largely on only one specific subject matter – ‘doxxing’. </p>
<p>Although there is no indication of when, it is expected that some of the other proposed amendments should form part of a larger package of amendments to the PDPO in the future. </p>
<p><strong>Amended PDPO</strong></p>
<p>The amendments to the PDPO took effect from 8 October 2021. They include provisions specifically aimed at combatting doxxing activities. Doxxing is the act of publishing private or identifying information about an individual on the internet, typically for malicious purposes – this has become more common in Hong Kong in recent years, including by protaganists on both sides of the Hong Kong protests. In Hong Kong, between June 2019 and April 2021, the Privacy Commissioner for Personal Data (PCPD) received around 6,000 complaints of doxxing-related activities.  </p>
<p>The new provisions fall into three categories:</p>
<ul>
    <li>the criminalisation of doxxing offences, with more severe sanctions where the doxxing caused actual harm to the victim(s) </li>
    <li>criminal investigation and prosecution powers for the PCPD in relation to such offences, and </li>
    <li>power for the PCPD to direct the removal of doxxing content and issue cessation notices with extra-territorial effect.  </li>
</ul>
<p><strong>Doxxing offences</strong></p>
<p>The new two-tier offences under Section 64 of the PDPO are as follows:</p>
<table style="width: 593px; height: 496px;">
    <tbody>
        <tr>
            <td><strong>OFFENCE</strong></td>
            <td><strong>PENALTY ON CONVICTION</strong></td>
        </tr>
        <tr>
            <td><strong>Section 64 (3A): A person commits an offence if they disclose personal data of a data subject without their consent, with an intent to cause specified harm to the data subject or any of their family members, or being reckless as to whether any specified harm would be or likely be caused</strong></td>
            <td>A fine of up to HK$100,000 and up to two years’ imprisonment</td>
        </tr>
        <tr>
            <td><strong>Section 64(3C): A person commits an offence if, in addition to the above, any specified harm is actually caused to the data subject or their family members</strong></td>
            <td>A fine of up to HK$1,000,000 and up to five years’ imprisonment</td>
        </tr>
    </tbody>
</table>
<p> </p>
<p>
“Specified harm” is defined quite broadly and includes pestering, harassment, molestation, threats or intimidation, physical harm, psychological harm, harm causing the person to be reasonably concerned for their safety or wellbeing, and damage to property. <br />
Applicable defences include: </p>
<ul>
    <li>a reasonable belief that the disclosure was necessary for preventing or detecting crime</li>
    <li>a reasonable belief that the data subject gave their consent to the disclosure</li>
    <li>a reasonable belief that disclosure was in the public interest and was made for news activity purposes, and </li>
    <li>where the disclosure was required or authorised by law or a court order. </li>
</ul>
<p><strong>PCPD powers to enforce, investigate and prosecute </strong></p>
<p>
Before the PDPO was amended, the PCPD was required to refer doxxing cases to the Hong Kong Police Force and the Department of Justice for investigation and prosecution. This delayed the handling of cases. Now, the PCPD itself can conduct its own investigations, and has the power to request relevant materials, documents and information and to stop, search and arrest without a warrant any person reasonably suspected of committing a doxxing offence. </p>
<p>The PCPD also has the power to initiate a prosecution in respect of summary offences at the Magistrates’ Court. </p>
<p>For more serious cases, the PCPD can still refer cases to the Hong Kong Police Force or the Department of Justice. </p>
<p>New provisions also empower the PCPD to issue cessation notices with extra-territorial effect to Hong Kong persons or non-Hong Kong service providers where there has been a disclosure of personal data of a data subject (who is either present in Hong Kong or a Hong Kong resident) via a written or electronic message without the data subject’s consent (meeting the elements of the first of the two-tier offences). This can be used to target social media users and, potentially, platforms.</p>
<p>The cessation notice may demand:</p>
<ul>
    <li>removal of the disclosure from the relevant platform, eg websites and mobile applications </li>
    <li>discontinuance of hosting services for whole or part of the platform on which the disclosure was made, or </li>
    <li>restriction of access to the disclosure or the relevant platform.</li>
</ul>
<p>
Failure to comply with a cessation notice may result in a fine of HK$50,000 and two years’ imprisonment on first conviction. On subsequent convictions, the fine may increase to HK$100,000. </p>
<p><strong>Comment</strong></p>
<p>The PCPD’s Implementation Guideline on the amended PDPO states that the new provisions target the disclosure of personal data without consent in a doxxing context only. However, the new two-tier offences adopt wide descriptions without mentioning the term ‘doxxing’ which could enable the PCPD to use the new investigative powers and offences more broadly, particularly since the PCPD’s power to request materials, documents and information appears not to be limited only to the new two-tier offences. </p>
<p>So far, though, the new provisions have been used only in the doxxing context for which they were intended. The PCPD arrested its first two suspects under the new doxxing provisions (for suspected breach of section 64(3A) PDPO) on 13 December 2021 following a victim’s complaint and on 26 April 2021. It conducted a joint operation with the Hong Kong Police Force on 11 May 2022 in which another person was arrested (for suspected breach of section 64(3C) PDPO), and issued its first doxxing charges on 20►May 2022 (against the first arrested suspect). </p>
<p>Between October 2021 and the end of February 2022, the PCPD issued “more than 460 cessation notices to 12 platforms to request the removal of over 2,400 doxxing messages”. </p>
<p>Beyond individuals, this has implications for both employers and services providers/online platforms:</p>
<ul>
    <li>employers should update their internal policies to reflect these changes, in particular to avoid an employee committing an offence of doxxing while working, which could subject the organisation to an investigation, and </li>
    <li>online service providers and social media companies should ensure that they are aware of the new provisions of the PDPO, and create a procedure for responding to and complying with any demand received from the PCPD. </li>
</ul>
<p>As it is an offence not to comply with an investigation, if in doubt, service providers and any companies receiving a demand or cessation notice should seek legal advice. </p>
<p>The PDPO continues to evolve. The 2021 amendments to the PDPO focussed on doxxing, while leaving other expected amendments such as mandatory data breach reporting and a power for the PCPD to impose direct administrative fines. The PCPD has confirmed, however, that she is working with the HKSAR Government to implement these and other amendments to the PDPO. The PDPC has also recently issued guidance on recommended model clauses for cross-border personal data transfers (see Hong Kong data protection: cross-border transfers of personal data). We will cover key developments in separate articles.</p>
<p>
The PCPD has also recently issued <a href="https://www.pcpd.org.hk//english/resources_centre/publications/files/guidance_model_contractual_clauses.pdf">Guidance</a> on Recommended Model Contractual Clauses for Cross-border Transfer of Personal Data. This Guidance note is explained in more detail in our <a href="https://www.rpc.co.uk/perspectives/data-and-privacy/hong-kong-data-protection-cross-border-transfers-of-personal-data/">previous article</a>.</p>
<h2>Singapore</h2>
<p>Our previous article listed the key amendments to Singapore’s Personal Data Protection Act (PDPA) which came into effect on 1 February 2021. As part of the update to the PDPA, follow-up amendments to the Personal Data Protection (Notification of Data Breaches) Regulations 2021 and Personal Data Protection Regulations 2021 have been made, taking effect on 1 October 2021. These include minor clarifications on what constitutes ‘significant harm’ for mandatory data breach reporting, ways organisations may provide the business contact information of their Data Protection Officers and defences for egregious mishandling of personal data. </p>
<p>The Advisory Guidelines on Enforcement of Data Protection Provisions indicate that the increased financial penalties will take effect on a further date to be notified, and no earlier than 1 February 2022. However, there is no update on when the Data Portability provisions will take effect, which will provide an avenue for individuals with an ongoing relationship with an organisation to request for their personal data to be transmitted in accordance with prescribed requirements to a receiving organisation. </p>
<p>We set out below some key updates in Singapore which occurred in the last 18 months. </p>
<p>
<br />
<strong>Cybersecurity </strong></p>
<p>The Cyber Security Agency of Singapore (CSA) announced, on 5 October 2021, the launch of the updated National Cybersecurity Strategy 2021. In particular, the <a href="https://www.csa.gov.sg/News/Publications/singapore-cybersecurity-strategy-2021">National Cybersecurity Strategy</a> explains Singapore’s plan to advance international norms and standards on cybersecurity in Singapore and to take a proactive stance against cyber threats. </p>
<p>The National Cybersecurity Strategy sets out the numerous ways in which Singapore (and businesses in Singapore) can adopt a robust infrastructure against cybersecurity threats. This is important in light of the increased levels of cyber activity that have been recorded in Singapore. As part of our cyber incident response service work, we have seen an increasing number of Singaporean companies become the targets of cyber incidents such as ransomware attacks. </p>
<p><strong>The first High Court PDPA case </strong></p>
<p>The Singapore High Court handed down its first ever decision under and on the scope of the PDPA on 25 May 2021. In Bellingham, Alex v Reed, Michael [2021] SGHC 125, the High Court considered the question of what constitutes “loss or damage”, the threshold requirement which data subjects need to satisfy to pursue a right of private action under PDPA.<br />
<br />
The High Court held that “loss or damage” must refer only to heads of loss or damage applicable to torts under common law – namely financial loss, damage to property and personal injury including psychiatric illness. Broader concepts of emotional harm (such as humiliation, loss of dignity, injury to feelings and distress) and/or loss of control over personal data are not covered. </p>
<p><strong>Comment</strong></p>
<p>The High Court’s decision to adopt a purposive and narrow interpretation of “loss or damage” lowers the potential litigation risk arising from private actions under the PDPA by affected data subjects. Data subjects must now prove that the misuse of personal data results in financial loss, damage to property and personal injury, such as psychiatric illness, in order to pursue a private action. <br />
Of particular importance is the High Court’s finding that the purpose of the PDPA was as much to enhance Singapore’s competitiveness and position as a trusted business hub as it was to safeguard individual personal data against misuse. The High Court also noted that the position in Singapore differed from the position in other jurisdictions, such as the EU, where the data protection frameworks were driven primarily by the need to recognise the right to privacy of data subjects.</p>
<h2><strong>Japan</strong></h2>
<p>Our previous article listed the key amendments to Japan’s Act on the Protection of Personal Information (APPI) which came into effect on 1 April 2022. That said, stricter financial sanctions had already come into effect, and transitional measures for providing personal data to third parties through an opt-out method had come into effect on 1 October 2021. </p>
<p>Through the latest changes, financial penalties have increased to a maximum fine of ¥100M (approx. USD755k) for companies, and individuals responsible for a breach of APPI may be subject to a fine of up to ¥1M (approx. USD7.5k) and up to a year in prison. </p>
<p>Furthermore, on 24 March 2021, the Cabinet of Japan issued an <a href="https://www.ppc.go.jp/files/pdf/Cabinet_Order.pdf">Order</a> to enforce the amended APPI and the Personal Information Protection Commission (PPC) issued <a href="https://www.ppc.go.jp/en/news/archives/2020/20200324/">Enforcement Rules</a> for the amended APPI. Together, these documents help to clarify the amended APPI provisions. For example, the Order has provided the following helpful explanations: </p>
<p><strong>data breach notification: </strong>the Order has clarified that a notification must be made to the PPC when a breach has or is likely to: (a) involve sensitive personal information; (b) risk property damage; (c) have been committed for an improper purpose, such as a cyberattack; or (d) effect more than 1,000 data subjects. A preliminary report must be made promptly after recognising the breach and a final report must be made within 30 days (or 60 days in the case of (c))</p>
<p><strong>pseudonymisation:</strong> the Order has set out processing standards for pseudonymised information (ie processing personal data so that it cannot be used to identify a data subject), which includes the deletion or replacement of the following: (a) descriptions that can identify specific individuals, such as names; (b) individual identification codes; and (c) descriptions that may cause property damage. </p>
<p><strong>Comment</strong></p>
<p>Companies conducting business in or with Japan should be mindful of the stringent nature of the amendments to APPI which will all come into effect in April 2022. Whilst the Order and Enforcement Rules are helpful for companies to understand their personal data obligations when providing goods and services in Japan or handling the personal data of data subjects in Japan, companies should seek legal advice from Japanese counsel if they have any specific queries.  </p>
<h2>Taiwan</h2>
<p>Following our last article, there have been no further updates on the proposed amendments to Taiwan’s Personal Data Protection Act (PDPA) and Cybersecurity Act (CSA). Due to the COVID-19 pandemic, the Legislative Yuan’s review of both Acts has been on hold. </p>
<p>On 25 May 2021, the Personal Data Protection Office (PDPO) announced that Adequacy talks were still active between Taiwan and the EU. Therefore, as part of Taiwan’s pursuit of an Adequacy Decision from the EU, businesses in Taiwan should expect amendments to the Acts to be announced this year. It is expected that the legislative process to amend the Acts will reconvene in the early months of this year.</p>
<h2>Mainland China</h2>
<p>This article cannot conclude without mentioning the most significant development seen in Asian data protection legislation in the last 12 months – Mainland China’s new Personal Information Protection Law. </p>
<p>In 2021, the National People’s Congress of the PRC passed the Data Security Law (DSL) and the Personal Information Protection Law (PIPL). Along with the Cyber Security Law (CSL), which was enacted in 2016, the three pieces of Chinese legislation present the three pillars of Mainland China’s data protection system which forms an overarching framework for governing data processing and cybersecurity issues. </p>
<p><strong>PIPL</strong></p>
<p>PIPL received a lot of attention around the time it came into effect on 1 November 2021, and with good reason. PIPL provides a robust data protection system which is similar in many ways to the EU’s GDPR. Of particular importance to multi-national corporates, PIPL has extra-territorial effect.  </p>
<p>Our key takeaways from PIPL are as follows:</p>
<p><strong>extra-territoriality: </strong>PIPL applies to companies that process the personal information of Mainland Chinese individuals inside or outside of Mainland China for the purposes of offering products or services to them or analysing and assessing their behaviour. Article 3 of PIPL is very similar to Article 3 of GDPR, both of which set out the extent of their extra-territorial application</p>
<p><strong>more rights for data subjects:</strong> PIPL provides more rights for data subjects and appears to emphasise the need for consent before processing personal information. PIPL requires personal information to be processed under one of seven legal bases, which include where the individual has voluntarily and explicitly provided consent to such processing, and where it is necessary to conduct human resources management in an employment context. Separate consent from data subjects must also be obtained when processing sensitive personal information such as biometric data, medical and health data and financial accounts. Data subjects have the right to access and copy their personal information, correct and delete personal information, restrict or refuse the processing of their personal information, and find out the ways in which their personal information is being used. Data subjects can also opt out of targeted marketing, including push notifications and pop-ups</p>
<p><strong>restrictions on cross-border transfers of data:</strong> PIPL stipulates that firms with critical information infrastructure and large amounts of personal information must store this data within Mainland China. If they wish to transfer it out of Mainland China, they will first need separate consent from individuals. Then, they will have to meet certain requirements, such as passing a security assessment of the state cyberspace authority and obtaining the required certification, or entering into a standard contract with the overseas recipient of the data (which will be made available by the cyberspace authority in due course) </p>
<p><strong>sanctions/penalties: </strong>companies that contravene PIPL may face a maximum fine of RMB 50m (about HK$60m) or 5% of their annual turnover. Other penalties can include suspension of operation or loss of license. Individuals responsible for a breach may also be subject to a fine of up to RMB 100,000 (about HK$120,000). Other penalties can include disqualification from acting as a director, supervisor, senior manager or data protection officer. </p>
<p><strong>Comment</strong></p>
<p>When PIPL came into effect, it was still subject to implementing regulations that had not been issued. Some of those are still awaited. PIPL therefore presents both uncertainty and an aspirational challenge to companies – the Chinese authorities will expect companies to work towards complying with PIPL while the precise implementing rules are finalised. In the context of personal data, however, it can often be cumbersome to change data compliance and governance processes once they have been implemented. </p>
<p>Companies with businesses or customers in Mainland China need to consider the impact of the new legislation on their operations and data processing activities. Due to the extra-territorial effect of PIPL, companies outside Mainland China that are impacted by the law should already have taken or be taking appropriate steps towards compliance. In many cases, companies may need to conduct a full review of their data processes in order to make the changes necessary to comply with this new ‘Chinese GDPR’. </p>
<p>Given the business ties between China and many countries around the world, the new law will pose challenges for many businesses around the globe, particularly those in the retail and e-commerce sector which collect and process consumer data. That said, businesses which already comply with the EU’s GDPR should be used to data consolidation and compliance projects and may not need to alter too many of their processes and practices. </p>
<p>Given the potential financial penalties for non-compliance, businesses in any doubt should at least try to comply and seek legal advice from PRC counsel (to whom we would be happy to make introductions).</p>
<h2>Conclusion</h2>
<p>The costs of data security compliance are part of the modern-day cost of doing business. In the same way that businesses are required to comply with anti-corruption standards and labour rights, data protection is now firmly another spoke to the wheel of operating in the any market, including in Asia. </p>
<p>This article provides just a short summary of recent changes in a handful of Asian jurisdictions. The laws in many Asian jurisdictions continue to change regularly. </p>
<p>As data protection regimes continue to change, with more onerous data protection obligations, it will become important for multi-national corporations to keep abreast of key developments or to face the risk of significant financial penalties (and perhaps more costly reputational damage). </p>
<p>We will continue to follow the legislative developments and provide further updates on key changes in the future.</p>
<p>
RPC frequently advises its clients on all aspects of data privacy and cyber security matters – please do get in touch with us if you would like to discuss how we can help.</p>]]></description><pubDate>Tue, 19 Jul 2022 10:00:00 +0100</pubDate><category>Data and privacy</category><authors:names>Jonathan Crompton, Yuankai Lin</authors:names><content:encoded><![CDATA[<p>This update follows on from our original article <a href="https://www.rpc.co.uk/perspectives/data-and-privacy/upcoming-changes-to-data-protection-legislation-in-asia/">Upcoming changes to data protection legislation in Asia</a>. </p>
<p>Looking back on the last 18 months, the data privacy laws of several Asian jurisdictions have been updated to incorporate stronger protections for individuals’ personal data. This article provides an update on a handful of jurisdictions in Asia and summarises some of those main changes, including the far-reaching implications of the new data protection law in Mainland China. </p>
<p><strong>Introduction</strong></p>
<p>Many jurisdictions in Asia are in the process of updating, or have already updated, their data protection regimes. Many of these changes were expected developments following a lengthy period of legislative debate, as a part of incremental steps towards strengthening data protection. For example, in Hong Kong, the Personal Data (Privacy) Ordinance has been amended include new provisions regarding ‘doxxing’. </p>
<p>Other jurisdictions have made more wholescale changes which represent a shakeup of the data protection regime, with both territorial and extra-territorial effects. For example, the Personal Information Protection Law in Mainland China, which came into effect on 1 November 2021, appears to reflect the European GDPR in its commitments to data protection and introduces a new standard for data protection – it also has broad extra-territorial application.</p>
<p>This article provides a brief overview of some of the key changes made, or expected shortly, in Hong Kong, Singapore, Japan, Taiwan and Mainland China. </p>
<p>Organisations operating in Asian markets will need to assess the impact of these changes on their businesses and take steps to ensure compliance. The data protection regimes in Asia are catching up to the GDPR in the EU, although there is no common data protection regime. Asian jurisdictions protect data differently, but increasingly with greater care and greater pro-active steps needed by those who use and process data. Failure to adhere to these stricter requirements could result in substantial penalties and, perhaps more importantly, significant reputational damage.</p>
<h2><strong>Hong Kong</strong></h2>
<p>Our previous article listed a number of proposed amendments to Hong Kong’s Personal Data (Privacy) Ordinance (PDPO). On 29 September 2021, the Hong Kong Legislative Council passed an amendment bill which focusses largely on only one specific subject matter – ‘doxxing’. </p>
<p>Although there is no indication of when, it is expected that some of the other proposed amendments should form part of a larger package of amendments to the PDPO in the future. </p>
<p><strong>Amended PDPO</strong></p>
<p>The amendments to the PDPO took effect from 8 October 2021. They include provisions specifically aimed at combatting doxxing activities. Doxxing is the act of publishing private or identifying information about an individual on the internet, typically for malicious purposes – this has become more common in Hong Kong in recent years, including by protaganists on both sides of the Hong Kong protests. In Hong Kong, between June 2019 and April 2021, the Privacy Commissioner for Personal Data (PCPD) received around 6,000 complaints of doxxing-related activities.  </p>
<p>The new provisions fall into three categories:</p>
<ul>
    <li>the criminalisation of doxxing offences, with more severe sanctions where the doxxing caused actual harm to the victim(s) </li>
    <li>criminal investigation and prosecution powers for the PCPD in relation to such offences, and </li>
    <li>power for the PCPD to direct the removal of doxxing content and issue cessation notices with extra-territorial effect.  </li>
</ul>
<p><strong>Doxxing offences</strong></p>
<p>The new two-tier offences under Section 64 of the PDPO are as follows:</p>
<table style="width: 593px; height: 496px;">
    <tbody>
        <tr>
            <td><strong>OFFENCE</strong></td>
            <td><strong>PENALTY ON CONVICTION</strong></td>
        </tr>
        <tr>
            <td><strong>Section 64 (3A): A person commits an offence if they disclose personal data of a data subject without their consent, with an intent to cause specified harm to the data subject or any of their family members, or being reckless as to whether any specified harm would be or likely be caused</strong></td>
            <td>A fine of up to HK$100,000 and up to two years’ imprisonment</td>
        </tr>
        <tr>
            <td><strong>Section 64(3C): A person commits an offence if, in addition to the above, any specified harm is actually caused to the data subject or their family members</strong></td>
            <td>A fine of up to HK$1,000,000 and up to five years’ imprisonment</td>
        </tr>
    </tbody>
</table>
<p> </p>
<p>
“Specified harm” is defined quite broadly and includes pestering, harassment, molestation, threats or intimidation, physical harm, psychological harm, harm causing the person to be reasonably concerned for their safety or wellbeing, and damage to property. <br />
Applicable defences include: </p>
<ul>
    <li>a reasonable belief that the disclosure was necessary for preventing or detecting crime</li>
    <li>a reasonable belief that the data subject gave their consent to the disclosure</li>
    <li>a reasonable belief that disclosure was in the public interest and was made for news activity purposes, and </li>
    <li>where the disclosure was required or authorised by law or a court order. </li>
</ul>
<p><strong>PCPD powers to enforce, investigate and prosecute </strong></p>
<p>
Before the PDPO was amended, the PCPD was required to refer doxxing cases to the Hong Kong Police Force and the Department of Justice for investigation and prosecution. This delayed the handling of cases. Now, the PCPD itself can conduct its own investigations, and has the power to request relevant materials, documents and information and to stop, search and arrest without a warrant any person reasonably suspected of committing a doxxing offence. </p>
<p>The PCPD also has the power to initiate a prosecution in respect of summary offences at the Magistrates’ Court. </p>
<p>For more serious cases, the PCPD can still refer cases to the Hong Kong Police Force or the Department of Justice. </p>
<p>New provisions also empower the PCPD to issue cessation notices with extra-territorial effect to Hong Kong persons or non-Hong Kong service providers where there has been a disclosure of personal data of a data subject (who is either present in Hong Kong or a Hong Kong resident) via a written or electronic message without the data subject’s consent (meeting the elements of the first of the two-tier offences). This can be used to target social media users and, potentially, platforms.</p>
<p>The cessation notice may demand:</p>
<ul>
    <li>removal of the disclosure from the relevant platform, eg websites and mobile applications </li>
    <li>discontinuance of hosting services for whole or part of the platform on which the disclosure was made, or </li>
    <li>restriction of access to the disclosure or the relevant platform.</li>
</ul>
<p>
Failure to comply with a cessation notice may result in a fine of HK$50,000 and two years’ imprisonment on first conviction. On subsequent convictions, the fine may increase to HK$100,000. </p>
<p><strong>Comment</strong></p>
<p>The PCPD’s Implementation Guideline on the amended PDPO states that the new provisions target the disclosure of personal data without consent in a doxxing context only. However, the new two-tier offences adopt wide descriptions without mentioning the term ‘doxxing’ which could enable the PCPD to use the new investigative powers and offences more broadly, particularly since the PCPD’s power to request materials, documents and information appears not to be limited only to the new two-tier offences. </p>
<p>So far, though, the new provisions have been used only in the doxxing context for which they were intended. The PCPD arrested its first two suspects under the new doxxing provisions (for suspected breach of section 64(3A) PDPO) on 13 December 2021 following a victim’s complaint and on 26 April 2021. It conducted a joint operation with the Hong Kong Police Force on 11 May 2022 in which another person was arrested (for suspected breach of section 64(3C) PDPO), and issued its first doxxing charges on 20►May 2022 (against the first arrested suspect). </p>
<p>Between October 2021 and the end of February 2022, the PCPD issued “more than 460 cessation notices to 12 platforms to request the removal of over 2,400 doxxing messages”. </p>
<p>Beyond individuals, this has implications for both employers and services providers/online platforms:</p>
<ul>
    <li>employers should update their internal policies to reflect these changes, in particular to avoid an employee committing an offence of doxxing while working, which could subject the organisation to an investigation, and </li>
    <li>online service providers and social media companies should ensure that they are aware of the new provisions of the PDPO, and create a procedure for responding to and complying with any demand received from the PCPD. </li>
</ul>
<p>As it is an offence not to comply with an investigation, if in doubt, service providers and any companies receiving a demand or cessation notice should seek legal advice. </p>
<p>The PDPO continues to evolve. The 2021 amendments to the PDPO focussed on doxxing, while leaving other expected amendments such as mandatory data breach reporting and a power for the PCPD to impose direct administrative fines. The PCPD has confirmed, however, that she is working with the HKSAR Government to implement these and other amendments to the PDPO. The PDPC has also recently issued guidance on recommended model clauses for cross-border personal data transfers (see Hong Kong data protection: cross-border transfers of personal data). We will cover key developments in separate articles.</p>
<p>
The PCPD has also recently issued <a href="https://www.pcpd.org.hk//english/resources_centre/publications/files/guidance_model_contractual_clauses.pdf">Guidance</a> on Recommended Model Contractual Clauses for Cross-border Transfer of Personal Data. This Guidance note is explained in more detail in our <a href="https://www.rpc.co.uk/perspectives/data-and-privacy/hong-kong-data-protection-cross-border-transfers-of-personal-data/">previous article</a>.</p>
<h2>Singapore</h2>
<p>Our previous article listed the key amendments to Singapore’s Personal Data Protection Act (PDPA) which came into effect on 1 February 2021. As part of the update to the PDPA, follow-up amendments to the Personal Data Protection (Notification of Data Breaches) Regulations 2021 and Personal Data Protection Regulations 2021 have been made, taking effect on 1 October 2021. These include minor clarifications on what constitutes ‘significant harm’ for mandatory data breach reporting, ways organisations may provide the business contact information of their Data Protection Officers and defences for egregious mishandling of personal data. </p>
<p>The Advisory Guidelines on Enforcement of Data Protection Provisions indicate that the increased financial penalties will take effect on a further date to be notified, and no earlier than 1 February 2022. However, there is no update on when the Data Portability provisions will take effect, which will provide an avenue for individuals with an ongoing relationship with an organisation to request for their personal data to be transmitted in accordance with prescribed requirements to a receiving organisation. </p>
<p>We set out below some key updates in Singapore which occurred in the last 18 months. </p>
<p>
<br />
<strong>Cybersecurity </strong></p>
<p>The Cyber Security Agency of Singapore (CSA) announced, on 5 October 2021, the launch of the updated National Cybersecurity Strategy 2021. In particular, the <a href="https://www.csa.gov.sg/News/Publications/singapore-cybersecurity-strategy-2021">National Cybersecurity Strategy</a> explains Singapore’s plan to advance international norms and standards on cybersecurity in Singapore and to take a proactive stance against cyber threats. </p>
<p>The National Cybersecurity Strategy sets out the numerous ways in which Singapore (and businesses in Singapore) can adopt a robust infrastructure against cybersecurity threats. This is important in light of the increased levels of cyber activity that have been recorded in Singapore. As part of our cyber incident response service work, we have seen an increasing number of Singaporean companies become the targets of cyber incidents such as ransomware attacks. </p>
<p><strong>The first High Court PDPA case </strong></p>
<p>The Singapore High Court handed down its first ever decision under and on the scope of the PDPA on 25 May 2021. In Bellingham, Alex v Reed, Michael [2021] SGHC 125, the High Court considered the question of what constitutes “loss or damage”, the threshold requirement which data subjects need to satisfy to pursue a right of private action under PDPA.<br />
<br />
The High Court held that “loss or damage” must refer only to heads of loss or damage applicable to torts under common law – namely financial loss, damage to property and personal injury including psychiatric illness. Broader concepts of emotional harm (such as humiliation, loss of dignity, injury to feelings and distress) and/or loss of control over personal data are not covered. </p>
<p><strong>Comment</strong></p>
<p>The High Court’s decision to adopt a purposive and narrow interpretation of “loss or damage” lowers the potential litigation risk arising from private actions under the PDPA by affected data subjects. Data subjects must now prove that the misuse of personal data results in financial loss, damage to property and personal injury, such as psychiatric illness, in order to pursue a private action. <br />
Of particular importance is the High Court’s finding that the purpose of the PDPA was as much to enhance Singapore’s competitiveness and position as a trusted business hub as it was to safeguard individual personal data against misuse. The High Court also noted that the position in Singapore differed from the position in other jurisdictions, such as the EU, where the data protection frameworks were driven primarily by the need to recognise the right to privacy of data subjects.</p>
<h2><strong>Japan</strong></h2>
<p>Our previous article listed the key amendments to Japan’s Act on the Protection of Personal Information (APPI) which came into effect on 1 April 2022. That said, stricter financial sanctions had already come into effect, and transitional measures for providing personal data to third parties through an opt-out method had come into effect on 1 October 2021. </p>
<p>Through the latest changes, financial penalties have increased to a maximum fine of ¥100M (approx. USD755k) for companies, and individuals responsible for a breach of APPI may be subject to a fine of up to ¥1M (approx. USD7.5k) and up to a year in prison. </p>
<p>Furthermore, on 24 March 2021, the Cabinet of Japan issued an <a href="https://www.ppc.go.jp/files/pdf/Cabinet_Order.pdf">Order</a> to enforce the amended APPI and the Personal Information Protection Commission (PPC) issued <a href="https://www.ppc.go.jp/en/news/archives/2020/20200324/">Enforcement Rules</a> for the amended APPI. Together, these documents help to clarify the amended APPI provisions. For example, the Order has provided the following helpful explanations: </p>
<p><strong>data breach notification: </strong>the Order has clarified that a notification must be made to the PPC when a breach has or is likely to: (a) involve sensitive personal information; (b) risk property damage; (c) have been committed for an improper purpose, such as a cyberattack; or (d) effect more than 1,000 data subjects. A preliminary report must be made promptly after recognising the breach and a final report must be made within 30 days (or 60 days in the case of (c))</p>
<p><strong>pseudonymisation:</strong> the Order has set out processing standards for pseudonymised information (ie processing personal data so that it cannot be used to identify a data subject), which includes the deletion or replacement of the following: (a) descriptions that can identify specific individuals, such as names; (b) individual identification codes; and (c) descriptions that may cause property damage. </p>
<p><strong>Comment</strong></p>
<p>Companies conducting business in or with Japan should be mindful of the stringent nature of the amendments to APPI which will all come into effect in April 2022. Whilst the Order and Enforcement Rules are helpful for companies to understand their personal data obligations when providing goods and services in Japan or handling the personal data of data subjects in Japan, companies should seek legal advice from Japanese counsel if they have any specific queries.  </p>
<h2>Taiwan</h2>
<p>Following our last article, there have been no further updates on the proposed amendments to Taiwan’s Personal Data Protection Act (PDPA) and Cybersecurity Act (CSA). Due to the COVID-19 pandemic, the Legislative Yuan’s review of both Acts has been on hold. </p>
<p>On 25 May 2021, the Personal Data Protection Office (PDPO) announced that Adequacy talks were still active between Taiwan and the EU. Therefore, as part of Taiwan’s pursuit of an Adequacy Decision from the EU, businesses in Taiwan should expect amendments to the Acts to be announced this year. It is expected that the legislative process to amend the Acts will reconvene in the early months of this year.</p>
<h2>Mainland China</h2>
<p>This article cannot conclude without mentioning the most significant development seen in Asian data protection legislation in the last 12 months – Mainland China’s new Personal Information Protection Law. </p>
<p>In 2021, the National People’s Congress of the PRC passed the Data Security Law (DSL) and the Personal Information Protection Law (PIPL). Along with the Cyber Security Law (CSL), which was enacted in 2016, the three pieces of Chinese legislation present the three pillars of Mainland China’s data protection system which forms an overarching framework for governing data processing and cybersecurity issues. </p>
<p><strong>PIPL</strong></p>
<p>PIPL received a lot of attention around the time it came into effect on 1 November 2021, and with good reason. PIPL provides a robust data protection system which is similar in many ways to the EU’s GDPR. Of particular importance to multi-national corporates, PIPL has extra-territorial effect.  </p>
<p>Our key takeaways from PIPL are as follows:</p>
<p><strong>extra-territoriality: </strong>PIPL applies to companies that process the personal information of Mainland Chinese individuals inside or outside of Mainland China for the purposes of offering products or services to them or analysing and assessing their behaviour. Article 3 of PIPL is very similar to Article 3 of GDPR, both of which set out the extent of their extra-territorial application</p>
<p><strong>more rights for data subjects:</strong> PIPL provides more rights for data subjects and appears to emphasise the need for consent before processing personal information. PIPL requires personal information to be processed under one of seven legal bases, which include where the individual has voluntarily and explicitly provided consent to such processing, and where it is necessary to conduct human resources management in an employment context. Separate consent from data subjects must also be obtained when processing sensitive personal information such as biometric data, medical and health data and financial accounts. Data subjects have the right to access and copy their personal information, correct and delete personal information, restrict or refuse the processing of their personal information, and find out the ways in which their personal information is being used. Data subjects can also opt out of targeted marketing, including push notifications and pop-ups</p>
<p><strong>restrictions on cross-border transfers of data:</strong> PIPL stipulates that firms with critical information infrastructure and large amounts of personal information must store this data within Mainland China. If they wish to transfer it out of Mainland China, they will first need separate consent from individuals. Then, they will have to meet certain requirements, such as passing a security assessment of the state cyberspace authority and obtaining the required certification, or entering into a standard contract with the overseas recipient of the data (which will be made available by the cyberspace authority in due course) </p>
<p><strong>sanctions/penalties: </strong>companies that contravene PIPL may face a maximum fine of RMB 50m (about HK$60m) or 5% of their annual turnover. Other penalties can include suspension of operation or loss of license. Individuals responsible for a breach may also be subject to a fine of up to RMB 100,000 (about HK$120,000). Other penalties can include disqualification from acting as a director, supervisor, senior manager or data protection officer. </p>
<p><strong>Comment</strong></p>
<p>When PIPL came into effect, it was still subject to implementing regulations that had not been issued. Some of those are still awaited. PIPL therefore presents both uncertainty and an aspirational challenge to companies – the Chinese authorities will expect companies to work towards complying with PIPL while the precise implementing rules are finalised. In the context of personal data, however, it can often be cumbersome to change data compliance and governance processes once they have been implemented. </p>
<p>Companies with businesses or customers in Mainland China need to consider the impact of the new legislation on their operations and data processing activities. Due to the extra-territorial effect of PIPL, companies outside Mainland China that are impacted by the law should already have taken or be taking appropriate steps towards compliance. In many cases, companies may need to conduct a full review of their data processes in order to make the changes necessary to comply with this new ‘Chinese GDPR’. </p>
<p>Given the business ties between China and many countries around the world, the new law will pose challenges for many businesses around the globe, particularly those in the retail and e-commerce sector which collect and process consumer data. That said, businesses which already comply with the EU’s GDPR should be used to data consolidation and compliance projects and may not need to alter too many of their processes and practices. </p>
<p>Given the potential financial penalties for non-compliance, businesses in any doubt should at least try to comply and seek legal advice from PRC counsel (to whom we would be happy to make introductions).</p>
<h2>Conclusion</h2>
<p>The costs of data security compliance are part of the modern-day cost of doing business. In the same way that businesses are required to comply with anti-corruption standards and labour rights, data protection is now firmly another spoke to the wheel of operating in the any market, including in Asia. </p>
<p>This article provides just a short summary of recent changes in a handful of Asian jurisdictions. The laws in many Asian jurisdictions continue to change regularly. </p>
<p>As data protection regimes continue to change, with more onerous data protection obligations, it will become important for multi-national corporations to keep abreast of key developments or to face the risk of significant financial penalties (and perhaps more costly reputational damage). </p>
<p>We will continue to follow the legislative developments and provide further updates on key changes in the future.</p>
<p>
RPC frequently advises its clients on all aspects of data privacy and cyber security matters – please do get in touch with us if you would like to discuss how we can help.</p>]]></content:encoded></item><item><guid isPermaLink="false">{8AF954FC-453D-4701-BDE9-139E565671A6}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/cyber-bytes-issue-42/</link><title>Cyber_Bytes - Issue 42</title><description><![CDATA[<p><strong>Another go at Misuse of Private Information - Smith and Others v TalkTalk [2022] EWHC 1311 (QB)</strong></p>
<p>The Claimants issued proceedings against TalkTalk following data breaches in 2014 and 2015, alleging that their personal data was obtained from TalkTalk's IT systems by unknown criminal third parties and then used for fraudulent purposes. They claimed compensation for breach of statutory duty under the Data Protection Act 1998 and damages for the tort of misuse of private information.</p>
<p>The judgment followed the ruling in Warren v DSG Retail Limited, which held that claims were not viable in negligence or misuse of private information where the defendant had not committed any voluntary action leading to the loss of confidentiality in the data.</p>
<p>The Claimants attempted to distinguish Smith from Warren by framing TalkTalk's conduct as positive acts rather than a series of failures. But, as Saini J put it, this argument constituted "a negligence action masquerading as a claim for misuse of private information." Ultimately, it was held that the misuse of private information occurred as a result of the actions of a criminal third party and not TalkTalk.</p>
<p>Nevertheless, in a more concerning development, Saini J dismissed the "unconfirmed breaches" strike out application. Certain Claimants could not determine if they were affected by the 2014 or 2015 breaches or some other breach. However, it was held to be a permissible deduction that, if the personal information used by the scammers was not obtained in the 2014 or 2015 breaches, the trigger may have been some other unlawful accessing of TalkTalk's systems. Even though disclosure could be complex and cumbersome, Saini J refused to strike out the claim.</p>
<p>This decision is a welcome re-iteration of Warren as it relates to misuse of private information. However, it does also show as willingness by the Court to show leniency in data protection pleadings where the Claimants can only infer the occurrence of a breach.</p>
<p>Click <a href="https://www.bailii.org/ew/cases/EWHC/QB/2022/1311.html">here</a> to read the High Court judgment from Bailii.</p>
<p><strong>ICO funding update: Fine income retention agreement</strong></p>
<p>The ICO has announced they will now be able to retain up to £7.5 million per financial year of funds raised through civil monetary policy notices. When issuing a civil monetary policy notice, the ICO will be able to use funds to cover pre-agreed, specific and externally audited litigation costs.</p>
<p>The justification for the agreement has been said to be the increasing quantity and complexity of claims within the digital age. The additional funding will allow the ICO to maintain the technical and legal capacity needed to deal with ongoing and future matters. This change has been agreed to by the Department for Culture, Media and Sports and HM Treasury.</p>
<p>The ICO will be subject to auditing by the National Audit Office each year to ensure that these funds are only recovered where appropriate, and the ICO will report fines and associated costs in its Annual Report and to HM Treasury.</p>
<p>The ICO have called this measure an "appropriate and proportionate regulatory action" and the new funding could help the ICO turn its attention to bigger fish rather than the five-figure PECR fines which have characterised much of its enforcement activity in recent times.</p>
<p>Click <a href="https://ico.org.uk/about-the-ico/media-centre/news-and-blogs/2022/06/ico-funding-update-fine-income-retention-agreement/">here</a> to read the full article as published by the ICO.</p>
<p><strong>Right of access extends to identification of specific recipients to whom personal data are disclosed (AG's opinion)</strong></p>
<p>In RW v Österreichische Post AG, it was determined that a data subject's right of access to information extends to the identification of any recipients of their personal data.</p>
<p>RW made a subject access request to the Österreichische Post (OP), Austria's main postal service, to identify which third parties had received data pertaining to RW from OP. OP provided descriptions of categories of recipients, as well as general information about data sharing, but did not identify specific parties.</p>
<p>Advocate General Pitruzzella (AG) noted that the wording of Article 15(1)(c), GDPR afforded a right to "recipients or categories" and that it was not for the data controller to decide which details to provide the data subject with. Further, Recital 63 of the GDPR provides that data subjects "have the right to know and obtain communication […] with regard to […] the recipients of the personal data".</p>
<p>OP was not in a position to limit RW's right of access to information with respect to their personal data and therefore should have provided specific identification upon request. RW had the right to ensure the lawful use and receipt of its data and to be aware of the ways in which it was being processed.</p>
<p>This ruling clarifies the type of information that data subjects will be entitled to receive from data controllers upon the lodging of a data subject access request. This is an important decision which clarifies data controllers' obligations towards data subjects when similar requests are made.</p>
<p>Click <a href="https://curia.europa.eu/juris/document/document.jsf?docid=260543&doclang=EN">here</a> to read the full opinion of Advocate Pitruzzella from InfoCuria.</p>
<p><strong>People’s Republic of China State-Sponsored Cyber Actors Exploit Network Providers and Devices</strong></p>
<p>The National Security Agency (NSA), Federal Bureau of Investigation and Cybersecurity and Infrastructure Security Agency (CISA) have co-authorised a Cybersecurity Advisory detailing how state-sponsored actors of the People's Republic of China (PRC) have engaged in the worldwide targeting of telecommunications companies and network service providers.</p>
<p>PRC cyber actors are known to have participated in the exploitation of publicly identified vulnerabilities. These allow actors to gain access to victims' accounts through publicly available exploit codes. These actors have also been observed to adapt their tactics by monitoring network defenders to continue their systems exploitations undetected.</p>
<p>Known vulnerabilities are exploited through the employing of open-source tools, such as specific software frameworks, to uncover access to small office / home office routers. The actors then leverage these exploitations to identify critical infrastructures, gaining user passwords and access to administrative accounts.</p>
<p>Organisations are encouraged to take mitigating actions such as updating and patching systems/ products, using multi factor authentication, strict password requirements and robust logging and review of network access.</p>
<p>Click <a href="https://www.cisa.gov/uscert/ncas/alerts/aa22-158a">here</a> to read the full article published by the Cybersecurity & Infrastructure Security Agency.</p>
<p><strong>Qatar bolsters cyber security in preparation for World Cup</strong></p>
<p>As Qatar prepares to host the 2022 FIFA World Cup, experts are anticipating cyber security issues to arise as a result of wider infrastructure and digital demands. From ticketing to hotels and restaurants, there will be an influx of foreign personal and financial data. Hackers will be hoping to gain the benefit of this data through fake bookings and phishing attempts.</p>
<p>As this is the first event of its kind taking place in Qatar, many have doubts regarding the state's capacity for cyber security defence. Qatar is being faced with a highly concentrated challenge in handling an estimated total of 1.5 million visitors. Interpol hosted cyber security experts on 25 March to analyse potential threats the event would create as part of the wider 'Project Stadia', the Qatar funded security programme.</p>
<p>Qatar will also partner with Morocco, which will be sending a team of cyber security experts to assist with Qatar's existing defences, such as the National Cyber Security Agency (established in 2021). To date, the agency has trained 25,000 employees in aspects of information security and has expressed interest in partnering with global organisations.</p>
<p>Click <a href="https://www.computerweekly.com/news/252521418/Qatar-bolsters-cyber-security-in-preparation-for-World-Cup">here</a> to read the full article published by ComputerWeekly.com.</p>
<p><strong>How Cyber Criminals Target Cryptocurrency</strong></p>
<p>The nature of cryptocurrency lends itself to targeting by cyber criminals. Its inherent anonymity and lack of centralised regulation makes cryptocurrency a practical target and medium of exchange.</p>
<p>Researchers have observed a variety of threats, such as traditional fraud targeting individuals and organisations to facilitate storage and transfer of cryptocurrency. The total reported value of cryptocurrency lost due to cybercrime was reported to be around $14 billion in 2021.</p>
<p>Phishing campaigns that target or utilise cryptocurrency can be broken down into three main categories:</p>
<ul>
    <li>Credential Harvesting – This is typically a URL sent to the potential victim leading to a false landing page, designed to imitate a popular website. This prompts the user to input log-in information or recovery phrases ultimately giving the cyber actor access to their account.</li>
    <li>Cryptocurrency Transfer Solicitation – This is a popular and more traditional form of cybercrime where the threat actor attempts to extort funds from the victim through social engineering. For example, the actor may claim to have sensitive data, pretend to be a business or claim to be collecting for charity. Cryptocurrency is commonly used as the means of transferring these funds due to its anonymity.</li>
    <li>Specific Targeting of Cryptocurrency Data – Malware that targets user data (such as passwords or financial information) has been adapted to target and monitor cryptocurrency activity. These typically fall under the malware family of 'infostealers' that log user inputs, take screenshots and search data for sensitive files.</li>
</ul>
<p>As an industry of growing interest, it is important to be well-informed of the threats arising from social engineering, exploitation and malware.</p>
<p>Click <a href="https://www.proofpoint.com/us/blog/threat-insight/how-cyber-criminals-target-cryptocurrency">here</a> to read the full article published by Proofpoint.</p>]]></description><pubDate>Wed, 06 Jul 2022 12:04:43 +0100</pubDate><category>Data and privacy</category><authors:names>Richard Breavington, Daniel Guilfoyle, Ian Dinning, Rachel Ford, Christopher Ashton, Elizabeth Zang, Emanuele Santella </authors:names><content:encoded><![CDATA[<p><strong>Another go at Misuse of Private Information - Smith and Others v TalkTalk [2022] EWHC 1311 (QB)</strong></p>
<p>The Claimants issued proceedings against TalkTalk following data breaches in 2014 and 2015, alleging that their personal data was obtained from TalkTalk's IT systems by unknown criminal third parties and then used for fraudulent purposes. They claimed compensation for breach of statutory duty under the Data Protection Act 1998 and damages for the tort of misuse of private information.</p>
<p>The judgment followed the ruling in Warren v DSG Retail Limited, which held that claims were not viable in negligence or misuse of private information where the defendant had not committed any voluntary action leading to the loss of confidentiality in the data.</p>
<p>The Claimants attempted to distinguish Smith from Warren by framing TalkTalk's conduct as positive acts rather than a series of failures. But, as Saini J put it, this argument constituted "a negligence action masquerading as a claim for misuse of private information." Ultimately, it was held that the misuse of private information occurred as a result of the actions of a criminal third party and not TalkTalk.</p>
<p>Nevertheless, in a more concerning development, Saini J dismissed the "unconfirmed breaches" strike out application. Certain Claimants could not determine if they were affected by the 2014 or 2015 breaches or some other breach. However, it was held to be a permissible deduction that, if the personal information used by the scammers was not obtained in the 2014 or 2015 breaches, the trigger may have been some other unlawful accessing of TalkTalk's systems. Even though disclosure could be complex and cumbersome, Saini J refused to strike out the claim.</p>
<p>This decision is a welcome re-iteration of Warren as it relates to misuse of private information. However, it does also show as willingness by the Court to show leniency in data protection pleadings where the Claimants can only infer the occurrence of a breach.</p>
<p>Click <a href="https://www.bailii.org/ew/cases/EWHC/QB/2022/1311.html">here</a> to read the High Court judgment from Bailii.</p>
<p><strong>ICO funding update: Fine income retention agreement</strong></p>
<p>The ICO has announced they will now be able to retain up to £7.5 million per financial year of funds raised through civil monetary policy notices. When issuing a civil monetary policy notice, the ICO will be able to use funds to cover pre-agreed, specific and externally audited litigation costs.</p>
<p>The justification for the agreement has been said to be the increasing quantity and complexity of claims within the digital age. The additional funding will allow the ICO to maintain the technical and legal capacity needed to deal with ongoing and future matters. This change has been agreed to by the Department for Culture, Media and Sports and HM Treasury.</p>
<p>The ICO will be subject to auditing by the National Audit Office each year to ensure that these funds are only recovered where appropriate, and the ICO will report fines and associated costs in its Annual Report and to HM Treasury.</p>
<p>The ICO have called this measure an "appropriate and proportionate regulatory action" and the new funding could help the ICO turn its attention to bigger fish rather than the five-figure PECR fines which have characterised much of its enforcement activity in recent times.</p>
<p>Click <a href="https://ico.org.uk/about-the-ico/media-centre/news-and-blogs/2022/06/ico-funding-update-fine-income-retention-agreement/">here</a> to read the full article as published by the ICO.</p>
<p><strong>Right of access extends to identification of specific recipients to whom personal data are disclosed (AG's opinion)</strong></p>
<p>In RW v Österreichische Post AG, it was determined that a data subject's right of access to information extends to the identification of any recipients of their personal data.</p>
<p>RW made a subject access request to the Österreichische Post (OP), Austria's main postal service, to identify which third parties had received data pertaining to RW from OP. OP provided descriptions of categories of recipients, as well as general information about data sharing, but did not identify specific parties.</p>
<p>Advocate General Pitruzzella (AG) noted that the wording of Article 15(1)(c), GDPR afforded a right to "recipients or categories" and that it was not for the data controller to decide which details to provide the data subject with. Further, Recital 63 of the GDPR provides that data subjects "have the right to know and obtain communication […] with regard to […] the recipients of the personal data".</p>
<p>OP was not in a position to limit RW's right of access to information with respect to their personal data and therefore should have provided specific identification upon request. RW had the right to ensure the lawful use and receipt of its data and to be aware of the ways in which it was being processed.</p>
<p>This ruling clarifies the type of information that data subjects will be entitled to receive from data controllers upon the lodging of a data subject access request. This is an important decision which clarifies data controllers' obligations towards data subjects when similar requests are made.</p>
<p>Click <a href="https://curia.europa.eu/juris/document/document.jsf?docid=260543&doclang=EN">here</a> to read the full opinion of Advocate Pitruzzella from InfoCuria.</p>
<p><strong>People’s Republic of China State-Sponsored Cyber Actors Exploit Network Providers and Devices</strong></p>
<p>The National Security Agency (NSA), Federal Bureau of Investigation and Cybersecurity and Infrastructure Security Agency (CISA) have co-authorised a Cybersecurity Advisory detailing how state-sponsored actors of the People's Republic of China (PRC) have engaged in the worldwide targeting of telecommunications companies and network service providers.</p>
<p>PRC cyber actors are known to have participated in the exploitation of publicly identified vulnerabilities. These allow actors to gain access to victims' accounts through publicly available exploit codes. These actors have also been observed to adapt their tactics by monitoring network defenders to continue their systems exploitations undetected.</p>
<p>Known vulnerabilities are exploited through the employing of open-source tools, such as specific software frameworks, to uncover access to small office / home office routers. The actors then leverage these exploitations to identify critical infrastructures, gaining user passwords and access to administrative accounts.</p>
<p>Organisations are encouraged to take mitigating actions such as updating and patching systems/ products, using multi factor authentication, strict password requirements and robust logging and review of network access.</p>
<p>Click <a href="https://www.cisa.gov/uscert/ncas/alerts/aa22-158a">here</a> to read the full article published by the Cybersecurity & Infrastructure Security Agency.</p>
<p><strong>Qatar bolsters cyber security in preparation for World Cup</strong></p>
<p>As Qatar prepares to host the 2022 FIFA World Cup, experts are anticipating cyber security issues to arise as a result of wider infrastructure and digital demands. From ticketing to hotels and restaurants, there will be an influx of foreign personal and financial data. Hackers will be hoping to gain the benefit of this data through fake bookings and phishing attempts.</p>
<p>As this is the first event of its kind taking place in Qatar, many have doubts regarding the state's capacity for cyber security defence. Qatar is being faced with a highly concentrated challenge in handling an estimated total of 1.5 million visitors. Interpol hosted cyber security experts on 25 March to analyse potential threats the event would create as part of the wider 'Project Stadia', the Qatar funded security programme.</p>
<p>Qatar will also partner with Morocco, which will be sending a team of cyber security experts to assist with Qatar's existing defences, such as the National Cyber Security Agency (established in 2021). To date, the agency has trained 25,000 employees in aspects of information security and has expressed interest in partnering with global organisations.</p>
<p>Click <a href="https://www.computerweekly.com/news/252521418/Qatar-bolsters-cyber-security-in-preparation-for-World-Cup">here</a> to read the full article published by ComputerWeekly.com.</p>
<p><strong>How Cyber Criminals Target Cryptocurrency</strong></p>
<p>The nature of cryptocurrency lends itself to targeting by cyber criminals. Its inherent anonymity and lack of centralised regulation makes cryptocurrency a practical target and medium of exchange.</p>
<p>Researchers have observed a variety of threats, such as traditional fraud targeting individuals and organisations to facilitate storage and transfer of cryptocurrency. The total reported value of cryptocurrency lost due to cybercrime was reported to be around $14 billion in 2021.</p>
<p>Phishing campaigns that target or utilise cryptocurrency can be broken down into three main categories:</p>
<ul>
    <li>Credential Harvesting – This is typically a URL sent to the potential victim leading to a false landing page, designed to imitate a popular website. This prompts the user to input log-in information or recovery phrases ultimately giving the cyber actor access to their account.</li>
    <li>Cryptocurrency Transfer Solicitation – This is a popular and more traditional form of cybercrime where the threat actor attempts to extort funds from the victim through social engineering. For example, the actor may claim to have sensitive data, pretend to be a business or claim to be collecting for charity. Cryptocurrency is commonly used as the means of transferring these funds due to its anonymity.</li>
    <li>Specific Targeting of Cryptocurrency Data – Malware that targets user data (such as passwords or financial information) has been adapted to target and monitor cryptocurrency activity. These typically fall under the malware family of 'infostealers' that log user inputs, take screenshots and search data for sensitive files.</li>
</ul>
<p>As an industry of growing interest, it is important to be well-informed of the threats arising from social engineering, exploitation and malware.</p>
<p>Click <a href="https://www.proofpoint.com/us/blog/threat-insight/how-cyber-criminals-target-cryptocurrency">here</a> to read the full article published by Proofpoint.</p>]]></content:encoded></item><item><guid isPermaLink="false">{047CF712-9B3F-469F-AA5F-4E420E51E7AB}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/cyber-bytes-issue-41/</link><title>Cyber_Bytes - Issue 41</title><description><![CDATA[<p><strong>The Government sets out a new legislative agenda with important implications for the UK tech sector<br />
</strong><br />
The UK Government has recently presented an updated legislative agenda, including new Bills for the technology sector, in the Queen's Speech.  <br />
<br />
Among the Bills that will be included in the new session of Parliament, those that are relevant to the technology sector included a Data Reform Bill, an Electronic Trade Documents Bill and a Bill to boost competition in digital markets, the Digital Markets, Competition and Consumer Bill.<br />
<br />
It is said that the UK General Data Protection Regulation and Data Protection Act 2018 are highly complex and prescriptive pieces of legislation. They encourage excessive paperwork and create burdens on businesses with little benefit to citizens. The UK Government states that the purpose of the Data Reform Bill is to create a data rights regime which will reduce burdens on businesses, such as reducing the number of reports that data controllers are required to make to the Information Commissioners Office (<strong>ICO</strong>) under the GDPR. It also aims to boost the economy and facilitate scientific innovation. There will be a move to modernise the ICO, ensuring that it has enhanced power to take stronger action against organisations who breach data rules. It will be interesting to see whether these changes to data protection legislation in the UK will have an impact on the European Commission's adequacy decision that is ruled in favour of the current regime.<br />
<br />
The Electronic Trades Documents Bill will place electronic trade documents on the same legal footing as paper documents, increasing efficiency and raising the security of trade by utilising the transparency and traceability benefits which electronic documents offer. This will be largely achieved by removing the traditional legal obstacles to the use of trade documents in digital form and allowing the adoption of new digital solutions which bypass the need for paper and wet ink signatures.<br />
<br />
Click <a href="https://www.gov.uk/government/speeches/queens-speech-2022">here</a> to read full speech on the UK Government website and click <a href="https://www.techuk.org/resource/the-government-sets-out-a-new-legislative-agenda-with-important-implications-for-the-uk-tech-sector.html">here</a> to read a summary from the TechUK website.<br />
<br />
<strong>Russia behind cyber-attack with Europe-wide impact an hour before Ukraine invasion<br />
</strong><br />
It has recently been announced, following assessment by the National Cyber Security Centre (<strong>NCSC</strong>), that Russia has been responsible for a series of cyber-attacks during the invasion of Ukraine, with the most recent attack being on Ukrainian communications company, Viasat. <br />
<br />
On 24 February 2022, a cyber-attack against the company began around 1 hour before the Ukraine invasion was launched, with the primary target believed to be the Ukrainian military. The effect of this has spread across central Europe, causing disruption to wind farms and internet users. <br />
<br />
Prior to this, the NCSC has stated that the Russian Military Intelligence was almost certainly behind various defacements of Ukrainian government websites back in January, as well as the deployment of Whispergate destructive malware. <br />
<br />
This announcement comes as cyber security leaders gather at the NCSC's cyber conference to discuss various global cyber threats. The UK has already sanctioned the GRU following their actions in Salisbury and has taken steps to freeze around £1.1 trillion in funds and assets from oligarchs who are connected to the Putin regime.<br />
<br />
Click <a href="https://www.gov.uk/government/news/russia-behind-cyber-attack-with-europe-wide-impact-an-hour-before-ukraine-invasion">here</a> to read the UK Government press release.<br />
<br />
<strong>ICO fines facial recognition database company Clearview AI Inc more than £7.5m and orders UK data to be deleted<br />
</strong>
<br />
The ICO has fined Clearview in excess of £7 million for collecting more than 20 billion images of people from the internet and social media and using these to build a global online facial recognition database. <br />
<br />
Services provided by the company include allowing customers to upload an image to an app which is then checked for a match against all the images in the database. The affected individuals were not informed that their images were being used in this manner. Clearview no longer offers its services to UK organisations but still has customers in other countries, meaning that it is still using the personal data of UK residents. <br />
<br />
The ICO found that Clearview had violated UK data protection laws by:</p>
<ul>
    <li>failing to use the information of people in the UK in a way that is fair and transparent;</li>
    <li>failing to have a lawful reason for collecting people’s information;</li>
    <li>failing to have a process in place to stop the data being retained indefinitely;</li>
    <li>failing to meet relevant data protection standards;</li>
    <li>asking for additional personal information, including photos, when asked by members of the public if they are on their database, potentially acting as a disincentive to individuals who wish to object to their data being collected and used.</li>
</ul>
<p>The ICO also issued an enforcement notice which ordered Clearview to refrain from using the personal data of UK residents that is publicly available on the web and to erase any existing data from its systems. <br />
<br />
Click <a href="https://ico.org.uk/about-the-ico/news-and-events/news-and-blogs/2022/05/ico-fines-facial-recognition-database-company-clearview-ai-inc/">here</a> to read the ICO's article.<br />
<br />
<strong>DCMS publishes new research on cyber security issues in use of internet-connected devices by businesses<br />
</strong><br />
The Department for Digital, Culture, Media & Sport (<strong>DCMS</strong>) has published research on cybersecurity in internet-connected devices used by businesses and organisations, with this forming part of the NCSC's £2.6 billion strategy to protect and promote the UK online. <br />
<br />
The DCMS has released two publications on cyber security issues in internet-connected devices used by businesses: "Literature Review on Connected Devices within Enterprise Networks" (<a href="https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/1073668/Literature_review_on_connected_devices_within_enterprise_networks.pdf">here</a>), as well as "Enterprise Connected Devices: Procurement, Usage and Management Among UK Businesses" (<a href="https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/1073905/Enterprise_connected_devices_-_procurement__usage_and_management_among_UK_businesses.pdf">here</a>).<br />
<br />
These publications have revealed that, despite significant concerns from IT professionals about device security, enterprise connected devices are being deployed and relied on by a large number of organisations. A large volume of connected device deployments are unsanctioned. This is particularly noteworthy when considered alongside the fact that businesses reported a broad range of connected devices used within organisational networks, with numbers ranging from 6,000 to 50,000 devices. <br />
<br />
The scale of the risk faced by business is amplified by the vulnerabilities which are found regularly in enterprise connected devices, with organisations lacking clarity on how to protect themselves against these exposures. Potentially vulnerable devices can provide a route for hostile actors to attack enterprise systems. <br />
<br />
The DCMS also published research from the NCSC on the threat of enterprise connected devices (<a href="https://www.ncsc.gov.uk/report/organisational-use-of-enterprise-connected-devices">here</a>). The NCSC has published industry principles that manufactures can use to identify which security mitigations should be included in their products.<br />
<br />
Click <a href="https://www.gov.uk/government/publications/cyber-security-in-enterprise-connected-devices">here</a> to see the DCMS press release.<br />
<br />
<strong>NCSC significantly expands services to protect UK from record number of online scams<br />
</strong><br />
The NCSC's Active Cyber Defence Programme (<strong>ACD</strong>) has successfully removed a record number of online scams from the internet last year. This rise is reflective of the expansion of the NCSC's services to take down malicious online content, rather than an increase in scams overall.<br />
<br />
The most common scams included fake celebrity endorsement scams and bogus extortion emails, as well as NHS vaccines and vaccine passports. The NCSC removed in excess of 1,400 NHS-themed phishing campaigns last year, an 11-fold increase on 2020. <br />
<br />
Other key highlights from the fifth year of ACD’s operations include:</p>
<ul>
    <li>More than 1.2 million domains linked with the Android malware Flubot (a malicious app) were blocked – this malware was distributed to the public posing as ‘missed delivery’ messages;</li>
    <li>33 million events were flagged on the networks of several organisations as part of the NCSC's Early Warning service, indicating something potentially malicious or vulnerable was on their systems;</li>
    <li>10,000 users around the world have used the Exercise in a Box toolkit – a service which helps organisations practise their response to a cyber incident.</li>
</ul>
<p>Click <a href="https://www.ncsc.gov.uk/news/ncsc-significantly-expands-services-to-protect-uk-from-record-number-of-online-scams">here</a> to read the NCSC press release.</p>]]></description><pubDate>Mon, 30 May 2022 15:14:00 +0100</pubDate><category>Data and privacy</category><authors:names>Richard Breavington, Daniel Guilfoyle, Ian Dinning, Rachel Ford, Christopher Ashton, Elizabeth Zang, Emanuele Santella </authors:names><content:encoded><![CDATA[<p><strong>The Government sets out a new legislative agenda with important implications for the UK tech sector<br />
</strong><br />
The UK Government has recently presented an updated legislative agenda, including new Bills for the technology sector, in the Queen's Speech.  <br />
<br />
Among the Bills that will be included in the new session of Parliament, those that are relevant to the technology sector included a Data Reform Bill, an Electronic Trade Documents Bill and a Bill to boost competition in digital markets, the Digital Markets, Competition and Consumer Bill.<br />
<br />
It is said that the UK General Data Protection Regulation and Data Protection Act 2018 are highly complex and prescriptive pieces of legislation. They encourage excessive paperwork and create burdens on businesses with little benefit to citizens. The UK Government states that the purpose of the Data Reform Bill is to create a data rights regime which will reduce burdens on businesses, such as reducing the number of reports that data controllers are required to make to the Information Commissioners Office (<strong>ICO</strong>) under the GDPR. It also aims to boost the economy and facilitate scientific innovation. There will be a move to modernise the ICO, ensuring that it has enhanced power to take stronger action against organisations who breach data rules. It will be interesting to see whether these changes to data protection legislation in the UK will have an impact on the European Commission's adequacy decision that is ruled in favour of the current regime.<br />
<br />
The Electronic Trades Documents Bill will place electronic trade documents on the same legal footing as paper documents, increasing efficiency and raising the security of trade by utilising the transparency and traceability benefits which electronic documents offer. This will be largely achieved by removing the traditional legal obstacles to the use of trade documents in digital form and allowing the adoption of new digital solutions which bypass the need for paper and wet ink signatures.<br />
<br />
Click <a href="https://www.gov.uk/government/speeches/queens-speech-2022">here</a> to read full speech on the UK Government website and click <a href="https://www.techuk.org/resource/the-government-sets-out-a-new-legislative-agenda-with-important-implications-for-the-uk-tech-sector.html">here</a> to read a summary from the TechUK website.<br />
<br />
<strong>Russia behind cyber-attack with Europe-wide impact an hour before Ukraine invasion<br />
</strong><br />
It has recently been announced, following assessment by the National Cyber Security Centre (<strong>NCSC</strong>), that Russia has been responsible for a series of cyber-attacks during the invasion of Ukraine, with the most recent attack being on Ukrainian communications company, Viasat. <br />
<br />
On 24 February 2022, a cyber-attack against the company began around 1 hour before the Ukraine invasion was launched, with the primary target believed to be the Ukrainian military. The effect of this has spread across central Europe, causing disruption to wind farms and internet users. <br />
<br />
Prior to this, the NCSC has stated that the Russian Military Intelligence was almost certainly behind various defacements of Ukrainian government websites back in January, as well as the deployment of Whispergate destructive malware. <br />
<br />
This announcement comes as cyber security leaders gather at the NCSC's cyber conference to discuss various global cyber threats. The UK has already sanctioned the GRU following their actions in Salisbury and has taken steps to freeze around £1.1 trillion in funds and assets from oligarchs who are connected to the Putin regime.<br />
<br />
Click <a href="https://www.gov.uk/government/news/russia-behind-cyber-attack-with-europe-wide-impact-an-hour-before-ukraine-invasion">here</a> to read the UK Government press release.<br />
<br />
<strong>ICO fines facial recognition database company Clearview AI Inc more than £7.5m and orders UK data to be deleted<br />
</strong>
<br />
The ICO has fined Clearview in excess of £7 million for collecting more than 20 billion images of people from the internet and social media and using these to build a global online facial recognition database. <br />
<br />
Services provided by the company include allowing customers to upload an image to an app which is then checked for a match against all the images in the database. The affected individuals were not informed that their images were being used in this manner. Clearview no longer offers its services to UK organisations but still has customers in other countries, meaning that it is still using the personal data of UK residents. <br />
<br />
The ICO found that Clearview had violated UK data protection laws by:</p>
<ul>
    <li>failing to use the information of people in the UK in a way that is fair and transparent;</li>
    <li>failing to have a lawful reason for collecting people’s information;</li>
    <li>failing to have a process in place to stop the data being retained indefinitely;</li>
    <li>failing to meet relevant data protection standards;</li>
    <li>asking for additional personal information, including photos, when asked by members of the public if they are on their database, potentially acting as a disincentive to individuals who wish to object to their data being collected and used.</li>
</ul>
<p>The ICO also issued an enforcement notice which ordered Clearview to refrain from using the personal data of UK residents that is publicly available on the web and to erase any existing data from its systems. <br />
<br />
Click <a href="https://ico.org.uk/about-the-ico/news-and-events/news-and-blogs/2022/05/ico-fines-facial-recognition-database-company-clearview-ai-inc/">here</a> to read the ICO's article.<br />
<br />
<strong>DCMS publishes new research on cyber security issues in use of internet-connected devices by businesses<br />
</strong><br />
The Department for Digital, Culture, Media & Sport (<strong>DCMS</strong>) has published research on cybersecurity in internet-connected devices used by businesses and organisations, with this forming part of the NCSC's £2.6 billion strategy to protect and promote the UK online. <br />
<br />
The DCMS has released two publications on cyber security issues in internet-connected devices used by businesses: "Literature Review on Connected Devices within Enterprise Networks" (<a href="https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/1073668/Literature_review_on_connected_devices_within_enterprise_networks.pdf">here</a>), as well as "Enterprise Connected Devices: Procurement, Usage and Management Among UK Businesses" (<a href="https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/1073905/Enterprise_connected_devices_-_procurement__usage_and_management_among_UK_businesses.pdf">here</a>).<br />
<br />
These publications have revealed that, despite significant concerns from IT professionals about device security, enterprise connected devices are being deployed and relied on by a large number of organisations. A large volume of connected device deployments are unsanctioned. This is particularly noteworthy when considered alongside the fact that businesses reported a broad range of connected devices used within organisational networks, with numbers ranging from 6,000 to 50,000 devices. <br />
<br />
The scale of the risk faced by business is amplified by the vulnerabilities which are found regularly in enterprise connected devices, with organisations lacking clarity on how to protect themselves against these exposures. Potentially vulnerable devices can provide a route for hostile actors to attack enterprise systems. <br />
<br />
The DCMS also published research from the NCSC on the threat of enterprise connected devices (<a href="https://www.ncsc.gov.uk/report/organisational-use-of-enterprise-connected-devices">here</a>). The NCSC has published industry principles that manufactures can use to identify which security mitigations should be included in their products.<br />
<br />
Click <a href="https://www.gov.uk/government/publications/cyber-security-in-enterprise-connected-devices">here</a> to see the DCMS press release.<br />
<br />
<strong>NCSC significantly expands services to protect UK from record number of online scams<br />
</strong><br />
The NCSC's Active Cyber Defence Programme (<strong>ACD</strong>) has successfully removed a record number of online scams from the internet last year. This rise is reflective of the expansion of the NCSC's services to take down malicious online content, rather than an increase in scams overall.<br />
<br />
The most common scams included fake celebrity endorsement scams and bogus extortion emails, as well as NHS vaccines and vaccine passports. The NCSC removed in excess of 1,400 NHS-themed phishing campaigns last year, an 11-fold increase on 2020. <br />
<br />
Other key highlights from the fifth year of ACD’s operations include:</p>
<ul>
    <li>More than 1.2 million domains linked with the Android malware Flubot (a malicious app) were blocked – this malware was distributed to the public posing as ‘missed delivery’ messages;</li>
    <li>33 million events were flagged on the networks of several organisations as part of the NCSC's Early Warning service, indicating something potentially malicious or vulnerable was on their systems;</li>
    <li>10,000 users around the world have used the Exercise in a Box toolkit – a service which helps organisations practise their response to a cyber incident.</li>
</ul>
<p>Click <a href="https://www.ncsc.gov.uk/news/ncsc-significantly-expands-services-to-protect-uk-from-record-number-of-online-scams">here</a> to read the NCSC press release.</p>]]></content:encoded></item><item><guid isPermaLink="false">{B263F4C6-150B-4F0A-8519-8668457BE167}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/cyber-bytes-issue-40/</link><title>Cyber_Bytes - Issue 40</title><description><![CDATA[<strong>Underwood v Bounty UK Ltd & Hampshire Hospitals NHS Foundation Trust [2022] EWHC 888 (QB)</strong><br />
<br />
This case concerns a claim against a pregnancy support company (<strong>Bounty</strong>), which had been granted access by the Hampshire Hospitals NHS Foundation Trust (<strong>the Trust</strong>) to new mothers on its maternity ward. Bounty was found to be in breach of the Data Protection Act 1998 when the company's representatives unlawfully inspected personal information about a mother and her new born child from documentation held at the mother's bedside. However, the Trust itself was not considered by the Court to have breached its statutory duties under the Data Protection Act 1998, nor was it found to be liable for misuse of private information. Bounty, not the Trust, was the relevant controller for this unauthorised processing of data and had breached its contractual duties in the process. <br />
<br />
This High Court decision emphasises that a data controller is not liable for the actions of a third party gaining unauthorised access to personal data in circumstances where it was reasonable and appropriate for that data not to be strictly withheld. Whether a data controller has taken " <em>appropriate technical and organisational measures… against unauthorised or unlawful processing of personal data and against accidental loss or destruction of, or damage to, personal data</em> " is fact sensitive and requires a sensible accommodation of these various rights and interests. <br />
<br />
The High Court also dismissed a claim for misuse of private information. The fact that Bounty was permitted by the Trust to have access to the Claimant (a new mother) was not an act sufficient to engage the tort, particularly since the data obtained by the mother's bedside had been obtained without the Trust's consent or knowledge. In any event, a person's name, gender and date of birth (even that of a new born infant) was not information of a nature which surpassed the threshold of seriousness required to be actionable for misuse of private information, especially given the regular exposure of such information in data breaches.<br />
<br />
Click <a href="https://www.bailii.org/ew/cases/EWHC/QB/2022/888.html">here</a> to read the full judgment on Bailii.org<br />
<br />
<strong>Over 42 million people in the UK had financial data compromised</strong><br />
<br />
The UK is a prime example of how compromised systems can have a potential economic impact as the number of cyberattacks grows. A publication from RPC commented on the fact that in the last year financial information belonging to approximately 42.2m people in the UK had been subject to compromise. This is a massive increase when compared to the 2019-2020 figure which saw 2.2m individuals being subject to a data compromise.<br />
<br />
Richard Breavington - Partner and Head of Cyber & Tech Insurance at RPC - states that the sharp rise in the number of people whose financial data was impacted in the last year demonstrates that cyber-attacks have become endemic, with hackers continually refining their methods and evolving their tactics. <br />
<br />
Impacted organisations' financial costs can be dramatic and include the cost of business interruption as well as costs required for the legal and regulatory ramifications of the data breach.<br />
<br />
Increasing numbers of cyberattacks will inevitably affect consumers' confidence over the security of their personal data. It is therefore important for businesses to take precautions when processing and storing personal data. This includes implementing a safe data storage system and investing in robust IT security software.  <br />
<br />
Click <a href="https://www.techrepublic.com/article/over-42-million-people-in-the-uk-had-financial-data-compromised/">here</a> to read Tech Republic's coverage of this story.<br />
<br />
<strong>European Commission proposes new cyber security regulations<br />
</strong><br />
In March 2022, two new regulations establishing common cyber and information security measures across the bloc were proposed by the European Commission (<strong>EC</strong>). Their objective is to bolster resilience and response capacity against cyber threats in the context of the COVID-19 pandemic and growing geopolitical tensions.<br />
<br />
In January, the World Economic Forum (<strong>WEF</strong>) published a report that established cyber security threats, such as ransomware and nation-state-backed attacks, to rank among the most prolific risks currently faced internationally.<br />
<br />
The proposed cybersecurity regulations will require all EC institutions, bodies, offices and agencies to have cyber security frameworks in place to support and strengthen governance, risk management and control.<br />
<br />
Certain organisations within the EC will also be obliged to conduct regular maturity assessments, implement improvement plans and promptly share any data relating to cyber incidents with the Computer Emergency Response Team (<strong>CERT-EU</strong>).<br />
<br />
In parallel with this, the UK is also looking to evolve its data legislation, with a series of updates expected to affect the 2018 Network and Information Systems (<strong>NIS</strong>) Regulations. In particular, the scope of the Regulations will widen to include managed service providers (<strong>MSPs</strong>) and providers of specialised online and digital services.<br />
<br />
Click <a href="https://www.computerweekly.com/news/252515140/European-Commission-proposes-new-cyber-security-regulations">here</a> to read Computer Weekly's coverage of the story.<br />
<br />
<strong>Businesses urged to boost cyber standards as new data reveals nearly a third of firms suffering cyberattacks hit every week<br />
</strong><br />
As more and more business is transacted online, it is becoming increasingly vital for organisations to take cybersecurity seriously to minimise the risk of attacks. Following a wave of high-profile attacks over the past year, including on Colonial Pipeline and Microsoft Exchange, there has been increased attention on the cybersecurity of supply chains and digital services.<br />
<br />
Organisations are being urged to strengthen their cybersecurity practices as new figures show that the frequency of cyberattacks increasing. Around a quarter to a third of businesses and charities are stating that they experience breaches at least once a week. <br />
Although the Cyber Security Breaches Survey 2022 report from the Department for Digital, Culture, Media and Sport (<strong>DCMS</strong>) (click <a href="https://www.gov.uk/government/statistics/cyber-security-breaches-survey-2022">here</a> to review this paper) revealed the frequency of cyberattacks is rising, the number of businesses which experienced an attack or breach remained on a par to 2021 levels. The report found that a large proportion of businesses see cybersecurity as a high priority, a significant increase on previous years. However, only around a third of businesses was using at least one managed service provider and only 13% of businesses reviewed the risks posed by immediate suppliers. <br />
<br />
The National Cyber Security Centre (<strong>NCSC</strong>) has issued guidance around steps which can be taken to reduce the risk of falling victim to an attack, although it is not aware of any current specific cyber threats to UK organisations in relation to events around Ukraine. The government is also aiming to strengthen critical businesses’ cyber resilience by investing in cyber skills, expanding the country’s offensive and defensive cyber capabilities, and prioritising cyber security in the workplace, boardrooms and digital supply chains. It aims to ensure that legislation remains effective and keeps pace with technology. <br />
<br />
Click <a href="https://www.gov.uk/government/news/businesses-urged-to-boost-cyber-standards-as-new-data-reveals-nearly-a-third-of-firms-suffering-cyber-attacks-hit-every-week">here</a> to read the UK Government's coverage of the story.<br />
<br />
<strong>U.S. warns newly discovered malware could sabotage energy plants<br />
</strong><br />
Earlier this month, U.S. officials announced the discovery of a sophisticated system for attacking industrial facilities dubbed "Pipedream" by Dragos Inc, industrial control security experts. The system is believed to be Russian and can manipulate equipment found in virtually all complex industrial plants. <br />
<br />
The software is intended to take advantage of longstanding weaknesses present in control systems, such as the standard industry requirements for compatibility leading to the unencrypted flow of data between various types of equipment.<br />
<br />
Investigators have stated that essentially almost any plant can fall victim, and that it will likely be months or years before any strong defences can be developed.<br />
<br />
The National Security Agency, the Energy Department, the Cybersecurity and Infrastructure Security Agency and the FBI issued a joint warning notice reporting the system’s discovery. Liquefied natural gas plants are believed to be the primary target given the type of equipment that would typically be utilised in such facilities.<br />
<br />
Click <a href="https://www.msn.com/en-us/news/technology/us-warns-newly-discovered-malware-could-sabotage-energy-plants/ar-AAWcnk4?ocid=uxbndlbing">here</a> to read The Washington Post's coverage of the story.]]></description><pubDate>Mon, 09 May 2022 15:25:00 +0100</pubDate><category>Data and privacy</category><authors:names>Richard Breavington, Daniel Guilfoyle, Ian Dinning, Rachel Ford, Christopher Ashton, Elizabeth Zang, Emanuele Santella </authors:names><content:encoded><![CDATA[<strong>Underwood v Bounty UK Ltd & Hampshire Hospitals NHS Foundation Trust [2022] EWHC 888 (QB)</strong><br />
<br />
This case concerns a claim against a pregnancy support company (<strong>Bounty</strong>), which had been granted access by the Hampshire Hospitals NHS Foundation Trust (<strong>the Trust</strong>) to new mothers on its maternity ward. Bounty was found to be in breach of the Data Protection Act 1998 when the company's representatives unlawfully inspected personal information about a mother and her new born child from documentation held at the mother's bedside. However, the Trust itself was not considered by the Court to have breached its statutory duties under the Data Protection Act 1998, nor was it found to be liable for misuse of private information. Bounty, not the Trust, was the relevant controller for this unauthorised processing of data and had breached its contractual duties in the process. <br />
<br />
This High Court decision emphasises that a data controller is not liable for the actions of a third party gaining unauthorised access to personal data in circumstances where it was reasonable and appropriate for that data not to be strictly withheld. Whether a data controller has taken " <em>appropriate technical and organisational measures… against unauthorised or unlawful processing of personal data and against accidental loss or destruction of, or damage to, personal data</em> " is fact sensitive and requires a sensible accommodation of these various rights and interests. <br />
<br />
The High Court also dismissed a claim for misuse of private information. The fact that Bounty was permitted by the Trust to have access to the Claimant (a new mother) was not an act sufficient to engage the tort, particularly since the data obtained by the mother's bedside had been obtained without the Trust's consent or knowledge. In any event, a person's name, gender and date of birth (even that of a new born infant) was not information of a nature which surpassed the threshold of seriousness required to be actionable for misuse of private information, especially given the regular exposure of such information in data breaches.<br />
<br />
Click <a href="https://www.bailii.org/ew/cases/EWHC/QB/2022/888.html">here</a> to read the full judgment on Bailii.org<br />
<br />
<strong>Over 42 million people in the UK had financial data compromised</strong><br />
<br />
The UK is a prime example of how compromised systems can have a potential economic impact as the number of cyberattacks grows. A publication from RPC commented on the fact that in the last year financial information belonging to approximately 42.2m people in the UK had been subject to compromise. This is a massive increase when compared to the 2019-2020 figure which saw 2.2m individuals being subject to a data compromise.<br />
<br />
Richard Breavington - Partner and Head of Cyber & Tech Insurance at RPC - states that the sharp rise in the number of people whose financial data was impacted in the last year demonstrates that cyber-attacks have become endemic, with hackers continually refining their methods and evolving their tactics. <br />
<br />
Impacted organisations' financial costs can be dramatic and include the cost of business interruption as well as costs required for the legal and regulatory ramifications of the data breach.<br />
<br />
Increasing numbers of cyberattacks will inevitably affect consumers' confidence over the security of their personal data. It is therefore important for businesses to take precautions when processing and storing personal data. This includes implementing a safe data storage system and investing in robust IT security software.  <br />
<br />
Click <a href="https://www.techrepublic.com/article/over-42-million-people-in-the-uk-had-financial-data-compromised/">here</a> to read Tech Republic's coverage of this story.<br />
<br />
<strong>European Commission proposes new cyber security regulations<br />
</strong><br />
In March 2022, two new regulations establishing common cyber and information security measures across the bloc were proposed by the European Commission (<strong>EC</strong>). Their objective is to bolster resilience and response capacity against cyber threats in the context of the COVID-19 pandemic and growing geopolitical tensions.<br />
<br />
In January, the World Economic Forum (<strong>WEF</strong>) published a report that established cyber security threats, such as ransomware and nation-state-backed attacks, to rank among the most prolific risks currently faced internationally.<br />
<br />
The proposed cybersecurity regulations will require all EC institutions, bodies, offices and agencies to have cyber security frameworks in place to support and strengthen governance, risk management and control.<br />
<br />
Certain organisations within the EC will also be obliged to conduct regular maturity assessments, implement improvement plans and promptly share any data relating to cyber incidents with the Computer Emergency Response Team (<strong>CERT-EU</strong>).<br />
<br />
In parallel with this, the UK is also looking to evolve its data legislation, with a series of updates expected to affect the 2018 Network and Information Systems (<strong>NIS</strong>) Regulations. In particular, the scope of the Regulations will widen to include managed service providers (<strong>MSPs</strong>) and providers of specialised online and digital services.<br />
<br />
Click <a href="https://www.computerweekly.com/news/252515140/European-Commission-proposes-new-cyber-security-regulations">here</a> to read Computer Weekly's coverage of the story.<br />
<br />
<strong>Businesses urged to boost cyber standards as new data reveals nearly a third of firms suffering cyberattacks hit every week<br />
</strong><br />
As more and more business is transacted online, it is becoming increasingly vital for organisations to take cybersecurity seriously to minimise the risk of attacks. Following a wave of high-profile attacks over the past year, including on Colonial Pipeline and Microsoft Exchange, there has been increased attention on the cybersecurity of supply chains and digital services.<br />
<br />
Organisations are being urged to strengthen their cybersecurity practices as new figures show that the frequency of cyberattacks increasing. Around a quarter to a third of businesses and charities are stating that they experience breaches at least once a week. <br />
Although the Cyber Security Breaches Survey 2022 report from the Department for Digital, Culture, Media and Sport (<strong>DCMS</strong>) (click <a href="https://www.gov.uk/government/statistics/cyber-security-breaches-survey-2022">here</a> to review this paper) revealed the frequency of cyberattacks is rising, the number of businesses which experienced an attack or breach remained on a par to 2021 levels. The report found that a large proportion of businesses see cybersecurity as a high priority, a significant increase on previous years. However, only around a third of businesses was using at least one managed service provider and only 13% of businesses reviewed the risks posed by immediate suppliers. <br />
<br />
The National Cyber Security Centre (<strong>NCSC</strong>) has issued guidance around steps which can be taken to reduce the risk of falling victim to an attack, although it is not aware of any current specific cyber threats to UK organisations in relation to events around Ukraine. The government is also aiming to strengthen critical businesses’ cyber resilience by investing in cyber skills, expanding the country’s offensive and defensive cyber capabilities, and prioritising cyber security in the workplace, boardrooms and digital supply chains. It aims to ensure that legislation remains effective and keeps pace with technology. <br />
<br />
Click <a href="https://www.gov.uk/government/news/businesses-urged-to-boost-cyber-standards-as-new-data-reveals-nearly-a-third-of-firms-suffering-cyber-attacks-hit-every-week">here</a> to read the UK Government's coverage of the story.<br />
<br />
<strong>U.S. warns newly discovered malware could sabotage energy plants<br />
</strong><br />
Earlier this month, U.S. officials announced the discovery of a sophisticated system for attacking industrial facilities dubbed "Pipedream" by Dragos Inc, industrial control security experts. The system is believed to be Russian and can manipulate equipment found in virtually all complex industrial plants. <br />
<br />
The software is intended to take advantage of longstanding weaknesses present in control systems, such as the standard industry requirements for compatibility leading to the unencrypted flow of data between various types of equipment.<br />
<br />
Investigators have stated that essentially almost any plant can fall victim, and that it will likely be months or years before any strong defences can be developed.<br />
<br />
The National Security Agency, the Energy Department, the Cybersecurity and Infrastructure Security Agency and the FBI issued a joint warning notice reporting the system’s discovery. Liquefied natural gas plants are believed to be the primary target given the type of equipment that would typically be utilised in such facilities.<br />
<br />
Click <a href="https://www.msn.com/en-us/news/technology/us-warns-newly-discovered-malware-could-sabotage-energy-plants/ar-AAWcnk4?ocid=uxbndlbing">here</a> to read The Washington Post's coverage of the story.]]></content:encoded></item><item><guid isPermaLink="false">{B06EDAC3-53E9-46F1-B1F1-A89D541330E3}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/cyber-bytes-issue-39/</link><title>Cyber_Bytes - Issue 39</title><description><![CDATA[<p><strong>KP Snacks supply chain crunches to halt after ransomware attack</strong></p>
<p><strong></strong>Food manufacturer KP Snacks is the latest victim of a major ransomware attack, with notorious Conti ransomware group taking responsibility. The attack is expected to have an impact on the company’s supply chain up until the end of March.</p>
<p>RPC Partner Richard Breavington has commented on the incident, (in an Insurance Times article found <a href="https://www.insurancetimes.co.uk/news/kp-snacks-supply-chain-crunches-to-halt-after-ransomware-attack/1440238.article">here</a>) which is yet another example of how even some of the largest organisations can fall victim to ransomware attacks. He calls for all businesses to remain vigilant to this threat. Attacks such as these are a big threat to our increasingly digitally dependent society. There has never been a more important time to ensure that appropriate precautions are put in place.</p>
<p>Click <a href="https://www.insurancetimes.co.uk/news/kp-snacks-supply-chain-crunches-to-halt-after-ransomware-attack/1440238.article">here</a> to read more.</p>
<p><strong>The High Court decision in <em>William Stadler v Currys Group Limited</em> [2022] EWHC 160 (QB)</strong></p>
<p>This case involved a consumer dispute on responsibility for the security of data stored on a smart television returned to a retailer for repair.<br />
<br />
The Claimant returned a faulty smart television to Currys Group Limited (Currys), who subsequently sold it to a third-party company without carrying out a factory reset. The Claimant's Amazon account was still active on the smart television and was used by another individual to purchase a film. Currys offered the Claimant £200 in vouchers to compensate for his distress.<br />
<br />
The Claimant brought a claim against Currys for misuse of private information, breach of confidence, negligence and breach of data protection legislation. In response, the Defendant applied for an order to strike out and/or summary judgement.<br />
<br />
Although the court did not grant the Defendant their application, they did make useful comments regarding conduct and allocation of these types of minor data breach claims.<br />
<br />
The court stated that in low-value and modest claims such as this one, it would be disproportionate to allow the claim to proceed in the High Court and that the matter should therefore be transferred to the County Court and a Small Claims Track. The Claimant's solicitors' strategy of pleading multiple causes of action was described by the Court as an unconvincing attempt to shoehorn the facts of the case into a tortious claim worthy of being heard in the High Court. This was held to be out of line with the obligation to ensure cases are justly and proportionately managed in accordance with the overriding objective.<br />
<br />
The Court's decision sets a positive precedent for Defendants and adds to the roster of recent caselaw decisions which might help stem the compensation culture created by low-value data protection breach claims (see <em>Warren v DSG Retails Limited</em>, <em>Lloyd v. Google</em>, <em>Johnson v. Eastlight Community Homes</em> and <em>Rolfe v Veale Wasbrough Vizards</em>). Demonstrating that these types of data breach claims ought to proceed in the County Court and Small Claims Track will ensure that disproportionate costs are not incurred.<br />
<br />
Click <a href="https://www.bailii.org/ew/cases/EWHC/QB/2022/160.html">here</a> to read the judgement in full.<br />
<strong><br />
Foreign Office target of 'serious cyber incident'</strong><br />
<br />
Following the accidental publication of a tender document on a government website, details have emerged of a serious cyber-security attack against the UK's Foreign, Commonwealth and Development Office. The attack was quickly detected, and it is not believed that any classified or highly sensitive material was accessed.<br />
<br />
Government offices are frequently the target of cyber-espionage campaigns by other states seeking to access information about diplomacy and current events.<br />
<br />
Despite the attack being quickly detected, the hackers have not yet been identified. For this reason, government bodies of the UK and the US remain on high alert for further cyber-attacks, especially given the risk of conflict in the Ukraine and current tensions with Russia.<br />
<br />
Click <a href="https://www.bbc.co.uk/news/technology-60309335">here</a> to read the BBC coverage of the incident.<br />
<br />
<strong>New plans could mean tougher cybersecurity for SMEs</strong><br />
<br />
The UK Government has published a new policy proposal (please see <a href="https://www.gov.uk/government/consultations/proposal-for-legislation-to-improve-the-uks-cyber-resilience/proposal-for-legislation-to-improve-the-uks-cyber-resilience#overview">here</a>) outlining tough new cyber security standards to help protect British businesses.<br />
<br />
Whilst many consider cyber security to be an issue for big corporations only, SMEs are also a prime target for cyber criminals. This is because SMEs might typically be less inclined to invest in the implementation of measures that could prevent an attack, making it in some cases easier for criminals to compromise their systems and gain access to data.<br />
<br />
The new proposal introduces stricter standards that will help businesses (large and small) prevent cyber security risks. These range from new procurement rules to ensure that the public sector only buys services from firms with good cyber security, to making multi-factor authentication a legal requirement.<br />
<br />
The proposal is unlikely to be implemented until the end of 2023 at the earliest. But an article by Startups, <a href="https://startups.co.uk/news/new-government-cybersecurity-policy/">here</a>, explores what SMEs can do in the meantime to protect themselves against the increasing threat of cyber-attacks.<br />
<strong><br />
Cybersecurity: 'To cripple UK, Putin does not need nuclear weapons'</strong><br />
<br />
Given the current tense political environment, it is feared that Russia may deploy further cyberattacks as part of their efforts to destabilise neighbouring Ukraine.<br />
<br />
However, it is not just Ukraine that is at risk from Russian devised attacks. There are concerns that other countries, including the UK, may also be under threat. Due to the increased digitalization of its services, the UK public sector in particular is seen as a prime target for such attacks.<br />
<br />
Whilst the UK has a new cybersecurity strategy in place, many experts believe that this needs to be revised and reformed in order to prevent and address any future attacks it may suffer.<br />
<br />
Click <a href="https://www.cityam.com/uk-public-sector-security-needs-to-be-agile-amid-fears-of-russian-cyberattack/">here</a> to read an article in City AM which explores this further.</p>]]></description><pubDate>Tue, 15 Feb 2022 12:39:00 Z</pubDate><category>Data and privacy</category><authors:names>Richard Breavington, Daniel Guilfoyle, Ian Dinning, Rachel Ford, Christopher Ashton, Elizabeth Zang, Emanuele Santella </authors:names><content:encoded><![CDATA[<p><strong>KP Snacks supply chain crunches to halt after ransomware attack</strong></p>
<p><strong></strong>Food manufacturer KP Snacks is the latest victim of a major ransomware attack, with notorious Conti ransomware group taking responsibility. The attack is expected to have an impact on the company’s supply chain up until the end of March.</p>
<p>RPC Partner Richard Breavington has commented on the incident, (in an Insurance Times article found <a href="https://www.insurancetimes.co.uk/news/kp-snacks-supply-chain-crunches-to-halt-after-ransomware-attack/1440238.article">here</a>) which is yet another example of how even some of the largest organisations can fall victim to ransomware attacks. He calls for all businesses to remain vigilant to this threat. Attacks such as these are a big threat to our increasingly digitally dependent society. There has never been a more important time to ensure that appropriate precautions are put in place.</p>
<p>Click <a href="https://www.insurancetimes.co.uk/news/kp-snacks-supply-chain-crunches-to-halt-after-ransomware-attack/1440238.article">here</a> to read more.</p>
<p><strong>The High Court decision in <em>William Stadler v Currys Group Limited</em> [2022] EWHC 160 (QB)</strong></p>
<p>This case involved a consumer dispute on responsibility for the security of data stored on a smart television returned to a retailer for repair.<br />
<br />
The Claimant returned a faulty smart television to Currys Group Limited (Currys), who subsequently sold it to a third-party company without carrying out a factory reset. The Claimant's Amazon account was still active on the smart television and was used by another individual to purchase a film. Currys offered the Claimant £200 in vouchers to compensate for his distress.<br />
<br />
The Claimant brought a claim against Currys for misuse of private information, breach of confidence, negligence and breach of data protection legislation. In response, the Defendant applied for an order to strike out and/or summary judgement.<br />
<br />
Although the court did not grant the Defendant their application, they did make useful comments regarding conduct and allocation of these types of minor data breach claims.<br />
<br />
The court stated that in low-value and modest claims such as this one, it would be disproportionate to allow the claim to proceed in the High Court and that the matter should therefore be transferred to the County Court and a Small Claims Track. The Claimant's solicitors' strategy of pleading multiple causes of action was described by the Court as an unconvincing attempt to shoehorn the facts of the case into a tortious claim worthy of being heard in the High Court. This was held to be out of line with the obligation to ensure cases are justly and proportionately managed in accordance with the overriding objective.<br />
<br />
The Court's decision sets a positive precedent for Defendants and adds to the roster of recent caselaw decisions which might help stem the compensation culture created by low-value data protection breach claims (see <em>Warren v DSG Retails Limited</em>, <em>Lloyd v. Google</em>, <em>Johnson v. Eastlight Community Homes</em> and <em>Rolfe v Veale Wasbrough Vizards</em>). Demonstrating that these types of data breach claims ought to proceed in the County Court and Small Claims Track will ensure that disproportionate costs are not incurred.<br />
<br />
Click <a href="https://www.bailii.org/ew/cases/EWHC/QB/2022/160.html">here</a> to read the judgement in full.<br />
<strong><br />
Foreign Office target of 'serious cyber incident'</strong><br />
<br />
Following the accidental publication of a tender document on a government website, details have emerged of a serious cyber-security attack against the UK's Foreign, Commonwealth and Development Office. The attack was quickly detected, and it is not believed that any classified or highly sensitive material was accessed.<br />
<br />
Government offices are frequently the target of cyber-espionage campaigns by other states seeking to access information about diplomacy and current events.<br />
<br />
Despite the attack being quickly detected, the hackers have not yet been identified. For this reason, government bodies of the UK and the US remain on high alert for further cyber-attacks, especially given the risk of conflict in the Ukraine and current tensions with Russia.<br />
<br />
Click <a href="https://www.bbc.co.uk/news/technology-60309335">here</a> to read the BBC coverage of the incident.<br />
<br />
<strong>New plans could mean tougher cybersecurity for SMEs</strong><br />
<br />
The UK Government has published a new policy proposal (please see <a href="https://www.gov.uk/government/consultations/proposal-for-legislation-to-improve-the-uks-cyber-resilience/proposal-for-legislation-to-improve-the-uks-cyber-resilience#overview">here</a>) outlining tough new cyber security standards to help protect British businesses.<br />
<br />
Whilst many consider cyber security to be an issue for big corporations only, SMEs are also a prime target for cyber criminals. This is because SMEs might typically be less inclined to invest in the implementation of measures that could prevent an attack, making it in some cases easier for criminals to compromise their systems and gain access to data.<br />
<br />
The new proposal introduces stricter standards that will help businesses (large and small) prevent cyber security risks. These range from new procurement rules to ensure that the public sector only buys services from firms with good cyber security, to making multi-factor authentication a legal requirement.<br />
<br />
The proposal is unlikely to be implemented until the end of 2023 at the earliest. But an article by Startups, <a href="https://startups.co.uk/news/new-government-cybersecurity-policy/">here</a>, explores what SMEs can do in the meantime to protect themselves against the increasing threat of cyber-attacks.<br />
<strong><br />
Cybersecurity: 'To cripple UK, Putin does not need nuclear weapons'</strong><br />
<br />
Given the current tense political environment, it is feared that Russia may deploy further cyberattacks as part of their efforts to destabilise neighbouring Ukraine.<br />
<br />
However, it is not just Ukraine that is at risk from Russian devised attacks. There are concerns that other countries, including the UK, may also be under threat. Due to the increased digitalization of its services, the UK public sector in particular is seen as a prime target for such attacks.<br />
<br />
Whilst the UK has a new cybersecurity strategy in place, many experts believe that this needs to be revised and reformed in order to prevent and address any future attacks it may suffer.<br />
<br />
Click <a href="https://www.cityam.com/uk-public-sector-security-needs-to-be-agile-amid-fears-of-russian-cyberattack/">here</a> to read an article in City AM which explores this further.</p>]]></content:encoded></item><item><guid isPermaLink="false">{F5E48D12-2267-479E-BC17-327E81923AAB}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/edpb-guidelines-on-personal-data-breach-notifications/</link><title>EDPB guidelines on personal data breach notifications</title><description><![CDATA[Last month, the EDPB published their "Guidelines on Examples regarding Personal Data Breach Notification" (the Guidelines).  These are intended to provide "practice-oriented, case-based" guidance on when it is necessary to notify the relevant supervisory authorities (the SA) under Article 33(1) of the GDPR and/or data subjects under Article 34(1) of the GDPR following a personal data breach.]]></description><pubDate>Mon, 14 Feb 2022 14:09:00 Z</pubDate><category>Data and privacy</category><authors:names>Richard Breavington, Elizabeth Zang</authors:names><content:encoded><![CDATA[<p>These are intended to provide "practice-oriented, case-based" guidance on when it is necessary to notify the relevant supervisory authorities (the SA) under Article 33(1) of the GDPR and/or data subjects under Article 34(1) of the GDPR following a personal data breach.</p>
<p>Whilst the EDPB has provided guidance on personal data breach notifications in the past, the Guidelines focus on practical examples to offer a useful extra layer of reasoning on what events are likely to trigger Articles 33(1) and 34(1), and why.  The Guidelines contain a wide range of examples, setting out each scenario with key variables such as the presence of an IT security system and/or the exfiltration of personal data.  The Guidance takes into account both the preventative measures that could have ensured a different outcome (had they been in place at the time of the incident) and the actions that data controllers could take to mitigate the impact of the incident and ensure compliance with regulatory obligations.</p>
<p>We have set out below some high-level comments on how the Guidelines treat a couple of the scenarios we see most commonly, namely ransomware and social engineering (including business email compromise).<br />
<br />
<strong>Ransomware</strong></p>
<p><strong> </strong>Ransomware, if effective, will often involve an availability breach – in that personal data will be rendered unavailable as a result of encryption.  It can also potentially result in a confidentiality breach if the threat actor has exfiltrated personal data.  This is often the case as threat actors use the tactic of placing pressure on the data controller by threatening to publish exfiltrated data online should the ransom not be paid.  It follows that the effect on data subjects, and the resulting notification obligations, vary depending on the circumstances of the ransomware incident and the data controller's ability to reconstitute the data.<br />
<br />
<em>Existence of backups and no exfiltration</em></p>
<p><strong> </strong>If a firm suffers a ransomware attack that results in the encryption of data but not the exfiltration of data, there could be an availability breach as the firm is no longer able to access personal data which has been encrypted by the threat actor.  An availability breach of this type can of itself give rise to notification obligations in relation to the SA under Article 33(1) and/or data subjects under Article 34(1).  <br />
<br />
If electronic backups are available and the firm is able to use these to ensure an effective and timely restoration of personal data, there may be no requirement to notify either the SA or the data subjects, with only an internal record of the incident being required under Article 33(5), GDPR.  However, a key consideration will be how quickly the data can be restored and whether that restoration will be complete.  The Guidelines state that "<em>the GDPR states that a personal data breach shall be notified without undue delay and, where feasible, not later than after 72 hours. Therefore, it could be determined that exceeding the 72-hour time limit is unadvisable</em>".  This suggests that if data can be restored within 72 hours, notification to the SA under Article 33(1) might be unnecessary, but a lack of availability for longer than this could result in a notification being prudent.  <br />
<br />
Where electronic backups are not available, the Guidelines state that the SA is likely to need to be notified, even if data is restored from paper files.  The reasoning is that restoration from paper files takes more time, so the breach of availability of data subsists for longer, and some information (such as meta-data) may not be retrievable.  Therefore, in such cases, there could be both a requirement to keep an internal record of the incident under Article 33(5) and, depending on the nature of the personal data affected, a requirement to notify the SA under Article 33(1).  Whether there is a need to notify data subjects of the incident under Article 34(1) as well will depend on the length of time for which the data is unavailable and the severity of the likely impact of the lack of availability on the data subjects.  The Guidelines contrast an incident at an agricultural company where notification to data subjects "<em>may be necessary</em>" if delays result in financial loss to individuals in contrast to an incident at a hospital where notification to data subjects "is necessary" if it would impact on the treatment of patients.<br />
<br />
<em>No backups and evidence of exfiltration</em></p>
<p><strong> </strong>In situations where there is no backup available and there is evidence that personal data has been exfiltrated, both an availability breach and a confidentiality breach are likely to have occurred, likely leading to greater notification obligations.<br />
<br />
Internal documentation of the incident will be required under Article 33(5) as always, and notification to the SA will also most likely be required under Article 33(1).  However, in addition, the data controller may be required to communicate the breach to affected data subjects, especially where the data in question relates not just to basic identity data, but to financial data such as credit card details as well.  The difference is that where only basic identity data is involved, the incident is unlikely to result in a high risk to the individuals, whereas if sensitive financial details are compromised, the individuals should be informed directly because the incident is likely to result in a high risk of them being impacted.  Notifications are needed, not least so that they can take the necessary steps to avoid being impacted to the extent possible.<br />
<br />
<strong>Social engineering</strong></p>
<p><strong> </strong>The Guidelines also touch on social engineering – situations in which the threat actor communicates with individuals to persuade or trick them into performing an action that allows the attacker access to the systems, rather than using more technical means.  One example of a social engineering incident is sending phishing emails in order to gain access to an email mailbox. <br />
<br />
The scenario set out in the Guidelines involves emails containing expressions relating to payments (e.g. invoice, bank account details, etc) being forwarded to external email addresses and, subsequently, fictious invoices showing the threat actor's bank account details being sent out.  <br />
<br />
In this example, it is likely that the threat actor's intention was to commit payment diversion fraud by sending false invoices in the hope that a payment would be made to a fraudulent bank account.  The threat actor's intention does not appear to be to obtain personal data relating to individuals who communicate with the data controller.  However, if there is access to a mailbox, the threat actor ultimately might nevertheless obtain access to personal data belonging to various other individuals, such as employees, that could be used to facilitate other attacks.  As such, the personal data breach could potentially result in significant risk to those individuals, potentially triggering notification requirements, depending on the personal data involved.<br />
<br />
<strong>Conclusion</strong></p>
<p><strong> </strong>The Guidelines are useful in providing greater clarity on the Article 33 and 34 requirements in various scenarios.  However, personal data breaches vary considerably in circumstance and severity. Indeed, the Guidelines demonstrate the large extent to which situations must be assessed on a case-by-case basis, the degree of variance in outcomes when effective preventative measures are (or are not) in place and the importance of taking the right mitigating actions whilst ensuring compliance with data protection regulations. </p>
<p>The Guidelines can be found <a href="https://edpb.europa.eu/our-work-tools/our-documents/guidelines/guidelines-012021-examples-regarding-personal-data-breach_en">here</a>.</p>]]></content:encoded></item><item><guid isPermaLink="false">{550CE801-CC2B-45AC-BEBF-227AE2D4A750}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/cyber-bytes-issue-38/</link><title>Cyber_Bytes - Issue 38</title><description><![CDATA[<strong>RPC Annual Insurance Review 2022</strong><br />
<br />
This review discusses the events that shaped the insurance market in 2021 and what we can expect in 2022.<br />
<br />
In particular, we would like to draw your attention to the chapters on Cyber (chapter 44) and Technology (chapter 86).<br />
<br />
Our Cyber chapter discusses the hotly anticipated Supreme Court judgment of Lloyd v Google which was released on 10 November 2021. It also considers how the cyber insurance market is likely to adapt over the next year, including the likely increase in standalone cyber insurance products and a continued hardening of the cyber insurance market.<br />
<br />
Our Technology chapter discusses the development of AI in 2021, particularly in its use of ensuring a safe cyber environment. It also takes a look at the development of quantum computing and quantum-safe cryptography that we can expect to see in 2022.<br />
<br />
Wider topics covered in the review include COVID-19, political unrest, global supply chain and labour issues, Brexit and ESG.<br />
<br />
Click <a href="/thinking/insurance-reviews/annual-insurance-review-2022/">here</a> to access the Review.<br />
<br />
<strong>REvil ransomware gang arrested in Russia</strong><br />
<br />
One of the most prolific ransomware gangs, REvil, is reported to have been dismantled. Russian authorities charged several of its members and seized the gang's criminal proceeds.<br />
<br />
This comes after the United States put forward a reward of up to $10 million for information on the gang members following a series of damaging ransomware attacks.<br />
<br />
This sends a clear message to Russian cyber-crime gangs with the aim of stemming the wave of attacks. However, the fact that it was Russian authorities that took down the group has come as a surprise to many, given the previous tensions and poor relationship between Russia and the United States in terms of cyber-crime and cyber-relations.<br />
<br />
Click <a href="https://www.bbc.co.uk/news/technology-59998925">here</a> to read a BBC article which contains more detail.<br />
<br />
<strong>Why tougher cyber insurance rules could be a game changer</strong><br />
<br />
Given the significant increase in the number of ransomware attacks being carried out by cybercriminals, the requirement for companies to obtain cyber insurance has never been more important.<br />
<br />
Recent increases in ransomware attacks will ultimately mean that cyber insurance is likely to become more expensive for companies to obtain. However, the benefits of having cyber insurance cannot be underestimated.<br />
<br />
In order to minimise risk, cyber insurers are conducting due diligence on companies more frequently. Doing so ensures that key risks and threats within a company' security are identified and managed early on. Many cyber insurers also offer pre-breach security support in a bid to reduce the chances of an attack. This can reduce the risk for insurers and will also add value for companies, especially those who may not have adequate security measures in place.<br />
<br />
Click <a href="https://www.scmagazine.com/native/ransomware/why-tougher-cyber-insurance-rules-could-be-a-game-changer">here</a> to read an article from SC Media with more detail.<br />
<br />
<strong>NATO offers tech support after 'massive cyber attack' hits Ukraine</strong><br />
<br />
Ukraine has recently been subject to a major cyber-attack which saw multiple government websites being taken offline. Given the significance of the attack, NATO pledged to support Ukraine by signing an enhanced cyber security arrangement.<br />
<br />
During the attack, hackers posted threatening messages on the affected Ukrainian government websites. The messages were partly written in Polish and referred to controversial events in Ukraine's history over its relationship with Poland. A review of the messages written in Polish revealed clear mistakes in the text, prompting many to speculate that this was an attempt to try and deflect responsibility for the attack on to Polish hackers.<br />
<br />
Given the tense negotiations between Russia, the US and NATO over Russia's build-up of troops on the Ukrainian border, many Ukrainians suspect Russia to be behind the attack.<br />
<br />
Click <a href="https://www.computerweekly.com/news/252512047/Nato-offers-tech-support-after-massive-cyber-attack-hits-Ukraine">here</a> to read an article in Computer Weekly on this.<br />
<br />
<strong>National Cyber Strategy will improve skills and build resilience</strong><br />
<br />
The UK government has promised to expand and enhance cyber skills across the UK through adopting a new National Cyber Strategy and increasing investment in the National Cyber Force. The introduction of this new strategy is aimed at advancing the UK's national interests in the cyberspace, thus strengthening its defensive and offensive capabilities through the building of technical expertise. It is hoped that this should also reduce the UK's reliance on suppliers from other countries who do not necessarily share the same values.<br />
<br />
Click <a href="https://www.standard.co.uk/news/uk/huawei-government-queen-london-south-east-b972005.html">here</a> to read an article from the Evening Standard with more detail.]]></description><pubDate>Wed, 26 Jan 2022 16:27:00 Z</pubDate><category>Data and privacy</category><authors:names>Richard Breavington, Daniel Guilfoyle, Ian Dinning, Rachel Ford, Christopher Ashton, Elizabeth Zang, Emanuele Santella </authors:names><content:encoded><![CDATA[<strong>RPC Annual Insurance Review 2022</strong><br />
<br />
This review discusses the events that shaped the insurance market in 2021 and what we can expect in 2022.<br />
<br />
In particular, we would like to draw your attention to the chapters on Cyber (chapter 44) and Technology (chapter 86).<br />
<br />
Our Cyber chapter discusses the hotly anticipated Supreme Court judgment of Lloyd v Google which was released on 10 November 2021. It also considers how the cyber insurance market is likely to adapt over the next year, including the likely increase in standalone cyber insurance products and a continued hardening of the cyber insurance market.<br />
<br />
Our Technology chapter discusses the development of AI in 2021, particularly in its use of ensuring a safe cyber environment. It also takes a look at the development of quantum computing and quantum-safe cryptography that we can expect to see in 2022.<br />
<br />
Wider topics covered in the review include COVID-19, political unrest, global supply chain and labour issues, Brexit and ESG.<br />
<br />
Click <a href="/thinking/insurance-reviews/annual-insurance-review-2022/">here</a> to access the Review.<br />
<br />
<strong>REvil ransomware gang arrested in Russia</strong><br />
<br />
One of the most prolific ransomware gangs, REvil, is reported to have been dismantled. Russian authorities charged several of its members and seized the gang's criminal proceeds.<br />
<br />
This comes after the United States put forward a reward of up to $10 million for information on the gang members following a series of damaging ransomware attacks.<br />
<br />
This sends a clear message to Russian cyber-crime gangs with the aim of stemming the wave of attacks. However, the fact that it was Russian authorities that took down the group has come as a surprise to many, given the previous tensions and poor relationship between Russia and the United States in terms of cyber-crime and cyber-relations.<br />
<br />
Click <a href="https://www.bbc.co.uk/news/technology-59998925">here</a> to read a BBC article which contains more detail.<br />
<br />
<strong>Why tougher cyber insurance rules could be a game changer</strong><br />
<br />
Given the significant increase in the number of ransomware attacks being carried out by cybercriminals, the requirement for companies to obtain cyber insurance has never been more important.<br />
<br />
Recent increases in ransomware attacks will ultimately mean that cyber insurance is likely to become more expensive for companies to obtain. However, the benefits of having cyber insurance cannot be underestimated.<br />
<br />
In order to minimise risk, cyber insurers are conducting due diligence on companies more frequently. Doing so ensures that key risks and threats within a company' security are identified and managed early on. Many cyber insurers also offer pre-breach security support in a bid to reduce the chances of an attack. This can reduce the risk for insurers and will also add value for companies, especially those who may not have adequate security measures in place.<br />
<br />
Click <a href="https://www.scmagazine.com/native/ransomware/why-tougher-cyber-insurance-rules-could-be-a-game-changer">here</a> to read an article from SC Media with more detail.<br />
<br />
<strong>NATO offers tech support after 'massive cyber attack' hits Ukraine</strong><br />
<br />
Ukraine has recently been subject to a major cyber-attack which saw multiple government websites being taken offline. Given the significance of the attack, NATO pledged to support Ukraine by signing an enhanced cyber security arrangement.<br />
<br />
During the attack, hackers posted threatening messages on the affected Ukrainian government websites. The messages were partly written in Polish and referred to controversial events in Ukraine's history over its relationship with Poland. A review of the messages written in Polish revealed clear mistakes in the text, prompting many to speculate that this was an attempt to try and deflect responsibility for the attack on to Polish hackers.<br />
<br />
Given the tense negotiations between Russia, the US and NATO over Russia's build-up of troops on the Ukrainian border, many Ukrainians suspect Russia to be behind the attack.<br />
<br />
Click <a href="https://www.computerweekly.com/news/252512047/Nato-offers-tech-support-after-massive-cyber-attack-hits-Ukraine">here</a> to read an article in Computer Weekly on this.<br />
<br />
<strong>National Cyber Strategy will improve skills and build resilience</strong><br />
<br />
The UK government has promised to expand and enhance cyber skills across the UK through adopting a new National Cyber Strategy and increasing investment in the National Cyber Force. The introduction of this new strategy is aimed at advancing the UK's national interests in the cyberspace, thus strengthening its defensive and offensive capabilities through the building of technical expertise. It is hoped that this should also reduce the UK's reliance on suppliers from other countries who do not necessarily share the same values.<br />
<br />
Click <a href="https://www.standard.co.uk/news/uk/huawei-government-queen-london-south-east-b972005.html">here</a> to read an article from the Evening Standard with more detail.]]></content:encoded></item><item><guid isPermaLink="false">{91CCD89F-C298-48ED-96CE-600446D32639}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/cyber-bytes-issue-37/</link><title>Cyber_Bytes - Issue 37</title><description><![CDATA[<strong>The NCSC's 2021 Annual Review released</strong><br />
<br />
The National Cyber Security Centre (NCSC) has released the results of its annual review, highlighting the work it has undertaken to protect the UK over the past 12 months. Between August 2020 and September 2021, the NCSC handled a record 777 incidents. The NCSC reportedly received 5.9 million reports of malicious content from the public which led to 53,000 scams and 96,500 URLs being taken down.<br />
<br />
The review also highlighted its successes in issuing guidance and threat assessments to over 80 companies and 14 universities and taking down 2.3 million cyber-enabled commodity campaigns which included 442 NHS-branded phishing campaigns.<br />
<br />
The increase in NCSC's involvement in cyber incidents is partially linked to the ongoing work of its Threat Operations and Assessment teams, tasked to identify threats proactively. Services have included the Early Warning Service which alerts organisations to emerging threats through cyber security advice for those working in education.<br />
<br />
The report also highlights the NCSC's success in its educational programs, introducing over 56,000 11-to-17-year-olds to technology and cyber security. This included more than 6,500 pupils from 600 schools who entered the NCSC’s pioneering CyberFirst Girls Competition this year, which aims to tackle gender diversity in the area.<br />
<br />
Click <a href="https://www.ncsc.gov.uk/news/record-number-mitigated-incidents">here</a> to read more.<br />
<strong><br />
The Supreme Court hands down its judgment in Lloyd v Google</strong><br />
<br />
The Supreme Court has overturned the Court of Appeal's decision in Lloyd v Google, restoring the order refusing the Claimant's application for permission to serve proceedings on Google.<br />
<br />
The highly anticipated decision rejects the concept of "loss of control" damages and puts a requirement on individuals to prove they have suffered material damage or distress in order to recover compensation under section 13 of the Data Protection Act.<br />
<br />
Represented by RPC, techUK, one of the interveners in the appeal, embraced the decision as a win for individuals to exercise their rights in relation to data breaches, while also continuing to support the innovative capacity and competitiveness of the UK tech sector.<br />
<br />
As a result of the decision, data controllers will welcome a reduced exposure to liability arising from data claims.<br />
<br />
Click <a href="/thinking/data-and-privacy/the-supreme-court-hands-down-judgment-in-lloyd-v-google/">here</a> to read RPC's full note.<br />
<br />
<strong>UK and US intelligence services reaffirm a joint commitment to disrupt and deter new and emerging cyber threats</strong><br />
<br />
GCHQ director, Jeremy Fleming, and UK Strategic Command agent, Paul Sanders met with their NSA and US Cyber Command counterpart, Paul Nkasone, in a session at the annual Cyber Management Review forum hosted at the NSA’s headquarters in Fort Meade, Maryland.<br />
<br />
The event was an opportunity for the UK and US to share intelligence, develop ideas and improve overall defences to cyber attacks. It is hoped that continued co-operation will lead to greater defences and deterrents against malicious cyber activity.<br />
<br />
Click <a href="https://www.computerweekly.com/news/252509762/GCHQ-NSA-chiefs-recommit-to-counter-cyber-threats">here </a>to read more from Computer Weekly.<br />
<br />
<strong>US and UK agencies say Iran is behind ‘ongoing’ ransomware campaign</strong><br />
<br />
US, UK, and Australian cyber authorities have warned that Iranian state-sponsored APT groups are behind an ongoing ransomware campaign targeting critical infrastructure.<br />
<br />
The groups targeted Microsoft Exchange flaws to carry out ransomware attacks, according to UK and US security agencies. In a joint statement, the agencies stated that the groups have been exploiting a weakness since October 2021. The groups gained access to critical infrastructure organisations, including those in the US transportation and healthcare sectors, in order to then exfiltrate or encrypt data for extortion. Specifically, Microsoft found hackers stealing credentials via "interview requests" targeting individuals through emails that contained tracking links to confirm whether the user had opened the file. If a victim responded, they then sent a link to a fake Google Meeting, which led to a credential harvesting page.<br />
<br />
Authorities state that the groups are targeting flaws rather than specific sectors but urge organisations to patch and update their systems, implement two-factor authentication, use strong passwords and anti-virus software and remain alert to phishing threats.<br />
<br />
Click <a href="https://www.itpro.co.uk/security/ransomware/361589/iran-backed-hackers-ransomware-critical-infrastructure-warning">here</a> to read more information from IT Pro.<br />
<br />
<strong>New ransomware actor uses password-protected archives to bypass encryption protection</strong><br />
<br />
Ransomware group, "Memento Team" is using a new tactic to hold victim's files hostage. Instead of encrypting files, they copy them into password-protected archives, using a version of WinRAR, encrypting the password and then deleting the original files. This tactic comes after setbacks in attempts to encrypt data were foiled by endpoint protection.<br />
<br />
They appear to be replicating the wording of other well-known group REvil in their message to primary IT administrators, even including the tell-tale content within ransom notes.<br />
<br />
Attacks like these further emphasise the need for applying security patches, even outside those that Microsoft currently offer.<br />
<br />
Click <a href="https://news.sophos.com/en-us/2021/11/18/new-ransomware-actor-uses-password-protected-archives-to-bypass-encryption-protection/">here</a> to read more from Sophos News.]]></description><pubDate>Thu, 16 Dec 2021 11:45:00 Z</pubDate><category>Data and privacy</category><authors:names>Richard Breavington, Daniel Guilfoyle, Ian Dinning, Rachel Ford, Christopher Ashton, Elizabeth Zang, Emanuele Santella </authors:names><content:encoded><![CDATA[<strong>The NCSC's 2021 Annual Review released</strong><br />
<br />
The National Cyber Security Centre (NCSC) has released the results of its annual review, highlighting the work it has undertaken to protect the UK over the past 12 months. Between August 2020 and September 2021, the NCSC handled a record 777 incidents. The NCSC reportedly received 5.9 million reports of malicious content from the public which led to 53,000 scams and 96,500 URLs being taken down.<br />
<br />
The review also highlighted its successes in issuing guidance and threat assessments to over 80 companies and 14 universities and taking down 2.3 million cyber-enabled commodity campaigns which included 442 NHS-branded phishing campaigns.<br />
<br />
The increase in NCSC's involvement in cyber incidents is partially linked to the ongoing work of its Threat Operations and Assessment teams, tasked to identify threats proactively. Services have included the Early Warning Service which alerts organisations to emerging threats through cyber security advice for those working in education.<br />
<br />
The report also highlights the NCSC's success in its educational programs, introducing over 56,000 11-to-17-year-olds to technology and cyber security. This included more than 6,500 pupils from 600 schools who entered the NCSC’s pioneering CyberFirst Girls Competition this year, which aims to tackle gender diversity in the area.<br />
<br />
Click <a href="https://www.ncsc.gov.uk/news/record-number-mitigated-incidents">here</a> to read more.<br />
<strong><br />
The Supreme Court hands down its judgment in Lloyd v Google</strong><br />
<br />
The Supreme Court has overturned the Court of Appeal's decision in Lloyd v Google, restoring the order refusing the Claimant's application for permission to serve proceedings on Google.<br />
<br />
The highly anticipated decision rejects the concept of "loss of control" damages and puts a requirement on individuals to prove they have suffered material damage or distress in order to recover compensation under section 13 of the Data Protection Act.<br />
<br />
Represented by RPC, techUK, one of the interveners in the appeal, embraced the decision as a win for individuals to exercise their rights in relation to data breaches, while also continuing to support the innovative capacity and competitiveness of the UK tech sector.<br />
<br />
As a result of the decision, data controllers will welcome a reduced exposure to liability arising from data claims.<br />
<br />
Click <a href="/thinking/data-and-privacy/the-supreme-court-hands-down-judgment-in-lloyd-v-google/">here</a> to read RPC's full note.<br />
<br />
<strong>UK and US intelligence services reaffirm a joint commitment to disrupt and deter new and emerging cyber threats</strong><br />
<br />
GCHQ director, Jeremy Fleming, and UK Strategic Command agent, Paul Sanders met with their NSA and US Cyber Command counterpart, Paul Nkasone, in a session at the annual Cyber Management Review forum hosted at the NSA’s headquarters in Fort Meade, Maryland.<br />
<br />
The event was an opportunity for the UK and US to share intelligence, develop ideas and improve overall defences to cyber attacks. It is hoped that continued co-operation will lead to greater defences and deterrents against malicious cyber activity.<br />
<br />
Click <a href="https://www.computerweekly.com/news/252509762/GCHQ-NSA-chiefs-recommit-to-counter-cyber-threats">here </a>to read more from Computer Weekly.<br />
<br />
<strong>US and UK agencies say Iran is behind ‘ongoing’ ransomware campaign</strong><br />
<br />
US, UK, and Australian cyber authorities have warned that Iranian state-sponsored APT groups are behind an ongoing ransomware campaign targeting critical infrastructure.<br />
<br />
The groups targeted Microsoft Exchange flaws to carry out ransomware attacks, according to UK and US security agencies. In a joint statement, the agencies stated that the groups have been exploiting a weakness since October 2021. The groups gained access to critical infrastructure organisations, including those in the US transportation and healthcare sectors, in order to then exfiltrate or encrypt data for extortion. Specifically, Microsoft found hackers stealing credentials via "interview requests" targeting individuals through emails that contained tracking links to confirm whether the user had opened the file. If a victim responded, they then sent a link to a fake Google Meeting, which led to a credential harvesting page.<br />
<br />
Authorities state that the groups are targeting flaws rather than specific sectors but urge organisations to patch and update their systems, implement two-factor authentication, use strong passwords and anti-virus software and remain alert to phishing threats.<br />
<br />
Click <a href="https://www.itpro.co.uk/security/ransomware/361589/iran-backed-hackers-ransomware-critical-infrastructure-warning">here</a> to read more information from IT Pro.<br />
<br />
<strong>New ransomware actor uses password-protected archives to bypass encryption protection</strong><br />
<br />
Ransomware group, "Memento Team" is using a new tactic to hold victim's files hostage. Instead of encrypting files, they copy them into password-protected archives, using a version of WinRAR, encrypting the password and then deleting the original files. This tactic comes after setbacks in attempts to encrypt data were foiled by endpoint protection.<br />
<br />
They appear to be replicating the wording of other well-known group REvil in their message to primary IT administrators, even including the tell-tale content within ransom notes.<br />
<br />
Attacks like these further emphasise the need for applying security patches, even outside those that Microsoft currently offer.<br />
<br />
Click <a href="https://news.sophos.com/en-us/2021/11/18/new-ransomware-actor-uses-password-protected-archives-to-bypass-encryption-protection/">here</a> to read more from Sophos News.]]></content:encoded></item><item><guid isPermaLink="false">{641F62FC-626A-4A67-B1ED-16F18E9DEB17}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/cyber-bytes-issue-36/</link><title>Cyber_Bytes - Issue 36</title><description><![CDATA[<p><strong>The High Court decision in Rolfe and others v Veale Wasbrough Vizards [2021] EWHC (QB)</strong></p>
<p>This High Court decision is a helpful development in data protection claims, showing a willingness of the Court to acknowledge the existence of a de minimis level of distress and/or damages for a data claim to be successfully litigated.</p>
<p>The Defendant successfully applied for summary judgment in circumstances where the Defendant had inadvertently sent an email containing relatively anodyne personal data (including names, a home address, and an invoice for school fees). Given the very limited amount of personal data involved, combined with the fact that the mistake was addressed promptly and only accessible by one individual, the judge stated the Claimants did not present a credible case that distress or damage over a de minimis threshold will be proved. As a result, there was no viable claim.</p>
<p>Click <a href="https://www.bailii.org/ew/cases/EWHC/QB/2021/2809.html">here</a> to read more.</p>
<p><strong>Governments turn tables on ransomware gang REvil by pushing it offline</strong></p>
<p>Following a number of high-profile ransomware attacks against US companies, US law enforcement and intelligence personnel have forced the Revil ransomware group offline by shutting down it's "Happy Blog" website, which is used to leak victim data and extort companies.</p>
<p>This signifies a shift in attitude from the US Government, which is actively trying to disrupt criminal groups to try to prevent companies from falling victim to ransomware gangs. With REvil being such a prevalent cybercriminal group responsible for highly disruptive attacks, such as that carried out on the software vendor Kaseya, they were seen as the primary target by the US Government. This sends a clear message to other ransomware gangs that the US Government is now actively pursuing cybercriminals and moving forward on efforts to disrupt some of the top ransomware gangs.</p>
<p>Click <a href="https://www.reuters.com/technology/exclusive-governments-turn-tables-ransomware-gang-revil-by-pushing-it-offline-2021-10-21/">here</a> to read a Reuters article providing more detail.</p>
<p><strong>Conti Ransom Gang Starts Selling Access to Victims</strong></p>
<p>Conti have recently indicated that they intend to start selling access to the networks of victim organisations in circumstances where the victim does not pay their ransom demands. It is currently unclear as to why Conti have made these changes to their 'business plan'. It may be a further ploy to bring victim companies to the negotiating table or Conti could simply be aligning its operations with competing ransomware affiliate programs run by competitors.</p>
<p>For a reliably informative article from Krebs on Security, click <a href="https://krebsonsecurity.com/2021/10/conti-ransom-gang-starts-selling-access-to-victims/">here</a>.</p>
<p><strong>SRA approves PII clause clarifying cybercrime cover</strong></p>
<p>The SRA, working closely with the Law Society, have approved a new cybercrime clause which must be included within the minimum terms and conditions of law firms' professional indemnity insurance policies. The clause will explicitly mention cover for cybercrime and specify what losses fall within the scope of a potential claim.</p>
<p>The new clause was deemed necessary as law firms can be seen as attractive targets for cyber criminals. It is hoped that having a clause specifically dedicated to cybercrime will provide clarity to consumers, law firms and insurers alike, as to what losses will fall within the scope of a potential claim in the event of a cyber-attack. Subject to final approval from the Legal Services Board, the new clause is expected to be in place for renewals from early next year.</p>
<p>The full Law Society Gazette article is available <a href="https://www.lawgazette.co.uk/news/sra-approves-pii-clause-clarifying-cybercrime-cover/5110262.article">here</a>.</p>
<p><strong>Britain Wants to Use Its New Cyber Command to 'Hunt' Ransomware Gangs</strong></p>
<p>Over the last few years, the UK has seen a significant increase in the number of ransomware attacks being carried out by cybercriminals. Its previous approach to dealing with these attacks has arguably been reactive rather than proactive. However, in an attempt to combat cybercrime, the UK Government is said to be changing its tactics, focusing on actively and openly pursuing cybercriminals through its new unified command, the National Cyber Force. This new approach follows the US Government's recent take down of criminal group REvil (discussed above) and signifies a change of attitude by the UK Government in an attempt to crack down on the cyber criminals and curtail future attacks before they happen.</p>
<p>Click <a href="https://gizmodo.com/britain-wants-to-use-its-new-cyber-command-to-hunt-rans-1847930905">here</a> to read an article from Gizmodo providing more detail.</p>]]></description><pubDate>Wed, 10 Nov 2021 17:55:48 Z</pubDate><category>Data and privacy</category><authors:names>Richard Breavington, Daniel Guilfoyle, Ian Dinning, Rachel Ford, Christopher Ashton, Elizabeth Zang, Emanuele Santella </authors:names><content:encoded><![CDATA[<p><strong>The High Court decision in Rolfe and others v Veale Wasbrough Vizards [2021] EWHC (QB)</strong></p>
<p>This High Court decision is a helpful development in data protection claims, showing a willingness of the Court to acknowledge the existence of a de minimis level of distress and/or damages for a data claim to be successfully litigated.</p>
<p>The Defendant successfully applied for summary judgment in circumstances where the Defendant had inadvertently sent an email containing relatively anodyne personal data (including names, a home address, and an invoice for school fees). Given the very limited amount of personal data involved, combined with the fact that the mistake was addressed promptly and only accessible by one individual, the judge stated the Claimants did not present a credible case that distress or damage over a de minimis threshold will be proved. As a result, there was no viable claim.</p>
<p>Click <a href="https://www.bailii.org/ew/cases/EWHC/QB/2021/2809.html">here</a> to read more.</p>
<p><strong>Governments turn tables on ransomware gang REvil by pushing it offline</strong></p>
<p>Following a number of high-profile ransomware attacks against US companies, US law enforcement and intelligence personnel have forced the Revil ransomware group offline by shutting down it's "Happy Blog" website, which is used to leak victim data and extort companies.</p>
<p>This signifies a shift in attitude from the US Government, which is actively trying to disrupt criminal groups to try to prevent companies from falling victim to ransomware gangs. With REvil being such a prevalent cybercriminal group responsible for highly disruptive attacks, such as that carried out on the software vendor Kaseya, they were seen as the primary target by the US Government. This sends a clear message to other ransomware gangs that the US Government is now actively pursuing cybercriminals and moving forward on efforts to disrupt some of the top ransomware gangs.</p>
<p>Click <a href="https://www.reuters.com/technology/exclusive-governments-turn-tables-ransomware-gang-revil-by-pushing-it-offline-2021-10-21/">here</a> to read a Reuters article providing more detail.</p>
<p><strong>Conti Ransom Gang Starts Selling Access to Victims</strong></p>
<p>Conti have recently indicated that they intend to start selling access to the networks of victim organisations in circumstances where the victim does not pay their ransom demands. It is currently unclear as to why Conti have made these changes to their 'business plan'. It may be a further ploy to bring victim companies to the negotiating table or Conti could simply be aligning its operations with competing ransomware affiliate programs run by competitors.</p>
<p>For a reliably informative article from Krebs on Security, click <a href="https://krebsonsecurity.com/2021/10/conti-ransom-gang-starts-selling-access-to-victims/">here</a>.</p>
<p><strong>SRA approves PII clause clarifying cybercrime cover</strong></p>
<p>The SRA, working closely with the Law Society, have approved a new cybercrime clause which must be included within the minimum terms and conditions of law firms' professional indemnity insurance policies. The clause will explicitly mention cover for cybercrime and specify what losses fall within the scope of a potential claim.</p>
<p>The new clause was deemed necessary as law firms can be seen as attractive targets for cyber criminals. It is hoped that having a clause specifically dedicated to cybercrime will provide clarity to consumers, law firms and insurers alike, as to what losses will fall within the scope of a potential claim in the event of a cyber-attack. Subject to final approval from the Legal Services Board, the new clause is expected to be in place for renewals from early next year.</p>
<p>The full Law Society Gazette article is available <a href="https://www.lawgazette.co.uk/news/sra-approves-pii-clause-clarifying-cybercrime-cover/5110262.article">here</a>.</p>
<p><strong>Britain Wants to Use Its New Cyber Command to 'Hunt' Ransomware Gangs</strong></p>
<p>Over the last few years, the UK has seen a significant increase in the number of ransomware attacks being carried out by cybercriminals. Its previous approach to dealing with these attacks has arguably been reactive rather than proactive. However, in an attempt to combat cybercrime, the UK Government is said to be changing its tactics, focusing on actively and openly pursuing cybercriminals through its new unified command, the National Cyber Force. This new approach follows the US Government's recent take down of criminal group REvil (discussed above) and signifies a change of attitude by the UK Government in an attempt to crack down on the cyber criminals and curtail future attacks before they happen.</p>
<p>Click <a href="https://gizmodo.com/britain-wants-to-use-its-new-cyber-command-to-hunt-rans-1847930905">here</a> to read an article from Gizmodo providing more detail.</p>]]></content:encoded></item><item><guid isPermaLink="false">{22D88EB0-1A1C-45D6-8605-25A29B341DE7}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/the-supreme-court-hands-down-judgment-in-lloyd-v-google/</link><title>The Supreme Court hands down judgment in Lloyd v Google </title><description><![CDATA[In a keenly anticipated judgment that has significant ramifications for UK data protection, the Supreme Court has today overturned the Court of Appeal's decision in Lloyd v Google and restored the original order made by the High Court, refusing the claimant's application for permission to serve proceedings on Google outside the jurisdiction. ]]></description><pubDate>Wed, 10 Nov 2021 12:48:00 Z</pubDate><category>Data and privacy</category><authors:names>David Cran</authors:names><content:encoded><![CDATA[<p>RPC acted for techUK, one of the interveners in the appeal, which has welcomed the judgment as allowing individuals to exercise their rights in relation to data breaches, while also continuing to support the innovative capacity and competitiveness of the UK tech sector (read techUK's full statement <a rel="noopener noreferrer" href="https://www.techuk.org/resource/techuk-responds-to-the-judgement-of-the-supreme-court-in-the-appeal-of-richard-lloyd-v-google-llc.html" target="_blank">here</a>). In this article, we cover the key points arising from the judgment of Lord Leggatt (with whom the other justices agreed). </p>
<p>For a summary of the background to the claim and the Court of Appeal's decision, please see our previous blog <a rel="noopener noreferrer" href="https://www.rpc.co.uk/snapshots/data-protection/landmark-judgment-in-representative-data-protection-action/" target="_blank">here</a>. </p>
<p><strong>Monetary compensation </strong></p>
<p>The claimant’s case (which had been accepted by the Court of Appeal) was that an individual is entitled to recover compensation under section 13 of the Data Protection Act 1998 (the "<strong>Act</strong>") without proof of material damage or distress whenever a data controller fails to comply with any of the requirements of the Act in relation to any of that individual's personal data, provided only that the breach is not trivial or de minimis.  This was presented as "loss of control" or "user" damages; a lowest common denominator of loss suffered by each and every individual by reason of the breach.</p>
<p>Reversing the Court of Appeal's decision, the Supreme Court held that, to recover compensation, it is not enough to merely prove a breach by a data controller of its statutory duty under section 4(4) of the Act: an individual is only entitled to compensation under section 13 where "damage" - or in some circumstances "distress" - is suffered as a consequence of such a breach of duty.  It is therefore necessary to prove that the breach of the Act has caused material damage or distress to the individual concerned.  The claimant's construct of "loss of control" or "user" damages was rejected. </p>
<p><em>Takeaway</em>: In order to bring a claim for compensation for breach of data protection legislation, it is necessary for a data subject to prove that they suffered "damage" or "distress" – a contravention by a data controller of the requirements of data protection legislation alone is not sufficient.</p>
<p><strong>Representative claim </strong></p>
<p>Lord Leggatt could see no legitimate objection to a representative claim brought to establish whether Google was in breach of the Act, and, if so, seeking a declaration that any member of the represented class who has suffered damage by reason of the breach is entitled to be paid compensation. However, the Claimant had not proposed such process given that success at the first stage would not itself generate any financial return for the litigation funders or the persons represented. Both courts below accepted that a representative action is the only way the claims could be pursued. </p>
<p><em>Takeaway</em>: A representative action remains an appropriate mechanism for seeking a declaration that each member of class has suffered damage and could also be used where each member of the class has suffered the same damage (although the latter is likely to be difficult in a data claim). </p>
<p><strong>De minimis threshold </strong></p>
<p>The claimant accepted that there is a threshold of seriousness which must be crossed before a breach of the Act will give rise to an entitlement to compensation. The Supreme Court held that the position that the claimant asserted in each individual case was not sufficient to surmount the threshold and held that it was "impossible to characterise such damages as more than trivial." </p>
<p><em>Takeaway</em>: The Supreme Court did not provide any further guidance on what constitutes a de minimis or trivial contravention of data protection legislation. There is likely to be further debate as to this threshold when claims are asserted against data controllers, although the mere fact of a breach will not be sufficient. </p>
<p><strong>Relevance of GDPR</strong></p>
<p>The Supreme Court acknowledged that the parties and the interveners had made frequent references to the provisions of the General Data Protection Regulation and the DPA 2018 in their submissions but given that the meaning and effect of the DPA 1998 and the Data Protection Directive could not be affected by the subsequent legislation, it was not considered.</p>
<p><em>Takeaway</em>: Although GDPR and the DPA 2018 were not considered capable of helping to resolve the particular issues raised on the appeal, given the wording of the provisions concerning compensation are substantively replicated in Article 82 GDPR, the Supreme Court's judgment will have future application. </p>
<p><strong>Comment</strong></p>
<p>The Supreme Court's judgment will be warmly welcomed by data controllers who, following the Court of Appeal's judgment, were exposed to very significant potential liability arising from data claims, even if no specific damage was shown to have been suffered by any individual.</p>
<p>The judgment has firmly rejected the basis of this class action and many others that were waiting in the wings (some of which had been stayed pending handing down of this judgment). It is likely to have a very significant impact on UK industry across many different sectors that handle customer data, as well as the UK legal market, including claimant firms, litigation funders and ATE insurers.</p>
<p>Although the Supreme Court has left the door open for representative actions to proceed in relation to claims for breaches of data protection legislation, the rejection of the concept of "loss of control" damages and the requirement that individuals must prove they have suffered damage means that a representative action is unlikely to be a financially viable option for legal advisers and funders in most data claims. </p>]]></content:encoded></item><item><guid isPermaLink="false">{B1E45F48-211A-4614-BCF7-3FDBC849DF78}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/cyber-bytes-issue-35/</link><title>Cyber_Bytes - Issue 35</title><description><![CDATA[<p><strong>Ransom gangs increase hostility towards victims that seek help</strong></p>
<p>In the latest development to the methods used by ransomware gangs, the Grief ransomware gang (with apparent links to DoppelPaymer) has warned that they will delete decryption keys, thereby rendering decryption absolutely impossible, for victim organisations that bring in professionals to negotiate the ransom or who try to decrypt data themselves. This builds on Ragnar Locker group's recent warning that it would leak all exfiltrated data from victims who contact law enforcement authorities.</p>
<p>There are a number of benefits to victims seeking assistance which ransom gangs might be either fearful of or irritated by.  These include reduced profits through negotiation of ransom sum and also the possibility that a victim may be advised of sanctions which would simply preclude payment of the ransom.</p>
<p>Click <a href="https://www.insurancejournal.com/news/international/2021/09/13/631214.htm">here</a> to read more in an article on the Computing blog.</p>
<p><strong>Traditional data analytics ensure that reinsurers remain hesitant over cyber security cover</strong></p>
<p>Due to its relative infancy compared to other reinsurance options, the cyber security insurance market is struggling to attract reinsurance interest,  This comes as reinsurers grapple with the complexities of quantifying the extent of cyber security risk, accordingly to the Insurance Journal. Data development is in its early stages, as historical data modelling is less useful in a market where the data is constantly changing.  This forces potential reinsurers to consider less traditional methods to risk quantification. A better approach, suggested by Envelop and Corvus, might be for businesses to put in place infrastructure that collects data, both on individual accounts and in the aggregate; allowing for analytics to change and move with the nature of risk.</p>
<p>Click <a href="https://www.insurancejournal.com/news/international/2021/09/13/631214.htm">here</a> to read more.</p>
<p><strong>Cyber insurance providers and customers to improve knowledge base to combat criminality amidst Ransomware boom</strong></p>
<p>With ransomware demand values on the rise, cyber insurers are being forced to raise premiums and restrict coverage. Naturally, these factors are contributing to more and more businesses questioning the need for cyber insurance.</p>
<p>An article published on HelpNetSecurity suggests that it is essential for business purchasing cyber insurance to be aware of the intricacies and requirements that differentiate cyber policies from other traditional products.  Cyber insurance should also be combined with preventative cyber security investment. Insurance providers, on the other hand, are grappling with the conundrum of how to protect businesses from ransomware attacks whilst not simultaneously subsidising a growing ransomware industry. </p>
<p>Click <a href="https://www.helpnetsecurity.com/2021/09/10/cyber-insurance-ransomware/">here</a> to read more.</p>
<p><strong>German Parliamentary spokesperson points finger at Russia for election cyber breach</strong></p>
<p>In the lead up to Germany's parliamentary elections at the end of September, Russia's state and GRU intelligence services have been blamed for a cyber-attack on the German Parliament by the spokesperson for the German Parliament, according to City AM. Andrea Sasse identified a hacker with the alias "Ghostwriter" as directly responsible.  This hacker is believed to be a Russian-state-sponsored individual. The alleged motive is to spread disinformation and otherwise influence the integrity of the upcoming democratic process. </p>
<p>Click <a href="https://www.cityam.com/russia-blamed-by-german-foreign-ministry-for-parliament-cyber-attack/">here</a> to read more</p>]]></description><pubDate>Wed, 22 Sep 2021 12:00:25 +0100</pubDate><category>Data and privacy</category><authors:names>Richard Breavington, Daniel Guilfoyle, Ian Dinning, Rachel Ford, Christopher Ashton</authors:names><content:encoded><![CDATA[<p><strong>Ransom gangs increase hostility towards victims that seek help</strong></p>
<p>In the latest development to the methods used by ransomware gangs, the Grief ransomware gang (with apparent links to DoppelPaymer) has warned that they will delete decryption keys, thereby rendering decryption absolutely impossible, for victim organisations that bring in professionals to negotiate the ransom or who try to decrypt data themselves. This builds on Ragnar Locker group's recent warning that it would leak all exfiltrated data from victims who contact law enforcement authorities.</p>
<p>There are a number of benefits to victims seeking assistance which ransom gangs might be either fearful of or irritated by.  These include reduced profits through negotiation of ransom sum and also the possibility that a victim may be advised of sanctions which would simply preclude payment of the ransom.</p>
<p>Click <a href="https://www.insurancejournal.com/news/international/2021/09/13/631214.htm">here</a> to read more in an article on the Computing blog.</p>
<p><strong>Traditional data analytics ensure that reinsurers remain hesitant over cyber security cover</strong></p>
<p>Due to its relative infancy compared to other reinsurance options, the cyber security insurance market is struggling to attract reinsurance interest,  This comes as reinsurers grapple with the complexities of quantifying the extent of cyber security risk, accordingly to the Insurance Journal. Data development is in its early stages, as historical data modelling is less useful in a market where the data is constantly changing.  This forces potential reinsurers to consider less traditional methods to risk quantification. A better approach, suggested by Envelop and Corvus, might be for businesses to put in place infrastructure that collects data, both on individual accounts and in the aggregate; allowing for analytics to change and move with the nature of risk.</p>
<p>Click <a href="https://www.insurancejournal.com/news/international/2021/09/13/631214.htm">here</a> to read more.</p>
<p><strong>Cyber insurance providers and customers to improve knowledge base to combat criminality amidst Ransomware boom</strong></p>
<p>With ransomware demand values on the rise, cyber insurers are being forced to raise premiums and restrict coverage. Naturally, these factors are contributing to more and more businesses questioning the need for cyber insurance.</p>
<p>An article published on HelpNetSecurity suggests that it is essential for business purchasing cyber insurance to be aware of the intricacies and requirements that differentiate cyber policies from other traditional products.  Cyber insurance should also be combined with preventative cyber security investment. Insurance providers, on the other hand, are grappling with the conundrum of how to protect businesses from ransomware attacks whilst not simultaneously subsidising a growing ransomware industry. </p>
<p>Click <a href="https://www.helpnetsecurity.com/2021/09/10/cyber-insurance-ransomware/">here</a> to read more.</p>
<p><strong>German Parliamentary spokesperson points finger at Russia for election cyber breach</strong></p>
<p>In the lead up to Germany's parliamentary elections at the end of September, Russia's state and GRU intelligence services have been blamed for a cyber-attack on the German Parliament by the spokesperson for the German Parliament, according to City AM. Andrea Sasse identified a hacker with the alias "Ghostwriter" as directly responsible.  This hacker is believed to be a Russian-state-sponsored individual. The alleged motive is to spread disinformation and otherwise influence the integrity of the upcoming democratic process. </p>
<p>Click <a href="https://www.cityam.com/russia-blamed-by-german-foreign-ministry-for-parliament-cyber-attack/">here</a> to read more</p>]]></content:encoded></item><item><guid isPermaLink="false">{EE89AEDA-86D6-489B-81EA-4B361BCC8EB6}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/cyber-bytes-34/</link><title>Cyber_Bytes - Issue 34</title><description><![CDATA[We hope you enjoy this latest edition of Cyber_Bytes, our bi­weekly roundup of key<br/>developments in cyber, tech and evolving risks.]]></description><pubDate>Tue, 07 Sep 2021 17:21:07 +0100</pubDate><category>Data and privacy</category><authors:names>Richard Breavington, Daniel Guilfoyle, Ian Dinning, Rachel Ford, Christopher Ashton</authors:names><content:encoded><![CDATA[<p><strong>Cyber security professionals study analyses the effects of law enforcement involvement in ransomware attacks</strong></p>
<p>A study by Talion, a branch of BAE Systems, has reported that 45% of cyber security professionals consider law enforcement involvement to detract from a speedy recovery from ransomware attacks. One reason suggested for this is that law enforcement mechanisms are viewed as insufficiently supportive, being more likely to tie up victims in legal red tape than to lend valuable expertise and assistance; particularly where payment of a ransom is being contemplated.</p>
<p>The #Ransomaware coalition suggests that the introduction of a clear legal framework available to those companies that fall victim to hackers might instead assist and aims to promote collaboration between organisations to mitigate the effects of ransomware attacks.</p>
<p>Click <a href="https://www.computerweekly.com/news/252505828/Calling-the-cops-for-ransomware-attacks-doesnt-help-say-cyber-pros">here</a> to read more.</p>
<p><strong>Cyber Insurance may become essential for small to midsized businesses</strong> </p>
<p>The COVID pandemic has been a key trigger behind the dramatic increase of remote working over the last year. It is no coincidence that 2020 also saw ransomware attacks rise in frequency by approximately 50%, in part as cyber criminals have taken advantage of the limited security remote working has to offer. Attacks of this kind have led to an estimated $4bn of losses in the last year, though predictions see this number rise to $28bn annually by 2027. In such a climate, where 45% of small to midsized businesses consider their cyber security levels ineffective and where 60% cease operations within 6 months of a data breach, an article by The Tech Register suggested cyber insurance may become a vital commodity in ensuring such companies don't meet this fate.</p>
<p>Click <a href="https://www.techregister.co.uk/cyber-insurance-might-be-the-lifeboat-for-startups/">here</a> to read more.</p>
<p><strong>To combat modern and increasing cyber security threats we must create a Cyber Security Culture</strong></p>
<p>For businesses that take online payments, the Payment Card Industry Data Security Standard (PCI DSS) requires various substantive security measures. With Hiscox identifying 43% of businesses being targeted by cyber criminals last year alone, the requirement to have extra measures in place seems sensible. In practice however, it is concerning that 31% of respondents to a SentryBay poll regard PCI DSS as too complex to comply with effectively and 24% criticise the processes as contradictory. </p>
<p>More than half in the same poll admit their organisation is either non­compliant or has previously failed an assessment. It appears that a wider dialogue on organisational cyber security culture may be needed, along with more support and guidance provided to businesses wishing to take payments securely.</p>
<p>Click <a href="https://www.teiss.co.uk/pci-dss-the-importance-of-cyber-security-culture/">here</a> to read more.</p>
<p><strong>Cyber supply chain organisations suffer more significant implications to security threats</strong></p>
<p>An article on website Emerging Risks indicates that August's ransomware attack on software high­flyer Kaseya VSA has been considered the largest ever supply chain cyber­ attack, affecting over 1,500 businesses' IT networks. This demonstrates the extent of the detrimental impact that improperly secured third parties can have on cyber supply chains. It is not simply hacking that must be catered for, however, as infrastructure failures can yield similar practical and reputational repercussions. Business should be aware of the effects that supply chain breaches can pose in advance of any attack, so as to effectively mitigate the effects that may otherwise cause costly disputes with stakeholders, clients and insurers.</p>
<p>Click <a href="https://emergingrisks.co.uk/third-parties-can-pose-major-cyber-risk-to-supply-chain/">here</a> to read more.</p>
<p><strong>Vast majority of companies expect to fall foul of customer information breaches this year</strong></p>
<p>Of those who responded to Trend Micro's report poll, 80% indicated that they expected to have their customers' information breached in the next 12 months. Part of the reason behind the rising predictions of data breaches is the shift in popularity from traditional to distributed networks that support the increased need for remote working but pose a more complex challenge for IT security. The result is that many organisations are fearful of their potential lack of ability to prevent or even detect cyber breaches and the effects these may have on their customers. Businesses will need to carefully consider whether they have adequate resources aimed at preventing and mitigating the results of attacks on their data stores, given the new ways of working.</p>
<p>Click <a href="https://www.techregister.co.uk/security-teams-report-rise-in-cyber-risk-a-customers-perspective/">here</a> to read more.</p>
<p><strong>Be prepared for an incoming wave of AI­targeting cyber­attacks</strong> </p>
<p>As the adoption of AI continues to accelerate, cyber­attacks manipulating AI systems are expected to follow a similar trend. An article by The Tech Register, records that the AI industry is alarmingly unready for the wave of coming real­world attacks against AI systems, according to the CEO of security research firm, Adversa. With public perception of how trustworthy AI is having a large impact on further adoption, it is concerning that Adversa's research shows that every "machine learning" model in the top 60 most commonly used models in the industry are prone to at least one vulnerability. </p>
<p>Given the high stakes involved when asking the public to trust "what is essentially a black box". it will not be possible to "bolt security on " according to Oliver Rochford, a researcher and former Gartner analyst. In order for growth of AI " to continue, these security concerns will need to be addressed.</p>
<p>Click <a href="https://www.techregister.co.uk/artificial-intelligence-high-adoption-rates-attract-cyber-hacks-that-target-ai-and-ml/">here</a> to read more</p>]]></content:encoded></item><item><guid isPermaLink="false">{CAE33F39-1828-49CC-98EC-CC8B56D9E2EB}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/case-comment-striking-out-of-privacy-and-confidence-actions-in-the-dixons-data-breach-case/</link><title>Case comment: striking out of privacy and confidence actions in the Dixons data breach case</title><description><![CDATA[The number of claims issued in the High Court (Media and Communications List) with a data protection element continues to increase. The rise in claim numbers can be attributed to a number of factors including: (i) individuals becoming more aware of their rights under data protection legislation, (ii) uncertainty as to whether individuals may recover damages for a loss of control of their personal data without proving material damage or distress; (iii) the abundance of specialist law firms who are prepared to act for individuals on a "no-win-no-fee" basis and (iv) the availability of After the Event ("ATE") insurance to protect a would-be claimant against adverse costs orders. ]]></description><pubDate>Tue, 10 Aug 2021 15:11:00 +0100</pubDate><category>Data and privacy</category><authors:names></authors:names><content:encoded><![CDATA[<p>The number of claims issued in the High Court (Media and Communications List) with a data protection element continues to increase. The rise in claim numbers can be attributed to a number of factors including: (i) individuals becoming more aware of their rights under data protection legislation, (ii) uncertainty as to whether individuals may recover damages for a loss of control of their personal data without proving material damage or distress; (iii) the abundance of specialist law firms who are prepared to act for individuals on a "no-win-no-fee" basis and (iv) the availability of After the Event ("ATE") insurance to protect a would-be claimant against adverse costs orders. </p>
<p>It is the last of these factors that has arguably proved to be the element that has most contributed to this increase in claims. Claims for breach of data protection legislation are not "publication and privacy proceedings" under the Legal Aid, Sentencing and Punishment of Offenders Act 2012 ("LASPO"). As such, claimants are not entitled to recover ATE premiums from defendants in claims for breach of data protection legislation alone. However, to counter this, a common tactic of claimants has been to assert claims in misuse of private information and breach of confidence alongside claims for breach of data protection legislation, in an attempt to bring the claims within the exemption provided by LASPO, and which would in theory permit the recovery of ATE insurance premiums from defendants in the event of a successful claim. </p>
<p>The recent judgment in Darren Lee Warren v DSG Retail Limited provides much needed clarity in relation to the availability of causes of action that are commonly asserted by claimants in pre-action correspondence alongside claims for breach of data protection legislation. It is likely to have a significant impact on the future recoverability of ATE premiums.</p>
<p><strong>What is the case about?</strong></p>
<p>The Defendant, DSG, operates the well-known ‘Currys PC World’ and ‘Dixons Travel’ brands. Between July 2017 and April 2018, attackers infiltrated DSG’s systems and installed malware and thereby accessed the personal data of many of DSG's customers. </p>
<p>
The Claimant had purchased goods from a store operated by the DSG and brought a claim alleging that his name, address, phone number, date of birth and email address had been compromised. </p>
<p><strong>What causes of action were advanced? </strong></p>
<p>The Claimant brought a claim for breach of confidence (“BoC”), misuse of private information (“MPI”), breach of the Data Protection Act 1998 (“DPA”), and common law negligence. The claim form sought damages of £5,000 in respect of distress. </p>
<p>The Defendant applied for summary judgment and/or an order striking out all causes of action save for the claim relating to the breach of the DPA.</p>
<p><strong>What did the judge decide?  </strong></p>
<p>Mr Justice Saini struck out the Claimant's claims in MPI, BoC and common law negligence. We focus on MPI and BoC in this article. </p>
<p>Saini J noted that the Claimant’s claims were all based on the cyber-attack and recognised that the Claimant sought to position the actionable wrong as a ‘failure’ which allowed the attacker to access the personal data, rather than any positive conduct/action on behalf of the Defendant. </p>
<p>The judge characterised the Claimant's contention that the Defendant failed to protect the data as an attempt at articulating some form of data security duty. The judge clarified that neither BoC nor MPI impose a data security duty on the holders of information (even if private or confidential) and that instead, both MPI and BoC are concerned with prohibiting actions by the holder of information which are inconsistent with the obligation of confidence / privacy. </p>
<p>In respect of BoC, the Saini J drew on caselaw indicating “<em>a negative obligation not to disclose confidential information</em>” and a requirement for "<em>an unauthorised use</em>" of information to establish the tort.</p>
<p>Saini J also characterised MPI as a tort that was developed out of BoC in order to comply with obligations under the Human Rights Act 1998 and cross-referred to the ECHR and the requirement for / to avoid an 'interference' with the Claimant's Article 8 rights.</p>
<p>Crucially, the judge was not convinced by the novel argument advanced by the Claimant that the conduct of DSG was “<em>tantamount to publication</em>”. He described it as an "<em>unconvincing attempt to shoehorn the facts of the data breach into the tort of MPI</em>". </p>
<p><strong>Will this judgment stem the tide of data claims? </strong></p>
<p>The availability of no-win-no-fee agreements together with ATE insurance protection gives an individual whose personal data has been compromised the potential to claim compensation from a data controller arising from, for example, an accidental data breach.</p>
<p>When asserting claims against data controllers for breach of data protection legislation, it has been a common tactic for claimants to also include claims for MPI and/or BoC, in an attempt to take advantage of the exemptions in LASPO for 'publication and privacy proceedings', in theory enabling claimants to recover ATE insurance premiums from defendants in the event of being successful at trial.</p>
<p>Typically in such matters, the ATE premium is considerable when compared to the damages sought, which will often even on the Claimant's own case be relatively low. The prospects of recovery of the premium as legal costs from a data controller will have a significant impact on the decision as to whether to proceed with such claims in circumstances where the damages realistically recoverable are likely to be less than the ATE premium. </p>
<p>Whilst the judgment may not be enough to discourage claimants from asserting claims for MPI and BoC alongside data protection claims, the threat of these claims being struck out (with the prospect of adverse costs orders being made) may make the obtaining of ATE insurance harder to come by or disproportionately expensive. If claimants are unable to obtain reasonably priced ATE insurance premiums, there may be an increased reluctance to issue proceedings given the potential costs risk an individual may be exposed to. This may in the round lead to fewer claims being issued. </p>
<p>It remains to be seen whether there will be a noticeable drop off in claims as result of this judgment although it is likely that this judgment will embolden data controllers to be more robust in their defence of such claims and refuse, for example, to include the costs of ATE insurance premiums as part of any pre-action settlement. </p>
<p>Another important issue for data controllers at present remains whether a data subject may recover damages for a loss of control of personal data without proving material damages or distress. This issue will be resolved in the Supreme Court case of Lloyd v Google in which judgment is expected later this year. RPC <a rel="noopener noreferrer" href="https://www.rpc.co.uk/press-and-media/rpc-advises-client-techuk-as-intervening-party-in-landmark-lloyd-v-google-case-in-uk-supreme-court/" target="_blank">supported</a> techUK as an intervening party in the submitting a written intervention in the case. <br />
<br />
<strong>How can RPC help?</strong><br />
<br />
RPC act for a number of data controllers and their insurers, in all aspects of data breach response and in defending data subject claims. For any queries please reach out to a member of the team listed above.</p>]]></content:encoded></item><item><guid isPermaLink="false">{076E36DB-E2C9-4DB7-9913-718DFCB87D77}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/cyber-bytes-issue-33/</link><title>Cyber_Bytes - Issue 33</title><description><![CDATA[Welcome to Cyber_Bytes, our bi-weekly round up of key developments in cyber, tech and evolving risks.]]></description><pubDate>Wed, 16 Jun 2021 15:47:00 +0100</pubDate><category>Data and privacy</category><authors:names>Richard Breavington, Daniel Guilfoyle, Ian Dinning, Rachel Ford, Christopher Ashton</authors:names><content:encoded><![CDATA[<strong></strong>
<p style="color: #454040; background-color: #ffffff; margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px;"><strong><span>Come and meet us in September: RPC at London Tech Week</span></strong></p>
<p>RPC are delighted to be hosting a series of in-person events and experiences in a multifunctional collaboration space around London Tech Week this September.</p>
<p>Join us as we bring together founders, award-winning authors, philanthropists, business leaders, pioneering women and investors to discuss the vital role technology plays in the UK's retail, insurance and tech sectors.</p>
<p>For information on specific events and to register, please visit our <a href="/events/">events</a> page.</p>
<p><strong><span>High Court delivers judgement with significant potential effects on recoverability of ATE premiums in data breach cases</span></strong></p>
<p>The number of claims issued in the High Court with a data protection element continues to increase. Whilst claims for breach of data protection legislation alone do not qualify for recovery of ATE premiums from unsuccessful defendants under Legal Aid, Sentencing and Punishment of Offenders Act 2012, a common tactic of claimant law firms to get around this has been to add in claims in misuse of private information and breach of confidence.</p>
<p>The recent judgment in Darren Lee Warren v DSG Retail Limited provides much needed clarity in relation to the availability of these causes of action in instances where a criminal third party is involved. It confirms that claims of misuse of private information and breach of confidence do not have a realistic likelihood of success in these situations and is likely to have a significant impact on the claims landscape in this area.</p>
<p>Click <strong><a rel="noopener noreferrer" href="https://www.rpc.co.uk/perspectives/data-and-privacy/case-comment-striking-out-of-privacy-and-confidence-actions-in-the-dixons-data-breach-case/" target="_blank">here</a></strong> to read RPC's blog on the case, including its potential impact on ATE insurance arrangements</p>
<p><strong><span>Cyber insurance provider Coalition Inc. sees size of claims paid for Ransomware attacks declining</span></strong></p>
<p>Whilst the average ransom demand made by cyber criminals continues to increase, the amount of ransom actually being paid is generally decreasing according to Coalition Inc. The ransomware attacks against small and mid-size businesses are also growing, with cyber criminals focusing on an organisation's defences (or lack thereof) rather than its size. Overall, Coalition has observed a recent decline in ransomware attacks, with cyber criminals making a shift towards other forms of attacks such as Business Email Compromises and File Transfer Fraud.</p>
<p>Click <strong><a rel="noopener noreferrer" href="https://www.databreachtoday.co.uk/insurer-size-claims-paid-for-ransomware-attacks-declines-a-17174" target="_blank">here</a></strong> to read more.</p>
<p><strong><span>Ethical hackers collaborate with UK defence to strengthen cyber security</span></strong></p>
<p>The Ministry of Defence (MOD) have recently made use of the Bug Bounty programme, which saw 26 ethical hackers collaborate with US-based organization, HackerOne, to identify and fix key vulnerabilities within the MOD's cyber systems. This is in line with the UK Government's strategy to strengthen security and ensure better resilience across its departments and demonstrates the Government's openness and willingness to embrace new tools to secure cyber systems.</p>
<p>Click <strong><a rel="noopener noreferrer" href="https://www.businessinnovationmag.co.uk/ethical-hackers-collaborate-with-uk-defence-to-strengthen-cyber-security/" target="_blank">here</a></strong> to read more.</p>
<p><strong><span>Marsh and trade body examine cyber risk governance of foreign banks in the UK: Cyber risk management faces significant local threat</span></strong></p>
<p>A report released by Marsh and the Association of Foreign Banks has highlighted the disconnect between non-UK headquartered banks and the responsibilities of their UK subsidiaries and branch offices in terms of cyber governance.</p>
<p>The report details how local boards and management of foreign banks need to take action to be able to identify and manage cyber risks effectively within their UK operations, so as to ensure local regulatory requirements are adhered to and to improve the cyber security and resilience of the UK financial sector as a whole.</p>
<p>Click <strong><a rel="noopener noreferrer" href="https://www.insurancebusinessmag.com/uk/news/cyber/marsh-trade-body-examine-cyber-risk-governance-of-foreign-banks-in-the-uk-300673.aspx" target="_blank">here</a></strong> and <strong><a rel="noopener noreferrer" href="https://emergingrisks.co.uk/cyber-risk-management-faces-significant-local-threat/" target="_blank">here</a></strong> to read more.</p>
<p><strong><span>Zurich - Cyber risk management culture: people and processes</span></strong></p>
<p>People and processes are key to addressing cyber risks, according to Oliver Delvos, global cyber underwriting manager at Zurich. With many companies continuing to miss the basics of good cyber hygiene this article focusses on what organisations big and small can do to limit their cyber exposures including items that should not be overlooked among the excitement of new technologies and digitalisation.</p>
<p>Click <strong><a rel="noopener noreferrer" href="https://www.commercialriskonline.com/a-matter-of-cyber-risk-management-culture/" target="_blank">here</a></strong> to read more.</p>
<div class="telerik_paste_container" style="border-width: 0px; position: absolute; overflow: hidden; margin: 0px; padding: 0px; left: 3px; top: 145px; width: 1px; height: 1px;">
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;"><a rel="noopener noreferrer" href="https://www.insurancebusinessmag.com/uk/news/cyber/cyberattacks-are-soaring--how-can-the-insurance-industry-keep-up-248234.aspx" target="_blank" style="margin: 0px; padding: 0px; color: #522d6d;"><strong style="margin: 0px; padding: 0px;"><span style="margin: 0px; padding: 0px; color: #4d3069;">Insurance industries struggling to keep up with surge in cyber attacks</span></strong></a></p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">The COVID-19 pandemic has driven greater digitalization and remote working and as a result cyber vulnerability has intensified significantly. According to the Hiscox Cyber Readiness Report 2020, only 26% of the firms have stand-alone cyber insurance policies. The majority of firms rely on generic insurance policies which do not explicitly include or exclude cyber cover, giving rise to 'silent cyber' losses. S&P Global has suggested there needs to be further development of stand-alone cyber insurance products which would offer more efficient and optimized control of <em style="margin: 0px; padding: 0px;">accumulation risk</em>.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">To read more, please click <a rel="noopener noreferrer" href="https://www.insurancebusinessmag.com/uk/news/cyber/cyberattacks-are-soaring--how-can-the-insurance-industry-keep-up-248234.aspx" target="_blank" style="margin: 0px; padding: 0px; color: #522d6d;">here</a>.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;"><a rel="noopener noreferrer" href="https://www.pwc.co.uk/issues/cyber-security-services/insights/five-cyber-threat-trends-to-prepare-for-in-2021.html" target="_blank" style="margin: 0px; padding: 0px; color: #522d6d;"><strong style="margin: 0px; padding: 0px;"><span style="margin: 0px; padding: 0px; color: #4d3069;">5 cyber threat trends that will remain prominent in 2021</span></strong></a></p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">In their Cyber Threats Retrospective report, PWC highlight that over the last 12 months, the five most prolific cyber threat trends were ransomware, using current affairs as bait, supply chain attacks, social engineering and a rise of the defenders. Additionally, the report explores their wider impact on organisations, business and society.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">To read more, please click <a rel="noopener noreferrer" href="https://www.pwc.co.uk/issues/cyber-security-services/insights/five-cyber-threat-trends-to-prepare-for-in-2021.html" target="_blank" style="margin: 0px; padding: 0px; color: #522d6d;">here</a>.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;"><a rel="noopener noreferrer" href="https://www.denbighshirefreepress.co.uk/news/19120379.npower-scrap-app-customer-bank-details-exposed/" target="_blank" style="margin: 0px; padding: 0px; color: #522d6d;"><strong style="margin: 0px; padding: 0px;"><span style="margin: 0px; padding: 0px; color: #4d3069;">Npower app to be removed after login data was stolen</span></strong></a></p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">It is believed that personal contact details and partial financial information may have been obtained, but those affected were immediately alerted and had their accounts locked. The energy provider, which is owned by E.ON, has reinforced that protecting customers' security and data is their top priority and it was thanks to their robust threat detection and other cyber defences that the attack was identified.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">To read more, please click <a rel="noopener noreferrer" href="https://www.denbighshirefreepress.co.uk/news/19120379.npower-scrap-app-customer-bank-details-exposed/" target="_blank" style="margin: 0px; padding: 0px; color: #522d6d;">here</a>.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;"><a rel="noopener noreferrer" href="https://www.adsadvance.co.uk/bridewell-consulting-reports-on-aviation-s-cyber-security-vulnerability.html" target="_blank" style="margin: 0px; padding: 0px; color: #522d6d;"><strong style="margin: 0px; padding: 0px;"><span style="margin: 0px; padding: 0px; color: #4d3069;">Bridewell Consulting reports on aviation's cyber security vulnerability</span></strong></a></p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">88% of UK aviation companies have detected cyber attacks in the last year, despite 78% stating their systems are secure according to research by Bridewell Consulting.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">They posit that the aviation industry is facing an increased risk of cyber-attacks due to ageing infrastructure, a complex supply chain and the accessibility of operations systems both from corporate networks and over the internet.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">The data shows that 28% of companies have reduced their infrastructure budget since the start of the pandemic and the industry is being urged to review and update its security before it is too late.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">To read more, please click <a rel="noopener noreferrer" href="https://www.adsadvance.co.uk/bridewell-consulting-reports-on-aviation-s-cyber-security-vulnerability.html" target="_blank" style="margin: 0px; padding: 0px; color: #522d6d;">here</a>.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;"><a rel="noopener noreferrer" href="https://www.securityweek.com/different-flavors-cyber-resilience" target="_blank" style="margin: 0px; padding: 0px; color: #522d6d;"><strong style="margin: 0px; padding: 0px;"><span style="margin: 0px; padding: 0px; color: #4d3069;">The different flavours of cyber resilience</span></strong></a></p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">In an article on cyber resilience - the ability to anticipate and withstand cyber-attacks - internationally recognized IT security author, Torsten George, offers his insight into best practices.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">The steps needed to effectively implement cyber resilience strategies, will vary from business to business but these strategies are essential to ensure organisations can improve their data protection strategies, as well as survive a cyber-attack. To be effective, it must be applied to all cyber resources, namely networks, data, workloads, devices and people. Cyber resilience can also help prevent cyber incidents which may happen due to human error or outdated software.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">To read more, please click <a rel="noopener noreferrer" href="https://www.securityweek.com/different-flavors-cyber-resilience" target="_blank" style="margin: 0px; padding: 0px; color: #522d6d;">here</a>.</p>
</div>
<div class="telerik_paste_container" style="border-width: 0px; position: absolute; overflow: hidden; margin: 0px; padding: 0px; left: 3px; top: 145px; width: 1px; height: 1px;">
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;"><a rel="noopener noreferrer" href="https://www.insurancebusinessmag.com/uk/news/cyber/cyberattacks-are-soaring--how-can-the-insurance-industry-keep-up-248234.aspx" target="_blank" style="margin: 0px; padding: 0px; color: #522d6d;"><strong style="margin: 0px; padding: 0px;"><span style="margin: 0px; padding: 0px; color: #4d3069;">Insurance industries struggling to keep up with surge in cyber attacks</span></strong></a></p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">The COVID-19 pandemic has driven greater digitalization and remote working and as a result cyber vulnerability has intensified significantly. According to the Hiscox Cyber Readiness Report 2020, only 26% of the firms have stand-alone cyber insurance policies. The majority of firms rely on generic insurance policies which do not explicitly include or exclude cyber cover, giving rise to 'silent cyber' losses. S&P Global has suggested there needs to be further development of stand-alone cyber insurance products which would offer more efficient and optimized control of <em style="margin: 0px; padding: 0px;">accumulation risk</em>.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">To read more, please click <a rel="noopener noreferrer" href="https://www.insurancebusinessmag.com/uk/news/cyber/cyberattacks-are-soaring--how-can-the-insurance-industry-keep-up-248234.aspx" target="_blank" style="margin: 0px; padding: 0px; color: #522d6d;">here</a>.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;"><a rel="noopener noreferrer" href="https://www.pwc.co.uk/issues/cyber-security-services/insights/five-cyber-threat-trends-to-prepare-for-in-2021.html" target="_blank" style="margin: 0px; padding: 0px; color: #522d6d;"><strong style="margin: 0px; padding: 0px;"><span style="margin: 0px; padding: 0px; color: #4d3069;">5 cyber threat trends that will remain prominent in 2021</span></strong></a></p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">In their Cyber Threats Retrospective report, PWC highlight that over the last 12 months, the five most prolific cyber threat trends were ransomware, using current affairs as bait, supply chain attacks, social engineering and a rise of the defenders. Additionally, the report explores their wider impact on organisations, business and society.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">To read more, please click <a rel="noopener noreferrer" href="https://www.pwc.co.uk/issues/cyber-security-services/insights/five-cyber-threat-trends-to-prepare-for-in-2021.html" target="_blank" style="margin: 0px; padding: 0px; color: #522d6d;">here</a>.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;"><a rel="noopener noreferrer" href="https://www.denbighshirefreepress.co.uk/news/19120379.npower-scrap-app-customer-bank-details-exposed/" target="_blank" style="margin: 0px; padding: 0px; color: #522d6d;"><strong style="margin: 0px; padding: 0px;"><span style="margin: 0px; padding: 0px; color: #4d3069;">Npower app to be removed after login data was stolen</span></strong></a></p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">It is believed that personal contact details and partial financial information may have been obtained, but those affected were immediately alerted and had their accounts locked. The energy provider, which is owned by E.ON, has reinforced that protecting customers' security and data is their top priority and it was thanks to their robust threat detection and other cyber defences that the attack was identified.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">To read more, please click <a rel="noopener noreferrer" href="https://www.denbighshirefreepress.co.uk/news/19120379.npower-scrap-app-customer-bank-details-exposed/" target="_blank" style="margin: 0px; padding: 0px; color: #522d6d;">here</a>.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;"><a rel="noopener noreferrer" href="https://www.adsadvance.co.uk/bridewell-consulting-reports-on-aviation-s-cyber-security-vulnerability.html" target="_blank" style="margin: 0px; padding: 0px; color: #522d6d;"><strong style="margin: 0px; padding: 0px;"><span style="margin: 0px; padding: 0px; color: #4d3069;">Bridewell Consulting reports on aviation's cyber security vulnerability</span></strong></a></p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">88% of UK aviation companies have detected cyber attacks in the last year, despite 78% stating their systems are secure according to research by Bridewell Consulting.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">They posit that the aviation industry is facing an increased risk of cyber-attacks due to ageing infrastructure, a complex supply chain and the accessibility of operations systems both from corporate networks and over the internet.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">The data shows that 28% of companies have reduced their infrastructure budget since the start of the pandemic and the industry is being urged to review and update its security before it is too late.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">To read more, please click <a rel="noopener noreferrer" href="https://www.adsadvance.co.uk/bridewell-consulting-reports-on-aviation-s-cyber-security-vulnerability.html" target="_blank" style="margin: 0px; padding: 0px; color: #522d6d;">here</a>.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;"><a rel="noopener noreferrer" href="https://www.securityweek.com/different-flavors-cyber-resilience" target="_blank" style="margin: 0px; padding: 0px; color: #522d6d;"><strong style="margin: 0px; padding: 0px;"><span style="margin: 0px; padding: 0px; color: #4d3069;">The different flavours of cyber resilience</span></strong></a></p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">In an article on cyber resilience - the ability to anticipate and withstand cyber-attacks - internationally recognized IT security author, Torsten George, offers his insight into best practices.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">The steps needed to effectively implement cyber resilience strategies, will vary from business to business but these strategies are essential to ensure organisations can improve their data protection strategies, as well as survive a cyber-attack. To be effective, it must be applied to all cyber resources, namely networks, data, workloads, devices and people. Cyber resilience can also help prevent cyber incidents which may happen due to human error or outdated software.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">To read more, please click <a rel="noopener noreferrer" href="https://www.securityweek.com/different-flavors-cyber-resilience" target="_blank" style="margin: 0px; padding: 0px; color: #522d6d;">here</a>.</p>
</div>
<div class="telerik_paste_container" style="border-width: 0px; position: absolute; overflow: hidden; margin: 0px; padding: 0px; left: 3px; top: 145px; width: 1px; height: 1px;">
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;"><a rel="noopener noreferrer" href="https://www.insurancebusinessmag.com/uk/news/cyber/cyberattacks-are-soaring--how-can-the-insurance-industry-keep-up-248234.aspx" target="_blank" style="margin: 0px; padding: 0px; color: #522d6d;"><strong style="margin: 0px; padding: 0px;"><span style="margin: 0px; padding: 0px; color: #4d3069;">Insurance industries struggling to keep up with surge in cyber attacks</span></strong></a></p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">The COVID-19 pandemic has driven greater digitalization and remote working and as a result cyber vulnerability has intensified significantly. According to the Hiscox Cyber Readiness Report 2020, only 26% of the firms have stand-alone cyber insurance policies. The majority of firms rely on generic insurance policies which do not explicitly include or exclude cyber cover, giving rise to 'silent cyber' losses. S&P Global has suggested there needs to be further development of stand-alone cyber insurance products which would offer more efficient and optimized control of <em style="margin: 0px; padding: 0px;">accumulation risk</em>.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">To read more, please click <a rel="noopener noreferrer" href="https://www.insurancebusinessmag.com/uk/news/cyber/cyberattacks-are-soaring--how-can-the-insurance-industry-keep-up-248234.aspx" target="_blank" style="margin: 0px; padding: 0px; color: #522d6d;">here</a>.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;"><a rel="noopener noreferrer" href="https://www.pwc.co.uk/issues/cyber-security-services/insights/five-cyber-threat-trends-to-prepare-for-in-2021.html" target="_blank" style="margin: 0px; padding: 0px; color: #522d6d;"><strong style="margin: 0px; padding: 0px;"><span style="margin: 0px; padding: 0px; color: #4d3069;">5 cyber threat trends that will remain prominent in 2021</span></strong></a></p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">In their Cyber Threats Retrospective report, PWC highlight that over the last 12 months, the five most prolific cyber threat trends were ransomware, using current affairs as bait, supply chain attacks, social engineering and a rise of the defenders. Additionally, the report explores their wider impact on organisations, business and society.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">To read more, please click <a rel="noopener noreferrer" href="https://www.pwc.co.uk/issues/cyber-security-services/insights/five-cyber-threat-trends-to-prepare-for-in-2021.html" target="_blank" style="margin: 0px; padding: 0px; color: #522d6d;">here</a>.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;"><a rel="noopener noreferrer" href="https://www.denbighshirefreepress.co.uk/news/19120379.npower-scrap-app-customer-bank-details-exposed/" target="_blank" style="margin: 0px; padding: 0px; color: #522d6d;"><strong style="margin: 0px; padding: 0px;"><span style="margin: 0px; padding: 0px; color: #4d3069;">Npower app to be removed after login data was stolen</span></strong></a></p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">It is believed that personal contact details and partial financial information may have been obtained, but those affected were immediately alerted and had their accounts locked. The energy provider, which is owned by E.ON, has reinforced that protecting customers' security and data is their top priority and it was thanks to their robust threat detection and other cyber defences that the attack was identified.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">To read more, please click <a rel="noopener noreferrer" href="https://www.denbighshirefreepress.co.uk/news/19120379.npower-scrap-app-customer-bank-details-exposed/" target="_blank" style="margin: 0px; padding: 0px; color: #522d6d;">here</a>.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;"><a rel="noopener noreferrer" href="https://www.adsadvance.co.uk/bridewell-consulting-reports-on-aviation-s-cyber-security-vulnerability.html" target="_blank" style="margin: 0px; padding: 0px; color: #522d6d;"><strong style="margin: 0px; padding: 0px;"><span style="margin: 0px; padding: 0px; color: #4d3069;">Bridewell Consulting reports on aviation's cyber security vulnerability</span></strong></a></p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">88% of UK aviation companies have detected cyber attacks in the last year, despite 78% stating their systems are secure according to research by Bridewell Consulting.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">They posit that the aviation industry is facing an increased risk of cyber-attacks due to ageing infrastructure, a complex supply chain and the accessibility of operations systems both from corporate networks and over the internet.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">The data shows that 28% of companies have reduced their infrastructure budget since the start of the pandemic and the industry is being urged to review and update its security before it is too late.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">To read more, please click <a rel="noopener noreferrer" href="https://www.adsadvance.co.uk/bridewell-consulting-reports-on-aviation-s-cyber-security-vulnerability.html" target="_blank" style="margin: 0px; padding: 0px; color: #522d6d;">here</a>.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;"><a rel="noopener noreferrer" href="https://www.securityweek.com/different-flavors-cyber-resilience" target="_blank" style="margin: 0px; padding: 0px; color: #522d6d;"><strong style="margin: 0px; padding: 0px;"><span style="margin: 0px; padding: 0px; color: #4d3069;">The different flavours of cyber resilience</span></strong></a></p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">In an article on cyber resilience - the ability to anticipate and withstand cyber-attacks - internationally recognized IT security author, Torsten George, offers his insight into best practices.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">The steps needed to effectively implement cyber resilience strategies, will vary from business to business but these strategies are essential to ensure organisations can improve their data protection strategies, as well as survive a cyber-attack. To be effective, it must be applied to all cyber resources, namely networks, data, workloads, devices and people. Cyber resilience can also help prevent cyber incidents which may happen due to human error or outdated software.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">To read more, please click <a rel="noopener noreferrer" href="https://www.securityweek.com/different-flavors-cyber-resilience" target="_blank" style="margin: 0px; padding: 0px; color: #522d6d;">here</a>.</p>
</div>
<div class="telerik_paste_container" style="border-width: 0px; position: absolute; overflow: hidden; margin: 0px; padding: 0px; left: 3px; top: 145px; width: 1px; height: 1px;">
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;"><a rel="noopener noreferrer" href="https://www.insurancebusinessmag.com/uk/news/cyber/cyberattacks-are-soaring--how-can-the-insurance-industry-keep-up-248234.aspx" target="_blank" style="margin: 0px; padding: 0px; color: #522d6d;"><strong style="margin: 0px; padding: 0px;"><span style="margin: 0px; padding: 0px; color: #4d3069;">Insurance industries struggling to keep up with surge in cyber attacks</span></strong></a></p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">The COVID-19 pandemic has driven greater digitalization and remote working and as a result cyber vulnerability has intensified significantly. According to the Hiscox Cyber Readiness Report 2020, only 26% of the firms have stand-alone cyber insurance policies. The majority of firms rely on generic insurance policies which do not explicitly include or exclude cyber cover, giving rise to 'silent cyber' losses. S&P Global has suggested there needs to be further development of stand-alone cyber insurance products which would offer more efficient and optimized control of <em style="margin: 0px; padding: 0px;">accumulation risk</em>.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">To read more, please click <a rel="noopener noreferrer" href="https://www.insurancebusinessmag.com/uk/news/cyber/cyberattacks-are-soaring--how-can-the-insurance-industry-keep-up-248234.aspx" target="_blank" style="margin: 0px; padding: 0px; color: #522d6d;">here</a>.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;"><a rel="noopener noreferrer" href="https://www.pwc.co.uk/issues/cyber-security-services/insights/five-cyber-threat-trends-to-prepare-for-in-2021.html" target="_blank" style="margin: 0px; padding: 0px; color: #522d6d;"><strong style="margin: 0px; padding: 0px;"><span style="margin: 0px; padding: 0px; color: #4d3069;">5 cyber threat trends that will remain prominent in 2021</span></strong></a></p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">In their Cyber Threats Retrospective report, PWC highlight that over the last 12 months, the five most prolific cyber threat trends were ransomware, using current affairs as bait, supply chain attacks, social engineering and a rise of the defenders. Additionally, the report explores their wider impact on organisations, business and society.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">To read more, please click <a rel="noopener noreferrer" href="https://www.pwc.co.uk/issues/cyber-security-services/insights/five-cyber-threat-trends-to-prepare-for-in-2021.html" target="_blank" style="margin: 0px; padding: 0px; color: #522d6d;">here</a>.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;"><a rel="noopener noreferrer" href="https://www.denbighshirefreepress.co.uk/news/19120379.npower-scrap-app-customer-bank-details-exposed/" target="_blank" style="margin: 0px; padding: 0px; color: #522d6d;"><strong style="margin: 0px; padding: 0px;"><span style="margin: 0px; padding: 0px; color: #4d3069;">Npower app to be removed after login data was stolen</span></strong></a></p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">It is believed that personal contact details and partial financial information may have been obtained, but those affected were immediately alerted and had their accounts locked. The energy provider, which is owned by E.ON, has reinforced that protecting customers' security and data is their top priority and it was thanks to their robust threat detection and other cyber defences that the attack was identified.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">To read more, please click <a rel="noopener noreferrer" href="https://www.denbighshirefreepress.co.uk/news/19120379.npower-scrap-app-customer-bank-details-exposed/" target="_blank" style="margin: 0px; padding: 0px; color: #522d6d;">here</a>.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;"><a rel="noopener noreferrer" href="https://www.adsadvance.co.uk/bridewell-consulting-reports-on-aviation-s-cyber-security-vulnerability.html" target="_blank" style="margin: 0px; padding: 0px; color: #522d6d;"><strong style="margin: 0px; padding: 0px;"><span style="margin: 0px; padding: 0px; color: #4d3069;">Bridewell Consulting reports on aviation's cyber security vulnerability</span></strong></a></p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">88% of UK aviation companies have detected cyber attacks in the last year, despite 78% stating their systems are secure according to research by Bridewell Consulting.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">They posit that the aviation industry is facing an increased risk of cyber-attacks due to ageing infrastructure, a complex supply chain and the accessibility of operations systems both from corporate networks and over the internet.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">The data shows that 28% of companies have reduced their infrastructure budget since the start of the pandemic and the industry is being urged to review and update its security before it is too late.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">To read more, please click <a rel="noopener noreferrer" href="https://www.adsadvance.co.uk/bridewell-consulting-reports-on-aviation-s-cyber-security-vulnerability.html" target="_blank" style="margin: 0px; padding: 0px; color: #522d6d;">here</a>.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;"><a rel="noopener noreferrer" href="https://www.securityweek.com/different-flavors-cyber-resilience" target="_blank" style="margin: 0px; padding: 0px; color: #522d6d;"><strong style="margin: 0px; padding: 0px;"><span style="margin: 0px; padding: 0px; color: #4d3069;">The different flavours of cyber resilience</span></strong></a></p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">In an article on cyber resilience - the ability to anticipate and withstand cyber-attacks - internationally recognized IT security author, Torsten George, offers his insight into best practices.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">The steps needed to effectively implement cyber resilience strategies, will vary from business to business but these strategies are essential to ensure organisations can improve their data protection strategies, as well as survive a cyber-attack. To be effective, it must be applied to all cyber resources, namely networks, data, workloads, devices and people. Cyber resilience can also help prevent cyber incidents which may happen due to human error or outdated software.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">To read more, please click <a rel="noopener noreferrer" href="https://www.securityweek.com/different-flavors-cyber-resilience" target="_blank" style="margin: 0px; padding: 0px; color: #522d6d;">here</a>.</p>
</div>
<div class="telerik_paste_container" style="border-width: 0px; position: absolute; overflow: hidden; margin: 0px; padding: 0px; left: 3px; top: 145px; width: 1px; height: 1px;">
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;"><a rel="noopener noreferrer" href="https://www.insurancebusinessmag.com/uk/news/cyber/cyberattacks-are-soaring--how-can-the-insurance-industry-keep-up-248234.aspx" target="_blank" style="margin: 0px; padding: 0px; color: #522d6d;"><strong style="margin: 0px; padding: 0px;"><span style="margin: 0px; padding: 0px; color: #4d3069;">Insurance industries struggling to keep up with surge in cyber attacks</span></strong></a></p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">The COVID-19 pandemic has driven greater digitalization and remote working and as a result cyber vulnerability has intensified significantly. According to the Hiscox Cyber Readiness Report 2020, only 26% of the firms have stand-alone cyber insurance policies. The majority of firms rely on generic insurance policies which do not explicitly include or exclude cyber cover, giving rise to 'silent cyber' losses. S&P Global has suggested there needs to be further development of stand-alone cyber insurance products which would offer more efficient and optimized control of <em style="margin: 0px; padding: 0px;">accumulation risk</em>.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">To read more, please click <a rel="noopener noreferrer" href="https://www.insurancebusinessmag.com/uk/news/cyber/cyberattacks-are-soaring--how-can-the-insurance-industry-keep-up-248234.aspx" target="_blank" style="margin: 0px; padding: 0px; color: #522d6d;">here</a>.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;"><a rel="noopener noreferrer" href="https://www.pwc.co.uk/issues/cyber-security-services/insights/five-cyber-threat-trends-to-prepare-for-in-2021.html" target="_blank" style="margin: 0px; padding: 0px; color: #522d6d;"><strong style="margin: 0px; padding: 0px;"><span style="margin: 0px; padding: 0px; color: #4d3069;">5 cyber threat trends that will remain prominent in 2021</span></strong></a></p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">In their Cyber Threats Retrospective report, PWC highlight that over the last 12 months, the five most prolific cyber threat trends were ransomware, using current affairs as bait, supply chain attacks, social engineering and a rise of the defenders. Additionally, the report explores their wider impact on organisations, business and society.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">To read more, please click <a rel="noopener noreferrer" href="https://www.pwc.co.uk/issues/cyber-security-services/insights/five-cyber-threat-trends-to-prepare-for-in-2021.html" target="_blank" style="margin: 0px; padding: 0px; color: #522d6d;">here</a>.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;"><a rel="noopener noreferrer" href="https://www.denbighshirefreepress.co.uk/news/19120379.npower-scrap-app-customer-bank-details-exposed/" target="_blank" style="margin: 0px; padding: 0px; color: #522d6d;"><strong style="margin: 0px; padding: 0px;"><span style="margin: 0px; padding: 0px; color: #4d3069;">Npower app to be removed after login data was stolen</span></strong></a></p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">It is believed that personal contact details and partial financial information may have been obtained, but those affected were immediately alerted and had their accounts locked. The energy provider, which is owned by E.ON, has reinforced that protecting customers' security and data is their top priority and it was thanks to their robust threat detection and other cyber defences that the attack was identified.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">To read more, please click <a rel="noopener noreferrer" href="https://www.denbighshirefreepress.co.uk/news/19120379.npower-scrap-app-customer-bank-details-exposed/" target="_blank" style="margin: 0px; padding: 0px; color: #522d6d;">here</a>.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;"><a rel="noopener noreferrer" href="https://www.adsadvance.co.uk/bridewell-consulting-reports-on-aviation-s-cyber-security-vulnerability.html" target="_blank" style="margin: 0px; padding: 0px; color: #522d6d;"><strong style="margin: 0px; padding: 0px;"><span style="margin: 0px; padding: 0px; color: #4d3069;">Bridewell Consulting reports on aviation's cyber security vulnerability</span></strong></a></p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">88% of UK aviation companies have detected cyber attacks in the last year, despite 78% stating their systems are secure according to research by Bridewell Consulting.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">They posit that the aviation industry is facing an increased risk of cyber-attacks due to ageing infrastructure, a complex supply chain and the accessibility of operations systems both from corporate networks and over the internet.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">The data shows that 28% of companies have reduced their infrastructure budget since the start of the pandemic and the industry is being urged to review and update its security before it is too late.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">To read more, please click <a rel="noopener noreferrer" href="https://www.adsadvance.co.uk/bridewell-consulting-reports-on-aviation-s-cyber-security-vulnerability.html" target="_blank" style="margin: 0px; padding: 0px; color: #522d6d;">here</a>.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;"><a rel="noopener noreferrer" href="https://www.securityweek.com/different-flavors-cyber-resilience" target="_blank" style="margin: 0px; padding: 0px; color: #522d6d;"><strong style="margin: 0px; padding: 0px;"><span style="margin: 0px; padding: 0px; color: #4d3069;">The different flavours of cyber resilience</span></strong></a></p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">In an article on cyber resilience - the ability to anticipate and withstand cyber-attacks - internationally recognized IT security author, Torsten George, offers his insight into best practices.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">The steps needed to effectively implement cyber resilience strategies, will vary from business to business but these strategies are essential to ensure organisations can improve their data protection strategies, as well as survive a cyber-attack. To be effective, it must be applied to all cyber resources, namely networks, data, workloads, devices and people. Cyber resilience can also help prevent cyber incidents which may happen due to human error or outdated software.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">To read more, please click <a rel="noopener noreferrer" href="https://www.securityweek.com/different-flavors-cyber-resilience" target="_blank" style="margin: 0px; padding: 0px; color: #522d6d;">here</a>.</p>
</div>]]></content:encoded></item><item><guid isPermaLink="false">{66F7789B-E852-48AD-959B-409BE9C5091B}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/cyber-bytes-issue-32/</link><title>Cyber_Bytes - Issue 32</title><description><![CDATA[Welcome to Cyber_Bytes, our bi-weekly round up of key developments in cyber, tech and evolving risks.]]></description><pubDate>Mon, 10 May 2021 15:47:00 +0100</pubDate><category>Data and privacy</category><authors:names>Richard Breavington, Daniel Guilfoyle, Ian Dinning, Rachel Ford, Christopher Ashton</authors:names><content:encoded><![CDATA[<strong></strong>
<p style="color: #454040; background-color: #ffffff; margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px;"><strong>NCSC launches new Early Warning Service</strong></p>
<p>The National Cyber Security Centre is offering a free service which alerts organisations to potential cyber-attacks affecting their networks, named the Early Warning Service. It is said to provide timely and specialized notifications about possible incidents and security issues.</p>
<p>To read more, please click <strong><a rel="noopener noreferrer" href="https://www.ncsc.gov.uk/news/new-early-warning-alert-service-for-organisations" target="_blank">here</a>.</strong></p>
<p><strong>Pipeline operators pay ~$5 Million ransom</strong></p>
<p>The operators of the US' largest fuel pipeline has paid nearly $5 million in cryptocurrency to hackers, following a cyber security incident. It remains unclear whether the payment was funded by the company’s cyber-insurer.</p>
<p>Click <strong><a rel="noopener noreferrer" href="https://www.infosecurity-magazine.com/news/colonial-reportedly-paid-5-million/" target="_blank">here</a> </strong>to read more.</p>
<p><strong>Ransomware groups email customers to increase pressure</strong></p>
<p>In a move designed to pressurise more victims into paying a ransom demand, there is a developing trend in ransomware groups of emailing the victim’s customers directly, warning that their data will be leaked to the dark web unless they can convince the victim to pay up.</p>
<p>Click <strong><a rel="noopener noreferrer" href="https://krebsonsecurity.com/2021/04/ransom-gangs-emailing-victim-customers-for-leverage/" target="_blank">here</a></strong> and <strong><a rel="noopener noreferrer" href="https://www.agcs.allianz.com/news-and-insights/expert-risk-articles/financial-services-risk-cyber.html" target="_blank">here</a></strong> to read more.</p>
<p><strong>Government provided £3.68m in ‘exceptional financial support’ to Council for cyber-attack recovery</strong></p>
<p>Redcar and Cleveland Borough Council has received a grant of £3.68 million from the Government as a contribution towards the c.£10.4m it paid out last year as a result of a ransomware attack. The grant has apparently been offered as recognition of the unique circumstances of the incident and is distinct from the usual rescue packages that government sometimes offers local authorities.</p>
<p>Click <strong><a rel="noopener noreferrer" href="https://www.ukauthority.com/articles/government-gives-redcar-and-cleveland-368-million-for-cyber-attack-recovery/?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed:%20Ukauthoritycom%20(UKauthorITy.com%20-%20News%20on%20the%20tech-enabled%20transformation%20of%20frontline%20public%20service%20delivery)" target="_blank">here</a> </strong>to read more.</p>
<p><strong>NCSC issues free cyber security training for schools</strong></p>
<p>The National Cyber Security Centre has released free cyber security training for school staff, setting out real-life incident case studies and four practical steps staff can take to protect themselves online.</p>
<p>To read more, please click <strong><a rel="noopener noreferrer" href="https://www.ncsc.gov.uk/news/school-staff-offered-training-to-help-cyber-defences" target="_blank">here</a></strong>.</p>
<p><strong>Claim brought for over £4bn lost cryptocurrency</strong></p>
<p>A claim is being brought against developers of several cryptocurrencies to recover the cryptocurrency. The claimant asserts that he has legitimate ownership over the cryptocurrency, and where that can be shown the developers of it have a duty to ensure recovery. The value of the claim as at today’s market rates will be in excess of £4bn.</p>
<p>Click <strong><a rel="noopener noreferrer" href="https://www.ontier.net/ia/a2a1bitcoin-developers-press-release-12-may-2021.pdf" target="_blank">here</a></strong> to read more</p>
<div class="telerik_paste_container" style="border-width: 0px; position: absolute; overflow: hidden; margin: 0px; padding: 0px; left: 3px; top: 145px; width: 1px; height: 1px;">
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;"><a rel="noopener noreferrer" href="https://www.insurancebusinessmag.com/uk/news/cyber/cyberattacks-are-soaring--how-can-the-insurance-industry-keep-up-248234.aspx" target="_blank" style="margin: 0px; padding: 0px; color: #522d6d;"><strong style="margin: 0px; padding: 0px;"><span style="margin: 0px; padding: 0px; color: #4d3069;">Insurance industries struggling to keep up with surge in cyber attacks</span></strong></a></p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">The COVID-19 pandemic has driven greater digitalization and remote working and as a result cyber vulnerability has intensified significantly. According to the Hiscox Cyber Readiness Report 2020, only 26% of the firms have stand-alone cyber insurance policies. The majority of firms rely on generic insurance policies which do not explicitly include or exclude cyber cover, giving rise to 'silent cyber' losses. S&P Global has suggested there needs to be further development of stand-alone cyber insurance products which would offer more efficient and optimized control of <em style="margin: 0px; padding: 0px;">accumulation risk</em>.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">To read more, please click <a rel="noopener noreferrer" href="https://www.insurancebusinessmag.com/uk/news/cyber/cyberattacks-are-soaring--how-can-the-insurance-industry-keep-up-248234.aspx" target="_blank" style="margin: 0px; padding: 0px; color: #522d6d;">here</a>.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;"><a rel="noopener noreferrer" href="https://www.pwc.co.uk/issues/cyber-security-services/insights/five-cyber-threat-trends-to-prepare-for-in-2021.html" target="_blank" style="margin: 0px; padding: 0px; color: #522d6d;"><strong style="margin: 0px; padding: 0px;"><span style="margin: 0px; padding: 0px; color: #4d3069;">5 cyber threat trends that will remain prominent in 2021</span></strong></a></p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">In their Cyber Threats Retrospective report, PWC highlight that over the last 12 months, the five most prolific cyber threat trends were ransomware, using current affairs as bait, supply chain attacks, social engineering and a rise of the defenders. Additionally, the report explores their wider impact on organisations, business and society.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">To read more, please click <a rel="noopener noreferrer" href="https://www.pwc.co.uk/issues/cyber-security-services/insights/five-cyber-threat-trends-to-prepare-for-in-2021.html" target="_blank" style="margin: 0px; padding: 0px; color: #522d6d;">here</a>.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;"><a rel="noopener noreferrer" href="https://www.denbighshirefreepress.co.uk/news/19120379.npower-scrap-app-customer-bank-details-exposed/" target="_blank" style="margin: 0px; padding: 0px; color: #522d6d;"><strong style="margin: 0px; padding: 0px;"><span style="margin: 0px; padding: 0px; color: #4d3069;">Npower app to be removed after login data was stolen</span></strong></a></p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">It is believed that personal contact details and partial financial information may have been obtained, but those affected were immediately alerted and had their accounts locked. The energy provider, which is owned by E.ON, has reinforced that protecting customers' security and data is their top priority and it was thanks to their robust threat detection and other cyber defences that the attack was identified.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">To read more, please click <a rel="noopener noreferrer" href="https://www.denbighshirefreepress.co.uk/news/19120379.npower-scrap-app-customer-bank-details-exposed/" target="_blank" style="margin: 0px; padding: 0px; color: #522d6d;">here</a>.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;"><a rel="noopener noreferrer" href="https://www.adsadvance.co.uk/bridewell-consulting-reports-on-aviation-s-cyber-security-vulnerability.html" target="_blank" style="margin: 0px; padding: 0px; color: #522d6d;"><strong style="margin: 0px; padding: 0px;"><span style="margin: 0px; padding: 0px; color: #4d3069;">Bridewell Consulting reports on aviation's cyber security vulnerability</span></strong></a></p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">88% of UK aviation companies have detected cyber attacks in the last year, despite 78% stating their systems are secure according to research by Bridewell Consulting.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">They posit that the aviation industry is facing an increased risk of cyber-attacks due to ageing infrastructure, a complex supply chain and the accessibility of operations systems both from corporate networks and over the internet.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">The data shows that 28% of companies have reduced their infrastructure budget since the start of the pandemic and the industry is being urged to review and update its security before it is too late.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">To read more, please click <a rel="noopener noreferrer" href="https://www.adsadvance.co.uk/bridewell-consulting-reports-on-aviation-s-cyber-security-vulnerability.html" target="_blank" style="margin: 0px; padding: 0px; color: #522d6d;">here</a>.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;"><a rel="noopener noreferrer" href="https://www.securityweek.com/different-flavors-cyber-resilience" target="_blank" style="margin: 0px; padding: 0px; color: #522d6d;"><strong style="margin: 0px; padding: 0px;"><span style="margin: 0px; padding: 0px; color: #4d3069;">The different flavours of cyber resilience</span></strong></a></p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">In an article on cyber resilience - the ability to anticipate and withstand cyber-attacks - internationally recognized IT security author, Torsten George, offers his insight into best practices.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">The steps needed to effectively implement cyber resilience strategies, will vary from business to business but these strategies are essential to ensure organisations can improve their data protection strategies, as well as survive a cyber-attack. To be effective, it must be applied to all cyber resources, namely networks, data, workloads, devices and people. Cyber resilience can also help prevent cyber incidents which may happen due to human error or outdated software.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">To read more, please click <a rel="noopener noreferrer" href="https://www.securityweek.com/different-flavors-cyber-resilience" target="_blank" style="margin: 0px; padding: 0px; color: #522d6d;">here</a>.</p>
</div>
<div class="telerik_paste_container" style="border-width: 0px; position: absolute; overflow: hidden; margin: 0px; padding: 0px; left: 3px; top: 145px; width: 1px; height: 1px;">
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;"><a rel="noopener noreferrer" href="https://www.insurancebusinessmag.com/uk/news/cyber/cyberattacks-are-soaring--how-can-the-insurance-industry-keep-up-248234.aspx" target="_blank" style="margin: 0px; padding: 0px; color: #522d6d;"><strong style="margin: 0px; padding: 0px;"><span style="margin: 0px; padding: 0px; color: #4d3069;">Insurance industries struggling to keep up with surge in cyber attacks</span></strong></a></p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">The COVID-19 pandemic has driven greater digitalization and remote working and as a result cyber vulnerability has intensified significantly. According to the Hiscox Cyber Readiness Report 2020, only 26% of the firms have stand-alone cyber insurance policies. The majority of firms rely on generic insurance policies which do not explicitly include or exclude cyber cover, giving rise to 'silent cyber' losses. S&P Global has suggested there needs to be further development of stand-alone cyber insurance products which would offer more efficient and optimized control of <em style="margin: 0px; padding: 0px;">accumulation risk</em>.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">To read more, please click <a rel="noopener noreferrer" href="https://www.insurancebusinessmag.com/uk/news/cyber/cyberattacks-are-soaring--how-can-the-insurance-industry-keep-up-248234.aspx" target="_blank" style="margin: 0px; padding: 0px; color: #522d6d;">here</a>.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;"><a rel="noopener noreferrer" href="https://www.pwc.co.uk/issues/cyber-security-services/insights/five-cyber-threat-trends-to-prepare-for-in-2021.html" target="_blank" style="margin: 0px; padding: 0px; color: #522d6d;"><strong style="margin: 0px; padding: 0px;"><span style="margin: 0px; padding: 0px; color: #4d3069;">5 cyber threat trends that will remain prominent in 2021</span></strong></a></p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">In their Cyber Threats Retrospective report, PWC highlight that over the last 12 months, the five most prolific cyber threat trends were ransomware, using current affairs as bait, supply chain attacks, social engineering and a rise of the defenders. Additionally, the report explores their wider impact on organisations, business and society.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">To read more, please click <a rel="noopener noreferrer" href="https://www.pwc.co.uk/issues/cyber-security-services/insights/five-cyber-threat-trends-to-prepare-for-in-2021.html" target="_blank" style="margin: 0px; padding: 0px; color: #522d6d;">here</a>.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;"><a rel="noopener noreferrer" href="https://www.denbighshirefreepress.co.uk/news/19120379.npower-scrap-app-customer-bank-details-exposed/" target="_blank" style="margin: 0px; padding: 0px; color: #522d6d;"><strong style="margin: 0px; padding: 0px;"><span style="margin: 0px; padding: 0px; color: #4d3069;">Npower app to be removed after login data was stolen</span></strong></a></p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">It is believed that personal contact details and partial financial information may have been obtained, but those affected were immediately alerted and had their accounts locked. The energy provider, which is owned by E.ON, has reinforced that protecting customers' security and data is their top priority and it was thanks to their robust threat detection and other cyber defences that the attack was identified.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">To read more, please click <a rel="noopener noreferrer" href="https://www.denbighshirefreepress.co.uk/news/19120379.npower-scrap-app-customer-bank-details-exposed/" target="_blank" style="margin: 0px; padding: 0px; color: #522d6d;">here</a>.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;"><a rel="noopener noreferrer" href="https://www.adsadvance.co.uk/bridewell-consulting-reports-on-aviation-s-cyber-security-vulnerability.html" target="_blank" style="margin: 0px; padding: 0px; color: #522d6d;"><strong style="margin: 0px; padding: 0px;"><span style="margin: 0px; padding: 0px; color: #4d3069;">Bridewell Consulting reports on aviation's cyber security vulnerability</span></strong></a></p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">88% of UK aviation companies have detected cyber attacks in the last year, despite 78% stating their systems are secure according to research by Bridewell Consulting.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">They posit that the aviation industry is facing an increased risk of cyber-attacks due to ageing infrastructure, a complex supply chain and the accessibility of operations systems both from corporate networks and over the internet.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">The data shows that 28% of companies have reduced their infrastructure budget since the start of the pandemic and the industry is being urged to review and update its security before it is too late.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">To read more, please click <a rel="noopener noreferrer" href="https://www.adsadvance.co.uk/bridewell-consulting-reports-on-aviation-s-cyber-security-vulnerability.html" target="_blank" style="margin: 0px; padding: 0px; color: #522d6d;">here</a>.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;"><a rel="noopener noreferrer" href="https://www.securityweek.com/different-flavors-cyber-resilience" target="_blank" style="margin: 0px; padding: 0px; color: #522d6d;"><strong style="margin: 0px; padding: 0px;"><span style="margin: 0px; padding: 0px; color: #4d3069;">The different flavours of cyber resilience</span></strong></a></p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">In an article on cyber resilience - the ability to anticipate and withstand cyber-attacks - internationally recognized IT security author, Torsten George, offers his insight into best practices.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">The steps needed to effectively implement cyber resilience strategies, will vary from business to business but these strategies are essential to ensure organisations can improve their data protection strategies, as well as survive a cyber-attack. To be effective, it must be applied to all cyber resources, namely networks, data, workloads, devices and people. Cyber resilience can also help prevent cyber incidents which may happen due to human error or outdated software.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">To read more, please click <a rel="noopener noreferrer" href="https://www.securityweek.com/different-flavors-cyber-resilience" target="_blank" style="margin: 0px; padding: 0px; color: #522d6d;">here</a>.</p>
</div>
<div class="telerik_paste_container" style="border-width: 0px; position: absolute; overflow: hidden; margin: 0px; padding: 0px; left: 3px; top: 145px; width: 1px; height: 1px;">
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;"><a rel="noopener noreferrer" href="https://www.insurancebusinessmag.com/uk/news/cyber/cyberattacks-are-soaring--how-can-the-insurance-industry-keep-up-248234.aspx" target="_blank" style="margin: 0px; padding: 0px; color: #522d6d;"><strong style="margin: 0px; padding: 0px;"><span style="margin: 0px; padding: 0px; color: #4d3069;">Insurance industries struggling to keep up with surge in cyber attacks</span></strong></a></p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">The COVID-19 pandemic has driven greater digitalization and remote working and as a result cyber vulnerability has intensified significantly. According to the Hiscox Cyber Readiness Report 2020, only 26% of the firms have stand-alone cyber insurance policies. The majority of firms rely on generic insurance policies which do not explicitly include or exclude cyber cover, giving rise to 'silent cyber' losses. S&P Global has suggested there needs to be further development of stand-alone cyber insurance products which would offer more efficient and optimized control of <em style="margin: 0px; padding: 0px;">accumulation risk</em>.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">To read more, please click <a rel="noopener noreferrer" href="https://www.insurancebusinessmag.com/uk/news/cyber/cyberattacks-are-soaring--how-can-the-insurance-industry-keep-up-248234.aspx" target="_blank" style="margin: 0px; padding: 0px; color: #522d6d;">here</a>.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;"><a rel="noopener noreferrer" href="https://www.pwc.co.uk/issues/cyber-security-services/insights/five-cyber-threat-trends-to-prepare-for-in-2021.html" target="_blank" style="margin: 0px; padding: 0px; color: #522d6d;"><strong style="margin: 0px; padding: 0px;"><span style="margin: 0px; padding: 0px; color: #4d3069;">5 cyber threat trends that will remain prominent in 2021</span></strong></a></p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">In their Cyber Threats Retrospective report, PWC highlight that over the last 12 months, the five most prolific cyber threat trends were ransomware, using current affairs as bait, supply chain attacks, social engineering and a rise of the defenders. Additionally, the report explores their wider impact on organisations, business and society.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">To read more, please click <a rel="noopener noreferrer" href="https://www.pwc.co.uk/issues/cyber-security-services/insights/five-cyber-threat-trends-to-prepare-for-in-2021.html" target="_blank" style="margin: 0px; padding: 0px; color: #522d6d;">here</a>.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;"><a rel="noopener noreferrer" href="https://www.denbighshirefreepress.co.uk/news/19120379.npower-scrap-app-customer-bank-details-exposed/" target="_blank" style="margin: 0px; padding: 0px; color: #522d6d;"><strong style="margin: 0px; padding: 0px;"><span style="margin: 0px; padding: 0px; color: #4d3069;">Npower app to be removed after login data was stolen</span></strong></a></p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">It is believed that personal contact details and partial financial information may have been obtained, but those affected were immediately alerted and had their accounts locked. The energy provider, which is owned by E.ON, has reinforced that protecting customers' security and data is their top priority and it was thanks to their robust threat detection and other cyber defences that the attack was identified.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">To read more, please click <a rel="noopener noreferrer" href="https://www.denbighshirefreepress.co.uk/news/19120379.npower-scrap-app-customer-bank-details-exposed/" target="_blank" style="margin: 0px; padding: 0px; color: #522d6d;">here</a>.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;"><a rel="noopener noreferrer" href="https://www.adsadvance.co.uk/bridewell-consulting-reports-on-aviation-s-cyber-security-vulnerability.html" target="_blank" style="margin: 0px; padding: 0px; color: #522d6d;"><strong style="margin: 0px; padding: 0px;"><span style="margin: 0px; padding: 0px; color: #4d3069;">Bridewell Consulting reports on aviation's cyber security vulnerability</span></strong></a></p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">88% of UK aviation companies have detected cyber attacks in the last year, despite 78% stating their systems are secure according to research by Bridewell Consulting.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">They posit that the aviation industry is facing an increased risk of cyber-attacks due to ageing infrastructure, a complex supply chain and the accessibility of operations systems both from corporate networks and over the internet.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">The data shows that 28% of companies have reduced their infrastructure budget since the start of the pandemic and the industry is being urged to review and update its security before it is too late.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">To read more, please click <a rel="noopener noreferrer" href="https://www.adsadvance.co.uk/bridewell-consulting-reports-on-aviation-s-cyber-security-vulnerability.html" target="_blank" style="margin: 0px; padding: 0px; color: #522d6d;">here</a>.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;"><a rel="noopener noreferrer" href="https://www.securityweek.com/different-flavors-cyber-resilience" target="_blank" style="margin: 0px; padding: 0px; color: #522d6d;"><strong style="margin: 0px; padding: 0px;"><span style="margin: 0px; padding: 0px; color: #4d3069;">The different flavours of cyber resilience</span></strong></a></p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">In an article on cyber resilience - the ability to anticipate and withstand cyber-attacks - internationally recognized IT security author, Torsten George, offers his insight into best practices.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">The steps needed to effectively implement cyber resilience strategies, will vary from business to business but these strategies are essential to ensure organisations can improve their data protection strategies, as well as survive a cyber-attack. To be effective, it must be applied to all cyber resources, namely networks, data, workloads, devices and people. Cyber resilience can also help prevent cyber incidents which may happen due to human error or outdated software.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">To read more, please click <a rel="noopener noreferrer" href="https://www.securityweek.com/different-flavors-cyber-resilience" target="_blank" style="margin: 0px; padding: 0px; color: #522d6d;">here</a>.</p>
</div>
<div class="telerik_paste_container" style="border-width: 0px; position: absolute; overflow: hidden; margin: 0px; padding: 0px; left: 3px; top: 145px; width: 1px; height: 1px;">
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;"><a rel="noopener noreferrer" href="https://www.insurancebusinessmag.com/uk/news/cyber/cyberattacks-are-soaring--how-can-the-insurance-industry-keep-up-248234.aspx" target="_blank" style="margin: 0px; padding: 0px; color: #522d6d;"><strong style="margin: 0px; padding: 0px;"><span style="margin: 0px; padding: 0px; color: #4d3069;">Insurance industries struggling to keep up with surge in cyber attacks</span></strong></a></p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">The COVID-19 pandemic has driven greater digitalization and remote working and as a result cyber vulnerability has intensified significantly. According to the Hiscox Cyber Readiness Report 2020, only 26% of the firms have stand-alone cyber insurance policies. The majority of firms rely on generic insurance policies which do not explicitly include or exclude cyber cover, giving rise to 'silent cyber' losses. S&P Global has suggested there needs to be further development of stand-alone cyber insurance products which would offer more efficient and optimized control of <em style="margin: 0px; padding: 0px;">accumulation risk</em>.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">To read more, please click <a rel="noopener noreferrer" href="https://www.insurancebusinessmag.com/uk/news/cyber/cyberattacks-are-soaring--how-can-the-insurance-industry-keep-up-248234.aspx" target="_blank" style="margin: 0px; padding: 0px; color: #522d6d;">here</a>.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;"><a rel="noopener noreferrer" href="https://www.pwc.co.uk/issues/cyber-security-services/insights/five-cyber-threat-trends-to-prepare-for-in-2021.html" target="_blank" style="margin: 0px; padding: 0px; color: #522d6d;"><strong style="margin: 0px; padding: 0px;"><span style="margin: 0px; padding: 0px; color: #4d3069;">5 cyber threat trends that will remain prominent in 2021</span></strong></a></p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">In their Cyber Threats Retrospective report, PWC highlight that over the last 12 months, the five most prolific cyber threat trends were ransomware, using current affairs as bait, supply chain attacks, social engineering and a rise of the defenders. Additionally, the report explores their wider impact on organisations, business and society.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">To read more, please click <a rel="noopener noreferrer" href="https://www.pwc.co.uk/issues/cyber-security-services/insights/five-cyber-threat-trends-to-prepare-for-in-2021.html" target="_blank" style="margin: 0px; padding: 0px; color: #522d6d;">here</a>.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;"><a rel="noopener noreferrer" href="https://www.denbighshirefreepress.co.uk/news/19120379.npower-scrap-app-customer-bank-details-exposed/" target="_blank" style="margin: 0px; padding: 0px; color: #522d6d;"><strong style="margin: 0px; padding: 0px;"><span style="margin: 0px; padding: 0px; color: #4d3069;">Npower app to be removed after login data was stolen</span></strong></a></p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">It is believed that personal contact details and partial financial information may have been obtained, but those affected were immediately alerted and had their accounts locked. The energy provider, which is owned by E.ON, has reinforced that protecting customers' security and data is their top priority and it was thanks to their robust threat detection and other cyber defences that the attack was identified.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">To read more, please click <a rel="noopener noreferrer" href="https://www.denbighshirefreepress.co.uk/news/19120379.npower-scrap-app-customer-bank-details-exposed/" target="_blank" style="margin: 0px; padding: 0px; color: #522d6d;">here</a>.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;"><a rel="noopener noreferrer" href="https://www.adsadvance.co.uk/bridewell-consulting-reports-on-aviation-s-cyber-security-vulnerability.html" target="_blank" style="margin: 0px; padding: 0px; color: #522d6d;"><strong style="margin: 0px; padding: 0px;"><span style="margin: 0px; padding: 0px; color: #4d3069;">Bridewell Consulting reports on aviation's cyber security vulnerability</span></strong></a></p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">88% of UK aviation companies have detected cyber attacks in the last year, despite 78% stating their systems are secure according to research by Bridewell Consulting.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">They posit that the aviation industry is facing an increased risk of cyber-attacks due to ageing infrastructure, a complex supply chain and the accessibility of operations systems both from corporate networks and over the internet.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">The data shows that 28% of companies have reduced their infrastructure budget since the start of the pandemic and the industry is being urged to review and update its security before it is too late.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">To read more, please click <a rel="noopener noreferrer" href="https://www.adsadvance.co.uk/bridewell-consulting-reports-on-aviation-s-cyber-security-vulnerability.html" target="_blank" style="margin: 0px; padding: 0px; color: #522d6d;">here</a>.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;"><a rel="noopener noreferrer" href="https://www.securityweek.com/different-flavors-cyber-resilience" target="_blank" style="margin: 0px; padding: 0px; color: #522d6d;"><strong style="margin: 0px; padding: 0px;"><span style="margin: 0px; padding: 0px; color: #4d3069;">The different flavours of cyber resilience</span></strong></a></p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">In an article on cyber resilience - the ability to anticipate and withstand cyber-attacks - internationally recognized IT security author, Torsten George, offers his insight into best practices.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">The steps needed to effectively implement cyber resilience strategies, will vary from business to business but these strategies are essential to ensure organisations can improve their data protection strategies, as well as survive a cyber-attack. To be effective, it must be applied to all cyber resources, namely networks, data, workloads, devices and people. Cyber resilience can also help prevent cyber incidents which may happen due to human error or outdated software.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">To read more, please click <a rel="noopener noreferrer" href="https://www.securityweek.com/different-flavors-cyber-resilience" target="_blank" style="margin: 0px; padding: 0px; color: #522d6d;">here</a>.</p>
</div>
<div class="telerik_paste_container" style="border-width: 0px; position: absolute; overflow: hidden; margin: 0px; padding: 0px; left: 3px; top: 145px; width: 1px; height: 1px;">
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;"><a rel="noopener noreferrer" href="https://www.insurancebusinessmag.com/uk/news/cyber/cyberattacks-are-soaring--how-can-the-insurance-industry-keep-up-248234.aspx" target="_blank" style="margin: 0px; padding: 0px; color: #522d6d;"><strong style="margin: 0px; padding: 0px;"><span style="margin: 0px; padding: 0px; color: #4d3069;">Insurance industries struggling to keep up with surge in cyber attacks</span></strong></a></p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">The COVID-19 pandemic has driven greater digitalization and remote working and as a result cyber vulnerability has intensified significantly. According to the Hiscox Cyber Readiness Report 2020, only 26% of the firms have stand-alone cyber insurance policies. The majority of firms rely on generic insurance policies which do not explicitly include or exclude cyber cover, giving rise to 'silent cyber' losses. S&P Global has suggested there needs to be further development of stand-alone cyber insurance products which would offer more efficient and optimized control of <em style="margin: 0px; padding: 0px;">accumulation risk</em>.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">To read more, please click <a rel="noopener noreferrer" href="https://www.insurancebusinessmag.com/uk/news/cyber/cyberattacks-are-soaring--how-can-the-insurance-industry-keep-up-248234.aspx" target="_blank" style="margin: 0px; padding: 0px; color: #522d6d;">here</a>.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;"><a rel="noopener noreferrer" href="https://www.pwc.co.uk/issues/cyber-security-services/insights/five-cyber-threat-trends-to-prepare-for-in-2021.html" target="_blank" style="margin: 0px; padding: 0px; color: #522d6d;"><strong style="margin: 0px; padding: 0px;"><span style="margin: 0px; padding: 0px; color: #4d3069;">5 cyber threat trends that will remain prominent in 2021</span></strong></a></p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">In their Cyber Threats Retrospective report, PWC highlight that over the last 12 months, the five most prolific cyber threat trends were ransomware, using current affairs as bait, supply chain attacks, social engineering and a rise of the defenders. Additionally, the report explores their wider impact on organisations, business and society.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">To read more, please click <a rel="noopener noreferrer" href="https://www.pwc.co.uk/issues/cyber-security-services/insights/five-cyber-threat-trends-to-prepare-for-in-2021.html" target="_blank" style="margin: 0px; padding: 0px; color: #522d6d;">here</a>.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;"><a rel="noopener noreferrer" href="https://www.denbighshirefreepress.co.uk/news/19120379.npower-scrap-app-customer-bank-details-exposed/" target="_blank" style="margin: 0px; padding: 0px; color: #522d6d;"><strong style="margin: 0px; padding: 0px;"><span style="margin: 0px; padding: 0px; color: #4d3069;">Npower app to be removed after login data was stolen</span></strong></a></p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">It is believed that personal contact details and partial financial information may have been obtained, but those affected were immediately alerted and had their accounts locked. The energy provider, which is owned by E.ON, has reinforced that protecting customers' security and data is their top priority and it was thanks to their robust threat detection and other cyber defences that the attack was identified.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">To read more, please click <a rel="noopener noreferrer" href="https://www.denbighshirefreepress.co.uk/news/19120379.npower-scrap-app-customer-bank-details-exposed/" target="_blank" style="margin: 0px; padding: 0px; color: #522d6d;">here</a>.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;"><a rel="noopener noreferrer" href="https://www.adsadvance.co.uk/bridewell-consulting-reports-on-aviation-s-cyber-security-vulnerability.html" target="_blank" style="margin: 0px; padding: 0px; color: #522d6d;"><strong style="margin: 0px; padding: 0px;"><span style="margin: 0px; padding: 0px; color: #4d3069;">Bridewell Consulting reports on aviation's cyber security vulnerability</span></strong></a></p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">88% of UK aviation companies have detected cyber attacks in the last year, despite 78% stating their systems are secure according to research by Bridewell Consulting.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">They posit that the aviation industry is facing an increased risk of cyber-attacks due to ageing infrastructure, a complex supply chain and the accessibility of operations systems both from corporate networks and over the internet.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">The data shows that 28% of companies have reduced their infrastructure budget since the start of the pandemic and the industry is being urged to review and update its security before it is too late.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">To read more, please click <a rel="noopener noreferrer" href="https://www.adsadvance.co.uk/bridewell-consulting-reports-on-aviation-s-cyber-security-vulnerability.html" target="_blank" style="margin: 0px; padding: 0px; color: #522d6d;">here</a>.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;"><a rel="noopener noreferrer" href="https://www.securityweek.com/different-flavors-cyber-resilience" target="_blank" style="margin: 0px; padding: 0px; color: #522d6d;"><strong style="margin: 0px; padding: 0px;"><span style="margin: 0px; padding: 0px; color: #4d3069;">The different flavours of cyber resilience</span></strong></a></p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">In an article on cyber resilience - the ability to anticipate and withstand cyber-attacks - internationally recognized IT security author, Torsten George, offers his insight into best practices.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">The steps needed to effectively implement cyber resilience strategies, will vary from business to business but these strategies are essential to ensure organisations can improve their data protection strategies, as well as survive a cyber-attack. To be effective, it must be applied to all cyber resources, namely networks, data, workloads, devices and people. Cyber resilience can also help prevent cyber incidents which may happen due to human error or outdated software.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">To read more, please click <a rel="noopener noreferrer" href="https://www.securityweek.com/different-flavors-cyber-resilience" target="_blank" style="margin: 0px; padding: 0px; color: #522d6d;">here</a>.</p>
</div>]]></content:encoded></item><item><guid isPermaLink="false">{5B62139D-5E2A-499B-80B7-DEB8C06A7E62}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/cyber-bytes-issue-31/</link><title>Cyber_Bytes - Issue 31</title><description><![CDATA[Welcome to Cyber_Bytes, our bi-weekly round up of key developments in cyber, tech and evolving risks.]]></description><pubDate>Thu, 08 Apr 2021 15:47:00 +0100</pubDate><category>Data and privacy</category><authors:names>Richard Breavington, Daniel Guilfoyle, Ian Dinning, Rachel Ford, Christopher Ashton</authors:names><content:encoded><![CDATA[<strong>Claimant law firm ordered to pay damages for plagiarism</strong><br />
<br />
<span>A well-known claimant law firm frequently involved in data subject litigation has been ordered to pay £45,000 in damages after it was discovered that they were using a plagiarised Letter of Claim.</span><br />
<br />
<span>The letter was used on 242 occasions. The law firm has stated that the letter was provided to them by a barrister they had taken advice from and against whom them have announced they intend to pursue in a separate action.</span><br />
<br />
<span>Click </span><a href="https://www.lawgazette.co.uk/practice/firm-pays-45k-damages-to-rival-over-plagiarised-claim-letters/5107816.article?utm_source=gazette_newsletter&utm_medium=email&utm_campaign=Firm%27s%20plagiarised%20letters%20to%20rival%20%7C%20Judge%20to%20write%20monthly%20to%20defendant%20%7C%20CCRC%20needs%20cash_03%2F17%2F2021" style="color: #0088cc;">here </a><span>to read more.</span><br />
<br />
<strong>Interview with a ransomware organisation published</strong><br />
<br />
<span>An interview with ransomware organization REvil has provided insight into the group's operations.</span><br />
<br />
<span>One tactic appears to be "hack the insurers first—to get their customer base and work in a targeted way from there. And after you go through the list, then hit the insurer themselves." Further interesting points include the use of data auctions on the dark web and ransomware organisations working together to trade their tools and experience.</span><br />
<br />
<span>Click </span><a href="https://therecord.media/i-scrounged-through-the-trash-heaps-now-im-a-millionaire-an-interview-with-revils-unknown/" style="color: #0088cc;">here</a><span> to read the full interview.</span><br />
<br />
<strong>Cyber security podcast looks at cyber trends and future threats</strong><br />
<br />
<span>The latest episode of the podcast looks at trends from the last year and likely threats for 2021. It states that the pandemic saw a huge increase in ransomware attacks, VPN manipulation as a result of the move to home working, and medical research espionage. Looking ahead, ransomware is expected to continue to be a major threat as well as phishing, supply chain compromise and social engineering.</span><br />
<br />
<span>Click </span><a href="https://www.pwc.co.uk/issues/cyber-security-services/cyber-security-podcast/cyber-threat-imperatives-for-2021.html#transcript" style="color: #0088cc;">here </a><span>to listen to the podcast.</span><br />
<br />
<strong>Cyber security podcast looks at insurance market trends</strong><br />
<br />
<span>Another podcast has issued an episode focusing on trends in the global cyber insurance market. The most noticeable trend seems to be the huge growth in the market; with premiums forecasted to grow to $5bn.</span><br />
<br />
<span>The number of claims being made is also growing; particularly in relation to ransomware and third-party vendors who have experienced a data breach.</span><br />
<br />
<span>Click </span><a href="https://www.insurancehound.co.uk/risk-management/cyber-risk/conquering-cyber-risk-samit-shah-bitsight-36291?cta=true" style="color: #0088cc;">here </a><span>to listen to the podcast.</span><br />
<br />
<strong>NCSC issues warning to nurseries</strong><br />
<br />
<span>The National Cyber Security Centre has warned nurseries of the risk of cyber-attacks and urged them to increase their security infrastructure. Nurseries and other organisations which hold personal data on children are expected to be a lucrative target for ransomware attacks.</span><br />
<br />
<span>Nurseries have been warned to be particularly vigilant of scam emails which have been increasingly used to gain access to systems during the pandemic.</span><br />
<br />
<span>Click </span><a href="https://www.infosecurity-magazine.com/news/ncsc-warning-to-nurseries/" style="color: #0088cc;">here</a><span> to read more.</span>
<div class="telerik_paste_container" style="border-width: 0px; position: absolute; overflow: hidden; margin: 0px; padding: 0px; left: 3px; top: 145px; width: 1px; height: 1px;">
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;"><a rel="noopener noreferrer" href="https://www.insurancebusinessmag.com/uk/news/cyber/cyberattacks-are-soaring--how-can-the-insurance-industry-keep-up-248234.aspx" target="_blank" style="margin: 0px; padding: 0px; color: #522d6d;"><strong style="margin: 0px; padding: 0px;"><span style="margin: 0px; padding: 0px; color: #4d3069;">Insurance industries struggling to keep up with surge in cyber attacks</span></strong></a></p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">The COVID-19 pandemic has driven greater digitalization and remote working and as a result cyber vulnerability has intensified significantly. According to the Hiscox Cyber Readiness Report 2020, only 26% of the firms have stand-alone cyber insurance policies. The majority of firms rely on generic insurance policies which do not explicitly include or exclude cyber cover, giving rise to 'silent cyber' losses. S&P Global has suggested there needs to be further development of stand-alone cyber insurance products which would offer more efficient and optimized control of <em style="margin: 0px; padding: 0px;">accumulation risk</em>.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">To read more, please click <a rel="noopener noreferrer" href="https://www.insurancebusinessmag.com/uk/news/cyber/cyberattacks-are-soaring--how-can-the-insurance-industry-keep-up-248234.aspx" target="_blank" style="margin: 0px; padding: 0px; color: #522d6d;">here</a>.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;"><a rel="noopener noreferrer" href="https://www.pwc.co.uk/issues/cyber-security-services/insights/five-cyber-threat-trends-to-prepare-for-in-2021.html" target="_blank" style="margin: 0px; padding: 0px; color: #522d6d;"><strong style="margin: 0px; padding: 0px;"><span style="margin: 0px; padding: 0px; color: #4d3069;">5 cyber threat trends that will remain prominent in 2021</span></strong></a></p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">In their Cyber Threats Retrospective report, PWC highlight that over the last 12 months, the five most prolific cyber threat trends were ransomware, using current affairs as bait, supply chain attacks, social engineering and a rise of the defenders. Additionally, the report explores their wider impact on organisations, business and society.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">To read more, please click <a rel="noopener noreferrer" href="https://www.pwc.co.uk/issues/cyber-security-services/insights/five-cyber-threat-trends-to-prepare-for-in-2021.html" target="_blank" style="margin: 0px; padding: 0px; color: #522d6d;">here</a>.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;"><a rel="noopener noreferrer" href="https://www.denbighshirefreepress.co.uk/news/19120379.npower-scrap-app-customer-bank-details-exposed/" target="_blank" style="margin: 0px; padding: 0px; color: #522d6d;"><strong style="margin: 0px; padding: 0px;"><span style="margin: 0px; padding: 0px; color: #4d3069;">Npower app to be removed after login data was stolen</span></strong></a></p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">It is believed that personal contact details and partial financial information may have been obtained, but those affected were immediately alerted and had their accounts locked. The energy provider, which is owned by E.ON, has reinforced that protecting customers' security and data is their top priority and it was thanks to their robust threat detection and other cyber defences that the attack was identified.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">To read more, please click <a rel="noopener noreferrer" href="https://www.denbighshirefreepress.co.uk/news/19120379.npower-scrap-app-customer-bank-details-exposed/" target="_blank" style="margin: 0px; padding: 0px; color: #522d6d;">here</a>.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;"><a rel="noopener noreferrer" href="https://www.adsadvance.co.uk/bridewell-consulting-reports-on-aviation-s-cyber-security-vulnerability.html" target="_blank" style="margin: 0px; padding: 0px; color: #522d6d;"><strong style="margin: 0px; padding: 0px;"><span style="margin: 0px; padding: 0px; color: #4d3069;">Bridewell Consulting reports on aviation's cyber security vulnerability</span></strong></a></p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">88% of UK aviation companies have detected cyber attacks in the last year, despite 78% stating their systems are secure according to research by Bridewell Consulting.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">They posit that the aviation industry is facing an increased risk of cyber-attacks due to ageing infrastructure, a complex supply chain and the accessibility of operations systems both from corporate networks and over the internet.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">The data shows that 28% of companies have reduced their infrastructure budget since the start of the pandemic and the industry is being urged to review and update its security before it is too late.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">To read more, please click <a rel="noopener noreferrer" href="https://www.adsadvance.co.uk/bridewell-consulting-reports-on-aviation-s-cyber-security-vulnerability.html" target="_blank" style="margin: 0px; padding: 0px; color: #522d6d;">here</a>.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;"><a rel="noopener noreferrer" href="https://www.securityweek.com/different-flavors-cyber-resilience" target="_blank" style="margin: 0px; padding: 0px; color: #522d6d;"><strong style="margin: 0px; padding: 0px;"><span style="margin: 0px; padding: 0px; color: #4d3069;">The different flavours of cyber resilience</span></strong></a></p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">In an article on cyber resilience - the ability to anticipate and withstand cyber-attacks - internationally recognized IT security author, Torsten George, offers his insight into best practices.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">The steps needed to effectively implement cyber resilience strategies, will vary from business to business but these strategies are essential to ensure organisations can improve their data protection strategies, as well as survive a cyber-attack. To be effective, it must be applied to all cyber resources, namely networks, data, workloads, devices and people. Cyber resilience can also help prevent cyber incidents which may happen due to human error or outdated software.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">To read more, please click <a rel="noopener noreferrer" href="https://www.securityweek.com/different-flavors-cyber-resilience" target="_blank" style="margin: 0px; padding: 0px; color: #522d6d;">here</a>.</p>
</div>
<div class="telerik_paste_container" style="border-width: 0px; position: absolute; overflow: hidden; margin: 0px; padding: 0px; left: 3px; top: 145px; width: 1px; height: 1px;">
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;"><a rel="noopener noreferrer" href="https://www.insurancebusinessmag.com/uk/news/cyber/cyberattacks-are-soaring--how-can-the-insurance-industry-keep-up-248234.aspx" target="_blank" style="margin: 0px; padding: 0px; color: #522d6d;"><strong style="margin: 0px; padding: 0px;"><span style="margin: 0px; padding: 0px; color: #4d3069;">Insurance industries struggling to keep up with surge in cyber attacks</span></strong></a></p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">The COVID-19 pandemic has driven greater digitalization and remote working and as a result cyber vulnerability has intensified significantly. According to the Hiscox Cyber Readiness Report 2020, only 26% of the firms have stand-alone cyber insurance policies. The majority of firms rely on generic insurance policies which do not explicitly include or exclude cyber cover, giving rise to 'silent cyber' losses. S&P Global has suggested there needs to be further development of stand-alone cyber insurance products which would offer more efficient and optimized control of <em style="margin: 0px; padding: 0px;">accumulation risk</em>.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">To read more, please click <a rel="noopener noreferrer" href="https://www.insurancebusinessmag.com/uk/news/cyber/cyberattacks-are-soaring--how-can-the-insurance-industry-keep-up-248234.aspx" target="_blank" style="margin: 0px; padding: 0px; color: #522d6d;">here</a>.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;"><a rel="noopener noreferrer" href="https://www.pwc.co.uk/issues/cyber-security-services/insights/five-cyber-threat-trends-to-prepare-for-in-2021.html" target="_blank" style="margin: 0px; padding: 0px; color: #522d6d;"><strong style="margin: 0px; padding: 0px;"><span style="margin: 0px; padding: 0px; color: #4d3069;">5 cyber threat trends that will remain prominent in 2021</span></strong></a></p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">In their Cyber Threats Retrospective report, PWC highlight that over the last 12 months, the five most prolific cyber threat trends were ransomware, using current affairs as bait, supply chain attacks, social engineering and a rise of the defenders. Additionally, the report explores their wider impact on organisations, business and society.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">To read more, please click <a rel="noopener noreferrer" href="https://www.pwc.co.uk/issues/cyber-security-services/insights/five-cyber-threat-trends-to-prepare-for-in-2021.html" target="_blank" style="margin: 0px; padding: 0px; color: #522d6d;">here</a>.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;"><a rel="noopener noreferrer" href="https://www.denbighshirefreepress.co.uk/news/19120379.npower-scrap-app-customer-bank-details-exposed/" target="_blank" style="margin: 0px; padding: 0px; color: #522d6d;"><strong style="margin: 0px; padding: 0px;"><span style="margin: 0px; padding: 0px; color: #4d3069;">Npower app to be removed after login data was stolen</span></strong></a></p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">It is believed that personal contact details and partial financial information may have been obtained, but those affected were immediately alerted and had their accounts locked. The energy provider, which is owned by E.ON, has reinforced that protecting customers' security and data is their top priority and it was thanks to their robust threat detection and other cyber defences that the attack was identified.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">To read more, please click <a rel="noopener noreferrer" href="https://www.denbighshirefreepress.co.uk/news/19120379.npower-scrap-app-customer-bank-details-exposed/" target="_blank" style="margin: 0px; padding: 0px; color: #522d6d;">here</a>.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;"><a rel="noopener noreferrer" href="https://www.adsadvance.co.uk/bridewell-consulting-reports-on-aviation-s-cyber-security-vulnerability.html" target="_blank" style="margin: 0px; padding: 0px; color: #522d6d;"><strong style="margin: 0px; padding: 0px;"><span style="margin: 0px; padding: 0px; color: #4d3069;">Bridewell Consulting reports on aviation's cyber security vulnerability</span></strong></a></p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">88% of UK aviation companies have detected cyber attacks in the last year, despite 78% stating their systems are secure according to research by Bridewell Consulting.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">They posit that the aviation industry is facing an increased risk of cyber-attacks due to ageing infrastructure, a complex supply chain and the accessibility of operations systems both from corporate networks and over the internet.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">The data shows that 28% of companies have reduced their infrastructure budget since the start of the pandemic and the industry is being urged to review and update its security before it is too late.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">To read more, please click <a rel="noopener noreferrer" href="https://www.adsadvance.co.uk/bridewell-consulting-reports-on-aviation-s-cyber-security-vulnerability.html" target="_blank" style="margin: 0px; padding: 0px; color: #522d6d;">here</a>.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;"><a rel="noopener noreferrer" href="https://www.securityweek.com/different-flavors-cyber-resilience" target="_blank" style="margin: 0px; padding: 0px; color: #522d6d;"><strong style="margin: 0px; padding: 0px;"><span style="margin: 0px; padding: 0px; color: #4d3069;">The different flavours of cyber resilience</span></strong></a></p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">In an article on cyber resilience - the ability to anticipate and withstand cyber-attacks - internationally recognized IT security author, Torsten George, offers his insight into best practices.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">The steps needed to effectively implement cyber resilience strategies, will vary from business to business but these strategies are essential to ensure organisations can improve their data protection strategies, as well as survive a cyber-attack. To be effective, it must be applied to all cyber resources, namely networks, data, workloads, devices and people. Cyber resilience can also help prevent cyber incidents which may happen due to human error or outdated software.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">To read more, please click <a rel="noopener noreferrer" href="https://www.securityweek.com/different-flavors-cyber-resilience" target="_blank" style="margin: 0px; padding: 0px; color: #522d6d;">here</a>.</p>
</div>
<div class="telerik_paste_container" style="border-width: 0px; position: absolute; overflow: hidden; margin: 0px; padding: 0px; left: 3px; top: 145px; width: 1px; height: 1px;">
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;"><a rel="noopener noreferrer" href="https://www.insurancebusinessmag.com/uk/news/cyber/cyberattacks-are-soaring--how-can-the-insurance-industry-keep-up-248234.aspx" target="_blank" style="margin: 0px; padding: 0px; color: #522d6d;"><strong style="margin: 0px; padding: 0px;"><span style="margin: 0px; padding: 0px; color: #4d3069;">Insurance industries struggling to keep up with surge in cyber attacks</span></strong></a></p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">The COVID-19 pandemic has driven greater digitalization and remote working and as a result cyber vulnerability has intensified significantly. According to the Hiscox Cyber Readiness Report 2020, only 26% of the firms have stand-alone cyber insurance policies. The majority of firms rely on generic insurance policies which do not explicitly include or exclude cyber cover, giving rise to 'silent cyber' losses. S&P Global has suggested there needs to be further development of stand-alone cyber insurance products which would offer more efficient and optimized control of <em style="margin: 0px; padding: 0px;">accumulation risk</em>.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">To read more, please click <a rel="noopener noreferrer" href="https://www.insurancebusinessmag.com/uk/news/cyber/cyberattacks-are-soaring--how-can-the-insurance-industry-keep-up-248234.aspx" target="_blank" style="margin: 0px; padding: 0px; color: #522d6d;">here</a>.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;"><a rel="noopener noreferrer" href="https://www.pwc.co.uk/issues/cyber-security-services/insights/five-cyber-threat-trends-to-prepare-for-in-2021.html" target="_blank" style="margin: 0px; padding: 0px; color: #522d6d;"><strong style="margin: 0px; padding: 0px;"><span style="margin: 0px; padding: 0px; color: #4d3069;">5 cyber threat trends that will remain prominent in 2021</span></strong></a></p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">In their Cyber Threats Retrospective report, PWC highlight that over the last 12 months, the five most prolific cyber threat trends were ransomware, using current affairs as bait, supply chain attacks, social engineering and a rise of the defenders. Additionally, the report explores their wider impact on organisations, business and society.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">To read more, please click <a rel="noopener noreferrer" href="https://www.pwc.co.uk/issues/cyber-security-services/insights/five-cyber-threat-trends-to-prepare-for-in-2021.html" target="_blank" style="margin: 0px; padding: 0px; color: #522d6d;">here</a>.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;"><a rel="noopener noreferrer" href="https://www.denbighshirefreepress.co.uk/news/19120379.npower-scrap-app-customer-bank-details-exposed/" target="_blank" style="margin: 0px; padding: 0px; color: #522d6d;"><strong style="margin: 0px; padding: 0px;"><span style="margin: 0px; padding: 0px; color: #4d3069;">Npower app to be removed after login data was stolen</span></strong></a></p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">It is believed that personal contact details and partial financial information may have been obtained, but those affected were immediately alerted and had their accounts locked. The energy provider, which is owned by E.ON, has reinforced that protecting customers' security and data is their top priority and it was thanks to their robust threat detection and other cyber defences that the attack was identified.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">To read more, please click <a rel="noopener noreferrer" href="https://www.denbighshirefreepress.co.uk/news/19120379.npower-scrap-app-customer-bank-details-exposed/" target="_blank" style="margin: 0px; padding: 0px; color: #522d6d;">here</a>.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;"><a rel="noopener noreferrer" href="https://www.adsadvance.co.uk/bridewell-consulting-reports-on-aviation-s-cyber-security-vulnerability.html" target="_blank" style="margin: 0px; padding: 0px; color: #522d6d;"><strong style="margin: 0px; padding: 0px;"><span style="margin: 0px; padding: 0px; color: #4d3069;">Bridewell Consulting reports on aviation's cyber security vulnerability</span></strong></a></p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">88% of UK aviation companies have detected cyber attacks in the last year, despite 78% stating their systems are secure according to research by Bridewell Consulting.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">They posit that the aviation industry is facing an increased risk of cyber-attacks due to ageing infrastructure, a complex supply chain and the accessibility of operations systems both from corporate networks and over the internet.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">The data shows that 28% of companies have reduced their infrastructure budget since the start of the pandemic and the industry is being urged to review and update its security before it is too late.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">To read more, please click <a rel="noopener noreferrer" href="https://www.adsadvance.co.uk/bridewell-consulting-reports-on-aviation-s-cyber-security-vulnerability.html" target="_blank" style="margin: 0px; padding: 0px; color: #522d6d;">here</a>.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;"><a rel="noopener noreferrer" href="https://www.securityweek.com/different-flavors-cyber-resilience" target="_blank" style="margin: 0px; padding: 0px; color: #522d6d;"><strong style="margin: 0px; padding: 0px;"><span style="margin: 0px; padding: 0px; color: #4d3069;">The different flavours of cyber resilience</span></strong></a></p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">In an article on cyber resilience - the ability to anticipate and withstand cyber-attacks - internationally recognized IT security author, Torsten George, offers his insight into best practices.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">The steps needed to effectively implement cyber resilience strategies, will vary from business to business but these strategies are essential to ensure organisations can improve their data protection strategies, as well as survive a cyber-attack. To be effective, it must be applied to all cyber resources, namely networks, data, workloads, devices and people. Cyber resilience can also help prevent cyber incidents which may happen due to human error or outdated software.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">To read more, please click <a rel="noopener noreferrer" href="https://www.securityweek.com/different-flavors-cyber-resilience" target="_blank" style="margin: 0px; padding: 0px; color: #522d6d;">here</a>.</p>
</div>
<div class="telerik_paste_container" style="border-width: 0px; position: absolute; overflow: hidden; margin: 0px; padding: 0px; left: 3px; top: 145px; width: 1px; height: 1px;">
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;"><a rel="noopener noreferrer" href="https://www.insurancebusinessmag.com/uk/news/cyber/cyberattacks-are-soaring--how-can-the-insurance-industry-keep-up-248234.aspx" target="_blank" style="margin: 0px; padding: 0px; color: #522d6d;"><strong style="margin: 0px; padding: 0px;"><span style="margin: 0px; padding: 0px; color: #4d3069;">Insurance industries struggling to keep up with surge in cyber attacks</span></strong></a></p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">The COVID-19 pandemic has driven greater digitalization and remote working and as a result cyber vulnerability has intensified significantly. According to the Hiscox Cyber Readiness Report 2020, only 26% of the firms have stand-alone cyber insurance policies. The majority of firms rely on generic insurance policies which do not explicitly include or exclude cyber cover, giving rise to 'silent cyber' losses. S&P Global has suggested there needs to be further development of stand-alone cyber insurance products which would offer more efficient and optimized control of <em style="margin: 0px; padding: 0px;">accumulation risk</em>.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">To read more, please click <a rel="noopener noreferrer" href="https://www.insurancebusinessmag.com/uk/news/cyber/cyberattacks-are-soaring--how-can-the-insurance-industry-keep-up-248234.aspx" target="_blank" style="margin: 0px; padding: 0px; color: #522d6d;">here</a>.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;"><a rel="noopener noreferrer" href="https://www.pwc.co.uk/issues/cyber-security-services/insights/five-cyber-threat-trends-to-prepare-for-in-2021.html" target="_blank" style="margin: 0px; padding: 0px; color: #522d6d;"><strong style="margin: 0px; padding: 0px;"><span style="margin: 0px; padding: 0px; color: #4d3069;">5 cyber threat trends that will remain prominent in 2021</span></strong></a></p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">In their Cyber Threats Retrospective report, PWC highlight that over the last 12 months, the five most prolific cyber threat trends were ransomware, using current affairs as bait, supply chain attacks, social engineering and a rise of the defenders. Additionally, the report explores their wider impact on organisations, business and society.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">To read more, please click <a rel="noopener noreferrer" href="https://www.pwc.co.uk/issues/cyber-security-services/insights/five-cyber-threat-trends-to-prepare-for-in-2021.html" target="_blank" style="margin: 0px; padding: 0px; color: #522d6d;">here</a>.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;"><a rel="noopener noreferrer" href="https://www.denbighshirefreepress.co.uk/news/19120379.npower-scrap-app-customer-bank-details-exposed/" target="_blank" style="margin: 0px; padding: 0px; color: #522d6d;"><strong style="margin: 0px; padding: 0px;"><span style="margin: 0px; padding: 0px; color: #4d3069;">Npower app to be removed after login data was stolen</span></strong></a></p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">It is believed that personal contact details and partial financial information may have been obtained, but those affected were immediately alerted and had their accounts locked. The energy provider, which is owned by E.ON, has reinforced that protecting customers' security and data is their top priority and it was thanks to their robust threat detection and other cyber defences that the attack was identified.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">To read more, please click <a rel="noopener noreferrer" href="https://www.denbighshirefreepress.co.uk/news/19120379.npower-scrap-app-customer-bank-details-exposed/" target="_blank" style="margin: 0px; padding: 0px; color: #522d6d;">here</a>.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;"><a rel="noopener noreferrer" href="https://www.adsadvance.co.uk/bridewell-consulting-reports-on-aviation-s-cyber-security-vulnerability.html" target="_blank" style="margin: 0px; padding: 0px; color: #522d6d;"><strong style="margin: 0px; padding: 0px;"><span style="margin: 0px; padding: 0px; color: #4d3069;">Bridewell Consulting reports on aviation's cyber security vulnerability</span></strong></a></p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">88% of UK aviation companies have detected cyber attacks in the last year, despite 78% stating their systems are secure according to research by Bridewell Consulting.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">They posit that the aviation industry is facing an increased risk of cyber-attacks due to ageing infrastructure, a complex supply chain and the accessibility of operations systems both from corporate networks and over the internet.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">The data shows that 28% of companies have reduced their infrastructure budget since the start of the pandemic and the industry is being urged to review and update its security before it is too late.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">To read more, please click <a rel="noopener noreferrer" href="https://www.adsadvance.co.uk/bridewell-consulting-reports-on-aviation-s-cyber-security-vulnerability.html" target="_blank" style="margin: 0px; padding: 0px; color: #522d6d;">here</a>.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;"><a rel="noopener noreferrer" href="https://www.securityweek.com/different-flavors-cyber-resilience" target="_blank" style="margin: 0px; padding: 0px; color: #522d6d;"><strong style="margin: 0px; padding: 0px;"><span style="margin: 0px; padding: 0px; color: #4d3069;">The different flavours of cyber resilience</span></strong></a></p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">In an article on cyber resilience - the ability to anticipate and withstand cyber-attacks - internationally recognized IT security author, Torsten George, offers his insight into best practices.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">The steps needed to effectively implement cyber resilience strategies, will vary from business to business but these strategies are essential to ensure organisations can improve their data protection strategies, as well as survive a cyber-attack. To be effective, it must be applied to all cyber resources, namely networks, data, workloads, devices and people. Cyber resilience can also help prevent cyber incidents which may happen due to human error or outdated software.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">To read more, please click <a rel="noopener noreferrer" href="https://www.securityweek.com/different-flavors-cyber-resilience" target="_blank" style="margin: 0px; padding: 0px; color: #522d6d;">here</a>.</p>
</div>
<div class="telerik_paste_container" style="border-width: 0px; position: absolute; overflow: hidden; margin: 0px; padding: 0px; left: 3px; top: 145px; width: 1px; height: 1px;">
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;"><a rel="noopener noreferrer" href="https://www.insurancebusinessmag.com/uk/news/cyber/cyberattacks-are-soaring--how-can-the-insurance-industry-keep-up-248234.aspx" target="_blank" style="margin: 0px; padding: 0px; color: #522d6d;"><strong style="margin: 0px; padding: 0px;"><span style="margin: 0px; padding: 0px; color: #4d3069;">Insurance industries struggling to keep up with surge in cyber attacks</span></strong></a></p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">The COVID-19 pandemic has driven greater digitalization and remote working and as a result cyber vulnerability has intensified significantly. According to the Hiscox Cyber Readiness Report 2020, only 26% of the firms have stand-alone cyber insurance policies. The majority of firms rely on generic insurance policies which do not explicitly include or exclude cyber cover, giving rise to 'silent cyber' losses. S&P Global has suggested there needs to be further development of stand-alone cyber insurance products which would offer more efficient and optimized control of <em style="margin: 0px; padding: 0px;">accumulation risk</em>.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">To read more, please click <a rel="noopener noreferrer" href="https://www.insurancebusinessmag.com/uk/news/cyber/cyberattacks-are-soaring--how-can-the-insurance-industry-keep-up-248234.aspx" target="_blank" style="margin: 0px; padding: 0px; color: #522d6d;">here</a>.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;"><a rel="noopener noreferrer" href="https://www.pwc.co.uk/issues/cyber-security-services/insights/five-cyber-threat-trends-to-prepare-for-in-2021.html" target="_blank" style="margin: 0px; padding: 0px; color: #522d6d;"><strong style="margin: 0px; padding: 0px;"><span style="margin: 0px; padding: 0px; color: #4d3069;">5 cyber threat trends that will remain prominent in 2021</span></strong></a></p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">In their Cyber Threats Retrospective report, PWC highlight that over the last 12 months, the five most prolific cyber threat trends were ransomware, using current affairs as bait, supply chain attacks, social engineering and a rise of the defenders. Additionally, the report explores their wider impact on organisations, business and society.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">To read more, please click <a rel="noopener noreferrer" href="https://www.pwc.co.uk/issues/cyber-security-services/insights/five-cyber-threat-trends-to-prepare-for-in-2021.html" target="_blank" style="margin: 0px; padding: 0px; color: #522d6d;">here</a>.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;"><a rel="noopener noreferrer" href="https://www.denbighshirefreepress.co.uk/news/19120379.npower-scrap-app-customer-bank-details-exposed/" target="_blank" style="margin: 0px; padding: 0px; color: #522d6d;"><strong style="margin: 0px; padding: 0px;"><span style="margin: 0px; padding: 0px; color: #4d3069;">Npower app to be removed after login data was stolen</span></strong></a></p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">It is believed that personal contact details and partial financial information may have been obtained, but those affected were immediately alerted and had their accounts locked. The energy provider, which is owned by E.ON, has reinforced that protecting customers' security and data is their top priority and it was thanks to their robust threat detection and other cyber defences that the attack was identified.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">To read more, please click <a rel="noopener noreferrer" href="https://www.denbighshirefreepress.co.uk/news/19120379.npower-scrap-app-customer-bank-details-exposed/" target="_blank" style="margin: 0px; padding: 0px; color: #522d6d;">here</a>.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;"><a rel="noopener noreferrer" href="https://www.adsadvance.co.uk/bridewell-consulting-reports-on-aviation-s-cyber-security-vulnerability.html" target="_blank" style="margin: 0px; padding: 0px; color: #522d6d;"><strong style="margin: 0px; padding: 0px;"><span style="margin: 0px; padding: 0px; color: #4d3069;">Bridewell Consulting reports on aviation's cyber security vulnerability</span></strong></a></p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">88% of UK aviation companies have detected cyber attacks in the last year, despite 78% stating their systems are secure according to research by Bridewell Consulting.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">They posit that the aviation industry is facing an increased risk of cyber-attacks due to ageing infrastructure, a complex supply chain and the accessibility of operations systems both from corporate networks and over the internet.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">The data shows that 28% of companies have reduced their infrastructure budget since the start of the pandemic and the industry is being urged to review and update its security before it is too late.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">To read more, please click <a rel="noopener noreferrer" href="https://www.adsadvance.co.uk/bridewell-consulting-reports-on-aviation-s-cyber-security-vulnerability.html" target="_blank" style="margin: 0px; padding: 0px; color: #522d6d;">here</a>.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;"><a rel="noopener noreferrer" href="https://www.securityweek.com/different-flavors-cyber-resilience" target="_blank" style="margin: 0px; padding: 0px; color: #522d6d;"><strong style="margin: 0px; padding: 0px;"><span style="margin: 0px; padding: 0px; color: #4d3069;">The different flavours of cyber resilience</span></strong></a></p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">In an article on cyber resilience - the ability to anticipate and withstand cyber-attacks - internationally recognized IT security author, Torsten George, offers his insight into best practices.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">The steps needed to effectively implement cyber resilience strategies, will vary from business to business but these strategies are essential to ensure organisations can improve their data protection strategies, as well as survive a cyber-attack. To be effective, it must be applied to all cyber resources, namely networks, data, workloads, devices and people. Cyber resilience can also help prevent cyber incidents which may happen due to human error or outdated software.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">To read more, please click <a rel="noopener noreferrer" href="https://www.securityweek.com/different-flavors-cyber-resilience" target="_blank" style="margin: 0px; padding: 0px; color: #522d6d;">here</a>.</p>
</div>]]></content:encoded></item><item><guid isPermaLink="false">{4B8F7064-9123-426B-8B50-1090D6FBB285}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/cyber-bytes-issue-30/</link><title>Cyber_Bytes - Issue 30</title><description><![CDATA[Welcome to Cyber_Bytes, our bi-weekly round up of key developments in cyber, tech and evolving risks.]]></description><pubDate>Tue, 16 Mar 2021 17:19:00 Z</pubDate><category>Data and privacy</category><authors:names>Richard Breavington, Daniel Guilfoyle, Ian Dinning, Rachel Ford, Christopher Ashton</authors:names><content:encoded><![CDATA[<p><strong>Coronavirus research lab at oxford university falls victim to cyber attack</strong></p>
<p>In mid-February, Oxford University experienced a cyber-attack at the Division of Structural Biology which has been carrying out research into the virus. The incident was identified and contained with no impact on clinical research. However, it gives light to the rising problem of digital espionage targeting health bodies, vaccine scientists and drugmakers during the pandemic as hackers attempt to secure the latest information on the outbreak.</p>
<p>To read more, please click <a href="https://www.standard.co.uk/news/uk/hackers-oxford-university-coronavirus-research-lab-cyber-attack-b921297.html" target="_blank">here</a>.</p>
<p><strong><span>Insurance industries struggling to keep up with surge in cyber attacks</span></strong></p>
<p>The COVID-19 pandemic has driven greater digitalization and remote working and as a result cyber vulnerability has intensified significantly. According to the Hiscox Cyber Readiness Report 2020, only 26% of the firms have stand-alone cyber insurance policies. The majority of firms rely on generic insurance policies which do not explicitly include or exclude cyber cover, giving rise to 'silent cyber' losses. S&P Global has suggested there needs to be further development of stand-alone cyber insurance products which would offer more efficient and optimized control of <em>accumulation risk</em>.</p>
<p>To read more, please click <a href="https://www.insurancebusinessmag.com/uk/news/cyber/cyberattacks-are-soaring--how-can-the-insurance-industry-keep-up-248234.aspx" target="_blank">here</a>.</p>
<p><strong>5 cyber threat trends that will remain prominent in 2021</strong></p>
<p>In their Cyber Threats Retrospective report, PWC highlight that over the last 12 months, the five most prolific cyber threat trends were ransomware, using current affairs as bait, supply chain attacks, social engineering and a rise of the defenders. Additionally, the report explores their wider impact on organisations, business and society.</p>
<p>To read more, please click <a href="https://www.pwc.co.uk/issues/cyber-security-services/insights/five-cyber-threat-trends-to-prepare-for-in-2021.html" target="_blank">here</a>.</p>
<p><strong><span>Npower app to be removed after login data was stolen</span></strong></p>
<p>It is believed that personal contact details and partial financial information may have been obtained, but those affected were immediately alerted and had their accounts locked. The energy provider, which is owned by E.ON, has reinforced that protecting customers' security and data is their top priority and it was thanks to their robust threat detection and other cyber defences that the attack was identified.</p>
<p>To read more, please click <a href="https://www.denbighshirefreepress.co.uk/news/19120379.npower-scrap-app-customer-bank-details-exposed/" target="_blank">here</a>.</p>
<p><strong>Bridewell Consulting reports on aviation's cyber security vulnerability</strong></p>
<p><strong></strong>88% of UK aviation companies have detected cyber attacks in the last year, despite 78% stating their systems are secure according to research by Bridewell Consulting.</p>
<p>They posit that the aviation industry is facing an increased risk of cyber-attacks due to ageing infrastructure, a complex supply chain and the accessibility of operations systems both from corporate networks and over the internet.</p>
<p>The data shows that 28% of companies have reduced their infrastructure budget since the start of the pandemic and the industry is being urged to review and update its security before it is too late.</p>
<p>To read more, please click <a href="https://www.adsadvance.co.uk/bridewell-consulting-reports-on-aviation-s-cyber-security-vulnerability.html" target="_blank">here</a>.</p>
<p><strong><span>The different flavours of cyber resilience</span></strong></p>
<p>In an article on cyber resilience - the ability to anticipate and withstand cyber-attacks - internationally recognized IT security author, Torsten George, offers his insight into best practices.</p>
<p>The steps needed to effectively implement cyber resilience strategies, will vary from business to business but these strategies are essential to ensure organisations can improve their data protection strategies, as well as survive a cyber-attack. To be effective, it must be applied to all cyber resources, namely networks, data, workloads, devices and people. Cyber resilience can also help prevent cyber incidents which may happen due to human error or outdated software.</p>
<p>To read more, please click <a href="https://www.securityweek.com/different-flavors-cyber-resilience" target="_blank">here</a>.</p>
<div class="telerik_paste_container" style="border-width: 0px; position: absolute; overflow: hidden; margin: 0px; padding: 0px; left: 3px; top: 145px; width: 1px; height: 1px;">
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;"><a href="https://www.insurancebusinessmag.com/uk/news/cyber/cyberattacks-are-soaring--how-can-the-insurance-industry-keep-up-248234.aspx" target="_blank" style="margin: 0px; padding: 0px; color: #522d6d;"><strong style="margin: 0px; padding: 0px;"><span style="margin: 0px; padding: 0px; color: #4d3069;">Insurance industries struggling to keep up with surge in cyber attacks</span></strong></a></p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">The COVID-19 pandemic has driven greater digitalization and remote working and as a result cyber vulnerability has intensified significantly. According to the Hiscox Cyber Readiness Report 2020, only 26% of the firms have stand-alone cyber insurance policies. The majority of firms rely on generic insurance policies which do not explicitly include or exclude cyber cover, giving rise to 'silent cyber' losses. S&P Global has suggested there needs to be further development of stand-alone cyber insurance products which would offer more efficient and optimized control of <em style="margin: 0px; padding: 0px;">accumulation risk</em>.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">To read more, please click <a href="https://www.insurancebusinessmag.com/uk/news/cyber/cyberattacks-are-soaring--how-can-the-insurance-industry-keep-up-248234.aspx" target="_blank" style="margin: 0px; padding: 0px; color: #522d6d;">here</a>.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;"><a href="https://www.pwc.co.uk/issues/cyber-security-services/insights/five-cyber-threat-trends-to-prepare-for-in-2021.html" target="_blank" style="margin: 0px; padding: 0px; color: #522d6d;"><strong style="margin: 0px; padding: 0px;"><span style="margin: 0px; padding: 0px; color: #4d3069;">5 cyber threat trends that will remain prominent in 2021</span></strong></a></p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">In their Cyber Threats Retrospective report, PWC highlight that over the last 12 months, the five most prolific cyber threat trends were ransomware, using current affairs as bait, supply chain attacks, social engineering and a rise of the defenders. Additionally, the report explores their wider impact on organisations, business and society.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">To read more, please click <a href="https://www.pwc.co.uk/issues/cyber-security-services/insights/five-cyber-threat-trends-to-prepare-for-in-2021.html" target="_blank" style="margin: 0px; padding: 0px; color: #522d6d;">here</a>.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;"><a href="https://www.denbighshirefreepress.co.uk/news/19120379.npower-scrap-app-customer-bank-details-exposed/" target="_blank" style="margin: 0px; padding: 0px; color: #522d6d;"><strong style="margin: 0px; padding: 0px;"><span style="margin: 0px; padding: 0px; color: #4d3069;">Npower app to be removed after login data was stolen</span></strong></a></p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">It is believed that personal contact details and partial financial information may have been obtained, but those affected were immediately alerted and had their accounts locked. The energy provider, which is owned by E.ON, has reinforced that protecting customers' security and data is their top priority and it was thanks to their robust threat detection and other cyber defences that the attack was identified.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">To read more, please click <a href="https://www.denbighshirefreepress.co.uk/news/19120379.npower-scrap-app-customer-bank-details-exposed/" target="_blank" style="margin: 0px; padding: 0px; color: #522d6d;">here</a>.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;"><a href="https://www.adsadvance.co.uk/bridewell-consulting-reports-on-aviation-s-cyber-security-vulnerability.html" target="_blank" style="margin: 0px; padding: 0px; color: #522d6d;"><strong style="margin: 0px; padding: 0px;"><span style="margin: 0px; padding: 0px; color: #4d3069;">Bridewell Consulting reports on aviation's cyber security vulnerability</span></strong></a></p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">88% of UK aviation companies have detected cyber attacks in the last year, despite 78% stating their systems are secure according to research by Bridewell Consulting.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">They posit that the aviation industry is facing an increased risk of cyber-attacks due to ageing infrastructure, a complex supply chain and the accessibility of operations systems both from corporate networks and over the internet.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">The data shows that 28% of companies have reduced their infrastructure budget since the start of the pandemic and the industry is being urged to review and update its security before it is too late.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">To read more, please click <a href="https://www.adsadvance.co.uk/bridewell-consulting-reports-on-aviation-s-cyber-security-vulnerability.html" target="_blank" style="margin: 0px; padding: 0px; color: #522d6d;">here</a>.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;"><a href="https://www.securityweek.com/different-flavors-cyber-resilience" target="_blank" style="margin: 0px; padding: 0px; color: #522d6d;"><strong style="margin: 0px; padding: 0px;"><span style="margin: 0px; padding: 0px; color: #4d3069;">The different flavours of cyber resilience</span></strong></a></p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">In an article on cyber resilience - the ability to anticipate and withstand cyber-attacks - internationally recognized IT security author, Torsten George, offers his insight into best practices.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">The steps needed to effectively implement cyber resilience strategies, will vary from business to business but these strategies are essential to ensure organisations can improve their data protection strategies, as well as survive a cyber-attack. To be effective, it must be applied to all cyber resources, namely networks, data, workloads, devices and people. Cyber resilience can also help prevent cyber incidents which may happen due to human error or outdated software.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">To read more, please click <a href="https://www.securityweek.com/different-flavors-cyber-resilience" target="_blank" style="margin: 0px; padding: 0px; color: #522d6d;">here</a>.</p>
</div>
<div class="telerik_paste_container" style="border-width: 0px; position: absolute; overflow: hidden; margin: 0px; padding: 0px; left: 3px; top: 145px; width: 1px; height: 1px;">
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;"><a href="https://www.insurancebusinessmag.com/uk/news/cyber/cyberattacks-are-soaring--how-can-the-insurance-industry-keep-up-248234.aspx" target="_blank" style="margin: 0px; padding: 0px; color: #522d6d;"><strong style="margin: 0px; padding: 0px;"><span style="margin: 0px; padding: 0px; color: #4d3069;">Insurance industries struggling to keep up with surge in cyber attacks</span></strong></a></p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">The COVID-19 pandemic has driven greater digitalization and remote working and as a result cyber vulnerability has intensified significantly. According to the Hiscox Cyber Readiness Report 2020, only 26% of the firms have stand-alone cyber insurance policies. The majority of firms rely on generic insurance policies which do not explicitly include or exclude cyber cover, giving rise to 'silent cyber' losses. S&P Global has suggested there needs to be further development of stand-alone cyber insurance products which would offer more efficient and optimized control of <em style="margin: 0px; padding: 0px;">accumulation risk</em>.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">To read more, please click <a href="https://www.insurancebusinessmag.com/uk/news/cyber/cyberattacks-are-soaring--how-can-the-insurance-industry-keep-up-248234.aspx" target="_blank" style="margin: 0px; padding: 0px; color: #522d6d;">here</a>.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;"><a href="https://www.pwc.co.uk/issues/cyber-security-services/insights/five-cyber-threat-trends-to-prepare-for-in-2021.html" target="_blank" style="margin: 0px; padding: 0px; color: #522d6d;"><strong style="margin: 0px; padding: 0px;"><span style="margin: 0px; padding: 0px; color: #4d3069;">5 cyber threat trends that will remain prominent in 2021</span></strong></a></p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">In their Cyber Threats Retrospective report, PWC highlight that over the last 12 months, the five most prolific cyber threat trends were ransomware, using current affairs as bait, supply chain attacks, social engineering and a rise of the defenders. Additionally, the report explores their wider impact on organisations, business and society.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">To read more, please click <a href="https://www.pwc.co.uk/issues/cyber-security-services/insights/five-cyber-threat-trends-to-prepare-for-in-2021.html" target="_blank" style="margin: 0px; padding: 0px; color: #522d6d;">here</a>.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;"><a href="https://www.denbighshirefreepress.co.uk/news/19120379.npower-scrap-app-customer-bank-details-exposed/" target="_blank" style="margin: 0px; padding: 0px; color: #522d6d;"><strong style="margin: 0px; padding: 0px;"><span style="margin: 0px; padding: 0px; color: #4d3069;">Npower app to be removed after login data was stolen</span></strong></a></p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">It is believed that personal contact details and partial financial information may have been obtained, but those affected were immediately alerted and had their accounts locked. The energy provider, which is owned by E.ON, has reinforced that protecting customers' security and data is their top priority and it was thanks to their robust threat detection and other cyber defences that the attack was identified.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">To read more, please click <a href="https://www.denbighshirefreepress.co.uk/news/19120379.npower-scrap-app-customer-bank-details-exposed/" target="_blank" style="margin: 0px; padding: 0px; color: #522d6d;">here</a>.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;"><a href="https://www.adsadvance.co.uk/bridewell-consulting-reports-on-aviation-s-cyber-security-vulnerability.html" target="_blank" style="margin: 0px; padding: 0px; color: #522d6d;"><strong style="margin: 0px; padding: 0px;"><span style="margin: 0px; padding: 0px; color: #4d3069;">Bridewell Consulting reports on aviation's cyber security vulnerability</span></strong></a></p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">88% of UK aviation companies have detected cyber attacks in the last year, despite 78% stating their systems are secure according to research by Bridewell Consulting.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">They posit that the aviation industry is facing an increased risk of cyber-attacks due to ageing infrastructure, a complex supply chain and the accessibility of operations systems both from corporate networks and over the internet.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">The data shows that 28% of companies have reduced their infrastructure budget since the start of the pandemic and the industry is being urged to review and update its security before it is too late.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">To read more, please click <a href="https://www.adsadvance.co.uk/bridewell-consulting-reports-on-aviation-s-cyber-security-vulnerability.html" target="_blank" style="margin: 0px; padding: 0px; color: #522d6d;">here</a>.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;"><a href="https://www.securityweek.com/different-flavors-cyber-resilience" target="_blank" style="margin: 0px; padding: 0px; color: #522d6d;"><strong style="margin: 0px; padding: 0px;"><span style="margin: 0px; padding: 0px; color: #4d3069;">The different flavours of cyber resilience</span></strong></a></p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">In an article on cyber resilience - the ability to anticipate and withstand cyber-attacks - internationally recognized IT security author, Torsten George, offers his insight into best practices.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">The steps needed to effectively implement cyber resilience strategies, will vary from business to business but these strategies are essential to ensure organisations can improve their data protection strategies, as well as survive a cyber-attack. To be effective, it must be applied to all cyber resources, namely networks, data, workloads, devices and people. Cyber resilience can also help prevent cyber incidents which may happen due to human error or outdated software.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">To read more, please click <a href="https://www.securityweek.com/different-flavors-cyber-resilience" target="_blank" style="margin: 0px; padding: 0px; color: #522d6d;">here</a>.</p>
</div>
<div class="telerik_paste_container" style="border-width: 0px; position: absolute; overflow: hidden; margin: 0px; padding: 0px; left: 3px; top: 145px; width: 1px; height: 1px;">
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;"><a href="https://www.insurancebusinessmag.com/uk/news/cyber/cyberattacks-are-soaring--how-can-the-insurance-industry-keep-up-248234.aspx" target="_blank" style="margin: 0px; padding: 0px; color: #522d6d;"><strong style="margin: 0px; padding: 0px;"><span style="margin: 0px; padding: 0px; color: #4d3069;">Insurance industries struggling to keep up with surge in cyber attacks</span></strong></a></p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">The COVID-19 pandemic has driven greater digitalization and remote working and as a result cyber vulnerability has intensified significantly. According to the Hiscox Cyber Readiness Report 2020, only 26% of the firms have stand-alone cyber insurance policies. The majority of firms rely on generic insurance policies which do not explicitly include or exclude cyber cover, giving rise to 'silent cyber' losses. S&P Global has suggested there needs to be further development of stand-alone cyber insurance products which would offer more efficient and optimized control of <em style="margin: 0px; padding: 0px;">accumulation risk</em>.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">To read more, please click <a href="https://www.insurancebusinessmag.com/uk/news/cyber/cyberattacks-are-soaring--how-can-the-insurance-industry-keep-up-248234.aspx" target="_blank" style="margin: 0px; padding: 0px; color: #522d6d;">here</a>.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;"><a href="https://www.pwc.co.uk/issues/cyber-security-services/insights/five-cyber-threat-trends-to-prepare-for-in-2021.html" target="_blank" style="margin: 0px; padding: 0px; color: #522d6d;"><strong style="margin: 0px; padding: 0px;"><span style="margin: 0px; padding: 0px; color: #4d3069;">5 cyber threat trends that will remain prominent in 2021</span></strong></a></p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">In their Cyber Threats Retrospective report, PWC highlight that over the last 12 months, the five most prolific cyber threat trends were ransomware, using current affairs as bait, supply chain attacks, social engineering and a rise of the defenders. Additionally, the report explores their wider impact on organisations, business and society.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">To read more, please click <a href="https://www.pwc.co.uk/issues/cyber-security-services/insights/five-cyber-threat-trends-to-prepare-for-in-2021.html" target="_blank" style="margin: 0px; padding: 0px; color: #522d6d;">here</a>.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;"><a href="https://www.denbighshirefreepress.co.uk/news/19120379.npower-scrap-app-customer-bank-details-exposed/" target="_blank" style="margin: 0px; padding: 0px; color: #522d6d;"><strong style="margin: 0px; padding: 0px;"><span style="margin: 0px; padding: 0px; color: #4d3069;">Npower app to be removed after login data was stolen</span></strong></a></p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">It is believed that personal contact details and partial financial information may have been obtained, but those affected were immediately alerted and had their accounts locked. The energy provider, which is owned by E.ON, has reinforced that protecting customers' security and data is their top priority and it was thanks to their robust threat detection and other cyber defences that the attack was identified.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">To read more, please click <a href="https://www.denbighshirefreepress.co.uk/news/19120379.npower-scrap-app-customer-bank-details-exposed/" target="_blank" style="margin: 0px; padding: 0px; color: #522d6d;">here</a>.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;"><a href="https://www.adsadvance.co.uk/bridewell-consulting-reports-on-aviation-s-cyber-security-vulnerability.html" target="_blank" style="margin: 0px; padding: 0px; color: #522d6d;"><strong style="margin: 0px; padding: 0px;"><span style="margin: 0px; padding: 0px; color: #4d3069;">Bridewell Consulting reports on aviation's cyber security vulnerability</span></strong></a></p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">88% of UK aviation companies have detected cyber attacks in the last year, despite 78% stating their systems are secure according to research by Bridewell Consulting.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">They posit that the aviation industry is facing an increased risk of cyber-attacks due to ageing infrastructure, a complex supply chain and the accessibility of operations systems both from corporate networks and over the internet.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">The data shows that 28% of companies have reduced their infrastructure budget since the start of the pandemic and the industry is being urged to review and update its security before it is too late.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">To read more, please click <a href="https://www.adsadvance.co.uk/bridewell-consulting-reports-on-aviation-s-cyber-security-vulnerability.html" target="_blank" style="margin: 0px; padding: 0px; color: #522d6d;">here</a>.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;"><a href="https://www.securityweek.com/different-flavors-cyber-resilience" target="_blank" style="margin: 0px; padding: 0px; color: #522d6d;"><strong style="margin: 0px; padding: 0px;"><span style="margin: 0px; padding: 0px; color: #4d3069;">The different flavours of cyber resilience</span></strong></a></p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">In an article on cyber resilience - the ability to anticipate and withstand cyber-attacks - internationally recognized IT security author, Torsten George, offers his insight into best practices.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">The steps needed to effectively implement cyber resilience strategies, will vary from business to business but these strategies are essential to ensure organisations can improve their data protection strategies, as well as survive a cyber-attack. To be effective, it must be applied to all cyber resources, namely networks, data, workloads, devices and people. Cyber resilience can also help prevent cyber incidents which may happen due to human error or outdated software.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">To read more, please click <a href="https://www.securityweek.com/different-flavors-cyber-resilience" target="_blank" style="margin: 0px; padding: 0px; color: #522d6d;">here</a>.</p>
</div>
<div class="telerik_paste_container" style="border-width: 0px; position: absolute; overflow: hidden; margin: 0px; padding: 0px; left: 3px; top: 145px; width: 1px; height: 1px;">
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;"><a href="https://www.insurancebusinessmag.com/uk/news/cyber/cyberattacks-are-soaring--how-can-the-insurance-industry-keep-up-248234.aspx" target="_blank" style="margin: 0px; padding: 0px; color: #522d6d;"><strong style="margin: 0px; padding: 0px;"><span style="margin: 0px; padding: 0px; color: #4d3069;">Insurance industries struggling to keep up with surge in cyber attacks</span></strong></a></p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">The COVID-19 pandemic has driven greater digitalization and remote working and as a result cyber vulnerability has intensified significantly. According to the Hiscox Cyber Readiness Report 2020, only 26% of the firms have stand-alone cyber insurance policies. The majority of firms rely on generic insurance policies which do not explicitly include or exclude cyber cover, giving rise to 'silent cyber' losses. S&P Global has suggested there needs to be further development of stand-alone cyber insurance products which would offer more efficient and optimized control of <em style="margin: 0px; padding: 0px;">accumulation risk</em>.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">To read more, please click <a href="https://www.insurancebusinessmag.com/uk/news/cyber/cyberattacks-are-soaring--how-can-the-insurance-industry-keep-up-248234.aspx" target="_blank" style="margin: 0px; padding: 0px; color: #522d6d;">here</a>.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;"><a href="https://www.pwc.co.uk/issues/cyber-security-services/insights/five-cyber-threat-trends-to-prepare-for-in-2021.html" target="_blank" style="margin: 0px; padding: 0px; color: #522d6d;"><strong style="margin: 0px; padding: 0px;"><span style="margin: 0px; padding: 0px; color: #4d3069;">5 cyber threat trends that will remain prominent in 2021</span></strong></a></p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">In their Cyber Threats Retrospective report, PWC highlight that over the last 12 months, the five most prolific cyber threat trends were ransomware, using current affairs as bait, supply chain attacks, social engineering and a rise of the defenders. Additionally, the report explores their wider impact on organisations, business and society.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">To read more, please click <a href="https://www.pwc.co.uk/issues/cyber-security-services/insights/five-cyber-threat-trends-to-prepare-for-in-2021.html" target="_blank" style="margin: 0px; padding: 0px; color: #522d6d;">here</a>.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;"><a href="https://www.denbighshirefreepress.co.uk/news/19120379.npower-scrap-app-customer-bank-details-exposed/" target="_blank" style="margin: 0px; padding: 0px; color: #522d6d;"><strong style="margin: 0px; padding: 0px;"><span style="margin: 0px; padding: 0px; color: #4d3069;">Npower app to be removed after login data was stolen</span></strong></a></p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">It is believed that personal contact details and partial financial information may have been obtained, but those affected were immediately alerted and had their accounts locked. The energy provider, which is owned by E.ON, has reinforced that protecting customers' security and data is their top priority and it was thanks to their robust threat detection and other cyber defences that the attack was identified.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">To read more, please click <a href="https://www.denbighshirefreepress.co.uk/news/19120379.npower-scrap-app-customer-bank-details-exposed/" target="_blank" style="margin: 0px; padding: 0px; color: #522d6d;">here</a>.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;"><a href="https://www.adsadvance.co.uk/bridewell-consulting-reports-on-aviation-s-cyber-security-vulnerability.html" target="_blank" style="margin: 0px; padding: 0px; color: #522d6d;"><strong style="margin: 0px; padding: 0px;"><span style="margin: 0px; padding: 0px; color: #4d3069;">Bridewell Consulting reports on aviation's cyber security vulnerability</span></strong></a></p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">88% of UK aviation companies have detected cyber attacks in the last year, despite 78% stating their systems are secure according to research by Bridewell Consulting.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">They posit that the aviation industry is facing an increased risk of cyber-attacks due to ageing infrastructure, a complex supply chain and the accessibility of operations systems both from corporate networks and over the internet.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">The data shows that 28% of companies have reduced their infrastructure budget since the start of the pandemic and the industry is being urged to review and update its security before it is too late.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">To read more, please click <a href="https://www.adsadvance.co.uk/bridewell-consulting-reports-on-aviation-s-cyber-security-vulnerability.html" target="_blank" style="margin: 0px; padding: 0px; color: #522d6d;">here</a>.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;"><a href="https://www.securityweek.com/different-flavors-cyber-resilience" target="_blank" style="margin: 0px; padding: 0px; color: #522d6d;"><strong style="margin: 0px; padding: 0px;"><span style="margin: 0px; padding: 0px; color: #4d3069;">The different flavours of cyber resilience</span></strong></a></p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">In an article on cyber resilience - the ability to anticipate and withstand cyber-attacks - internationally recognized IT security author, Torsten George, offers his insight into best practices.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">The steps needed to effectively implement cyber resilience strategies, will vary from business to business but these strategies are essential to ensure organisations can improve their data protection strategies, as well as survive a cyber-attack. To be effective, it must be applied to all cyber resources, namely networks, data, workloads, devices and people. Cyber resilience can also help prevent cyber incidents which may happen due to human error or outdated software.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">To read more, please click <a href="https://www.securityweek.com/different-flavors-cyber-resilience" target="_blank" style="margin: 0px; padding: 0px; color: #522d6d;">here</a>.</p>
</div>
<div class="telerik_paste_container" style="border-width: 0px; position: absolute; overflow: hidden; margin: 0px; padding: 0px; left: 3px; top: 145px; width: 1px; height: 1px;">
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;"><a href="https://www.insurancebusinessmag.com/uk/news/cyber/cyberattacks-are-soaring--how-can-the-insurance-industry-keep-up-248234.aspx" target="_blank" style="margin: 0px; padding: 0px; color: #522d6d;"><strong style="margin: 0px; padding: 0px;"><span style="margin: 0px; padding: 0px; color: #4d3069;">Insurance industries struggling to keep up with surge in cyber attacks</span></strong></a></p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">The COVID-19 pandemic has driven greater digitalization and remote working and as a result cyber vulnerability has intensified significantly. According to the Hiscox Cyber Readiness Report 2020, only 26% of the firms have stand-alone cyber insurance policies. The majority of firms rely on generic insurance policies which do not explicitly include or exclude cyber cover, giving rise to 'silent cyber' losses. S&P Global has suggested there needs to be further development of stand-alone cyber insurance products which would offer more efficient and optimized control of <em style="margin: 0px; padding: 0px;">accumulation risk</em>.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">To read more, please click <a href="https://www.insurancebusinessmag.com/uk/news/cyber/cyberattacks-are-soaring--how-can-the-insurance-industry-keep-up-248234.aspx" target="_blank" style="margin: 0px; padding: 0px; color: #522d6d;">here</a>.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;"><a href="https://www.pwc.co.uk/issues/cyber-security-services/insights/five-cyber-threat-trends-to-prepare-for-in-2021.html" target="_blank" style="margin: 0px; padding: 0px; color: #522d6d;"><strong style="margin: 0px; padding: 0px;"><span style="margin: 0px; padding: 0px; color: #4d3069;">5 cyber threat trends that will remain prominent in 2021</span></strong></a></p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">In their Cyber Threats Retrospective report, PWC highlight that over the last 12 months, the five most prolific cyber threat trends were ransomware, using current affairs as bait, supply chain attacks, social engineering and a rise of the defenders. Additionally, the report explores their wider impact on organisations, business and society.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">To read more, please click <a href="https://www.pwc.co.uk/issues/cyber-security-services/insights/five-cyber-threat-trends-to-prepare-for-in-2021.html" target="_blank" style="margin: 0px; padding: 0px; color: #522d6d;">here</a>.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;"><a href="https://www.denbighshirefreepress.co.uk/news/19120379.npower-scrap-app-customer-bank-details-exposed/" target="_blank" style="margin: 0px; padding: 0px; color: #522d6d;"><strong style="margin: 0px; padding: 0px;"><span style="margin: 0px; padding: 0px; color: #4d3069;">Npower app to be removed after login data was stolen</span></strong></a></p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">It is believed that personal contact details and partial financial information may have been obtained, but those affected were immediately alerted and had their accounts locked. The energy provider, which is owned by E.ON, has reinforced that protecting customers' security and data is their top priority and it was thanks to their robust threat detection and other cyber defences that the attack was identified.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">To read more, please click <a href="https://www.denbighshirefreepress.co.uk/news/19120379.npower-scrap-app-customer-bank-details-exposed/" target="_blank" style="margin: 0px; padding: 0px; color: #522d6d;">here</a>.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;"><a href="https://www.adsadvance.co.uk/bridewell-consulting-reports-on-aviation-s-cyber-security-vulnerability.html" target="_blank" style="margin: 0px; padding: 0px; color: #522d6d;"><strong style="margin: 0px; padding: 0px;"><span style="margin: 0px; padding: 0px; color: #4d3069;">Bridewell Consulting reports on aviation's cyber security vulnerability</span></strong></a></p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">88% of UK aviation companies have detected cyber attacks in the last year, despite 78% stating their systems are secure according to research by Bridewell Consulting.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">They posit that the aviation industry is facing an increased risk of cyber-attacks due to ageing infrastructure, a complex supply chain and the accessibility of operations systems both from corporate networks and over the internet.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">The data shows that 28% of companies have reduced their infrastructure budget since the start of the pandemic and the industry is being urged to review and update its security before it is too late.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">To read more, please click <a href="https://www.adsadvance.co.uk/bridewell-consulting-reports-on-aviation-s-cyber-security-vulnerability.html" target="_blank" style="margin: 0px; padding: 0px; color: #522d6d;">here</a>.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;"><a href="https://www.securityweek.com/different-flavors-cyber-resilience" target="_blank" style="margin: 0px; padding: 0px; color: #522d6d;"><strong style="margin: 0px; padding: 0px;"><span style="margin: 0px; padding: 0px; color: #4d3069;">The different flavours of cyber resilience</span></strong></a></p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">In an article on cyber resilience - the ability to anticipate and withstand cyber-attacks - internationally recognized IT security author, Torsten George, offers his insight into best practices.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">The steps needed to effectively implement cyber resilience strategies, will vary from business to business but these strategies are essential to ensure organisations can improve their data protection strategies, as well as survive a cyber-attack. To be effective, it must be applied to all cyber resources, namely networks, data, workloads, devices and people. Cyber resilience can also help prevent cyber incidents which may happen due to human error or outdated software.</p>
<p style="margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding: 0px; font-size: 14px; line-height: 18px; color: #454040; clear: both; background-color: #ffffff;">To read more, please click <a href="https://www.securityweek.com/different-flavors-cyber-resilience" target="_blank" style="margin: 0px; padding: 0px; color: #522d6d;">here</a>.</p>
</div>]]></content:encoded></item><item><guid isPermaLink="false">{F6C61DDD-2E42-4256-A622-02CF3037D3FC}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/cyber-bytes-issue-29/</link><title>Cyber_Bytes - Issue 29</title><description><![CDATA[Welcome to Cyber_Bytes, our bi-weekly round up of key developments in cyber, tech and evolving risks.]]></description><pubDate>Mon, 22 Feb 2021 13:01:00 Z</pubDate><category>Data and privacy</category><authors:names>Richard Breavington, Daniel Guilfoyle, Ian Dinning, Rachel Ford, Christopher Ashton</authors:names><content:encoded><![CDATA[<p><strong>£1m advertising costs in British Airways litigation irrecoverable</strong></p>
<p>In the group litigation brought against British Airways, the Court has confirmed that the advertising costs incurred by claimant law firms to attract potential claimants were irrecoverable from the defendant. </p>
<p>The comments from the Court will come as some relief to defendants facing group litigation but could, subject to the upcoming Supreme Court decision in Lloyd v Google, steer claimants toward the opt-out representative class action mechanism rather than the opt-in mechanism.</p>
<p>To read more, please click <a href="https://www.lawgazette.co.uk/law/1m-cost-of-advertising-for-claimants-is-not-recoverable-judge-rules/5107332.article">here</a>; RPC's analysis of ICO enforcement can be found <a href="https://www.rpc.co.uk/snapshots/data-protection/british-airways-slapped-with-biggest-ever-fine-for-data-breach/">here</a></p>
<p> </p>
<p><strong>Cybersecurity – a shift to in house legal teams</strong></p>
<p><span>A new report has suggested that cybersecurity has overtaken compliance as the most important business issue within in-house legal teams. With a shift to remote, home working, it appears that chief legal officers are increasingly being asked to take on responsibility for the organisations cybersecurity measures. </span></p>
<p><span></span><span>To read more, please click <a href="https://www.itproportal.com/news/cybersecurity-responsbility-increasingly-shifting-to-in-house-legal-teams/">here</a></span></p>
<p><span></span></p>
<p><span><strong></strong></span><span><strong> </strong></span></p>
<p><span><strong>Commercial Court cracks down on crypto-fraudsters</strong></span></p>
<p><span></span><span>The Commercial Court has granted permission for serving disclosure orders on two cryptocurrency exchanges and a world-wide freezing order against persons unknown in the first initial coin offering fraud case to come before it. The court also gave ground-breaking guidance on the law relating to the location and applicable jurisdiction of crypto-assets. </span></p>
<p><span></span><span>Judicial treatment of crypto-assets is developing rapidly and given the ever-increasing investment in crypto-assets (including, recently, by Tesla) and volatile valuation, it's likely that crypto-cons will become increasingly common; thus making the courts' innnovative application of existing law to give victims a remedy a welcome one.</span></p>
<p><span></span><span>To read RPC's analysis, please click <a href="https://www.rpc.co.uk/perspectives/tech/commercial-court-cracks-down-on-cryptofraudsters-if-it-can-find-them/">here</a></span></p>
<p><span></span></p>
<p><span><strong></strong></span><span><strong> </strong></span></p>
<p><span><strong>UK Cyber Security Council formed by Government</strong></span></p>
<p><span></span><span>The UK government has formed the UK Cyber Security Council to govern the cyber security sector. The Council will be the UK's first official governing body on training and standards, with a duty to establish standards and define career and learning paths for the cyber security sector. The Council will be formally launched on 31 March 2021.</span></p>
<p><span></span><span>To read more, please click <a href="https://www.gov.uk/government/news/new-uk-cyber-security-council-to-be-official-governing-body-on-training-and-standards">here</a></span></p>
<p><span></span></p>
<p><span><strong></strong></span><span><strong> </strong></span></p>
<p><span><strong>Stormshield - cyber attack</strong></span></p>
<p><span></span><span>A cyber security firm, Stormshield, which counts the French government among its clients, has revealed that malicious actors gained access to a technical portal used by Stormshield's customers and partners. Approximately 200 customer accounts were affected, with personal data being accessed and viewed. The incident demonstrates that no business is off-limits.</span></p>
<p><span></span><span>To read more, please click <a href="https://www.computerweekly.com/news/252495912/Security-firm-Stormshield-loses-source-code-in-cyber-attack">here</a>.</span></p>
<p><span></span></p>
<p><span><strong></strong></span><span><strong> </strong></span></p>
<p><span><strong>State based cyber threats and the future of AI</strong></span></p>
<p><span></span><span>At a recent cyber AI forum, the former Director General of MI5 has outlined the risks around cyber warfare and has said that thousands of businesses are at risk of being caught in the cross hairs of state campaigns. Experts also discussed the role of AI in combatting a new era of sophisticated cyber-threats, suggesting AI may be the answer.</span></p>
<p><span></span><span>To read more, please click <a href="https://www.cambridgenetwork.co.uk/news/lord-evans-warns-rising-nation-state-cyber-threat-private-sector">here</a>.</span></p>]]></content:encoded></item><item><guid isPermaLink="false">{E659AEC3-E23E-4299-88C8-7A69D2B296B5}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/cyber-bytes-issue-28/</link><title>Cyber_Bytes - Issue 28</title><description><![CDATA[Welcome to latest edition of Cyber_Bytes, our bi-weekly roundup of key developments in cyber, tech and evolving risks.]]></description><pubDate>Fri, 29 Jan 2021 11:08:00 Z</pubDate><category>Data and privacy</category><authors:names></authors:names><content:encoded><![CDATA[<iframe src="https://player.vimeo.com/video/506054903" width="640" height="360" frameborder="0" allow="autoplay; fullscreen; picture-in-picture"></iframe><br>
<p><strong>Cyber Insurance Market Projected to Surge in 2021 </strong><br>
<br>
The global insurance market is projected to grow by 21% in 2021 to reach $9.5 billion dollars according to Finaria.it and it is projected to reach $20 billion dollars by 2025. This is driven by the increasing awareness of cyber as a core business threat and the shift to remote working. The research also shows breaches related to the health care sector tended to be the most expensive at $7 million dollars per incident followed by energy, financial services, pharmaceuticals, and technology. Equally there are plenty of opportunities for Insurers to provide solutions where in the context of the UK more than 80% of businesses still don't have cyber related insurance.     <br>
<br>
To read more, please click <a href="https://www.infosecurity-magazine.com/news/cyber-insurance-market-surge-2021/" target="_blank">here</a>.<br>
<br>
<strong>2020 Cost of Ransomware and Cyber-Extortion Payments Double  </strong><br>
<br>
Two thirds of cyber attacks in 2020 were primarily motivated by financial gain according to security firm CrowdStrike. 81% of attackers used ransomware to achieve their goal and the number of cyber extortions demands being paid has doubled in the last year. This comes off the back of a steady increase in such demands in the last few years. Running a ransomware campaign is becoming more commoditized and it seems are increasingly likely to look to leverage the reputational impact of incidents to extract payments.<br>
<br>
To read more, please click <a href="https://www.infosecurity-magazine.com/news/ransomware-extortion-payments/" target="_blank">here</a>.<br>
<br>
<strong>Two Sentenced to Prison following a Prosecution Brought by the ICO </strong><br>
<br>
Two individuals have been sentenced to eight months in prison and suspended for two years in a prosecution brought by the ICO under the computer misuse act. The first individual compiled road traffic accident data from her employer without permission and sold it to the second individual who was a director of an accident claims management firm. The details were then used to make nuisance calls to potential claimants. <br>
<br>
To read more, please click <a href="https://ico.org.uk/about-the-ico/news-and-events/news-and-blogs/2021/01/motor-industry-employee-sentenced-in-ico-computer-misuse-act-prosecution/" target="_blank">here</a>.<br>
<br>
<strong>Cyber Criminals attempt to scam the public using the Covid 19 Vaccine roll out</strong><br>
<br>
The National Cyber Security Centre issued its weekly threat report on the 15 January. The report raises concerns of cyber criminals wanting to scam the public by taking advantage of the Covid 19 vaccine roll out. The scam comes in the form of an email or text message using the lure of being vaccinated to trick victims in to sharing their personal details.<br>
<br>
To read more, please click <a href="https://www.ncsc.gov.uk/report/weekly-threat-report-15th-january-2021" target="_blank">here</a>.<br>
<br>
<strong>Data Breach Suffered by Mimecast   </strong><br>
<br>
The email security provider Mimecast whose products are designed to reduce phishing attacks recently announced that hackers had hijacked its products in order to monitor their customers with approximately 10% of its more than 36,000 customers being affected. The vulnerability related to the digital certificate used to guard connections between its products and Microsoft's cloud services.   <br>
<br>
To read more, please click <a href="https://cybernews.com/news/email-security-firm-mimecast-says-hackers-hijacked-its-products-to-spy-on-customers/" target="_blank">here</a>.<br>
<br>
<strong>Reform proposals of the criminal law concerning communications offences </strong><br>
<br>
The law commission has made a number of proposals for the reform of the criminal law around communications offences. The proposals include an offence for criminal behavior where a communication would likely cause harm and covers emails, social media, and WhatsApp messages. The law society has agreed with the proposals for reform but has stressed the importance for the right of freedom of expression and privacy.    <br>
<br>
To read more, please click <a href="https://www.lawsociety.org.uk/campaigns/consultation-responses/law-commission-consultation-on-communications-offences-law-society-response" target="_blank">here</a>.</p>
<div> </div>]]></content:encoded></item><item><guid isPermaLink="false">{BB8B9EA0-0D50-482B-8372-3325F4C45186}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/cyber-bytes-issue-27-2020/</link><title>Cyber_Bytes - Issue 27</title><description><![CDATA[Welcome to Cyber_Bytes, our bi-weekly round up of key developments in cyber, tech and evolving risks.]]></description><pubDate>Mon, 14 Dec 2020 12:31:00 Z</pubDate><category>Data and privacy</category><authors:names>Richard Breavington, Rachel Ford</authors:names><content:encoded><![CDATA[<p><strong>RPC's Cyber Team peer-reviews leading AI research paper</strong><br>
<br>
A paper on emerging cyber threats has been peer-reviewed by RPC's cyber law team and published in an international legal journal. Alex Matheson, the cyber team's latest addition, was invited to conduct the peer-review of the paper on the legal and cyber-security implications of advances in 'adversarial machine learning', which is a fast-developing sub-field of the field of artificial intelligence (AI) with the twist that it can exploit the technology for malicious outcomes.  <br>
<br>
To read more, please click <a href="https://www.rpclegal.com/press-and-media/rpcs-cyber-team-peerreviews-leading-ai-research-paper/">here</a>.</p>
<p> <strong>Major growth predicted for the global cyber insurance market</strong><br>
<br>
Research by Verified Market Research has predicted a 24% increase in the global cyber insurance market, equivalent to an estimated $32bn. The growth follows the surge in mandatory legislation and increasingly prevalent high-profile ransomware attacks. The rise in data privacy laws have also been a key factor.<br>
<br>
To read more, please click <a href="https://www.decisionmarketing.co.uk/news/cyber-insurance-to-grow-24-to-32bn-as-attacks-soar">here</a>. </p>
<p><strong>Extortion as the new cyber threat predicted for 2021<br>
</strong><br>
New data suggests that whilst ransomware continues to be the most damaging cyber security threat predicted for 2021, there has been an increase in the collection of sensitive data as a means to extort companies for money. This is already something we are seeing more commonly in the context of a ransomware attack, but it appears that the extortion techniques could be deployed by cybercriminal even where ransomware is not implemented. <br>
<br>
To read more, please click <a href="https://edtechnology.co.uk/international/new-cyber-threat-report-forecasts-2021-to-be-the-year-of-extortion/">here</a>.</p>
<p><strong>Cyber Security threats to e-commerce<br>
</strong><br>
Three key threats to retailers in protecting consumer information and data have been highlighted: 1) Magecart / E-skimming: an attack where malware infects checkout pages to steal payment and personal information of online shoppers 2) Third-party vendors: whilst they are often used to support retailers, they can open retailers up to possible threats 3) Open-source software: software that anyone can view or modify which, whilst providing transparency and opportunity for continued improvement, provides a new set of vulnerabilities.<br>
<br>
To read more, please click <a href="https://www.electronicspecifier.com/industries/security/three-e-commerce-cyber-security-threats-to-defend-against">here</a>.</p>
<p><strong>Cyber Attack on Council</strong><br>
<br>
A cyber-attack on Hackney Council's systems have affected processes around planning decisions. The attack has left many of the council-provided services paralysed for an indefinite amount of time, including the Council's ability to notify members of the public about planning decisions. There has been a temporary suspension of the Council’s obligation to make such notifications as a result, potentially opening the council up to legal challenge. <br>
<br>
To read more, please click <a href="https://www.hackneycitizen.co.uk/2020/11/27/town-hall-cyber-attack-puts-planning-decisions-at-risk-of-legal-challenge/">here</a>.</p>]]></content:encoded></item><item><guid isPermaLink="false">{CFE1DBAB-A87E-447E-B27C-302041938797}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/cyber-bytes-issue-26-2020/</link><title>Cyber_Bytes - Issue 26</title><description><![CDATA[Welcome to Cyber_Bytes, our bi-weekly round up of key developments in cyber, tech and evolving risks.]]></description><pubDate>Tue, 01 Dec 2020 11:26:00 Z</pubDate><category>Data and privacy</category><authors:names>Richard Breavington, Rachel Ford</authors:names><content:encoded><![CDATA[<p><strong>What is GDPR’s impact on cyber insurance?</strong><br>
<br>
The consensus from sources such as Marsh insurance, the ratings agency Fitch and the Bank of England is that the EU's General Data Protection Regulation (GDPR) is pushing up the demand for cyber insurance. Around one third of the UK's biggest companies have bought cyber insurance, but it is expected that the biggest increase will be seen in smaller businesses. Bigger businesses tend to be able to invest more in cyber security, and can in some cases afford time for better preparation than smaller businesses, who can be affected more if they fall victims of a cyber-attack.<br>
<br>
To read more, please click <a href="https://insurance-edge.net/2020/10/31/cyber-insurance-ico-hits-marriott-hotels-with-18m-fine/">here</a>.</p>
<p><strong>The cyber market could deliver compound annual growth of 26%</strong><br>
<br>
Over the next decade the cyber market looks set to achieve market revenue of £53 billion, up from the £4 billion recorded in 2019, according to the 'Cyber Insurance Market Research Report' from Prescient & Strategic Intelligence. The research says growth will come not just from an increasing awareness about cyber risk, but also from governments mandating that firms have robust cyber security and insurance programmes in place.<br>
<br>
To read more, please click <a href="https://www.mondaq.com/Article/1007656">here</a>.</p>
<p><strong>SRA's Thematic Review on Cyber Security</strong><br>
<br>
The SRA's review has shone light on the frequency and potentially significant consequences of cyber crime on law firms. The review found that cyber criminals were successful in their attacks against over three-quarters of the firms targeted. The report found that less than a third of firms held specific cyber insurance, and therefore the SRA are encouraging firms to put suitable measures in place now before it's too late.<br>
<br>
To read more, please click <a href="https://www.mondaq.com/Article/1007656">here</a>.</p>
<p><strong>Ticketmaster fined for failing to protect its customer's payment details<br>
</strong><br>
The Information Commissioner's Office (<strong>ICO</strong>) has fined the company £1.25 million for failing to put appropriate security measures in place to prevent cyber-attacks on their chat-box function on the online payment page. Their failure to protect their customer's personal data was found to be a breach of the General Data Protection Regulation (GDPR). The cyber fraud began in February 2018 and has since affected 9.4 million customers across Europe.<br>
<br>
To read more, please click <a href="https://ico.org.uk/about-the-ico/news-and-events/news-and-blogs/2020/11/ico-fines-ticketmaster-uk-limited-125million-for-failing-to-protect-customers-payment-details/">here</a>.</p>
<p><strong>Manchester United become victims of cyber attack</strong><br>
<br>
On Friday 20th November Manchester United's systems were attacked. The club has referred to protocols and procedures being valuable in identifying and containing the breach to protect data. Although the exact details of the attack are currently unknown, 2020 has seen ransomware incidents and "double extortion attacks" (the threat to sell or even auction the encrypted data in the event a ransom is not paid).<br>
<br>
To read more, please click <a href="https://inews.co.uk/news/uk/manchester-united-targeted-sophisticated-cyber-attack-767832">here</a>.</p>
<p><strong>COVID-19 attacks on education accelerate cyber security work?</strong><br>
<br>
A new report has stated that further and higher education providers are increasing IT security as a result of the current COVID-19 pandemic. This has followed cyber criminals taking advantage of the expansion of home working and scams specifically linked to the pandemic. In September, the National Cyber Security Centre warned that criminals are increasingly targeting education providers and have provided guidance to improve defenses.<br>
<br>
To read more, please click <a href="https://www.ukauthority.com/articles/covid-19-attacks-on-education-accelerate-cyber-security-work/?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A%20Ukauthoritycom%20(UKauthorITy.com%20-%20News%20on%20the%20tech-enabled%20transformation%20of%20frontline%20public%20service%20delivery)">here</a><span style="font-weight: lighter;">.</span></p>
<p><span><strong>Transport Canada sets out to develop vehicle cyber security</strong></span></p>
<p><span>Transport Canada (TC) has partnered with the U.S. Department of Transportation's Volpe Center to develop TC's Vehicle Cyber Security Strategy. It looks to specifically focus on the emergence of disruptive technologies relating to autonomous vehicles, electric vehicles and connected vehicles.<br>
<br>
To read more, please click <a href="https://www.mondaq.com/Article/1007204">here</a>.<br>
</span></p>
<p><span><strong>Shipowners to take a second look at their cyber security</strong></span></p>
<p><span>As of January 2021, it will be mandatory for most shipowners to review their cyber-security. Shipowners will make their own risk assessments about how important cyber risk is to them, which at one extreme could involve some shipowners giving a full overview of all systems on board and involving every department in the company.<br>
<br>
To read more, please click <a href="https://www.motorship.com/news101/regulation-and-classification/ism-cyber-security-race-starts-on-1-january">here</a>.</span></p>]]></content:encoded></item><item><guid isPermaLink="false">{F31375B3-51D1-42BB-A780-9818AEBE75AB}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/cyber-bytes-issue-25-2020/</link><title>Cyber_Bytes - Issue 25</title><description><![CDATA[Welcome to Cyber_Bytes, our bi-weekly round up of key developments in cyber, tech and evolving risks.]]></description><pubDate>Thu, 05 Nov 2020 14:54:00 Z</pubDate><category>Data and privacy</category><authors:names>Richard Breavington, Rachel Ford</authors:names><content:encoded><![CDATA[<strong>£18m ICO fine for Marriott Hotels  </strong><br>
<br>
The ICO have fined Marriott International an estimated £18.4 million for failure to secure millions of its customers' personal data. The access resulted from a piece of code installed onto a device in 2014 ultimately creating an unrestricted access point to Starwood's systems. The attack remained undetected until September 2018 by which time Starwood had been acquired by Marriott. <br>
<br>
To read more, please click <a href="https://insurance-edge.net/2020/10/31/cyber-insurance-ico-hits-marriott-hotels-with-18m-fine/">here</a>. <br>
<br>
<strong>Maze Ransomware Group Closes <br>
</strong><br>
The ransomware group, Maze, has officially closed. Maze gained notoriety for encrypting a victim's data and threatening to publish stolen files, often on the Dark Web, unless a ransom was paid following a ransomware attack. A public statement along with a variety of stolen data has been posted to the Dark Web announcing Maze's official closure. <br>
<br>
To read more, please click <a href="https://techcrunch.com/2020/11/02/maze-ransomware-group-shutting-down/?guce_referrer=aHR0cHM6Ly93d3cuZ29vZ2xlLmNvbS8&guce_referrer_sig=AQAAABvip0ZbQB0e54i5lFaD_XpuxIQe2SDuqop1TS6l890bGv3DPqs_9DjQEqay_2PgZzjebxybxb0uhFAIThQXiAacyNEh_tsPa7XTdH1vpHhHP9sYXeYDXZr4stHYbL91YULDrms2Kkj37OHAb5PGyTA-NABFGLeOX0A804pZFbDA&guccounter=2">here </a>or <a href="https://uk.finance.yahoo.com/news/maze-notorious-ransomware-group-says-182013144.html">here</a>.<br>
<br>
<strong>Nando's data breach   </strong>  <br>
<br>
Hackers have targeted thousands of customers' accounts to place large orders with the popular chicken restaurant. Nando's have confirmed that whilst their internal systems remain intact, some individual customers accounts were compromised. The restaurant has promised to reimburse those affected and improve the detection of fraudulent activity.  <br>
<br>
To read more, please click <a href="https://www.infosecurity-magazine.com/news/nandos-customers-hit-credential/">here</a>.<br>
<br>
<strong>Russia face UK sanctions for involvement in cyber-attack on German Parliament </strong><br>
<br>
The UK government has enforced new sanctions including asset freezes and travel bans against Russia for alleged involvements in a 2015 cyber-attack that affected the German federal parliament. The UK government has publicly announced the sanctions are a clear direct message to Russia that there are consequences for undertaking malicious cyber activity.  <br>
<br>
To read more, please click <a href="https://www.governmentcomputing.com/security/digital-disruptions/uk-sanctions-russia-cyber-attacks-german-parliament">here</a>.<br>
<br>
<strong>Energy Networks Association (ENA) launch new Cyber Security Guidance </strong><br>
<br>
The ENA has published guidance for the energy sector to help mitigate the risk of a cyber-attack. The guidance aims to support distributors in connecting to the grid securely without unknowingly compromising the wider network.  <br>
<br>
To read more, please click <a href="https://www.energynetworks.org/operating-the-networks/managing-cyber-security">here</a>.]]></content:encoded></item><item><guid isPermaLink="false">{2D03B177-8228-4CDF-9094-86FE28AA35E4}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/cyber-bytes-issue-24-2020/</link><title>Cyber_Bytes - Issue 24</title><description><![CDATA[Welcome to Cyber_Bytes, our bi-weekly round up of key developments in cyber, tech and evolving risks.]]></description><pubDate>Wed, 21 Oct 2020 15:53:00 +0100</pubDate><category>Data and privacy</category><authors:names>Richard Breavington, Rachel Ford</authors:names><content:encoded><![CDATA[<strong>ICO issues regulatory guidance</strong><br>
<br>
The ICO has issued guidance on data protection obligations and details on how it will exercise its regulatory functions when taking enforcement action. The guidance refers to a risk-based approach and provides numerous examples as to when the ICO will issue a penalty notice. The examples include breaches where (i) many individuals have been affected, (ii) there has been a degree of damage including distress or embarrassment and (iii) there has been a repeated breach or a failure to rectify a previously identified problem.  <br>
<br>
To read more, please click <a href="https://ico.org.uk/media/about-the-ico/consultations/2618333/ico-draft-statutory-guidance.pdf">here</a>. <br>
<br>
<strong>12% drop in UK hacking prosecutions in 2019 </strong><br>
<br>
Analysis conducted by RPC has shown a 12% decrease in UK hacking prosecutions in 2019, compared to the previous year, despite there being a significant growth in cyber-attacks. Of the 17,600 cases reported for computer hacking in 2019, only 57 led to prosecution. With the task of tracking down cyber criminals being very resource-intensive and with a low success rate, the decline in hacking prosecutions comes as no surprise.  <br>
<br>
To read more, please click <a href="https://www.infosecurity-magazine.com/news/uk-hacking-prosecutions-drop-2019/">here</a>.<br>
<strong><br>
British Airways - ICO fine </strong><br>
<br>
The ICO has fined British Airways £20m for failing to protect the personal and financial details of more than 400,000 customers, following a data breach that it suffered back in 2018. The fine is the largest issued by the ICO to date, albeit it is a significant reduction to the original £183m fine that was issued against BA in 2019. <br>
<br>
To read more, please click <a href="https://ico.org.uk/about-the-ico/news-and-events/news-and-blogs/2020/10/ico-fines-british-airways-20m-for-data-breach-affecting-more-than-400-000-customers/">here</a>.<br>
<br>
<strong>H&M fined for illegal surveillance of employees   </strong><br>
<br>
The global fashion chain H&M has been fined a total of €35.3m for the illegal surveillance of several hundred employees. Investigation from the German data protection watchdog found housed within the fashion company's Nuremberg service facility were extensive records of employee information including families, religions and illnesses.    <br>
<br>
To read more, please click <a href="https://www.bbc.co.uk/news/technology-54418936">here</a>.<br>
<strong><br>
Cyber Security Victory - Trickbot forced offline </strong><br>
<br>
A US court order obtained by Microsoft has resulted in the take down of the Trickbot botnet's back-end server infrastructure. Infamous for being one of the primary sources of ransomware distribution worldwide, in a coordinated effort with telecoms operators around the world, the botnet can no longer be used.   <br>
<br>
To read more, please click <a href="https://www.computerweekly.com/news/252490407/Trickbot-forced-offline-in-major-cyber-security-victory">here</a>.<br>
<br>
<strong>ICO investigation into Klarna</strong><br>
<br>
An ICO investigation has been opened after marketing emails were inadvertently sent by payments firm Klarna. Individuals are said to have received the marketing emails from Klarna despite never having dealt with the company before. <br>
<br>
To read more, please click <a href="http://client.manzama.com/article/v/25771071922/190110/?usrc=email&usrc_s=article%3Atracker&send_id=333bfa99-ad7a-492f-af83-95f46d6c4a51">here</a>.<br>
<br>
<strong>Employees' IoT devices increase cyber security risk</strong><br>
<br>
A new report into the financial services industry has highlighted a risk of firms being at risk via smart devices connected to business networks. The devices include connected coffee machines, personal medical devices, gym equipment, games consoles and smart toys and connected cars.<br>
<br>
To read more, please click <a href="https://www.fstech.co.uk/fst/Palo_Alto_Networks_Report_IoT_Devices_Cyber_Security_Risk.php">here</a>.<br>
<br>
<strong>Cyber-attack - Norway & Russia </strong><br>
<br>
The Norwegian parliament has suffered a cyber-attack resulting in a compromise of the email accounts of several MPs and employees. Norway have publicly announced that they believe the incident was the result Russian State hackers. Russia has denied any involvement. <br>
<br>
To read more, please click <a href="https://www.watoday.com.au/world/europe/norway-says-russia-backed-cyber-attack-against-its-parliament-20201014-p564yw.html">here</a>.<br>
<br>
 ]]></content:encoded></item><item><guid isPermaLink="false">{7E324B76-B65C-4536-923D-3F0A45567F68}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/cyber-bytes-23-2020/</link><title>Cyber_Bytes - Issue 23</title><description><![CDATA[Welcome to Cyber_Bytes, a round up of key developments in cyber, tech and evolving risks over the last two weeks. ]]></description><pubDate>Fri, 02 Oct 2020 10:20:00 +0100</pubDate><category>Data and privacy</category><authors:names>Richard Breavington, Daniel Guilfoyle, Rachel Ford</authors:names><content:encoded><![CDATA[<p style="margin-bottom: 1.11111rem;"><span><strong>Cyber Insurance Guidance</strong></span></p>
<p style="margin-bottom: 1.11111rem;"><span></span><span>The National Cyber Security Centre have released guidance for organisations that are considering purchasing cyber insurance. The guidance states that, in a world where cyber threats are varied (and constantly changing), cyber insurance can help organisations get back on their feet, should something cyber related go wrong.  <br>
<br>
To read more, please click <a href="https://www.ncsc.gov.uk/guidance/cyber-insurance-guidance">here</a>.</span></p>
<p style="margin-bottom: 1.11111rem;"><span><strong></strong></span><span><strong>New data breach notification feature for iOS 14</strong></span></p>
<p style="margin-bottom: 1.11111rem;"><span></span><span>Apple's new iOS 14 release has a new feature to warn users that their stored passwords have been compromised in data breaches. The new feature aims to check stored credentials against a list of known data breaches. The check is said to be performed with the use of strong cryptographic techniques, regularly checking derivations of the owner's passwords against a list of breached passwords in a secure and private way that doesn’t reveal the actual password information, even to Apple.<br>
<br>
To read more, please click <a href="https://www.bleepingcomputer.com/news/apple/hands-on-with-ios-14s-new-data-breach-notification-feature/">here</a>.</span></p>
<p style="margin-bottom: 1.11111rem;"><span><strong></strong></span><span><strong>Rising Attacks on UK Academia prompt Cyber Security Alert<br>
<br>
</strong>The National Cyber Security Centre has issued an alert warning against an increase in ransomware attacks being carried out against the education sector. The NCSC has said that the alert follows a spate of online attacks with the potential to de-rail preparations for the new term.   This fits with our own experience of having assisted with a number of recent incidents targeted at academic institutions.<br>
<br>
To read the alert, please click <a href="https://www.ncsc.gov.uk/news/alert-targeted-ransomware-attacks-on-uk-education-sector">here</a>.</span></p>
<strong>First Cyber-related death in targeted cyber attack</strong><br>
<br>
A targeted attack on a German hospital has resulted in the first death linked to a cyber-attack. Doctors were unable to start treating a patient following the incident. <br>
<br>
To read more, please click <a href="https://inews.co.uk/news/technology/germany-hospital-cyber-attack-woman-dies-ransomware-duesseldorf-652997">here</a>.<br>
<br>
<strong>Cyber Risk highlighted for customer data theft</strong><br>
<br>
Which? has called for tougher penalties for organisations that fail to prevent data breaches following a study that has been carried out.  The study revealed that around 46% of people whose data was stolen by hackers then went on to experience fraud, and that people reported having had their mental health impacted as a result of being impacted by a data breach.  <br>
<br>
To read more, please click <a href="https://insurance-edge.net/2020/09/22/which-customer-data-theft-study-highlights-cyber-risk/">here</a>.<br>
<br>
<strong>Cyber-attack hits National Park</strong><br>
<br>
The Brecon Beacons National Park Authority is working with the Police in its recovery from a cyber-attack experienced in early September. It has been confirmed that the incident has been reported to the Information Commissioner's Office but the Park has advised that it has no reason to believe any personal data has been accessed or downloaded as a result of the incident.<br>
<br>
To read more, please click <a href="https://www.countytimes.co.uk/news/18739040.brecon-beacons-national-park-hit-major-cyber-attack/?ref=rss">here</a>.]]></content:encoded></item><item><guid isPermaLink="false">{8B71B9B0-6868-4A7B-A415-83099BA41E63}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/cyber-bytes-issue-22/</link><title>Cyber_Bytes - Issue 22</title><description><![CDATA[Welcome to the latest edition of Cyber_Bytes, our bi-weekly roundup of key developments in cyber, tech and evolving risks.]]></description><pubDate>Tue, 15 Sep 2020 14:43:00 +0100</pubDate><category>Data and privacy</category><authors:names>Richard Breavington, Rachel Ford</authors:names><content:encoded><![CDATA[<p><strong>Government consultation on permitting "representative action" where an individual’s data rights have been infringed without specific authorisation by the data subject</strong></p>
<p>A new consultation by the government seeks input on whether individuals whose data protection rights are violated but who cannot readily authorise a non-profit organisation to act on their behalf (e.g. children or vulnerable adults) should be able to be represented by non-profit organisations without their specific authorisation.</p>
<p>To read more, please click <a href="https://www.gov.uk/government/publications/call-for-views-and-evidence-review-of-representative-action-provisions-section-189-data-protection-act-2018">here</a>.</p>
<p><strong>SRA publishes cybersecurity thematic review</strong></p>
<p>The SRA has published the results of a review in which it interviewed law firms about their experiences with cybercrime. <br>
<br>
Of the 40 law firms interviewed, 30 had suffered a cyber attack and 23 saw a total of more than £4m in client money stolen as a result of cybercrime. In addition, 60% of the law firms felt that their biggest potential vulnerability to cybercrime was linked to the knowledge and behaviours of their staff. </p>
<p>To read more, please click <a href="https://www.sra.org.uk/sra/how-we-work/reports/cyber-security/">here</a>.</p>
<p><strong>Whistleblower reports to the ICO over data breaches reach an all-time high</strong></p>
<p>Between April 2019 and March 2020, employees made 427 complaints to the ICO, which is a 34% increase compared to last year. The ICO took further action in 68 out of the 427 reports, with 23 considered for investigations. The ICO has also been encouraging employees to come forward with concerns about data mishandling. <br>
<br>
Whilst the ICO has said that it will be more flexible when investigating organisations and will take into account the challenges they face, RPC's Richard Breavington comments that it would be wrong to think that is a "free pass” and that whistleblowing is now a "major risk" for businesses that fail to deal with a data breach properly, or who have failed to take reasonable steps to protect the data they hold on their customers.</p>
<p>To read more, please click <a href="https://www.telegraph.co.uk/technology/2020/09/07/whistle-blower-reports-data-breaches-hit-record-high/#:~:text=Partner%20at%20the%20law%20firm,to%20deal%20with%20data%20properly.">here</a> and <a href="https://www.verdict.co.uk/whistleblower-ico-data-breach/#:~:text=The%20number%20of%20whistleblower%20reports,it%20to%20a%20record%20high.&text=The%20ICO%20took%20further%20action,with%2023%20considered%20for%20investigations.">here</a>.</p>
<p><strong>Partnership between Oxford University and Willis Towers Watson to better understand the impact of current and future cyber incidents and risks</strong></p>
<p>Research to be carried out will focus on cost of equity in publicly listed companies, following severe security breaches, the nature of cyberattack “resilience”, and the current risk landscape of AI-facilitated phishing and the implications this has specifically for the insurance sector.<br>
<br>
The partnership aims to ensure clients can benefit from the in-depth research findings but also from sharing best practice across the industry.</p>
<p>To read more, please click <a href="https://insurance-edge.net/2020/09/12/willlis-towers-partners-with-oxford-university-on-cyber-risk/">here</a>.</p>
<p><strong>Inside job: Two-thirds of companies hit by insider cyber attacks</strong></p>
<p>A new report has been published, indicating that some 61% of businesses surveyed have had at least one cyber incident attributable to an employee in the last 12 months, with almost a quarter (22%) reporting up to six separate incidents.  It is important to be clear that for these purposes, insider threats are classed as those that stem from an employee, whether deliberate or accidental. </p>
<p>To read more, please click <a href="https://www.itproportal.com/news/two-thirds-of-companies-have-experienced-an-insider-attack-this-year/">here</a>. </p>]]></content:encoded></item><item><guid isPermaLink="false">{FB63BC31-D530-4FBA-AA23-DA826BC4B727}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/cyber-bytes-issue-21/</link><title>Cyber_Bytes - Issue 21</title><description><![CDATA[Welcome to the latest edition of Cyber_Bytes, our bi-weekly roundup of key developments in cyber, tech and evolving risks.]]></description><pubDate>Thu, 03 Sep 2020 15:05:57 +0100</pubDate><category>Data and privacy</category><authors:names>Richard Breavington, Rachel Ford</authors:names><content:encoded><![CDATA[<p><strong>39% of firms have dismissed staff over cyber security since COVID-19</strong></p>
<p>A new survey has shown that whilst two-thirds of companies made substantial changes to their cyber security policy in response to COVID-19,  almost 60% of respondents agreed that employees are more likely to try and circumvent company security practices (e.g. using personal devices and not changing passwords, in order to maximise productivity).  However, as the article describes, the consequences are capable of being serious for the employee.</p>
<p>To read more, please click <a href="https://www.cirmagazine.com/cir/40pc-firms-dismissed-staff-over-cyber-policy.php">here</a>.</p>
<p><strong>Microsoft data suggests changing attitudes towards cyber but impact of attacks remains significant</strong></p>
<p>58% of respondents to a Microsoft business survey said they have increased their security budgets during the pandemic while 82% said they plan on adding security staff. This is set against the backdrop of cyber-criminals applying pandemic-themed lures to known scams and malware since March 2020.Business leaders have also reported phishing threats as the biggest risk to security in that same timeframe, with 90% of indicating that phishing attacks have impacted their organisation.</p>
<p>To read more, please click here and <a href="http://https://www.microsoft.com/security/blog/2020/06/16/exploiting-a-crisis-how-cybercriminals-behaved-during-the-outbreak/">here</a>.</p>
<p><strong>Oracle and Salesforce targeted in €10bn GDPR lawsuit backed by profit-making litigation fund</strong></p>
<p>Privacy Collective, a legally aggressive privacy campaign group, is pursuing Oracle's Bluekai and Salesforce DMP (formerly Krux) ad-tech subsidiaries with the help of Innsworth Advisors. This is a further illustration of the continued rise of class action regimes in the UK and the availability of collective redress.</p>
<p>To read more, please click <a href="https://www.theregister.com/2020/08/14/privacy_collective_sues_oracle_salesforce_gdpr/">here</a>.</p>
<p><strong>Carnival Cruises into Danger After Ransomware Attack</strong></p>
<p>British-American cruise operator Carnival (which also operates Princess Cruises, Costa, P&O Australia, P&O Cruises, Holland American Line, AIDA, Cunard and Seabourn brands) has suffered a ransomware attack in which guest and employee data was accessed, it has revealed in an SEC regulatory filing. It is anticipated that claims may arise from this incident and serves as a reminder that the travel industry is an extremely attractive target to cyber criminals, as they can collect and store valuable personally identifiable information on passengers and guests alongside implementing a ransomware attack.</p>
<p>To read more, please click here, here and <a href="https://www.computerweekly.com/news/252487779/Carnival-cruise-lines-hit-by-ransomware-customer-data-stolen">here</a>. </p>
<p><strong>NHS Digital launches Cyber Security Services framework to manage cyber threats </strong></p>
<p>NHS Digital has announced the launch of a new framework in partnership with the National Cyber Security Centre (NCSC) called the Cyber Security Services framework for helping the NHS and public sector organisations in procuring external support and services to help in the management of cyber security risks. The 25 specially selected suppliers are a mix of SMEs and multi-national providers designed to ensure organisations are able to purchase quality cyber security services from trusted suppliers. </p>
<p>To read more, please click <a href="https://www.governmentcomputing.com/security/news/nhs-digital-cyber-security-services-framework">here</a>. </p>
<p><strong>"Drovorub" Is The Latest Cyber Threat To Come Out Of Russia</strong></p>
<p><strong> </strong>This new strain of malware can give the attacker near-complete control over the device in question and government agencies aren't the only target. Whilst the malware spreads primarily via spear-phishing and zero-day vulnerabilities, there is at least a partial and easy solution to hand.</p>
<p>To read more, please click here and <a href="https://www.theregister.com/2020/08/13/drovorub_nsa_fbi/">here</a>.</p>]]></content:encoded></item><item><guid isPermaLink="false">{EAFE814A-02C4-46C7-846E-0B726BD06D8C}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/cyber-bytes-19-2020/</link><title>Cyber_Bytes - Issue 19</title><description><![CDATA[Welcome to Cyber_Bytes, a round up of key developments in cyber, tech and evolving risks over the last two weeks. ]]></description><pubDate>Fri, 31 Jul 2020 11:07:00 +0100</pubDate><category>Data and privacy</category><authors:names>Richard Breavington, Christopher Ashton, Rachel Ford</authors:names><content:encoded><![CDATA[<p>This week, we are introducing the first of our virtual round up videos, which we hope to issue each quarter. </p>
<p><iframe src="https://player.vimeo.com/video/443308784" width="640" height="360" frameborder="0" allow="autoplay; fullscreen"></iframe> </p>
<p style="margin-bottom: 1.11111rem;"><span><strong>Twitter hack highlights weakness in security</strong></span></p>
<p style="margin-bottom: 1.11111rem;"><span></span><span>A hack which targeted 130 high-profile Twitter accounts for the purpose of tweeting solicited cryptocurrency scams has highlighted the weakest link in Twitter's security. The hack was achieved by successfully targeting some of the Twitter employees with access to internal tools that allowed them to change account settings and effectively hand over control of accounts to others. The concern for some is that personal data is not truly protected until companies implement end-to-end encryption securing data from being accessed by unauthorised third parties. </span></p>
<p style="margin-bottom: 1.11111rem;"><span></span><span>To read more, please click <a href="https://www.marketwatch.com/story/the-most-disturbing-part-of-the-twitter-hack-many-of-its-employees-have-access-to-accounts-2020-07-25">here</a>.</span></p>
<p style="margin-bottom: 1.11111rem;"><span><strong></strong></span><span><strong>Information Commissioner's Annual Report and Financial Statements 2019-2020</strong></span></p>
<p style="margin-bottom: 1.11111rem;"><span></span><span>The ICO have released their annual report for the year 2019-2020. The report is split into three section as follows; Performance Report, Accountability Report and Financial Statements. The report covers the ICO key achievements and operational performance with in-depth examination of some of the most impactful work from 2019-2020. </span></p>
<p style="margin-bottom: 1.11111rem;"><span></span><span>To read more, please click <a href="https://ico.org.uk/media/about-the-ico/documents/2618021/annual-report-2019-20-v83-certified.pdf">here</a>.</span></p>
<p style="margin-bottom: 1.11111rem;"><span><strong></strong></span><span><strong>Ransomware Recovery starts for American GPS and fitness company Garmin</strong></span></p>
<p style="margin-bottom: 1.11111rem;"><span></span><span>GPS and fitness-tracker company Garmin suffered a ransomware attack, with the perpetrators demanding a 10 million USD ransom. The attack left Garmin smart watch owners without service for a number of days. It is currently unclear whether or not the ransom has been paid, with Garmin's statement avoiding details of the ransom demands. The firm expects for normal operations to resume within a few days of the attack.</span></p>
<p style="margin-bottom: 1.11111rem;"><span></span><span>To read more, please click <a href="https://sites-rpc.vuturevx.com/email_handler.aspx?sid=blankform&redirect=https%3a%2f%2fwww.bbc.co.uk%2fnews%2ftechnology-53553576">here</a></span></p>]]></content:encoded></item><item><guid isPermaLink="false">{8D283156-B369-4C42-8CED-0F8CBE4F5601}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/schrems-ii-groundhog-day-for-data-transfers/</link><title>Schrems II – Groundhog Day for Data Transfers</title><description><![CDATA[On Thursday 16 July, the Court of Justice of the European Union (“CJEU”) delivered its judgment in one of the most highly anticipated court cases in data protection, Case C-311/18 Data Protection Commissioner v Facebook Ireland Limited, Maximillian Schrems (widely referred to as “Schrems II”). This decision came almost 8 months after Advocate General Saugmandsgaard Øe published his Opinion, which albeit not binding, provided a strong indication for the CJEU's judgment.]]></description><pubDate>Fri, 17 Jul 2020 15:47:19 +0100</pubDate><category>Data and privacy</category><authors:names></authors:names><content:encoded><![CDATA[<p>This decision came almost 8 months after Advocate General Saugmandsgaard Øe published his Opinion, which albeit not binding, provided a strong indication for the CJEU's judgment.</p>
<p>The key takeaways from the <a href="http://curia.europa.eu/juris/document/document.jsf?text=&docid=221826&pageIndex=0&doclang=en&mode=req&dir=&occ=first&part=1&cid=9804138">Judgment</a> are the following:</p>
<ul style="list-style-type: disc;">
    <li><span>The <strong>Privacy Shield</strong> framework, which is used by thousands of companies to transfer data between the EU and US, does not protect the privacy of EU citizens and is declared <em>invalid</em>. This comes less than 5 years after the CJEU struck down its predecessor, the Safe Harbour framework.</span></li>
    <li><span></span>The <strong>Standard Contractual Clauses</strong><span style="font-weight: lighter;"> </span>("<strong>SCCs</strong>") adopted by the European Commission for the transfer of personal data to processors established in third countries are valid, but companies will have to carefully analyse whether their SCCs are sufficient to ensure that data in third countries is treated in line with the General Data Protection Regulation ("<strong>GDPR</strong>") and the EU Charter of Fundamental Rights</li>
</ul>
<strong>The background<br>
</strong><br>
The General Data Protection Regulation EU 2016/679 (“<strong>GDPR”</strong>) provides that transfers of personal data to a third country (i.e. any country outside the European Economic Area ("<strong>EEA</strong>")) may only take place if “appropriate safeguards” are used to legitimise the transfer. Those safeguards should ensure compliance with data protection requirements appropriate to processing within the EU, including both the availability of enforceable rights and of effective legal remedies, as well as adherence to the general principles relating to personal data processing. Among those safeguards are the Standard Contractual Clauses ("<strong>SCCs</strong>") of which many EU companies avail themselves in order to transfer personal data outside of the EEA for their everyday business operations.<br>
<div><strong> </strong></div>
<p><em><span><strong>Schrems II</strong></span></em></p>
<p><span>In Schrems II, the CJEU has been asked to decide upon the validity of <a href="https://eur-lex.europa.eu/legal-content/en/TXT/?uri=CELEX%3A32010D0087"><strong>European Commission Decision 2010/87/EU</strong></a>, which incorporates the SCCs that are relied on to facilitate these international transfers of personal data.</span></p>
<p style="background: white; text-align: justify;"><span>A complaint was made to the Irish Data Protection Commissioner ("<strong>DPC</strong>") by the privacy activist, Max Schrems, about certain transfers of his personal data from the EEA to the US on the basis of the SCCs. More specifically, Mr Schrems complained about Facebook Ireland transferring his data outside the EU to Facebook Inc in the USA. The processing of data by the Facebook entity in the US was authorised based on the SCCs, but Mr Schrems argued that the US data protection framework did not provide the safeguards he was entitled to under EU law. He claimed that the SCCs cannot be enforced effectively in light of revelations regarding access of US state agencies to personal data for national security purposes, in a way that was incompatible with the EU Charter of Fundamental Rights.</span></p>
<p style="background: white; text-align: justify;"><span>The <em>Schrems II</em> case comes after 2015’s </span><strong><span style="color: windowtext;"><a href="http://curia.europa.eu/juris/fiche.jsf?id=C%3B362%3B14%3BRP%3B1%3BP%3B1%3BC2014%2F0362%2FJ&oqp=&for=&mat=or&lgrec=en&jge=&td=%3BALL&jur=C%2CT%2CF&num=C-362%252F14&dates=&pcs=Oor&lg=&pro=&nat=or&cit=none%252CC%252CCJ%252CR%252C2008E%252C%252C%252C%252C%252C%252C%252C%252C%252C%252Ctrue%252Cfalse%252Cfalse&language=en&avg=&cid=52601">Case C-362/14 Maximillian Schrems v Data Protection Commissioner</a></span></strong><span> ("<em>Schrems I</em>") which invalidated the Safe Harbour framework, another EU/US arrangement used by companies in order to legitimise transfers of personal data from the EEA to the US, and following which the new framework of the Privacy Shield was adopted.</span></p>
<p><em><span><strong>The Advocate General's opinion</strong></span></em></p>
<p style="background: white; text-align: justify;"><span>The AG's opinion covers two ways to ensure data transferred to countries outside of the EEA are subject to sufficient safeguards. The first one is an "adequacy decision", a decision of the European Commission which confirms that the third country’s law and practices offer protection which is analogous to the GDPR. In the absence of an adequacy decision though, organisations should take measures to compensate for the lack of a satisfactory level of data protection in a third country by way of other appropriate safeguards for individuals, such as the SCCs adopted by the European Commission.</span></p>
<p><em><span><strong> <span></span></strong></span></em><span>The Advocate General suggested that the CJEU upholds the validity of the SCCs, arguing that they are a sufficient measure to protect personal data and thus a valid mechanism of transfer, regardless of the level of protection in the country where the personal data is transferred.  However, the opinion suggested that companies and data protection authorities should assess on their own and on a case-by-case basis whether other countries' national security protections are adequate.</span></p>
<p style="text-align: justify;"><span><strong>The CJEU decision</strong></span></p>
<p style="text-align: justify;"><span>The CJEU considered that, when personal data is transferred to a third country, it should be "afforded a level of protection essentially equivalent to that guaranteed within the EU by the GDPR, read in the light of the [EU] Charter [of Fundamental Rights]". This protection encompasses appropriate safeguards, enforceable rights and effective legal remedies for individuals.</span></p>
<p style="text-align: justify;"><span>Through this prism, the CJEU considered the validity of the <strong>Privacy Shield</strong> and took the view that, despite the safeguards built into this framework, the risks to individual privacy arising from US government surveillance and law enforcement activities mean that the requirements of GDPR and the EU Charter are not met.</span></p>
<p style="text-align: justify;"><span>Concerns include a lack of proportionality, as access to data by US authorities is not limited to what is strictly necessary, and the lack of actionable rights for individuals before the courts. In the court's opinion, the Privacy Shield decision acknowledges the primacy of the US national security, public interest and law enforcement requirements, even when this would condone interference with the rights of EU citizens whose data is transferred to the US. "Mitigating" measures, such as the introduction of an Ombudsman to handle EU citizens' complaints did not satisfy the requirement for effective judicial protection, partly because the Ombudsman does not have the power to make decisions that bind the US intelligence services.</span></p>
<p style="text-align: justify;"><span>However, the court found that the SCCs, which are model clauses for data transfers from the EU to third countries, establish effective mechanisms that ensure compliance with the level of protection required by EU law – with the caveat that, if breached or not honoured, transfers of personal data pursuant to such clauses should be suspended or prohibited. In particular, the SCCs oblige both the data exporter and the recipient of data in the third country to verify, before commencing any transfer, not only whether that level of protection is respected in the third country, but also if the recipient is indeed able to comply with the requirements imposed by the SCCs on them. If not, the UK or EU organisation transferring the data must suspend the data transfer and/or terminate the contractual relationship with the recipient. The court also stated that national data protection authorities are under a duty to order the suspension or termination of data transfers based on the SCCs if in their view, the SCCs cannot be complied with in the third country to which the data is being transferred. </span></p>
<p style="text-align: justify;"><span><strong>Any practical tips?</strong></span></p>
<p style="text-align: justify;"><span>Commenting on the court's decision, RPC data protection partner <a href="/people/jon-bartley/">Jon Bartley</a> said:</span></p>
<p style="text-align: justify; margin-left: 40px;"><span>"<em>This is an important decision for the thousands of UK and EU companies that rely on Privacy Shield to ensure that data transfers to affiliates and suppliers in the US are lawful. It will have a similar impact to the 2015 decision which struck down the Safe Harbour arrangement and led to many US vendors revising their customer contracts to incorporate SCCs. It now remains to be seen whether the EU and US will be able to find an alternative solution that will succeed where their two previous efforts have failed, although this might require the US government to introduce domestic legislation to address the key concerns regarding its surveillance activities.</em></span></p>
<p style="text-align: justify; margin-left: 40px;"><em><span>Also, although the court has upheld the validity of the SCCs, it has made clear that national data protection authorities are under a duty to suspend or prohibit transfers based on the SCCs if they cannot be complied with in the country to which the data is being transferred. So, we also have the risk that an EU data protection regulator declares the SCCs insufficient for data transfers to the US or other countries. This would cause significant problems for businesses given that the SCCs are the primary mechanism used for data transfers outside the EEA. It's also not yet clear how companies, let alone specialist data regulators, are supposed to judge the legal systems of third countries before authorising data transfers.</span></em></p>
<p style="text-align: justify; margin-left: 40px;"><em><span>In the context of Brexit, this decision increases the pressure on the UK government to obtain an adequacy decision for data transfers to the UK.  Concerns about the UK's data-sharing arrangements with the US have already been raised as part of the adequacy review process, which could fuel challenges to the use of SCCs if adequacy is not granted.</span></em></p>
<p style="text-align: justify; margin-left: 40px;"><em><span>As a first step, companies should be looking out for guidance from national regulators and the European Data Protection Board and identifying whether any personal data transfers to the US are made on the basis of Privacy Shield.  They should also identify which third countries are recipients of personal data on the basis of the SCCs so that assessments of those countries can be made on the basis of guidance that we hope will soon be produced. </span></em><span>"</span></p>
<p style="text-align: justify;"><span>With the demise of the Privacy Shield, and the requirement that the SCCs should be judged on a case by case basis, the uncertainty surrounding international data transfers is set to continue.</span></p>]]></content:encoded></item><item><guid isPermaLink="false">{5CC70EF3-FBC5-421D-BAB9-7DA3D84E6C1A}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/restarting-your-business-and-implementing-government-guidance-to-support-nhs-test-and-trace/</link><title>Restarting your business and implementing Government guidance to support NHS Test and Trace</title><description><![CDATA[In its latest guidance on keeping workers and customers safe during COVID-19 in restaurants, pubs, bars and takeaway services (23 June 2020), the Government has recommended that businesses operating in these sectors keep a temporary record of customers and visitors for 21 days. This will assist NHS Test and Trace with requests for that data if needed.]]></description><pubDate>Thu, 02 Jul 2020 12:51:35 +0100</pubDate><category>Data and privacy</category><authors:names>Jon Bartley</authors:names><content:encoded><![CDATA[<p>However, there are measures that hospitality businesses will need to take to ensure that they collect, use, and dispose of personal data for these purposes in compliance with GDPR and other data protection legislation. Here are some practical steps to help your business comply with its obligations under data protection legislation when implementing Test and Trace measures.</p>
<p><strong>Information collected</strong></p>
<p>You should only collect the minimum amount of data that you actually need in order to comply with the <a href="https://assets.publishing.service.gov.uk/media/5eb96e8e86650c278b077616/working-safely-during-covid-19-restaurants-pubs-bars-takeaway-090720i.pdf">Government guidance</a>. In practical terms this is likely to mean:</p>
<ul>
    <li>customer names</li>
    <li>contact telephone numbers</li>
    <li>date of attending your venue (and estimated timings at your venue).</li>
</ul>
<p>The Government Guidance does not currently recommend asking customers whether or not they have had COVID-19 symptoms or any other health-related questions before attending venues. Such information is considered special category data and additional legal considerations will apply. Additional guidance recently released by the Information Commissioner's Office (<strong>ICO</strong>) sets out specific circumstances where data that some businesses might collect in their response to the pandemic is considered <strong>special category data</strong>. Where this is the case, the ICO makes clear that the business may need to consider a different lawful basis for collecting and processing such data. </p>
<div><strong>Lawful basis<br>
</strong></div>
<p>You are required to be able to demonstrate that you have one of the GDPR-specified lawful basis for processing this personal data. The most likely lawful basis in this context is ‘legitimate interests’. However, in order to rely on legitimate interests you should clearly document that you have:</p>
<ul>
    <li><strong>identified a legitimate interest</strong>: in this case, facilitating contact tracing for COVID-19</li>
    <li><strong>shown that the processing is necessary to achieve it</strong>: this is likely to be met given that the Government has recommended these measures, and</li>
    <li><strong>balanced these against the individual’s interests, rights and freedoms</strong>: this analysis should be carried out in the context of your specific organisation, but again should be fairly easy to demonstrate in the present circumstances.</li>
</ul>
<p><strong>Customer notification</strong></p>
<p>You will need to notify your customers clearly as to:</p>
<ul>
    <li><strong>why you are collecting their data</strong>: this should be limited to contact tracing</li>
    <li><strong>who you will be sharing it with</strong>: you will need to tell your customers that you may pass data collected to the NHS Test and Trace service, which is operated by The Department of Health and Social Care. For most hospitality businesses, there is unlikely to be any other organisations that you will need to share this data with. However, if you do need to share it with another third party you will also need to inform your customers that you will be doing so</li>
    <li><strong>how long you will keep the data</strong>: see section on ‘retention time periods’ below.</li>
</ul>
<p>
</p>
<div>There is other information that you are required to provide to individuals when you collect their personal data (e.g. the identity of the controller, details of data subject’s rights, right to complain to Information Commissioner). However, depending on the method you’re using to collect the data, it may be easier to include a statement at the end of the short-form notice along the lines of:</div>
<p style="margin-left: 40px;"> <br>
<span style="font-weight: lighter;">“<em>For further information about how we process your personal data, please see our Privacy Notice at [insert URL, possibly with QR code for ease of consultation</em>]”</span></p>
<p>This should all be communicated to your customers at the time of collecting their data for contact tracing purposes (eg when they make a reservation or before they enter your venue). You should also consider updating your general customer privacy policy.</p>
<p><span style="font-weight: lighter;"><strong>Security data</strong></span></p>
<p>You should make sure that the information collected is kept secure. Consider implementing measures such as requiring passwords to access the data and encryption (if stored electronically) and limiting access to staff that strictly need to access the data to perform their role. Your systems as a whole should have appropriate security measures, such as up to date versions of software, patching and antivirus.</p>
<p><span style="font-weight: lighter;"><strong>Use of data</strong></span></p>
<p>This data should <strong>only</strong> be used to assist with contact tracing and not for any other purpose. Please do not automatically add customers to your marketing lists or combine this data with any other customer databases that you may have. If you want to also collect data for marketing purposes at the same time (eg if this collection step for contact tracing will be incorporated into an online booking process), then this will need to be clear in the collection process and you will need to obtain <strong>separate consent</strong> to use this data for marketing. In other words, customers should not feel obligated to allow you to collect their data for marketing purposes at the same time that you collect this data to facilitate Test and Trace measures.</p>
<p><span style="font-weight: lighter;"><strong>Retention time periods</strong></span></p>
<p>The Government guidance recommends retaining the data for <strong>21 days</strong>. You must ensure that any periods are no longer than necessary for contact tracing purposes. In practice, given that the Government guidance has specified a 21-day period, retention periods that are much longer than this are highly unlikely to be acceptable. You must also ensure that you tell customers how long you will be retaining the data for. Once the retention period has finished, you should securely delete the data. This means shredding and/ or otherwise securely disposing of all hard copy records plus <strong>securely</strong> deleting any electronic copies.</p>
<p><strong>Staff considerations</strong></p>
<p>The guidance also recommends keeping a temporary record of your staff shift patterns for 21 days and assisting NHS Test and Trace in the context of your staff. The scope of this note does not cover any testing or other measures in relation to staff, but businesses should also be mindful that additional guidance has been published by the ICO setting out other considerations for employers in a COVID-19 world (see other useful resources).</p>
<p><strong>Use of third-party booking systems</strong></p>
<p>You may already have booking or reservations systems in place with third party booking platforms. Some of these service providers already facilitate the safe collection and storage of personal data in order to make bookings for your restaurant. They will no doubt also be keeping an eye on Government recommended measures so consider contacting them to see to what extent they can help you implement some of the other steps outlined in this note.</p>
<strong>Other useful resources </strong><br>
<br>
Since first publishing this note the ICO has also released detailed guidance on Contact Tracing and data protection considerations. This guidance is available<a href="https://ico.org.uk/media/for-organisations/documents/2617676/ico-contact-tracing-recommendations.pdf"> here</a>.<br>
<div> </div>
Additional useful resources may also be found at:  <br>
<br>
•<span> <a href="https://assets.publishing.service.gov.uk/media/5eb96e8e86650c278b077616/Keeping-workers-and-customers-safe-during-covid-19-restaurants-pubs-bars-takeaways-230620.pdf ">Keeping workers and customers safe during COVID-19</a> </span><br>
•<span> <a href="https://ico.org.uk/global/data-protection-and-coronavirus-information-hub/coronavirus-recovery-data-protection-advice-for-organisations/">Coronavirus recovery data protection advice for organisations</a> </span><br>
<div> </div>]]></content:encoded></item><item><guid isPermaLink="false">{3AA01361-54E7-4AD5-8D24-B5920F4B4782}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/cyber-bytes-issue-17/</link><title>Cyber bytes - Issue 17</title><description><![CDATA[Welcome to Cyber_Bytes, our bi-weekly roundup of key developments in cyber, tech and evolving risks. ]]></description><pubDate>Wed, 01 Jul 2020 10:00:00 +0100</pubDate><category>Data and privacy</category><authors:names>Richard Breavington, Christopher Ashton, Rachel Ford</authors:names><content:encoded><![CDATA[<p><strong>Small growth in cyber security spending anticipated in 2020</strong><br>
<br>
Gartner, a leading research and advisory company, estimates worldwide spending on information security and risk management technology and services will grow 2.4% this year. This is substantially below the 8.7% growth it had estimated before the Covid-19 pandemic. The cause is a disruption in supply chains and production across the world, which has forced organisations to limit their spending to survive. Security teams will be expected to do more with less and develop creative new ways to prevent opportunity-driven cyber attacks.<br>
<br>
To read more, please click <a href="https://www.teiss.co.uk/worldwide-cyber-security-spending-2020/">here</a>.<br>
<br>
<strong>New national certification scheme designed to boost cyber security resilience</strong><br>
<br>
Pen Underwriting has partnered with the Police Digital Security Centre on a new national certification scheme, which recognises and rewards small businesses in the UK who can demonstrate they are ‘Digitally Aware’. The certification scheme can be completed via a simple online assessment tool which analyses a firm's commitment to taking cyber security seriously by testing how resilient they are to the most common types of cybercrime.<br>
<br>
To read more, please click <a href="https://insurance-edge.net/2020/06/16/pen-underwriting-teams-up-with-police-on-cyber-security-for-smes/">here</a>.<br>
<br>
<strong>The Cyber (Sanctions) (EU Exit) Regulations 2020</strong><br>
<br>
The Cyber (Sanctions) (EU Exit) Regulations 2020, which implement in UK law some 2019 EU Regulations that will disappear at the end of the Brexit transition period, have been laid before parliament.  The regulations enable the government to designate cyber criminals and attach asset freezing orders to them, or to exclude them from the UK.<br>
<br>
To read the full legislation please click<a href="http://www.legislation.gov.uk/uksi/2020/597/introduction/made"> here</a>.<br>
<br>
<strong>Australian government and institutions targeted by state-based cyber attack</strong><br>
<br>
Scott Morrison, Australia's Prime Minister, recently confirmed that the nation's government and institutions are being targeted by ongoing “sophisticated” state-based cyber hacks. However, he has declined to identify a specific state actor or provide further information which reduces the confidence of such statements. Industry experts have argued the government must collaborate with the industry to provide the best response.</p>
<p>To read the full article, please click <a href="https://www.scmagazineuk.com/dangerous-speculate-state-based-cyber-attack-australia-without-evidence-threat-intelligence/article/1687119">here</a>.</p>
<p><strong>Tech giant Amazon hit by record DDoS attack</strong><br>
<br>
Amazon was hit by a distributed denial of service (DDoS) attack earlier on this year which lasted over three days and is the largest DDoS attack ever recorded. Amazon successfully defended against the attack with its AWS Shield, but experts are warning the industry not to ignore its effect.<br>
<br>
To read the full article, please click <a href="https://www.chargedretail.co.uk/2020/06/19/amazon-hit-with-largest-ddos-cyber-attack-in-history/?utm_source=rss&utm_medium=rss&utm_campaign=amazon-hit-with-largest-ddos-cyber-attack-in-history#new_tab">here</a>.<br>
<br>
<strong>Woman's 6-month battle to re-claim her stolen identity</strong><br>
<br>
The BBC tells the story of how a data subject realised she was a victim of ID fraud after she was refused a mortgage over a payday loan that she was not aware of. As a result, the fraud has cost the data subject roughly £10,000 in solicitor fees and continued rent payments.<br>
<br>
For the full article, please click <a href="https://www.bbc.co.uk/news/business-53106532">here</a>.</p>]]></content:encoded></item><item><guid isPermaLink="false">{81E5BEF6-EF48-484F-BF44-5A48251F8E52}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/cyber-bytes-issue-16-2020/</link><title>Cyber bytes - Issue 16</title><description><![CDATA[Welcome to Cyber_Bytes, our bi-weekly roundup of key developments in cyber, tech and evolving risks. ]]></description><pubDate>Tue, 16 Jun 2020 14:19:00 +0100</pubDate><category>Data and privacy</category><authors:names>Richard Breavington, Christopher Ashton, Rachel Ford</authors:names><content:encoded><![CDATA[<p><strong>Police Chief issues warning on discovering cyber-attacks when businesses go back to their offices</strong><br>
<br>
A Chief Policeman has cautioned businesses that during the COVID-19 pandemic offices and digital devices have been left untouched. It is anticipated that some businesses could return to find malware sitting on their systems. <br>
<br>
For full article, please click <a href="https://brownglock.com/library/2020/06/09/police-chief-issues-cyber-attack-warning/">here</a>.<br>
<br>
<strong>Ransomware group begin auctioning their victim's sensitive data off online</strong><br>
<br>
The gang behind the 'REvil ransomware enterprise' has started to auction off data that they stole from companies through malicious software. Their tactics encourage victims to pay up or be publicly shamed. Experts have said that this is just a sign on these types of groups feeling the financial pressure during the COVID-19 crisis as they look for new ways to extract value from victims who are less able to pay their demands.<br>
<br>
For the full article, please click <a href="https://krebsonsecurity.com/2020/06/revil-ransomware-gang-starts-auctioning-victim-data/">here</a>.<span style="font-weight: lighter;"></span><span style="font-weight: lighter;"></span></p>
<p>
<strong>The UK government set to invest £10m in the development of cyber security solutions </strong><br>
<br>
The UK Department for Digital, Culture, Media & Sport has announced that it will invest £10m in the development of cyber security solutions designed to strengthen the security of digital devices and services. The investment, which will be spread over four years and involve grants awarded to nine firms, is aimed at helping the tech infrastructure of UK organisations and digital devices to become more resilient to cyber attacks.<br>
<br>
For the full article, please click <a href="https://www.governmentcomputing.com/security/digital-disruptions/dcms-cyber-security-digital-devices">here</a>.<br>
<br>
<strong>Honda falls victim to a cyber attack</strong></p>
<p>
Honda was forced to suspend production facilities worldwide when they discovered a computer virus had infiltrated the company's servers. Factories were temporarily taken offline in locations across the world including Brazil, India and Japan. Most facilities affected were brought back online after one day, although some continued to remain closed.<br>
<br>
For full article, please click <a href="https://www.dailymail.co.uk/sciencetech/article-8403117/Honda-suspends-global-production-factories-discovering-computer-virus-servers.html?ns_mchannel=rss&ns_campaign=1490&ito=1490">here.</a><br>
<br>
<strong>FBI issue warning that mobile banking users could face increased cyber attacks</strong><span style="font-weight: lighter;"> </span></p>
<p>
The FBI have advised that cyber attackers are embedding malicious apps inside third-party software. This comes after it was seen there was a 50% increase in the use of online banking since 2020.<br>
<br>
For the full article, please click <a href="https://www.mobilepaymentstoday.com/news/fbi-warns-on-cyber-threat-amid-heightened-mobile-banking-use/">here.</a></p>
<p style="margin-bottom: 1.11111rem;"><strong>Report illustrates cyber exposure in each country as we enter post COVID-19 world </strong></p>
<p style="margin-bottom: 1.11111rem;">PasswordManagers.co has compiled data from five of the most significant types of end-point and cloud cyberattacks alongside the level of cybersecurity commitment across 108 countries to assess the exposure to cybercrime that each country faces.<br>
<br>
For the full article, please click <a href="https://insurance-edge.net/2020/06/04/new-report-identifies-cyber-attack-exposure-by-country/">here.</a></p>
<p style="margin-bottom: 1.11111rem;"><strong>Sweden to become world's first cashless society</strong></p>
<p style="margin-bottom: 1.11111rem;">Sweden is looking at introducing their own cryptocurrency, making them the world's first cashless society. Whilst the 'e-Krona' may be very effective for the country, it has been recognised that they could face the problem of all transactions being tracked, and people's personal lives being discovered. <br>
<br>
For full article, please click <a href="https://cryptodaily.co.uk/2018/01/sweden-set-to-introduce-its-own-cryptocurrency">here.</a></p>]]></content:encoded></item><item><guid isPermaLink="false">{2667429A-2E90-4B9F-99BD-3F1369E191D0}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/cyber-bytes-issue-15/</link><title>Cyber bytes - Issue 15</title><description><![CDATA[Welcome to Cyber_Bytes, our bi-weekly roundup of key developments in cyber, tech and evolving risks. ]]></description><pubDate>Mon, 01 Jun 2020 14:19:00 +0100</pubDate><category>Data and privacy</category><authors:names>Richard Breavington, Christopher Ashton, Rachel Ford</authors:names><content:encoded><![CDATA[<p><strong>£18 billion data breach lawsuit against easyJet</strong><br>
<br>
UK budget airline easyJet recently confirmed that information belonging to nine million customers could have been exposed as a result of a cyber incident.</p>
<p>To read more, please click <a href="https://www.zdnet.com/article/easyjet-faces-18-billion-class-action-lawsuit-over-data-breach/">here</a>.<br>
<br>
<strong>Transferring business from physical to online</strong><br>
<br>
The National Cyber Security Centre (NCSC) has released guidance on how businesses can transition to digital platforms and implement new cyber security measures. The guidance includes advice around dealing with new ways of working, such as reviewing Service Level Agreements and securing devices, as well as implementing systems which will sustain homeworking conditions for the long term.<br>
<br>
For the full set of guidance, please click<a href="https://www.ncsc.gov.uk/guidance/moving-business-from-physical-to-digital"> here</a>.<br>
<br>
<strong>COVID-19 and an increase in numbers of cyber security incidents</strong><br>
<br>
Experts from PwC's UK Cyber Threat Intelligence team have analysed the detail sitting behind the increase in reported cyber security incidents during COVID-19.  They found that many public high-profile cyber security incidents were already set in motion before the COVID-19 outbreak, with attackers often obtaining initial access to networks long before the incidents are identified and reported.  Nonetheless, it is thought there are number of reasons for an increase in cyber incidents following the COVID-19 outbreak, including organised crime groups taking advantage of target organisations in desperate situations and vulnerabilities of remote working practices.<br>
<br>
For the full article, please click <a href="https://www.pwc.co.uk/issues/crisis-and-resilience/covid-19/why-an-increase-in-cyber-incidents-during-covid-19.html">here</a>.<br>
<br>
<strong>Online sales drive the need for cyber insurance</strong></p>
<p>
Large numbers of businesses with a physical presence on the high street have been forced to close due to COVID-19 and move their services and products online. As a result, food and groceries sales have significantly increased during the government-imposed lockdowns. This means, as businesses focus on their online sales, they will hold more digital records of sensitive personal information and this opens the door for new cyber related insurance policies to be sold. <br>
<br>
For the full article, please click <a href="https://www.globaldata.com/cyber-insurance-becomes-the-new-norm-with-spike-in-online-sales-in-the-uk-says-globaldata/">here.</a><br>
<br>
<strong>Major Ukraine cyber attacker detained</strong><br>
<br>
The Security Service of Ukraine recently announced it had detained a hacker who could be partly responsible for a "megabreach" in 2009 which involved the release of about 773 million stolen usernames and passwords. Whilst it is a relief that criminals are being made accountable for their activities, such an incident should be viewed as a good reminder to ensure people are adequately protecting their accounts by adopting unique passwords with sufficient complexity.<br>
<br>
For the full article, please click <a href="https://krebsonsecurity.com/2020/05/ukraine-nabs-suspect-in-773m-password-megabreach/">here</a>.</p>]]></content:encoded></item><item><guid isPermaLink="false">{DA1AF9E6-A7AC-4B67-8603-DF68D48D5536}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/cyber-bytes-issue-14/</link><title>Cyber bytes - Issue 14</title><description><![CDATA[Welcome to Cyber_Bytes, our bi-weekly roundup of key developments in cyber, tech and evolving risks. ]]></description><pubDate>Fri, 22 May 2020 14:19:27 +0100</pubDate><category>Data and privacy</category><authors:names>Richard Breavington, Christopher Ashton, Rachel Ford</authors:names><content:encoded><![CDATA[<strong>Update: ICO's approach during COVID-19</strong><br>
<br>
The ICO has issued further guidance on its regulatory approach during COVID-19, stating that it has reshaped its priorities for the coming months and will be focusing on six key aspects: (1) protecting vulnerable citizens (2) supporting economic growth and digitalisation (3) shaping proportionate surveillance (4) enabling good practice in AI (5) enabling transparency and (6) maintaining business continuity. <br>
<br>
Whilst this means that some ICO projects are being paused, including the investigation into adtech bidding, the ICO has stated that it will be maintaining its statutory functions, including dealing with complaints and investigating data breach reports. <br>
<br>
Click <a href="https://ico.org.uk/about-the-ico/news-and-events/news-and-blogs/2020/05/new-priorities-for-uk-data-protection-during-covid-19-and-beyond/">here</a> and <a href="https://ico.org.uk/about-the-ico/news-and-events/news-and-blogs/2020/05/ico-statement-on-adtech-work/">here</a> to find out more.<br>
<br>
<strong>NCSC responds to security and privacy fears about COVID-19 tracing app</strong><br>
<br>
The National Cyber Security Centre (NCSC) has addressed public fears around privacy and security when using the government's COVID-19 tracing app, which uses Bluetooth to alert a mobile user when they have spent more than 15 minutes within 6ft of someone who has tested positive for COVID-19 or experienced symptoms. <br>
<br>
The NCSC has confirmed that the app doesn't store any personal information about users, holds only anonymous data and is built "as secure as practical". It is actively encouraging members of the public to download and use the app when it becomes available. <br>
<br>
The ICO is also investigating the app, stating that it will be providing its comments "as quickly as possible so that they can be usefully included in the learnings from the trial.” <br>
<br>
To read more, please click <a href="https://www.ncsc.gov.uk/blog-post/security-behind-nhs-contact-tracing-app">here</a> and <a href="https://ico.org.uk/about-the-ico/news-and-events/news-and-blogs/2020/05/dpia-for-the-nhsx-s-trial-of-contact-tracing-app/">here</a>.<br>
<br>
<strong>Government warns of cyber security threat due to COVID-19</strong><br>
<br>
The government has warned that cyber criminals are actively targeting national and international organisations responding to COVID-19, including healthcare bodies, pharmaceutical companies, research organisations and various different arms of local government. <br>
<br>
A joint statement has been issued by the UK's National Cyber Security Centre and the US Department of Homeland Security Cybersecurity and Infrastructure Security Agency, which provides an update on the methods that cyber criminals are using to target organisations and provides mitigation advice. <br>
<br>
To read more, please click <a href="https://www.freshbusinessthinking.com/raab-warns-of-covid-19-related-cyber-threat/">here</a>. To read the joint statement by the UK and US cyber security centres, please click <a href="https://www.ncsc.gov.uk/news/apt-groups-target-healthcare-essential-services-advisory">here</a>. <br>
<br>
<strong>NCSC report Suspicious Email Reporting Service results</strong><br>
<br>
The National Cyber Security Centre (NCSC) has published the initial results of its suspicious email reporting service, which allows members of the public to notify the NCSC of any suspicious emails that they have received. The results show that 160,000 emails have been reported in just over two weeks, which have resulted in more than 300 bogus websites being taken down. <br>
<br>
To read more, please click <a href="https://www.ncsc.gov.uk/news/cyber-experts-shine-light-on-online-scams">here</a>.<br>
<br>
<strong>White paper published - quantifying cyber risks </strong><br>
<br>
The Department of Computer Science at Oxford University and AXIS Insurance have published a white paper which discusses a new model that aims to quantify cyber risks. The model estimates cyber risk, taking into account potential losses, probability of losses, and timeframes.  <br>
<br>
To read more, please click <a href="https://axiscapital.com/insurance/cyber-technology-e-o/cyber#resource=84b1071a-ee0b-4096-88f1-ff9157625272">here</a>.<br>
<br>
<strong>Virtual cyber security classes online during Coronavirus Pandemic</strong><br>
<br>
The government has announced plans to keep the flow of new tech talent open during the COVID-19 pandemic. Cyber courses and modules are being offered online, for free.<br>
<br>
To access some of the modules, please click <a href="https://www.cybersecuritychallenge.org.uk/what-we-do/schools-programme/cyberland">here</a> and <a href="https://joincyberdiscovery.com/">here</a>. <br>
<br>
<strong>Greater Manchester Cyber Resilience Centre offers free membership for local businesses </strong><br>
<br>
The Cyber Resilience Centre for Greater Manchester is offering a three-month membership for local businesses of up to 100 employees to improve their cyber resilience during the COVID-19 outbreak - including tailored advice, regular cyber news updates and useful tools.   <br>
<br>
Click<a href="https://www.oldham-chronicle.co.uk/news-features/139/main-news/134305/gm-cyber-resilience-centre-offers-free-membership-following-surge-in-coronavirusrelated-online-crime"> here </a>to find out more. ]]></content:encoded></item><item><guid isPermaLink="false">{5BFABB82-F2B8-483B-91C1-B676255A6924}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/cyber-bytes-issue-13-2020/</link><title>Cyber Bytes - Issue 13</title><description><![CDATA[Welcome to Cyber_Bytes, our bi-weekly roundup of key developments in cyber, tech and evolving risks.]]></description><pubDate>Wed, 20 May 2020 18:13:00 +0100</pubDate><category>Data and privacy</category><authors:names>Richard Breavington, Christopher Ashton, Rachel Ford</authors:names><content:encoded><![CDATA[<p><strong>National Cyber Security Centre (NCSC) launches cyber security awareness campaign after over 2,000 online scams identified</strong></p>
<p>The NCSC has launched a cross-governmental coronavirus cyber awareness campaign, aiming to help individuals and businesses protect themselves from malicious cyber criminals.  Besides information on basic cyber security hygiene, the campaign will also include help and advice for people who are trying out services such as video-conferencing for the first-time during lockdown.</p>
<p>To read more, please click <a href="https://www.computerweekly.com/news/252481850/NCSC-launches-coronavirus-cyber-security-campaign">here</a> and <a href="https://www.civilserviceworld.com/professions/article/national-cyber-security-centre-takes-down-2000-coronavirus-online-scams">here</a>.</p>
<p><strong>Cyber criminals create fake NHS website</strong></p>
<p>Security researchers at Kaspersky recently discovered a fake NHS website which lured internet users to download malware that is designed to steal passwords and credit card data from browsers and device files. The use of fonts, language and interface on the spoofed website was very similar to those used on the genuine NHS website.<br>
<br>
For full article please click <a href="https://www.teiss.co.uk/fake-nhs-website-malware/">here</a>.</p>
<p><strong>Malicious GIF vulnerability identified in Microsoft Teams</strong></p>
<p>Cyber Ark have identified a vulnerability in Microsoft Teams that would have enabled malicious GIFs to be used to scrape users' data.  The vulnerability wold have affected every Teams user, but a fix was quickly issued.<br>
<br>
For full article please click <a href="https://www.cyberark.com/resources/threat-research-blog/beware-of-the-gif-account-takeover-vulnerability-in-microsoft-teams">here</a>.</p>
<p><strong>More needs to be done to make Auto vehicles more secure</strong></p>
<p>Concerns over the security of automatic vehicles have surfaced after McAfee recently made headlines by hacking a Tesla vehicle and convincing it to speed on its own owing to a modified traffic sign. They simply used a small piece of black tape to alter the speed limit sign so that the Tesla read it as 85mph instead of 35mph. Cyber-security experts say improvements have been made, but more needs to be done before and during production.<br>
<br>
For full article please click <a href="https://www.tu-auto.com/with-connected-cars-zero-trust-is-best-security-advice/">here.</a></p>
<p><strong>Financial Stability Board (FSB) publish consultation report</strong></p>
<p>The FSB has released a report on 'Effective Practices for Cyber Incident Response and Recovery'.  The FSB has created a toolkit of 46 effective practices which aim to assist financial institutions in their response to and recovery from cyber threats.<br>
<br>
For full article please click <a href="https://www.fintechfutures.com/2020/04/fsb-consults-on-effective-practices-for-cyber-incident-response-and-recovery/">here</a>.</p>
<p><strong>Investment Association (IA) launches cyber threat platform</strong></p>
<p>The IA has launched a cyber intelligence platform to help investment managers protect their firms. The IA's Threat Intelligence Alert Network will provide a real-time dashboard which brings together alerts originating from law enforcement, government agencies and other relevant authorities on cyber hazards and risks.<br>
<br>
For full article please click <a href="https://www.fstech.co.uk/fst/Investment_Association_Launches_Cyber_Threat_Platform.php">here.</a></p>]]></content:encoded></item><item><guid isPermaLink="false">{B9F0D824-7512-4B5B-BE71-082CF150BF5F}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/cyber-bytes-issue-12-2020/</link><title>Cyber Bytes - Issue 12</title><description><![CDATA[Welcome to Cyber_Bytes, our bi-weekly roundup of key developments in cyber, tech and evolving risks.]]></description><pubDate>Tue, 21 Apr 2020 18:13:00 +0100</pubDate><category>Data and privacy</category><authors:names>Richard Breavington, Christopher Ashton, Rachel Ford</authors:names><content:encoded><![CDATA[<p><strong>ICO issues guidance on flexibility of its approach during COVID-19</strong></p>
<p>Last week, the ICO published a document setting out its approach during COVID-19. The document should provide some comfort to businesses. It acknowledges that the current crisis may impact on the time taken to report personal data breaches to the ICO and that the ICO will take an empathetic and proportionate approach. The document also confirms that the ICO expects to conduct fewer investigations, focusing its attention on the more serious incidents, and that it will take into account whether an incident has arisen due to difficulties resulting from COVID-19 when deciding whether to take enforcement action.  </p>
<p>For the full published document, please click <a href="https://ico.org.uk/about-the-ico/news-and-events/news-and-blogs/2020/04/how-we-will-regulate-during-coronavirus/">here</a>.</p>
<p><strong>ICO issues warning over COVID-19 nuisance marketing </strong></p>
<p>The ICO has issued a warning about businesses using COVID-19 to contact vulnerable people using nuisance calls, unsolicited emails and spam texts. The warning states that the ICO has seen an increase in complaints about nuisance marketing and confirms that the ICO is prioritising such cases. </p>
<p>For full article, please click <a href="https://ico.org.uk/about-the-ico/news-and-events/news-and-blogs/2020/04/ico-statement-on-investigating-coronavirus-scams/">here</a>.</p>
<p><strong>Email security and cyber resilience</strong></p>
<p>Mimecast has conducted a global survey to further understanding of the current most persuasive types of emails threats, how security professionals perceive them and what they are doing to combat them. Some interesting results of the survey are that of the businesses surveyed: 94% experienced phishing attacks; 54% experienced a ransomware attack; and 88% experienced email-based spoofing of business partners or vendors. </p>
<p>To download the report published by Mimecast summarising the results, please click <a href="https://www.mimecast.com/the-state-of-email-security-2019/?utm_medium=SEMPPC&utm_source=BingPPC&utm_campaign=7013l000000TmCuAAK&utm_term=cybersecurity&msclkid=edc39423be3216465aeccabee7a8d00b">here</a>.</p>
<p><strong>Static passwords are a big cyber security risk</strong></p>
<p>A report has indicated that cyberattacks are largely being carried out using weak, default or stolen log in credentials, with around 80 percent of security breaches involving compromised credentials in the last year. It is said that static passwords are no longer enough, since they lack the ability to verify whether the user accessing data is authentic or not. The report stresses that multi factor authentication is an important security tool, with the need to move away from static passwords. </p>
<p>For the full article, please click <a href="https://www.securityweek.com/human-element-and-beyond-why-static-passwords-arent-enough?https%3A%2Fwww_securityweek_com%2Fsilicon-valley-legends-launch-beyond-identity-quest-eliminate-passwords=">here</a>.</p>
<p><strong>Zoom credentials database found on dark web</strong></p>
<p>A database containing 2,300 Zoom video credentials have been located in a dark web forum. The credentials included a mixture of emails, passwords, meeting IDs, names, PIN codes and host keys. The risks with unauthorised third parties gaining access to these credentials is not just access to confidential meetings. In addition, social engineering could be attempted via Zoom. The development is one of the many impacts we are seeing whilst employees work from home and interact digitally. </p>
<p>For the full article, please click <a href="https://www.securityweek.com/zoom-credentials-database-available-dark-web">here</a>.</p>
<p><strong>ICO's video conferencing guidance</strong></p>
<p>The ICO has issued advice about how to safely roll out the latest video conferencing technology. The advice lists the key questions that businesses should ask when implementing video conferencing technology. It also references the risk of the 'live chat feature' in a video conference being used to spread phishing messages. </p>
<p>For full article, please click <a href="https://ico.org.uk/about-the-ico/news-and-events/news-and-blogs/2020/04/video-conferencing-what-to-watch-out-for/">here</a>.</p>
<p><strong>Cyber security in connected cars</strong></p>
<p>Leading independent consumer body Which? has published a report indicating security flaws in Ford and Volkswagen cars, said to put motorists' personal data and safety at risk. The consumer body has raised concerns around the lack of regulation for tech in the motor industry, which it says has led to a lack of cyber security.</p>
<p>For the full article, please click <a href="http://www.connectingindustry.com/IrishManufacturing/context-cyber-security-researchers-help-which-find-serious-flaws-in-ford-focus-and-vw-polo-cars-that-pose-questions-about-security-privacy-and-safety.aspx">here</a>.</p>]]></content:encoded></item><item><guid isPermaLink="false">{45EF0E44-38C9-4144-96B0-13E8F36F9FE0}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/cyber-bytes-issue-10-2020/</link><title>Cyber_Bytes - Issue 10</title><description><![CDATA[Welcome to Cyber_Bytes, our bi-weekly roundup of key developments in cyber, tech and evolving risks.]]></description><pubDate>Fri, 10 Apr 2020 17:28:00 +0100</pubDate><category>Data and privacy</category><authors:names>Richard Breavington, Christopher Ashton, Rachel Ford</authors:names><content:encoded><![CDATA[<p><strong>NCSC responds to COVID-19 related cyber attacks </strong></p>
<p>Experts from the National Cyber Security Centre (NCSC) have revealed a range of attacks being perpetrated online as cyber criminals seek to exploit COVID-19. The NCSC has issued a warning in response to this, urging organisations to protect themselves online. </p>
<p>To read the warning from the NCSC, please click <a href="https://www.ncsc.gov.uk/news/cyber-experts-step-criminals-exploit-coronavirus">here</a>. To read the guidance, please click <a href="https://www.ncsc.gov.uk/news/home-working-increases-in-response-to-covid-19">here</a>.</p>
<p><strong>Regulators issue guidance on data protection issues following COVID-19</strong></p>
<p>The ICO has issued guidance on the collection and sharing of personal data for COVID-19 related purposes, and security measures that should be put in place where employees are working from home. The guidance helpfully confirms that the ICO will not penalise organisations that need to prioritise other areas or adapt their usual approach during this extraordinary period.</p>
<p>For the EDPB statement, please click<a href="https://edpb.europa.eu/news/news/2020/statement-edpb-chair-processing-personal-data-context-covid-19-outbreak_en"> here</a>. </p>
<p><strong>FCA shares industry insight into ever-evolving cyber risk</strong></p>
<p>Readers may be aware of the Cyber Coordination Groups (CCGs) set up by the Financial Conduct Authority (FCA), which share knowledge of common experiences and discuss best practices in the cyber security sector. </p>
<p>For the full article, please click <a href="https://www.fca.org.uk/publications/research/insights-cyber-coordination-groups">here</a></p>
<p><strong>Research finds nearly 50% of UK businesses have basic skills gap</strong></p>
<p>A government report has identified that 48% of UK businesses have a basic skills gap when it comes to cyber security, primarily around configuring firewalls and the storing and transferring of personal data. The report further highlights that cyber professionals are not confident in performing basic tasks backed by the government's Cyber Essentials scheme.<br>
<br>
For the full report, click <a href="https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/869506/Cyber_security_skills_report_in_the_UK_labour_market_2020.pdf">here</a>.</p>]]></content:encoded></item><item><guid isPermaLink="false">{15D5F5B7-63D9-4C9B-901C-4DE1934C5589}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/cyber-bytes-issue-11-2020/</link><title>Cyber Bytes - Issue 11</title><description><![CDATA[Welcome to Cyber_Bytes, our bi-weekly roundup of key developments in cyber, tech and evolving risks.]]></description><pubDate>Mon, 06 Apr 2020 17:52:00 +0100</pubDate><category>Data and privacy</category><authors:names>Richard Breavington, Christopher Ashton, Rachel Ford</authors:names><content:encoded><![CDATA[<p><strong>Cybersecurity and COVID-19: Opportunities for change in the face of challenge</strong></p>
<p>Richard Breavington, Daniel Guilfoyle and Ridvan Canbilen explore the potential sources of cyber risk that a wide range of businesses are now facing, with a number of challenges being presented by staff working from home due to the COVID-19 outbreak.</p>
<p>Businesses should look to take steps to protect against those risks, but should also see the outbreak as an opportunity to prepare themselves for operating effectively in a future that promises more remote working challenges.</p>
<p>Please click <a href="https://www.rpclegal.com/-/media/rpc/files/perspectives/data-and-privacy/covid19--cybersecurity-article-v4.pdf">here</a> to read the full article.</p>
<p><strong>Supporting NHS Cybersecurity During COVID-19</strong></p>
<p>The World Health Organization, US Department of Health and Human Services, and hospitals in Spain, France and the Czech Republic have all been hit by cyber attacks during the current COVID-19 crisis.  Chatham House explores how the current crisis could be seen as an opportunity for the UK government to show agility in how it deals with cyber threats and how it cooperates with the private sector in creating cyber resilience.</p>
<p>To read more, click <a href="https://www.chathamhouse.org/expert/comment/supporting-nhs-cybersecurity-during-covid-19-vital">here</a>.</p>
<p><strong></strong><strong>ICO launches Coronavirus Hub</strong></p>
<p>The ICO has released a new information hub to help individuals and organisations navigate data protection issues during the coronavirus outbreak, pooling together previous updates and guidance that it had previously released in respect of the outbreak.  New and relevant information will be added to the hub as the pandemic continues.</p>
<p>To keep up to date, please click <a href="https://ico.org.uk/global/data-protection-and-coronavirus-information-hub/">here</a>.</p>
<p><strong></strong><strong>DCMS publishes results of cyber security survey 2020</strong></p>
<p>The Department for Digital Culture, Media & Sport has issued its fifth <a href="https://www.gov.uk/government/publications/cyber-security-breaches-survey-2020/cyber-security-breaches-survey-2020">Cyber Security Breaches Survey</a>. Its aim is to support the UK government in shaping future policy in this area; results suggest that cyber-attacks have evolved and become more frequent.</p>
<p>For more information click <a href="https://www.scl.org/news/10855-dcms-publishes-results-of-cyber-security-survey-2020">here</a></p>
<p><strong></strong><strong>Cyber resilience in a pandemic</strong></p>
<p>The World Health Organization's extensive involvement in COVID-19 inter-governmental coordination gives cyber attackers an opportunity to target the data streams driving global engagement.  As nations scramble to break-ground on disease prevention and test conduction research, it is important than ever for countries to erect a united front against digital espionage, and safeguard highly sensitive information from criminal precision.</p>
<p>For more information click <a href="https://www.companynewshq.com/coronavirus-news/cyber-resilience-in-a-pandemic/">here</a></p>
<p><strong></strong><strong>International credit card theft ring fraudsters caught</strong></p>
<p>The Russian Federal Security Service has charged 25 people with operating a sprawling international credit card theft ring. The crime involved stolen credit card data from around 90 websites. </p>
<p>To read more, please click <a href="https://krebsonsecurity.com/2020/03/russians-shut-down-huge-card-fraud-ring/">here</a>.</p>
<div> </div>]]></content:encoded></item><item><guid isPermaLink="false">{3AC1E711-B189-4543-88CB-C4B3E488AD60}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/cybersecurity-and-covid19-opportunities-for-change-in-the-face-of-challenge/</link><title>Cybersecurity and COVID-19: Opportunities for change in the face of challenge</title><description><![CDATA[<p class="BodytextLevel2" style="margin-left: 0cm;"><span>Many businesses have been understandably focused on continuing to trade. While this is obviously a critical concern there could be a risk that it distracts from ensuring that appropriate security measures are put in place to protect personal and commercially sensitive data. The National Cyber Security Centre (NCSC) report that malicious actors across the globe are already trying to capitalise. </span></p>
<p class="BodytextLevel2" style="margin-left: 0cm;"><span>In the UK, the National Fraud Intelligence Bureau (NFIB) has identified multiple reports of fraud involving coronavirus links to date, with losses to victims totalling close to £1m. This is likely the tip of the iceberg both because victims are not obliged to report to NFIB and because the UK has only experienced the first few weeks of what is predicted to be a significant period of disruption.</span></p>
<p class="BodytextLevel2" style="margin-left: 0cm;"><span>To access the full article, click the link below. </span></p>]]></description><pubDate>Fri, 27 Mar 2020 14:20:16 Z</pubDate><category>Data and privacy</category><authors:names></authors:names><content:encoded><![CDATA[<p class="BodytextLevel2" style="margin-left: 0cm;"><span>Many businesses have been understandably focused on continuing to trade. While this is obviously a critical concern there could be a risk that it distracts from ensuring that appropriate security measures are put in place to protect personal and commercially sensitive data. The National Cyber Security Centre (NCSC) report that malicious actors across the globe are already trying to capitalise. </span></p>
<p class="BodytextLevel2" style="margin-left: 0cm;"><span>In the UK, the National Fraud Intelligence Bureau (NFIB) has identified multiple reports of fraud involving coronavirus links to date, with losses to victims totalling close to £1m. This is likely the tip of the iceberg both because victims are not obliged to report to NFIB and because the UK has only experienced the first few weeks of what is predicted to be a significant period of disruption.</span></p>
<p class="BodytextLevel2" style="margin-left: 0cm;"><span>To access the full article, click the link below. </span></p>]]></content:encoded></item><item><guid isPermaLink="false">{27E26C76-7795-4354-8E2D-522BA9163124}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/cyber-bytes-issue-8-2020/</link><title>Cyber_Bytes - Issue 8 2020</title><description><![CDATA[Welcome to the eighth 2020 edition of Cyber_Bytes, our bi-weekly roundup of key developments in cyber, tech and evolving risks. ]]></description><pubDate>Tue, 10 Mar 2020 15:30:00 Z</pubDate><category>Data and privacy</category><authors:names>Richard Breavington, Christopher Ashton, Rachel Ford</authors:names><content:encoded><![CDATA[<p><strong>With ransomware being one of the most common cyber breaches of 2019, it is no surprise that the commentary around it is increasing. </strong></p>
<p>Regular readers might recall the plans by ransomware developer Nemty to publish stolen data if ransoms are not paid by its victims. In latest news, the ransomware developer behind the well-known Travelex breach has published personal data contained on the systems of American IT firm, Artech Systems, with threats that the data would be sold to third parties if Artech did not pay the ransom demanded.  </p>
<p>To read more, please click <a href="https://www.computing.co.uk/news/3084926/travelex-gdpr-ransomware-ico">here</a>, and <a href="https://www.independent.co.uk/news/business/news/travelex-hack-customer-data-personal-information-a9282296.html">here</a>.</p>
<p><strong>Timescales for responding to data subject access requests updated</strong></p>
<p>The ICO’s guidance has been amended to state that the time limit for a response to a DSAR starts from the day the request is received (even if it is not a working day) until the corresponding calendar date in the next month, instead of the day after the request.<br>
<br>
To read RPC's take on this, please click <a href="https://www.rpclegal.com/perspectives/retail-therapy/ico-revises-guidance-on-timescales-for-responding-to-a-data-subject-access-request/">here</a>.</p>
<p><strong>Mastercard has unveiled plans to open a cybersecurity centre in Europe.</strong></p>
<p>A focus will be on information sharing with law enforcement bodies such as the National Cyber Security Centre (NCSC) and the National Crime Agency (NCA).</p>
<p>For the full article, please click <a href="https://portswigger.net/daily-swig/mastercard-to-lead-security-cooperation-in-europe-with-new-cyber-resilience-facility">here</a>.</p>
<p><strong>Another week, another quiz to test your knowledge…</strong></p>
<p>BT have released a security savvy quiz, with questions on the digital world and the risks that it brings with it. <br>
<br>
To take the quiz, please click <a href="http://home.bt.com/tech-gadgets/internet/cyber-security-how-savvy-are-you-quiz-11364119381599">here</a></p>
<p><strong>Warning from the FCA and ICO  </strong></p>
<p>A joint statement from the FCA and ICO has warned firms about the sale of consumers' personal data by FCA-authorised firms and insolvency practitioners to claims management companies. The statement warns that any such sale is likely to be unlawful, and in breach of the GDPR, PECR and the FCA Handbook. <br>
<br>
For the full statement, please click <a href="https://ico.org.uk/about-the-ico/news-and-events/news-and-blogs/2020/02/joint-statement-from-the-fca-ico-and-fscs/">here</a>.</p>
<p><strong>Online Harms White Paper and the ICO's response</strong></p>
<p>The government may legislate to appoint Ofcom as the regulator to enforce rules to make the internet a safer place. As part of the change, Ofcom may be given new powers to make sure online companies have the correct systems and processes to keep people using their platforms safe.</p>
<p>To read the government and the ICO's responses, please click <a href="https://ico.org.uk/about-the-ico/news-and-events/news-and-blogs/2020/02/statement-regarding-the-government-s-initial-response-to-online-harms-white-paper-consultation/">here</a>.</p>]]></content:encoded></item><item><guid isPermaLink="false">{8DECD128-F79D-49E9-8900-C37020033173}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/cyber-bytes-issue-9-2020/</link><title>Cyber_Bytes - Issue 9</title><description><![CDATA[Welcome to Cyber_Bytes, our bi-weekly roundup of key developments in cyber, tech and evolving risks.]]></description><pubDate>Mon, 09 Mar 2020 17:28:00 Z</pubDate><category>Data and privacy</category><authors:names>Richard Breavington, Christopher Ashton, Rachel Ford</authors:names><content:encoded><![CDATA[<p><strong>ESRB reports on systemic cyber risk</strong></p>
<p>The European Systemic Risk Board (ESRB) has published a report on cyber risks and incidents, which, owing to the interconnectedness of various information systems, spread quickly and widely. The ESRB has found that cyber incidents are becoming more persistent and prevalent, spreading widely across sectors and beyond geographical borders, including to parties which are not the primary target.</p>
<p>For the full article, please click <a href="https://financialinstitutionsnews.com/2020/02/24/esrb-reports-on-systemic-cyber-risk/">here</a></p>
<p><strong>International airline fined £500,000 for failing to secure its customers’ personal data</strong></p>
<p>The ICO has fined Cathay Pacific Airways Limited £500,000 for failing to protect the security of its customers’ personal data. The airline’s failure to secure its systems resulted in the unauthorised access to their passengers’ personal details including: names, passport and identity details, dates of birth, postal and email addresses, phone numbers and historic travel information.</p>
<p>For the full article, please click <a href="https://ico.org.uk/about-the-ico/news-and-events/news-and-blogs/2020/03/international-airline-fined-500-000-for-failing-to-secure-its-customers-personal-data/">here</a></p>
<p><strong>UK's Travelex expects 25 million sterling hit due to cyber attack</strong></p>
<p>Currency service provider Travelex has estimated a 25- million-pound ($32 million) hit to its first-quarter underlying core earnings from a ransomware attack in late December.  It has now restored all its customer-facing systems.</p>
<p>For the full article, please click <a href="https://uk.reuters.com/article/uk-britain-travelex/uks-travelex-expects-25-million-sterling-hit-due-to-cyber-attack-idUKKBN20P185?il=0&utm_source=slipcase&utm_medium=affiliate&utm_campaign=slipcase">here</a></p>
<p><strong>Growth of ransomware threat 'unsustainable' for cyber insurance industry</strong></p>
<p>Ransomware attacks soared in the second half of 2019, and industry experts are concerned that the cost to insurers is growing at rates unsustainable for current policies.  Insurers and insureds will have to focus on promoting good security practices before a breach occurs if the "unsustainable" rise in ransomware attacks are going to be curbed.</p>
<p>For the full article, please click <a href="https://www.spglobal.com/marketintelligence/en/news-insights/latest-news-headlines/growth-of-ransomware-threat-unsustainable-for-cyber-insurance-industry-57125698https:/www.spglobal.com/marketintelligence/en/news-insights/latest-news-headlines/growth-of-ransomware-threat-unsustainable-for-cyber-insurance-industry-57125698">here</a></p>
<p><strong>8 out of 10 businesses don't have cyber-attack insurance</strong></p>
<p>With the rise of cyber-crime now costing firms in the UK billions each year, many companies have sought to upgrade their defence against hostile outsiders. However, according to a recent study, more than 8 in 10 businesses have still not taken out insurance policies against the impacts of a potential breach.</p>
<p>For the full article, please click <a href="https://www.consultancy.uk/news/23882/8-out-of-10-businesses-dont-have-a-cyber-attack-insurancehttps:/www.consultancy.uk/news/23882/8-out-of-10-businesses-dont-have-a-cyber-attack-insurance">here</a></p>
<p><strong>Why cyber physical damage attacks may increase</strong></p>
<p>TMK Cyber Underwriter Paul Gooch explains why cyber Physical Damage attacks may increase in 2020 and beyond.  Most cyber policies exclude cover for physical damage and ensuing business interruption. As a result, many policyholders could now find themselves with a gap in cover. Although cyber physical damage events have thus far remained infrequent, there are several reasons why this could change. </p>
<p>For the full article, please click <a href="http://www.tokiomarinekiln.com/news-views/blog/posts/why-cyber-physical-damage-attacks-may-increase-reason-1/?utm_source=slipcase&utm_medium=affiliate&utm_campaign=slipcase">here</a></p>
<p><strong>Smart cameras could let hackers spy on homes, cyber security chiefs warn</strong></p>
<p>The National Cyber Security Centre has advised people to adjust settings on smart cameras to secure them from cyber-attacks. This follows cyber-attacks where hackers were able to spy on people's homes through smart cameras.</p>
<p>For the full article, please click <a href="https://www.standard.co.uk/news/crime/smart-cameras-hackers-spy-homes-cyber-security-a4377226.html">here</a></p>
<div> </div>]]></content:encoded></item><item><guid isPermaLink="false">{D0F8F1D6-DA82-4F45-A098-3FFCF631C3F5}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/are-you-compliant-with-the-new-data-protection-rules-in-asia/</link><title>Are you compliant with the new rules in Singapore? Asia? Beyond?</title><description /><pubDate>Thu, 27 Feb 2020 14:09:51 Z</pubDate><category>Data and privacy</category><authors:names></authors:names></item><item><guid isPermaLink="false">{9FF98AD3-49C2-4FDD-AACE-738E0C3628CC}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/cyber-bytes-issue-7-2020/</link><title>Cyber_Bytes - Issue 7 2020</title><description><![CDATA[Welcome to the seventh 2020 edition of Cyber_Bytes, our bi-weekly roundup of key developments in cyber, tech and evolving risks. ]]></description><pubDate>Mon, 10 Feb 2020 15:30:00 Z</pubDate><category>Data and privacy</category><authors:names>Richard Breavington, Christopher Ashton, Rachel Ford</authors:names><content:encoded><![CDATA[<p><strong>High Court grants proprietary injunction over Bitcoin cyber ransom payment to a third party</strong></p>
<p>RPC's Bethan Griffiths comments on a recent High Court decision to grant a proprietary injunction in respect of a bitcoin payment made to a cyber extortionist.</p>
<p>An English insurer suffered a ransomware attack and paid about $950,000 in Bitcoin as ransom payment. The Court decided crypto assets can be 'property' and the test for a proprietary injunction was satisfied. Tracing Bitcoin payments and obtaining an injunction can be a complex and expensive task, but potentially worth considering if the sum involved is significant enough.</p>
<p>For the full article, please click <a href="https://www.rpclegal.com/perspectives/professional-and-financial-risks/high-court-grants-proprietary-injunction-over-bitcoin-cyber-ransom-payment-to-a-third-party/">here</a>.</p>
<p><strong>Action required to drive development of the cyber market</strong></p>
<p>Tougher data privacy regulations such as the GDPR have resulted in an increase in the purchase of cyber cover, but that regulation is way down the list of factors driving the purchase of cyber insurance cover. A mix of factors has led to the increase in the purchase of cyber cover, but that increase is not as high as one might expect.</p>
<p>RPC Partner, Richard Breavington, comments "Our own tracking of client claims has seen a rapid rise after May 2018, with the number of cases more than doubling and remaining consistently high…."</p>
<p>For the full article, please click <a href="https://insuranceday.maritimeintelligence.informa.com/ID1130267/GDPR-enforcement-action-required-to-drive-development-of-cyber-market">here</a>.  (Note that this article requires a subscription to Insurance Day)</p>
<p><strong>The Metropolitan Police Service publishes a new cyber security strategy</strong></p>
<p>The Metropolitan Police Service has published a new cyber security strategy with an emphasis on four ‘core vision principles’ to protect its information assets. It sets out priorities to: defend the data, distrust the asset; use identity as its perimeter; develop transparency of its internet traffic; and be aware and prepared.</p>
<p>For the full article, please click <a href="https://www.ukauthority.com/articles/met-police-sets-four-principles-for-cyber-security/?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+Ukauthoritycom+%28UKauthorITy.com+-+News+on+the+tech-enabled+transformation+of+frontline+public+service+delivery%29">here</a>.</p>
<p><strong>More victims attacked by Maze ransomware</strong></p>
<p>The Maze ransomware group has continued its threats to release the data stolen from victims who refuse to pay the ransom. Their recent targets include French construction company, Bouygues, and multiple law firms, who have had sensitive customer data published.</p>
<p>For the full article, please click <a href="https://www.infosecurity-magazine.com/news/maze-ransomware-law-firms-french/">here</a>.</p>
<p><strong>UK cyber security sector now worth over £8bn</strong></p>
<p>The UK’s cyber security sector seems to be benefiting from increasing regulation, with the market now worth an estimated £8.3bn, and the number of firms operating in the industry up 44% since 2017. The UK industry has rocketed from 846 companies three years ago to 1,200 now.</p>
<p>For the full article, please click <a href="https://www.decisionmarketing.co.uk/news/hack-attack-fears-push-uk-cyber-security-to-over-8bn">here</a>.</p>
<p><strong>Report reveals organisations successfully phished in 2019 </strong></p>
<p>Proofpoint reports more than half of organisations have been successfully phished for valuable intel at least once last year. Proofpoint argues that employee training plays a vital role in the cybersecurity chain, given that 78 per cent reported “measurable reductions” in phishing susceptibility following proper education.</p>
<p>For the full article, please click <a href="https://www.itproportal.com/news/over-half-of-organisations-were-successfully-phished-in-2019/">here</a>. </p>
<p><strong>Rise of Artificial intelligence and Big Data creates cyber security challenges</strong></p>
<p>The European Union Agency for Law Enforcement Cooperation (Europol) believes the best way to address cyber security challenges posed by artificial intelligence (AI) and Big Data is to increase the synergies between individual privacy and public security whilst fostering innovation.</p>
<p>For the full article, please click <a href="https://www.teiss.co.uk/ai-and-big-data-cyber-security/">here</a>.</p>
<p><strong>New IoT legislation intended to improve security  </strong></p>
<p>Manufacturers of smart connected devices will need to adhere to a set of stringent cyber security requirements to ensure robust security standards are upheld. The three key rules revolve around device passwords, reporting vulnerabilities and security patches. A globally applicable standard based on the UK’s has been published by European standards body ETSI.</p>
<p>For the full article, please click <a href="https://www.computerweekly.com/news/252477375/Government-tightens-law-around-IoT-cyber-security">here</a>.</p>]]></content:encoded></item><item><guid isPermaLink="false">{58C01A84-DEC4-4028-A409-D2EE2F7566BA}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/cyber-bytes-issue-6-2020/</link><title>Cyber_Bytes - Issue 6 2020</title><description><![CDATA[Welcome to Cyber_Bytes, a round up of key developments in cyber, tech and evolving risks over the first month of 2020.]]></description><pubDate>Wed, 29 Jan 2020 11:56:00 Z</pubDate><category>Data and privacy</category><authors:names>Richard Breavington, Christopher Ashton, Rachel Ford</authors:names><content:encoded><![CDATA[<p><strong>New year, same challenge</strong></p>
<p>Regular readers will be familiar with the phishing quiz created by Google that we circulated last year. As 2020 develops, we have already seen several victims to phishing attacks, making it all the more important for companies to remain vigilant. We circulate the quiz in this issue as a reminder to be on guard against phishing attacks, and for our new readers to take on the challenge. </p>
<p>
To access the quiz, please <a href="https://sites-rpc.vuturevx.com/email_handler.aspx?sid=blankform&redirect=https%3a%2f%2fsites-rpc.vuturevx.com%2fe%2fmjk2x0tyotoen3w%2ff805e101-6773-4017-880b-7eb0fb2f1913">click here</a></p>
<p>
<strong>ICO issues guidance on subject access requests</strong></p>
<p>
The ICO has issued new guidance on dealing with subject access requests, which is open for consultation until 12 Feb 2020. Readers will be aware that a subject access request is a right provided to individuals under the GDPR which allows them to find out what personal data a data controller holds about them. The guidance provides further details on subject access requests and the rights they offer to individuals. </p>
<p>
15 City law firms including RPC will submit their comments before the consultation closes.</p>
<p>
To read more, please <a href="https://sites-rpc.vuturevx.com/email_handler.aspx?sid=blankform&redirect=https%3a%2f%2fico.org.uk%2fabout-the-ico%2fico-and-stakeholder-consultations%2fico-consultation-on-the-draft-right-of-access-guidance%2f">click here</a></p>
<p>
<strong>Ransomware developer plans on creating leaked data site</strong></p>
<p>
Ransomware developer Nemty has announced plans to create a website which will be used to publish stolen data if ransoms are not paid by its victims. The latest plans highlight the risk of personal data being downloaded by the attackers, before a victim's systems are encrypted with the ransomware. The developments could potentially increase the number of notifications to the ICO and to individuals being necessary as a result of a ransomware attack. </p>
<p>
To read more, please <a href="https://sites-rpc.vuturevx.com/email_handler.aspx?sid=blankform&redirect=https%3a%2f%2fwww.bleepingcomputer.com%2fnews%2fsecurity%2fnemty-ransomware-to-start-leaking-non-paying-victims-data%2f">click here</a></p>
<p>
<strong>Citrix vulnerability revealed</strong></p>
<p>
Key vulnerabilities in software provided by the technology supplier Citrix have been identified. The vulnerabilities enable unauthorised third parties to gain direct access into a company's local network without needing log in credentials.  Citrix has started to roll out security patches to permanently fix the vulnerabilities, but they will apparently not be fully patched until the end of January. </p>
<p>
To read more, please <a href="https://sites-rpc.vuturevx.com/email_handler.aspx?sid=blankform&redirect=https%3a%2f%2fwww.computerweekly.com%2fnews%2f252477166%2fCitrix-releases-IoC-scanner-for-ADC-and-Gateway-vulnerabilities">click here</a></p>
<p>
<strong>ICO issues first fine under GDPR</strong></p>
<p>
The ICO has issued its first fine under the GDPR, fining a pharmacy £275,000 for failing to ensure the security of medical details. </p>
<p>
The incident was brought to the ICO's attention by a third party, who reported that the pharmacy had left approximately 500,000 documents in unlocked containers on site. </p>
<p>
The ICO has published its intention to issue far higher fines,  in particular to British Airways and Marriott International, but these have not been formally issued yet.  </p>
<p>
To read more, please <a href="https://sites-rpc.vuturevx.com/email_handler.aspx?sid=blankform&redirect=https%3a%2f%2fico.org.uk%2faction-weve-taken%2fenforcement%2fdoorstep-dispensaree-ltd-mpn%2f">click here  </a></p>
<p>
<strong>Travelex data breach</strong></p>
<p>
Readers may be aware of the ransomware attack suffered by Travelex on New Year's Eve. The foreign exchange company was forced to take down its websites across roughly 30 countries in order to contain the incident. It now comes under scrutiny in how it has dealt with the attack and how it was communicated to third parties. </p>
<p>
The latest press coverage highlights the key importance for companies to have an incident response plan in place for when a cyber incident does occur, including ways to correctly manage communications with the ICO, affected individuals, and in some cases the media.</p>
<p>
To read more, please <a href="https://sites-rpc.vuturevx.com/email_handler.aspx?sid=blankform&redirect=https%3a%2f%2fwww.computing.co.uk%2fctg%2fnews%2f3084903%2ftravelex-ransomware-attack">click here </a></p>
<p>
<strong>Possible new laws for internet connected devices </strong></p>
<p>
In May last year, the government announced plans to launch a consultation to ensure that internet connected devices, such as smart watches and home voice speakers, are better protected from cyber attacks. In latest news, the results of the consultation will apparently be published in the next month or so. It is said that the results will contain proposals for mandatory industry requirements that could lead to potential new regulation.</p>
<p>
To read more, please <a href="https://sites-rpc.vuturevx.com/email_handler.aspx?sid=blankform&redirect=https%3a%2f%2fwww.bloomberg.com%2fnews%2farticles%2f2020-01-15%2fsmart-speakers-uk-government">click here.</a></p>]]></content:encoded></item><item><guid isPermaLink="false">{1753E533-C396-406A-8F46-5722C24C573D}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/cyber-bytes-issue-5-2019/</link><title>Cyber_Bytes - Issue 5 2019</title><description><![CDATA[Welcome to Cyber_Bytes, a bi-weekly roundup of key developments in cyber, tech and evolving risks.]]></description><pubDate>Tue, 10 Dec 2019 11:30:00 Z</pubDate><category>Data and privacy</category><authors:names>Richard Breavington, Christopher Ashton, Rachel Ford</authors:names><content:encoded><![CDATA[<p><strong>Increased Investment in Cyber Protection</strong></p>
<p>A Financial Times special report indicated that, as data breaches and ransomware hacks escalate, cyber protection is becoming one of the fastest-growing insurance industry sectors. It is excepted to reach $15 billion by 2022. This follows various high-profile incidents, including the WannaCry and NotPetya ransomware variants two years ago, with businesses appreciating the importance of protection given the expensive costs associated with data breaches.</p>
<p>For the full article, please click <a href="https://www.pymnts.com/news/security-and-risk/2019/cyber-insurance-market-expected-to-reach-15b-by-2022/">here</a>.</p>
<p><strong>MoJ to develop cyber security log platform</strong></p>
<p>The Ministry of Justice is looking to develop a cyber security log platform.  It is aiming to develop a single, centralised store of logs that can be queried to help correlate information on attacks and track behaviour by cyber attackers.  This will support the MoJ's ongoing implementation of new policies, standards, guidelines and procedures aimed at strengthening its cyber security capabilities.</p>
<p>For the full article, please click <a href="https://www.ukauthority.com/articles/moj-to-develop-cyber-security-log-platform/?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+Ukauthoritycom+%28UKauthorITy.com+-+News+on+the+tech-enabled+transformation+of+frontline+public+service+delivery%29">here</a>.</p>
<p><strong>Serious Android vulnerability identified in top 500 most popular apps</strong></p>
<p>Promon, a leading Norwegian app security company, has identified evidence of a dangerous Android vulnerability, known as 'StrandHogg', which allows real-life malware to pose as legitimate apps. Hackers are able to listen to users through the microphone, read and send SMS messages and phish login credentials amongst other actions.</p>
<p>For the full articles, please click <a href="https://promon.co/security-news/strandhogg-press-release/">here</a> and <a href="https://promon.co/security-news/strandhogg/">here</a>.</p>
<p><strong>National Crime Agency seizes website which sold hacking tools</strong><br>
<br>
A website that sold hacking tools for as little as US$25 and which were responsible for infecting thousands of machines has been seized by law enforcements agencies. Nine people were arrested in the UK, fourteen arrests were made globally, and over 400 items related to the running of the website were seized.</p>
<p>For the full article, please click <a href="https://www.itpro.co.uk/security/trojans/354242/national-crime-agency-brings-down-prolific-trojan-marketplace">here</a>.</p>
<p><strong></strong><strong>Cyber-attack targets UK’s nuclear industry</strong></p>
<p><strong></strong>The National Cyber Security Centre has been providing assistance to a nuclear power company in the UK that has struggled to recover after falling victim of a cyber-attack. It is not yet known what damage the attack caused or whether it put public safety at risk.</p>
<p>For the full article, please click <a href="https://www.pressreader.com/uk/the-sunday-telegraph-money-business/20191201/281556587686878">here</a>.</p>
<p><strong></strong><strong>Berlin DPA imposes 14.5M euro GDPR fine to real estate company</strong></p>
<p>The Berlin Commissioner for Data Protection and Freedom of Information has fined a real estate company 14.5 million euros for the unlawful storage of old tenant data. The fine is related to audits in June 2017 and March 2019 which revealed improper data storage and retention.</p>
<p>For the full article, please click <a href="https://gdpr.report/news/2019/11/08/privacy-berlin-dpa-imposes-fine-in-the-millions-to-real-estate-company/">here</a>.</p>]]></content:encoded></item><item><guid isPermaLink="false">{C1F3D151-8F80-4B61-A7A7-E5FE0DBC8853}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/cyber-bytes-issue-4-2019/</link><title>Cyber_Bytes - Issue 4 2019</title><description><![CDATA[Welcome to Cyber_Bytes, a round up of key developments in cyber, tech and evolving risks over the last two weeks.]]></description><pubDate>Thu, 28 Nov 2019 14:07:00 Z</pubDate><category>Data and privacy</category><authors:names>Richard Breavington, Christopher Ashton, Rachel Ford</authors:names><content:encoded><![CDATA[<strong>Labour party hit by cyber attacks </strong><br>
<br>
Labour has been hit by two co-ordinated cyber-attacks through a distributed denial-of-service (<strong>DDoS</strong>) attack. As readers may be aware, a DDoS attack is designed to take a network offline by flooding it with a lot of requests from different areas. The party has said no data breach occurred. <br>
<br>
An AI company for cyber security, Darktrace, has commented <em>"really this is the tip of the iceberg in terms of the types of attacks that, not just the Labour Party, but all political parties are going to be without a doubt experiencing on a daily basis…"</em>.  <br>
<br>
Richard Breavington of RPC has also been quoted in the Financial Times, commenting<em> "perpetrators frequently attack when they expect organisations to be at their most busy and most stretched; as they are then most vulnerable, for political organisations it would be the election period"</em>.<br>
<br>
For the full articles, please click <a href="https://sites-rpc.vuturevx.com/e/dk0e6rc2hxbu2kq/0cf60f27-9d8a-4d04-bd7a-db0a387ded91" target="_blank">here</a> and <a href="https://sites-rpc.vuturevx.com/e/iuohkriroqoyma/0cf60f27-9d8a-4d04-bd7a-db0a387ded91" target="_blank">here</a>.<br>
<br>
<strong><br>
New figures published on business investment in cyber security</strong><br>
<br>
A software company, Specops Software, has published figures for the period 2018/2019 to see how serious businesses are about cyber security. The figures show that finance and insurance firms invested the most in cyber security, whilst firms in the hospitality and food sector invested the least. <br>
<br>
For the full article, please click <a href="https://sites-rpc.vuturevx.com/e/c0gawv6owodtxg/0cf60f27-9d8a-4d04-bd7a-db0a387ded91" target="_blank">here</a>.<br>
<br>
<br>
<strong>Report highlights lack of compliance with NIS regulations</strong><br>
<br>
A report has been published to uncover some of the latest trends in cybersecurity. The report highlights that 30% of businesses remain unaware of the NIS Regulations 2018, which set out a range of network and information security requirements for certain businesses. Out of the 70% businesses aware of the regulations, over a third had failed to implement the necessary changes in line with them and only 39% were confident that they were compliant in this area. <br>
<br>
Any businesses providing an online marketplace, online search engine or cloud computing service must comply with these regulations. It is therefore vital to be aware of them. <br>
<br>
To download the full report, please click <a href="https://sites-rpc.vuturevx.com/e/maea16ix0dpgbew/0cf60f27-9d8a-4d04-bd7a-db0a387ded91" target="_blank">here</a>.<br>
<br>
<br>
<strong>21-year-old Illinois man sentenced to prison for running multiple DDos-for-hire services</strong><br>
<br>
A man was sentenced last week to 13 months in prison for running multiple DDoS-for-hire services that launched millions of attacks over several years. In addition, he will forfeit $542,925 in proceeds from the attacks and the computer equipment that was used in them.<br>
<br>
For the full article, please click <a href="https://sites-rpc.vuturevx.com/e/l5eg7vckkb8xx9a/0cf60f27-9d8a-4d04-bd7a-db0a387ded91" target="_blank">here</a>.]]></content:encoded></item><item><guid isPermaLink="false">{79C326F8-0046-42A0-BF3A-29993B3407F2}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/no-deal-brexit-implications-for-data-and-privacy-law-compliance/</link><title>No Deal Brexit – implications for data and privacy law compliance</title><description><![CDATA[The Brexit rollercoaster ride continues.  At the time of writing, the UK and EU have just announced the agreement of a new withdrawal deal but there are serious doubts about whether it will be backed by Parliament. Despite the requirements of the Benn Act, the risk of the UK leaving the EU without a deal continues to be a concern.]]></description><pubDate>Thu, 17 Oct 2019 11:24:50 +0100</pubDate><category>Data and privacy</category><authors:names>Jon Bartley, Richard Breavington</authors:names><content:encoded><![CDATA[<p>As the government's posters and online adverts keep telling us, there are plenty of areas that businesses need to consider in order to get ready for Brexit.  In this article, we focus on the area of data protection, and summarise some of the key issues that will impact UK businesses if we were to crash out of the EU without any withdrawal agreement.<br>
<br>
<strong>1. Data Transfers to and from the UK</strong><br>
<br>
<span style="text-decoration: underline;">Data Transfers from the EEA to the UK</span><br>
<br>
Under GDPR, personal data may not be transferred by organisations in the European Economic Area<sup>1</sup> ("<strong>EEA</strong>") to recipients outside the EEA unless the organisation receiving the data is in one of the <a href="https://ec.europa.eu/info/law/law-topic/data-protection/international-dimension-data-protection/adequacy-decisions_en" target="_blank">13 countries</a> that have been deemed as "adequate" by the EU, an exemption applies or an approved mechanism, such as Standard Contractual Clauses ("<strong>SCC</strong>s"), has been implemented.  The prohibition applies both to transfers of data and also where EEA organisations permit access to their personal data e.g. allowing software maintenance providers remote access to an organisation's systems.<br>
<br>
If the UK leaves the EU without agreeing a withdrawal agreement (which would preserve the UK's "adequacy" for data transfer purposes during a transitional period), the UK will be a third country from the date of exit, and personal data flows between the EEA and the UK could be interrupted.  The UK may obtain an adequacy decision from the EU in due course, but it will take some time.  <br>
<br>
This will affect many businesses, such as:<br>
<br>
(i) UK companies that receive personal data from EEA customers (e.g. enterprise SaaS providers with UK hosting infrastructure);<br>
(ii) EEA companies that share data with UK affiliates; and<br>
(iii) EEA service providers that share personal data with processors located in the UK.<br>
<br>
Although there are exceptions that apply to the transfer restriction, most EEA organisations will look to implement SCCs with those UK organisations that they share personal data with.  The UK Information Commissioner ("<strong>ICO</strong>") has <a href="https://ico.org.uk/for-organisations/data-protection-and-brexit/data-protection-if-theres-no-brexit-deal/the-gdpr/international-data-transfers/" target="_blank">templates</a> and contract builder tools for both controller/controller and controller/processor transfers.<br>
<br>
<span style="text-decoration: underline;">Data Transfers from the UK to the EEA</span><br>
<br>
As the UK Government confirmed in its "No Deal Readiness Report"<sup>2</sup>  of 8th October, personal data transfers from the UK to the EEA will be uninterrupted in the event of a no-deal Brexit, as the government will recognise, at least for now, the adequacy of the EEA countries.  It will however keep this position under review. <br>
<br>
<span style="text-decoration: underline;">Data Transfers from the UK to Other Countries</span><br>
<br>
Following Brexit, although the EU GDPR will fall away, the UK government will preserve the UK's implementation of GDPR (through the Data Protection Act 2018) ("<strong>UK GDPR</strong>").  This will mean that, like today, personal data transfers to countries outside the UK will be restricted in the same way as under GDPR.  So, other than transfers to the EEA states (which are approved on a transitional basis) or to the thirteen countries approved by the EU (which the UK will continue to recognise as adequate), organisations will need to find exceptions or compliant mechanisms (such as the SCCs) to ensure their transfers are lawful.<br>
<br>
<span style="text-decoration: underline;">Data Transfers from non-EEA Countries to the UK</span><br>
<br>
In order for the thirteen white-listed countries to obtain and retain their adequacy status, they have to have restrictions on onward data transfers, so technically once the UK falls outside the EU, there could be an issue in relation to transfers from these countries to the UK. However, as confirmed in the No-Deal Readiness Report, twelve of the thirteen countries (all except Andorra) have taken steps to legitimise data transfers to the UK post-Brexit.<br>
<br>
In respect of transfers from other non-EEA countries to the UK, the ability to transfer personal data to the UK will continue to be subject to any local laws in the country from which the data is being sent.<br>
<br>
<span style="text-decoration: underline;">Privacy Shield in the US</span><br>
<br>
Many UK organisations rely on the bespoke EU-US deal for enabling trans-Atlantic data flows, the Privacy Shield, which effectively provides an adequacy decision for those US organisations who have self-certified under Privacy Shield.  UK organisations can continue to use Privacy Shield in the event of a No Deal Brexit, subject to ensuring that the receiving US organisation has updated its public commitments to include transfers from the UK, not just from the EU.<br>
<br>
<strong>2. Requirement for EU Representative</strong><br>
<br>
Broadly, GDPR applies to controllers and processors that:<br>
<br>
(i) process personal data in the context of an establishment in the EU; or<br>
(ii) although not established in the EU, process personal data of individuals in the EU where the processing activities are related to offering goods or services to those data subjects or the monitoring of their behaviour.   <br>
<br>
GDPR also requires that controllers and processors who fall into category (ii) appoint a representative in one of the EU member states where the relevant data subjects are located.  For UK businesses that offer goods or services to customers in the EU, but do not have establishments in the EU, they will have to find an independent representative in the EU that can liaise with data subjects and supervisory authorities in the EU.  Using a company's Data Protection Officer for this role is not permissible.  <br>
We have had a number of queries from clients asking for recommendations, particularly for companies offering representative services in Ireland.  Our understanding is that the market in the EU for these services is nascent, and it is not a simple task to find a representative.  This may have something to do with the fact that the European Data Protection Board issued an opinion stating that representatives would potentially be liable for GDPR breaches by the companies they represent.<br>
<br>
<strong>3. Removal of the One Stop Shop</strong><br>
<br>
Under GDPR, where there is cross-border processing of personal data, notification of a personal data breach needs to be made to the lead supervisory authority.  This will ultimately be the place where the decisions on the purposes and means of the processing of personal data are taken. This 'one stop shop' approach means that it should in principle only be necessary to deal with one supervisory authority about a personal data breach that affects data subjects in various EU states.<br>
<br>
This has meant that in practice for UK data controllers taking decisions about the means and processing of personal data in the UK, they should be able just to deal with the ICO as the lead supervisory authority, even if the breach affects data subjects from other EU states.<br>
<br>
Once the UK is no longer in the EU, UK data controllers will no longer be able to take advantage of this one-stop shop approach.  To the extent that the GDPR applies, for example on the basis that goods or services are being offered to data subjects within various EU states, it might be necessary to notify more than one supervisory authority of a breach. <br>
<br>
<strong>4. Dual Compliance Requirement</strong><br>
<br>
For those UK businesses that also have operations, or sell to customers, in the EU, post-Brexit they will have to comply both with the EU GDPR (and any member state nuances in their implementation of GDPR), and also with the UK GDPR.  Going forwards, if there is divergence between the two, this will potentially lead to a compliance headache for UK businesses.<br>
<br>
<strong>5. Review and Update Documentation</strong><br>
<br>
In addition to the above issues, UK organisations will need to review their privacy documentation, such as Privacy Notices, contracts and internal policies, to reflect the UK's new position, the different legislation references, and to explain the steps taken in relation to data transfers.<br>
<br>
No doubt the rollercoaster will continue over the next few weeks, and we hope for the most seamless and least disruptive outcome in all areas.  However, if you need any advice in the run-up to Brexit, or just need a sounding board on your arrangements, please do get in touch.</p>
<p> </p>
<p><sup><em>1</em></sup><em> EU plus Iceland, Norway and Lichtenstein.<br>
<sup>2</sup> <a href="https://www.gov.uk/government/publications/no-deal-readiness-report" target="_blank">https://www.gov.uk/government/publications/no-deal-readiness-report</a></em></p>]]></content:encoded></item><item><guid isPermaLink="false">{26CDDC1A-16F2-4639-961D-869360F718F1}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/pushing-back-on-app-scams/</link><title>Pushing back on APP scams</title><description><![CDATA[An Authorised Push Payment (APP) is where a payer instructs their payment service provider, such as their bank, to send money from their account to another. These payments are usually made through the Faster Payment Service or CHAPS.]]></description><pubDate>Thu, 18 Jul 2019 10:44:53 +0100</pubDate><category>Data and privacy</category><authors:names>Ian Dinning</authors:names><content:encoded><![CDATA[<h2>Introduction</h2>
<p>An Authorised Push Payment (APP) is where a payer instructs their payment service provider, such as their bank, to send money from their account to another. These payments are usually made through the Faster Payment Service or CHAPS.</p>
APP fraud is where a fraudster convinces a payer into making an APP to an account in the fraudster's control.  Usually the fraudster impersonates a third party that the victim is due to pay for a valid transaction, for example payment of an invoice.  They do this in a variety of ways, including intercepting invoices and amending the recipient bank details or emailing victims to purportedly notify of recent changes to bank details.  The scams are often sophisticated and convincing, with the victims not realising what has happened for some time.<br>
<br>
Once the payment is made, the fraudster will usually drain the account within hours.  The chances of tracing the funds, or the fraudster, are often slim to none.<br>
<br>
<a href="https://www.ukfinance.org.uk/system/files/Fraud the facts-Digital version August 2018.pdf" target="_blank">UK Finance</a> reported that in 2017, the total losses suffered from APP frauds was £236 million with 43,875 reported cases. <br>
<br>
If an individual has suffered an APP fraud, there are a couple of options, depending on the circumstances.  However, the first port of call should be contacting both the paying and recipient bank to see if the payment can be caught.  Previously, this had mixed results, with banks taking differing approaches and, in some cases, significant time to investigate.  Often they would refuse to refund the payment on the basis that the victim had purportedly consented to the transaction.<br>
<br>
<h2>The Code</h2>
As of 28 May 2019, eight banks (representing 17 brands<sup>1</sup>) have agreed to adhere to a voluntary code for victims of APP scams, the <a href="https://appcrmsteeringgroup.uk/wp-content/uploads/2019/02/APP-scams-Steering-Group-Final-CRM-Code.pdf" target="_blank">Contingent Reimbursement Model Code for Authorised Push Payment Scams</a> (the <strong>Code</strong>).<br>
<br>
The purpose of the Code is to deliver on a number of principles<sup>2</sup>, including:<br>
<br>
<ul>
    <li>Where a customer that has fallen victim to an APP scam did what was expected of them under the Code, then that customer will be reimbursed.</li>
    <br>
    <li>Where a bank has failed to meet the standards required of it under the Code for a payment journey resulting in an APP scam, and that customer should be reimbursed, that bank will meet all, or share the cost of, the reimbursement.</li>
    <br>
    <li>Where both sending and receiving banks have met the standards expected of them, and the customer also did everything that could be expected of them, then the customer will be reimbursed, with the cost of the reimbursement being met through a <em>"no-blame funding solution"</em>.</li>
    <br>
    <li>Where a customer disagrees with a decision not to reimburse them, that customer will be able to challenge the bank's decision by referring their case to the Financial Ombudsman Service.</li>
</ul>
<h2>Provisions</h2>
The Code has a number of provisions that require banks to detect, prevent and respond to APP scams in a more co-ordinated and customer friendly way. The Code covers both the sending and receiving bank.  Below is a summary of some of the key requirements in the Code.<br>
<br>
<em>Prevention </em><br>
<br>
The Code requires the banks to raise awareness, educate their customers and identify APP scam risks before they materialise. This includes the use of shared intelligence resources and appropriate due diligence when opening accounts<sup>3</sup> that are ultimately used to receive stolen funds.    <br>
<br>
Banks are required to take reasonable steps to make their customers aware of steps to take to reduce the risk of falling victim to APP scams and provide <em>"Effective Warnings"</em>, which should meet a minimum criteria as set out in the Code<sup>4</sup>, including that it is:<br>
<br>
<ul>
    i.<span style="white-space: pre;">	</span>Understandable – in plain language and meaningful to the customer;<br>
    ii.<span style="white-space: pre;">	</span>Clear – fair, clear and not misleading as set out in the FCA Principles for Businesses;<br>
    iii.<span style="white-space: pre;">	</span>Impactful – including the customer can reasonably understand that the consequences of continuing with an irrevocable payment;<br>
    iv.<span style="white-space: pre;">	</span>Timely – at the points most likely to have an impact on the customer's decision-making; and<br>
    v.<span style="white-space: pre;">	</span>Specific – tailored to the customer type and the APP scam risk identified by analytics. </ul>
    Where a bank has sufficient concern that a payment may be an APP scam, it should take appropriate action to delay the payment whilst it is investigated<sup>5</sup>. <br>
    <br>
    <em>Detection </em><br>
    <br>
    Banks are now required to take reasonable steps to identify customers and payment authorisations that run a higher risk of being associated with APP scams<sup>6</sup> and detect accounts that may be, or are being, used to receive APP scam funds, including the use of customer behaviour analytics<sup>7</sup>.<br>
    <br>
    <em>Response </em><br>
    <br>
    This area perhaps represents the biggest shift in how banks should treat APP scams going forward.<br>
    <br>
    The presumption is now that<em> "when a Customer has been the victim of an APP scam Firms should reimburse the Customer"</em> .  <br>
    <br>
    The exceptions to the above include<sup>9</sup>:<br>
    <br>
    <ul>
        i.<span style="white-space: pre;">	</span>The customer ignored the <em>"Effective Warnings"</em>; <br>
        ii.<span style="white-space: pre;">	</span>Where the customer is a micro-enterprise or charity, it did not follow its own internal procedures for approval; <br>
        iii.<span style="white-space: pre;">	</span>The customer has been <em>"grossly negligent"</em> (though there is no definition of what this is).   </ul>
        In another welcome step towards clarity, the Code requires a commitment to decide whether to reimburse the victim within 15 working days<sup>10</sup>.<br>
        <br>
        Finally, if the customer is unhappy with the way a bank has handled their complaint, they can refer it directly to the Financial Ombudsman Service who will undertake a review of the matter, notably whether or not their bank has signed up to the Code.  It remains to be seen whether the FOS will use the Code as a bench mark to measure all banks against.<br>
        <br>
        <h2>Summary</h2>
        In an increasingly technology-based financial sector, APP scams have been a scourge for customers.  Fraudsters are using increasingly sophisticated techniques and sometimes elaborate social-engineering to con people in to making payments.  A frequent source of frustration in these cases is often the time it takes for banks to respond, regardless of when they are notified of the payment.  As the intermediary of the payments, the banks are often also the best placed to identify and manage this risk.  The Code now recognises this and shifts the burden on to the banks to combat it using the resources available to them. 
        <p> </p>
        <p> </p>
        <p><sup><em>1</em></sup><em> Barclays, HSBC (including HSBC, First Direct, and M&S Bank); Lloyds Banking Group (including Lloyds Bank, Halifax, Bank of Scotland, and Intelligent Finance); Metro Bank; Nationwide; RBS (including Royal Bank of Scotland, Natwest, and Ulster Bank); Santander (including Santander, Cahoot, and Carter Allen); and Starling Bank.</em></p>
        <p><em><sup>2</sup> <a href="https://appcrmsteeringgroup.uk/wp-content/uploads/2019/02/APP-scams-Steering-Group-response-to-the-draft-CRM-code-consultation.pdf" target="_blank">https://appcrmsteeringgroup.uk/wp-content/uploads/2019/02/APP-scams-Steering-Group-response-to-the-draft-CRM-code-consultation.pdf</a></em></p>
        <p><em><sup>3</sup> SF2(1) <br>
        <br>
        <sup>4</sup> SF1(2)(e)<br>
        <br>
        <sup>5</sup> SF1(5)<br>
        <br>
        <sup>6</sup> SF1(1)<br>
        <br>
        <sup>7</sup> SF2(3)<br>
        <br>
        <sup>8</sup> R1<br>
        <br>
        <sup>9</sup> R2<br>
        <br>
        <sup>10</sup> R3(1)</em></p>
        <div> </div>
        <p> </p>
        <p> </p>]]></content:encoded></item><item><guid isPermaLink="false">{2E2968B0-4329-409B-94E7-2BEDA4AAB944}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/the-latest-cyber-stats-revealed-the-cyber-security-breaches-survey-2019/</link><title>The latest cyber stats revealed (the Cyber Security Breaches Survey 2019)</title><description><![CDATA[Whilst cyber attacks decrease, the threats to businesses remain. We give you the Cyber Security Breaches Survey 2019.  ]]></description><pubDate>Fri, 05 Apr 2019 17:22:22 +0100</pubDate><category>Data and privacy</category><authors:names>Rachel Ford</authors:names><content:encoded><![CDATA[<p>The survey, found <a href="https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/791940/Cyber_Security_Breaches_Survey_2019_-_Main_Report.PDF">here</a>, found that 98% of our UK businesses are dependent on online services. Whilst this is no surprise in a time where the typewriter is a distant memory, it highlights the key fact that almost all of UK businesses are susceptible to a cyber attack. </p>
<p>At the heart of the survey is the concern that as businesses move to become more data driven, they aren't fully protected against the associated risks.</p>
<p>It is not all doom and gloom. The survey found that the number of businesses identifying cyber attacks has dropped from 43% to 32% in the last year. This seems to be a positive effect of the General Data Protection Regulation (GDPR) which has prompted a number of businesses to review their approach to cyber security procedures, with 30% having made changes as a result, although it is recognised that changes in the focus and vector of attacks could also explain the change.</p>
<p>The picture wasn't as bright for medium and large businesses, however, which saw almost twice that incidence of breaches and attacks. That being said, this still represents a reduction on the previous year.</p>
<p>Another reassuring fact is that 88% of businesses have now heard of the GDPR, a stark increase compared with the previous year where the figure stood at 38%. This has not led to a significant increase in breach preparedness, however, with just 16% of businesses having put formal cyber security incident management processes in place. That could have a detrimental impact on their ability to promptly and effectively contain and manage an attack.</p>
<p>Coupled with this is the concern that there is clearly a gap in the level of cyber insurance being purchased by businesses to combat cyber crime. Although the costs associated with cyber security breaches have continually increased since 2017, the survey found that only 11% of UK businesses have purchased cyber insurance, leaving a concerning 89% without cover in the event of a cyber attack. Whilst the figures show that generally more UK businesses are taking out cyber insurance, there remains the stark concern that cyber insurance is not in place for the large majority of them, and that businesses could have to absorb the costs associated with handling the breach itself. This would include legal, PR, credit monitoring, and forensic IT advice, as well as business disruption, and any ensuing litigation with suppliers and compensation claims from affected individuals.</p>
<p>Where businesses had taken out cyber insurance, the survey found their key reason for doing so was to gain access to the breach response services written into most cyber policies or due to the influence of the broker. Where cyber insurance had not been purchased, the reasons for this were that the businesses (a) already had external cyber security providers, (b) didn’t even know that cyber insurance existed, or (c) considered themselves too low of a risk to warrant purchasing the insurance. </p>
<p>Further interesting statistics from the survey are that the most common type of attacks were found to be phishing attacks – through fraudulent emails or being directed to fraudulent websites – and that the most common impact on businesses was loss of access to files or networks, software or systems damage and website disruption.</p>
<p> Although the statistics are a helpful insight into the ways businesses are combatting cyber crime, there remains a number of areas in which businesses could step up their preparations for the inevitable attack, including preparing breach response plans and taking out cyber insurance which offers breach response services. In a world where we are all so dependent on online services, the problem simply cannot be ignored. </p>]]></content:encoded></item><item><guid isPermaLink="false">{81131994-3FEE-4AD8-8CCF-EAAA97B2BF62}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/seeking-the-right-regulation-of-digital-services/</link><title>Seeking the "right regulation" of digital services: Lords' Communications Committee articulates its vision</title><description><![CDATA[In 2018, Mark Zuckerberg, Facebook's CEO, told the US Senate Judiciary Committee that the question was no longer whether there should be regulation of the internet, but what is the right regulation. ]]></description><pubDate>Mon, 11 Mar 2019 12:53:36 Z</pubDate><category>Data and privacy</category><authors:names></authors:names><content:encoded><![CDATA[<p style="margin: 0cm 0cm 12pt;">In advance of the highly anticipated publication of the government White Paper on 'Online harms', which the Secretary of State for Culture, Media and Sport has indicated will set out legislative measures to ensure social media platforms protect their users from a range of online harms, including online hate speech, on Saturday 09th March 2019 the House of Lords' Communications Committee published its report <a href="https://publications.parliament.uk/pa/ld201719/ldselect/ldcomuni/299/299.pdf"><span style="text-decoration: underline;">'Regulating in a digital world'</span></a>. We doubt that Mr Zuckerberg will think that this is one of the occasions when the Europeans have got it all right… </p>
<p style="margin: 0cm 0cm 12pt;">Overall, the Committee's recommendations appear to go further than what we anticipate the government will put forward as part of its White Paper, and include a number of high level aims which demonstrate little apparent thought to how they might be implemented or the impact this would have on the provision of services or the experience of users. We wait to see whether the government adopts any of the Committee's recommendations as part of its proposals, and comment on some of the Committee's key recommendations below.</p>
<p style="margin: 0cm 0cm 12pt;">In summary, relying on the Cambridge Analytica scandal, online hate speech directed toward female MPs, the suicide of Molly Russell, and media reports of the sexual activities of the celebrity referred to as 'PJS', as well as what it perceived as challenges posed to competition, media pluralism, privacy, consumer protection, and common decency, the Committee sets out a radical vision to govern the online space, drawing heavily from principles contained within the GDPR, and advocating certain key proposals including: </p>
<ul style="list-style-type: disc;">
    <li style="color: rgb(0, 0, 0);">
    <p style="color: rgb(0, 0, 0); margin-top: 0cm; margin-bottom: 0pt;">the creation of a new over-arching super-regulator, the Orwellian-sounding Digital Authority, to oversee and instruct existing regulators in the area; </p>
    </li>
    <li style="color: rgb(0, 0, 0);">
    <p style="color: rgb(0, 0, 0); margin-top: 0cm; margin-bottom: 0pt;">the regulation of user services, including search engines, marketplaces, social media, gaming and content-sharing platforms, using a system of principles-based regulation; </p>
    </li>
    <li style="color: rgb(0, 0, 0);">
    <p style="color: rgb(0, 0, 0); margin-top: 0cm; margin-bottom: 0pt;">the withdrawal of the safe-harbour provisions in the E-Commerce Directive, while the Committee rejected the imposition of strict liability; </p>
    </li>
    <li style="color: rgb(0, 0, 0);">
    <p style="color: rgb(0, 0, 0); margin-top: 0cm; margin-bottom: 0pt;">increased transparency obligations toward users, regulators, and the public, with clearer terms and conditions, and what is effectively an enhanced subject access regime in relation to the use of algorithms and created behavioural data; </p>
    </li>
    <li style="color: rgb(0, 0, 0);">
    <p style="color: rgb(0, 0, 0); margin-top: 0cm; margin-bottom: 0pt;">enhanced regulation of algorithms by the Information Commissioner's Office, which should create a code of conduct; </p>
    </li>
    <li style="color: rgb(0, 0, 0);">
    <p style="color: rgb(0, 0, 0); margin-top: 0cm; margin-bottom: 0pt;">a requirement for maximum privacy and safety settings to be imposed by default; </p>
    </li>
    <li style="color: rgb(0, 0, 0);">
    <p style="color: rgb(0, 0, 0); margin-top: 0cm; margin-bottom: 0pt;">a stricter competition law regime, to focus on the impact of the accumulation of data with a new public interest test;<span>  </span></p>
    </li>
    <li style="color: rgb(0, 0, 0);">
    <p style="color: rgb(0, 0, 0); margin-top: 0cm; margin-bottom: 0pt;">an enhanced right of data portability, to be enforced by way of the regulation of interoperability; </p>
    </li>
    <li style="color: rgb(0, 0, 0);">
    <p style="color: rgb(0, 0, 0); margin-top: 0cm; margin-bottom: 0pt;">the imposition of a duty of care on online services which host and curate content which can openly be uploaded and accessed by the public, to be upheld by a regulator with powers of enforcement; </p>
    </li>
    <li style="color: rgb(0, 0, 0);">
    <p style="color: rgb(0, 0, 0); margin-top: 0cm; margin-bottom: 0pt;">greater investment in moderation by online services, with Ofcom to adjudicate upon appeals; </p>
    </li>
    <li style="color: rgb(0, 0, 0);">
    <p style="color: rgb(0, 0, 0); margin-top: 0cm; margin-bottom: 0pt;">regulation of online services' compliance with their terms of use and the power to impose fines for failure to comply; </p>
    </li>
    <li style="color: rgb(0, 0, 0);">
    <p style="color: rgb(0, 0, 0); margin-top: 0cm; margin-bottom: 0pt;">increased powers for the ICO, CMA and Ofcom; and, </p>
    </li>
    <li style="color: rgb(0, 0, 0);">
    <p style="color: rgb(0, 0, 0); margin-top: 0cm; margin-bottom: 0pt;">the imposition of a classification system, similar to the BBFC, for websites, consistent with the platform's age policy. </p>
    <p style="color: rgb(0, 0, 0); margin-top: 0cm; margin-bottom: 12pt;">Many of the proposals present challenges to established principles and lack detail as to their practical implementation. </p>
    </li>
</ul>
<p style="margin: 0cm 0cm 12pt;">Many of the proposals present challenges to established principles and lack detail as to their practical implementation. </p>
<p style="margin: 0cm 0cm 12pt;">While the proposals are intended to ensure that unlawful conduct is treated consistently whether it takes place online or offline, and there is a professed commitment not to stifle free speech or lead to unjustified censorship, they extend far beyond the regulation of what is unlawful and trespass on what is deemed to be harmful or anti-social. The proposals would thereby impose more stringent restrictions on the online space than would apply in other forums for public discourse, potentially threatening an undue restriction on freedom of expression. The lack of any attempt to articulate what constitutes an 'online harm' also serves to increase the risk of mission creep. It is  objectionable to put online service providers in the position of legal adjudicators, with the threat of sanction if they are deemed not to be delivering in that role in the desired manner.</p>
<p style="margin: 0cm 0cm 12pt;">While any attempt to achieve a comprehensive system of regulation with clarity around the powers of regulators may be welcomed by some, the imposition of such a broad range of new controls in one fell swoop would present significant challenges, and risks having a disproportionate impact which may be difficult to reverse. </p>
<p style="margin: 0cm 0cm 12pt;">By proposing to regulate the terms and conditions of user services, apparently without seeking to set minimum standards, the Committee risks subjecting the most responsible platforms to the greatest regulation by virtue of seeking to enforce their terms and conditions.</p>
<p style="margin: 0cm 0cm 12pt;"><strong>Background </strong></p>
<p style="margin: 0cm 0cm 12pt;">In January 2018, the Government published its <a href="https://www.gov.uk/government/publications/digital-charter/digital-charter"><span style="text-decoration: underline;">Digital Charter</span></a>, a rolling programme of work to establish "norms and rules" online guided by the principles that: (i) the internet should be free, open and accessible; (ii) people should understand the rules that apply to them when they are online; (iii) personal data should be respected and used appropriately; (iv) protections should be in place to help keep people safe online, especially children; (v) the same rights that people have offline must be protected online; and, (vi) the social and economic benefits brought by new technologies should be fairly shared. The Charter identified the government's priorities as including protecting people from harmful content and behaviour, the legal liability of online platforms, and data and artificial intelligence. </p>
<p style="margin: 0cm 0cm 12pt;">The government subsequently published its <a href="https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/708873/Government_Response_to_the_Internet_Safety_Strategy_Green_Paper_-_Final.pdf"><span style="text-decoration: underline;">response to the Internet Safety Strategy green paper</span></a>, which reiterated its commitment to the principles of ensuring that what is unacceptable offline should be unacceptable online, that all users are empowered to manage online risks and stay safe, and tech companies have a responsibility to their users and for the content they host. Despite Google, Twitter and Facebook stating that they would work with Government to establish a social media code of practice and transparency reporting, the government announced that new laws would be created to <em>"make sure the UK is the safest place in the world to be online" </em>and committed to the publication of the forthcoming online harms white paper, which it is anticipated will address a number of topics covered by the Committee's report, including age verification for social media companies. </p>
<p style="margin: 0cm 0cm 12pt;"><strong>Regulation</strong></p>
<p style="margin: 0cm 0cm 12pt;">The Lords' Committee posited that existing law and regulation affecting the provision and use of digital services was piecemeal and inadequate, being governed by the Information Commissioner's Office, Ofcom, and the Competition and Markets Authority and affected by the GDPR, DPA 2018, law of misuse of private information, breach of confidence, E-Commerce Directive, Computer Misuse Act 1990, and the Malicious Communications Act 1988 <em>inter alia</em>.</p>
<p style="margin: 0cm 0cm 12pt;">The Lords Committee proposes the creation of an overarching super-regulator, the Orwellian-sounding 'Digital Authority', which would not only co-ordinate non-statutory organisations and existing regulators but have over-arching powers in relation to the latter. </p>
<p style="margin: 0cm 0cm 12pt;">In concert, a new joint select committee is proposed, the remit of which would cover all matters related to the digital world and which would specifically oversee the Digital Authority, <em>"to create a strong role for Parliament in the regulation of the digital world"</em>. </p>
<p style="color: rgb(0, 0, 0);"> <span>It is proposed that this and all other regulators would be governed by a commitment to 10 key principles, many of which appear to be drawn from the obligations imposed under the General Data Protection Regulation and the Data Protection Act 2018: </span></p>
<ol style="list-style-type: decimal;">
    <li style="color: rgb(0, 0, 0);">
    <p style="color: rgb(0, 0, 0); margin-top: 0cm; margin-bottom: 0pt;">Parity</p>
    </li>
    <li style="color: rgb(0, 0, 0);">
    <p style="color: rgb(0, 0, 0); margin-top: 0cm; margin-bottom: 0pt;">Accountability</p>
    </li>
    <li style="color: rgb(0, 0, 0);">
    <p style="color: rgb(0, 0, 0); margin-top: 0cm; margin-bottom: 0pt;">Transparency</p>
    </li>
    <li style="color: rgb(0, 0, 0);">
    <p style="color: rgb(0, 0, 0); margin-top: 0cm; margin-bottom: 0pt;">Openness</p>
    </li>
    <li style="color: rgb(0, 0, 0);">
    <p style="color: rgb(0, 0, 0); margin-top: 0cm; margin-bottom: 0pt;">Privacy</p>
    </li>
    <li style="color: rgb(0, 0, 0);">
    <p style="color: rgb(0, 0, 0); margin-top: 0cm; margin-bottom: 0pt;">Ethical design</p>
    </li>
    <li style="color: rgb(0, 0, 0);">
    <p style="color: rgb(0, 0, 0); margin-top: 0cm; margin-bottom: 0pt;">Recognition of childhood</p>
    </li>
    <li style="color: rgb(0, 0, 0);">
    <p style="color: rgb(0, 0, 0); margin-top: 0cm; margin-bottom: 0pt;">Respect for human rights and equality</p>
    </li>
    <li style="color: rgb(0, 0, 0);">
    <p style="color: rgb(0, 0, 0); margin-top: 0cm; margin-bottom: 0pt;">Education and awareness raising</p>
    </li>
    <li style="color: rgb(0, 0, 0);">
    <p style="color: rgb(0, 0, 0); margin-top: 0cm; margin-bottom: 0pt;">Democratic accountability, proportionality and evidence-based approach</p>
    </li>
</ol>
<p style="margin: 0cm 0cm 12pt;">The principle of parity was illustrated with the example that social media platforms should face the same obligations in relation to the imposition of age-based access restrictions as providers of online pornography. Such an approach would appear to fail to take account of the risk associated with any given online service and instead result in the imposition of the strongest restrictions on all services. It is not clear, therefore, how the Committee envisages the principle of parity would interact with that of proportionality. </p>
<p style="margin: 0cm 0cm 12pt;"><strong>Liability of social media platforms </strong></p>
<p style="margin: 0cm 0cm 12pt;">In a bold rejection of the protections afforded to online intermediaries by the E-Commerce Directive 2000/31/EC, which recognises that platforms ought not to be required to proactively monitor content and that information society services which are a <em>"mere conduit"</em> or are simply involved in <em>"caching"</em> content ought not to be held responsible for unlawful content and those services which are <em>"hosting"</em> unlawful content ought not to be held responsible for content of which they are not on notice or - once on notice - have acted expeditiously to remove, the Lords Committee considered that the hosting and curation of content which can be uploaded and accessed by the public meant that a notice and takedown model was no longer appropriate. The Committee recommends revising or replacing the protections, but rejected the imposition of strict liability. It is not clear what the Committee envisages would be an appropriate standard, but it may be that specific timescales for responding to notice and takedowns coupled with its proposals for the enforcement of terms and conditions would be sufficient. The Committee referenced the Australian model in this regard, and the powers of the Office of the e-Safety Commissioner to resolve complaints. </p>
<p style="margin: 0cm 0cm 12pt;"><strong>Obligations of social media platforms</strong></p>
<p style="margin: 0cm 0cm 12pt;">Arguing that the moderation processes employed by social media platforms <em>"are unacceptably opaque and slow"</em>, the Lords Committee recommends that online services hosting UGC <em>"should be subject to a statutory duty of care and that Ofcom should have responsibility for enforcing this duty of care, particularly in respect of children and the vulnerable in society"</em>, which should incorporate moderation services and an obligation to achieve safety by design. The Committee did not accept the evidence calling for external adjudications of complaints or even judicial review of online moderation. Although the Committee does not seek to articulate the scope of the duty, in February the Children's Commissioner published a <a href="https://www.childrenscommissioner.gov.uk/wp-content/uploads/2019/02/cco-duty-of-care-owed-by-online-service-providers-to-children.pdf"><span style="text-decoration: underline;">draft statutory duty of care</span></a> proposed to be applicable to any online service provider which proposes a duty to <em>"take all reasonable and proportionate care to protect [anyone under the age of 18] from any reasonably foreseeable Harm"</em>, which is defined as <em>"a detrimental impact on the physical, mental, psychological, educational or emotional health, development or wellbeing" of children, </em>and from which liability for the acts of third parties can only be avoided if the provider has done<em> "all it reasonably can to prevent Harm". </em>The factors by which the discharge of the duty should be determined, such as the speed of responding to complaints (legitimate or otherwise), are not proposed to be limited to their application to children, and would therefore have the effect of imposing wider obligations vis-à-vis all users of the service regardless of impact. The imposition of a duty of care to the provision and operation of online services would significantly extend the<em> </em>circumstances in which such a duty has been imposed by law, impacting not only on the acts of online service providers but also on their omissions, as well as imposing liability on a blanket basis regardless of whether that would appear to be fair and just in the circumstances of a given case.</p>
<p style="margin: 0cm 0cm 12pt;"><strong>Competition</strong></p>
<p style="margin: 0cm 0cm 12pt;">Concerned about the impact of the creation of data monopolies and the consequences for consumer protection, and (perhaps surprisingly) comparing online service providers to utility providers, the Committee recommended that the consumer welfare test needs to be broadened to move away from a focus on consumption and price and that a public interest test should be applied to data-driven mergers. <span> </span>One could envisage that this could encapsulate privacy, protection of democracy, and media pluralism issues, and could even lead to conditions under these heads being imposed on any approved merger. </p>
<p style="margin: 0cm 0cm 12pt;"><strong>Algorithms</strong></p>
<p style="margin: 0cm 0cm 12pt;">Despite the ability of users to request information regarding whether their personal data has been processed by automated means and the logic behind such processing, the design and transparency of algorithms was of particular concern to the Committee. </p>
<p style="margin: 0cm 0cm 12pt;">In an example of a differentiation between acceptable conduct online and offline, the Committee disapproved of the use of technology to take advantage of psychological insights to manipulate user behaviour, for example to encourage time spent using a service. While psychological insights have long been a tool utilised by the retail sector, for example, and even the government itself with David Cameron's 'nudge unit', the Committee suggested that ethical design required that <em>"individuals should not be manipulated but free to use the internet purposefully”</em>. The Committee recommended that the ICO should not only produce a code of conduct on the design and use of algorithms, potentially working with the Centre for Data Ethics and Innovation to establish a kitemark scheme, but also suggested that it should have powers of audit and that its powers should be supported by sanctions. </p>
<p style="margin: 0cm 0cm 12pt;">The Committee also recommended that greater transparency around the use of algorithms and the data generated be achieved by requiring service providers to publish information about the data being generated and its use, as well as by affording users an enhanced right of subject access. The Committee proposed that the former be applicable to both data controllers and data processors, although it would only seem appropriate to apply any such obligation to data controllers. </p>
<p style="margin: 0cm 0cm 12pt;"><strong>Terms and conditions </strong></p>
<p style="margin: 0cm 0cm 12pt;">The transparency, fairness and age appropriateness of terms and conditions was also a key focus for the Committee and, given what it considered to be the imbalance of power between users and service providers, the Committee suggested that these should be subject to regulatory oversight with any service provider which breached its terms of service being subject to enforcement. This would not appear to incentivise service providers to provide gold standard service commitments for fear of being penalised for failing to meet them and could result in a lower common standard. </p>
<p style="margin: 0cm 0cm 12pt;"><strong>Conclusion</strong></p>
<p style="margin: 0cm 0cm 12pt;">While many of the Committee's proposals are likely to be lauded in some quarters, the practicality of designing and implementing them, and the impact they would have on the majority of users and the provision of services, means that they warrant at least further scrutiny, if not revision or rejection, if the government is to achieve the <em>"right regulation"</em>. </p>]]></content:encoded></item><item><guid isPermaLink="false">{0DAE5D45-C00A-45A1-A98B-ADBCDCFC8C2E}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/love-or-hate-data/</link><title>Love (or hate) Data?</title><description><![CDATA[Personal Data and Special Category Personal Data – what has changed?<br/><br/>"The course of true love never did run smooth"<br/>- Shakespeare, W., A Midsummer Night's Dream<br/><br/>The definition of personal data is obviously fundamental to the General Data Protection Regulation (GDPR). When considering data protection, your first question should always be – 'is this data personal data?' <br/>]]></description><pubDate>Thu, 21 Feb 2019 16:01:01 Z</pubDate><category>Data and privacy</category><authors:names>Charles Buckworth, Jonathan Greenway</authors:names><content:encoded><![CDATA[<p><strong><em>"The course of true love never did run smooth" <br>
- Shakespeare, W., A Midsummer Night's Dream</em></strong></p>
<p>The definition of personal data is obviously fundamental to the General Data Protection Regulation (<strong>GDPR</strong>). When considering data protection, your first question should always be – 'is this data <em>personal data</em>?' If it is not, the GDPR will not apply. Once you've determined that the data is personal data, you can assess whether the information is special category personal data, which is subject to increased protections. </p>
<p><strong>Personal data – definition <br>
</strong><br>
Personal data is defined at Article 4(1) GDPR as: (i) any information; (ii) relating to; (iii) an identified or identifiable; (iv) natural person.</p>
<p>Taking each part of that definition in turn:</p>
<p>(i) <strong>any information</strong> means just that. The information can be objective or subjective. The content and format of the information is irrelevant. It can be any sort of information, available in any recorded medium (including, for example, sound and video recordings). </p>
<p>(ii) <strong>relating to</strong> means that one or more of the following three elements should be present:</p>
<ul>
    <li>
    <p><strong>Content</strong> – the information given is about a particular person, regardless of the purpose of the data controller or any third party, or the impact of that information on the data subject. </p>
    </li>
    <li>
    <p><strong>Purpose</strong> – the data is used, or is likely to be used, to evaluate, treat in a certain way or influence the status or behaviour of an individual. </p>
    </li>
    <li>
    <p><strong>Result </strong>– the use of the data is likely to have an impact on a person's rights and interests</p>
    </li>
</ul>
<p>Information may relate to an individual even if it does not focus on him or her.</p>
<p>(iii) an <strong>identified</strong> or<strong> identifiable</strong> – the GDPR provides that an identifiable person is one who can be identified, in particular by reference to an identifier such as name; ID number; location data; online identifier; or one or more factors specific to a person's physical; psychological; genetic; mental; economic; cultural; or social identity.</p>
<p>Location data, online identifiers (such as an IP address), and genetic factors are new with the GDPR.<br>
<br>
Identifiers can be direct, eg a name, or indirect, eg a social security ID. Whether an identifier is sufficient to identify someone will depend on the circumstances of the case. For example, 'the woman in the black suit', may be sufficient to identify someone out of the passers-by standing at a traffic crossing, but possibly not in a crowded court-room or the House of Commons.<br>
<br>
Indirect identification usually involves 'unique combinations', either large or small in size. Some are clear (eg the Prime Minister of Spain) but a combination of details on categorical level may also be sufficient (eg age category, regional origin etc).<br>
<br>
When assessing 'identifiability', account should be taken of all the means reasonably likely to be used to identify someone from the data (by anyone, not just by the controller). This is considered in the round, including with reference to the purpose of the processing.</p>
<p>(iv) <strong>natural person</strong> means living human beings.</p>
<p><strong>Special category personal data – definition</strong><br>
<br>
Once you know that you're dealing with personal data, the next question is whether it is 'special category' personal data. This was previously known as 'sensitive personal data'.<br>
<br>
Special category personal data means personal data revealing racial or ethnic origin, political opinions, religious or philosophical beliefs, or trade union membership, and includes the processing of genetic data, biometric data for the purpose of uniquely identifying a natural person, data concerning health or data concerning a natural person's sex life or sexual orientation.<br>
<br>
Genetic data (eg a person's gene sequence) and biometric data (eg facial images or fingerprints) are new inclusions for this category.<br>
<br>
The processing of personal data relating to criminal convictions has its own section, and is subject to similarly strict requirements as those applicable to special category data (eg processing will be lawful if it is necessary for the administration of justice, or the safeguarding of children provided certain requirements are met).<br>
<strong><br>
What has changed from the previous regime?</strong><br>
<br>
The short answer is, not much. The GDPR definition of personal data is broadly the same as that in the old Data Protection Directive and the UK Data Protection Act. However, there are a few important additions which at the very least serve as clarifications on the existing law.<br>
<br>
Some businesses, in particular many in the tech and retail sectors, may face additional compliance obligations due to the GDPR's express reference to 'location data', 'online identifiers', 'genetic data', and 'biometric data' (for special category personal data).  Many types of cookies (in their capacity as 'online identifiers') will be now explicitly become personal data.<br>
<br>
Although the definitions are largely unchanged, businesses will need to contend with a range of new and enhanced obligations in relation to the personal data they process – which we will explore in later editions of Love Data.</p>]]></content:encoded></item><item><guid isPermaLink="false">{7AF2DE1A-24F5-438D-A039-D3500BC8EA15}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/happy-valentines-day-from-rpc-love-or-hate-data/</link><title>Happy Valentine's Day from RPC: Love (or hate) data? </title><description><![CDATA[So it is that time of year again.  Love is in the air - roses, prosecco (if you're lucky, champagne), chocolates (in boxes covered in sickly hearts as though a heart surgeon has gone serial killer – yes, we're big fans of Luther). ]]></description><pubDate>Thu, 14 Feb 2019 14:14:17 Z</pubDate><category>Data and privacy</category><authors:names>Charles Buckworth</authors:names><content:encoded><![CDATA[<p>Have you prepared?  Everywhere is booked up.  Panicked other halves are fighting over the last box of chocolates in the corner shop (you are going for [insert unfavoured brand of chocolates which we have been forced to redact]?  Seriously?). And wondering whether that restaurant reservation at 10pm (nothing earlier) gives the game away that you had totally forgotten about it.…   </p>
<p>So you arrive for your reservation to be confronted with more enforced romance. The tables of those long timers (who we all secretly envy); those who would rather avoid one another but have run out of excuses (and conversation); the couples who managed to get a baby sitter and are knocking back the wine in celebration and then there's the dates.  Don’t you love those "few dates in daters" for whom overthinking the prospect of spending the evening alone (yet again) prompted them to awkwardly blurt out an invitation to their latest Bumble match. And then we have to spare a thought for the single people. Have they been furiously swiping to try to fill that hole in their life but without success?  Will they drink their sorrows away or celebrate the endless opportunities of singledom? Or do they do a Bridget Jones, hibernate, eat ice cream and watch a rom com?</p>
<p>However you'll be celebrating or commiserating this glorious anniversary of romance - and we speak on behalf of all at RPC in wishing you the happiest of Valentine's Days – we wanted to remind you of one potential true love which is available to all.  Now we say "potential" as we know that after the implementation of GDPR your relationship with data may be going through a rocky patch.  For some of you it may just never recover.  But the reality is you're still going to have to see it every day, so whether you are a lover or a hater, in typical RPC style we want to make your loving (or loathing) that bit easier. Over the next 12 months we will be issuing a data protection toolkit, addressing a fresh topic each month, which will hopefully ensure that by the time you reassess your relationship with data this time next year, if you're not head over heels, you will at least be able to stand the sight of it. Our first is a fitting start – it's on the meaning of personal data and will be released (to build up the tension) very shortly. </p>
<p>And, of course, over the next twelve months if you need relationship counselling then please do contact us and we are always more than happy to help.  And when we say relationship counselling we mean "data relationship counselling"… trust us when we say you wouldn't want relationship counselling from us.</p>
<ul style="list-style-type: disc;">
</ul>]]></content:encoded></item><item><guid isPermaLink="false">{EF75E3BA-B57F-42B6-A77F-702DD5A7CFEA}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/gdpr-and-the-data-protection-act-2018/</link><title>GDPR and the Data Protection Act 2018 – how do they impact publishers?</title><description><![CDATA[The need for publishers to ensure that their processing of personal data complies with the law is more important than ever.  ]]></description><pubDate>Fri, 25 May 2018 15:50:32 +0100</pubDate><category>Data and privacy</category><authors:names>Rupert Cowper-Coles </authors:names><content:encoded><![CDATA[<p style="margin: 0cm 0cm 0pt; text-align: justify;">The EU's <a href="https://eur-lex.europa.eu/legal-content/EN/TXT/HTML/?uri=CELEX:32016R0679&from=EN"><span style="text-decoration: underline;">General Data Protection Regulation EU/2016/679</span></a> comes into force today, hopefully bringing to an end the wave of privacy notices that have been flooding inboxes over the last few weeks. With somewhat less attention, Parliament has supplemented the GDPR in domestic law by enacting the <a href="http://www.legislation.gov.uk/ukpga/2018/12/pdfs/ukpga_20180012_en.pdf"><span style="text-decoration: underline;">Data Protection Act 2018</span></a>, which received Royal Assent only on Wednesday 23 May 2018. The statute, which clarifies and supplements the GDPR, replaces the <a href="https://www.legislation.gov.uk/ukpga/1998/29/contents"><span style="text-decoration: underline;">Data Protection Act 1998</span></a> as the new statutory framework governing personal data in this country.</p>
<p style="margin: 0cm 0cm 0pt; text-align: justify;"> </p>
<p style="margin: 0cm 0cm 0pt; text-align: justify;">Media lawyers and journalists might feel a degree of trepidation at this news. The Data Protection Act 1998 has become a mainstay of media disputes, with its importance and impact increasingly felt by publishers. So what changes do the traditional media publishers, online platforms and journalists face under the new 2018 Act?<span>  </span></p>
<p style="margin: 0cm 0cm 0pt; text-align: justify;"> </p>
<p style="margin: 0cm 0cm 0pt; text-align: justify;">In short: </p>
<p style="margin: 0cm 0cm 0pt; text-align: justify;"> </p>
<ul style="list-style-type: disc;">
    <li style="color: rgb(0, 0, 0);">
    <p style="text-align: justify; color: rgb(0, 0, 0); margin-top: 0cm; margin-bottom: 0pt;">The journalism exemption at s.32(1) Data Protection Act 1998 has been reproduced and its application expanded in the Data Protection Act 2018 at Schedule 2, Part 5 para.26.</p>
    </li>
    <li style="color: rgb(0, 0, 0);">
    <p style="text-align: justify; color: rgb(0, 0, 0); margin-top: 0cm; margin-bottom: 0pt;">The statutory stay procedure at s.32(4) Data Protection Act 1998 has been reproduced in similar terms at s176.</p>
    </li>
    <li style="color: rgb(0, 0, 0);">
    <p style="text-align: justify; color: rgb(0, 0, 0); margin-top: 0cm; margin-bottom: 0pt;">New criminal data offences have been introduced alongside explicit journalism public interest defences at ss170-171.</p>
    </li>
    <li style="color: rgb(0, 0, 0);">
    <p style="text-align: justify; color: rgb(0, 0, 0); margin-top: 0cm; margin-bottom: 0pt;">The Information Commissioner has been granted significant powers and responsibility to encourage media compliance with data protection laws, including periodic review and reporting on compliance, an obligation to issue guidance to individuals on seeking redress against media organisations and creation of a code of practice for media organisations on data protection compliance to be approved by Parliament.</p>
    </li>
    <li style="color: rgb(0, 0, 0);">
    <p style="text-align: justify; color: rgb(0, 0, 0); margin-top: 0cm; margin-bottom: 0pt;">The Secretary of State must report every three years on the effectiveness of the media dispute resolution procedures, including under the Editors' Code of Practice.</p>
    </li>
</ul>
<p style="margin: 0cm 0cm 0pt; text-align: justify;"><strong>The Special Purposes Exemption<br></strong></p>
<p style="margin: 0cm 0cm 0pt; text-align: justify;"><br>Unsurprisingly, given the explicit requirement in the GDPR to provide protection for the right to freedom of expression and information, the special purposes exemption, which protects processing for the purposes of journalism, art and literature (and now academic purposes) has survived and in fact has widened in scope and application under the new Act.</p>
<p style="margin: 0cm 0cm 0pt; text-align: justify;"><strong> </strong></p>
<p style="margin: 0cm 0cm 0pt; text-align: justify;">The journalism exemption at section 32(1) of the DPA 1998 provided that personal data have to be processed <span style="text-decoration: underline;">only</span> for one of the 'special purposes', including journalism, in order for the exemption to be capable of applying, subject to meeting the s.32(1) criteria. Consequently, a data controller processing for two or more substantive purposes, including for journalism, was on the face of the legislation precluded from relying on the exemption.</p>
<p style="margin: 0cm 0cm 0pt; text-align: justify;"> </p>
<p style="margin: 0cm 0cm 0pt; text-align: justify;">The exemption in the Data Protection Act 2018 is wider. Schedule 2, Part 5, para 26(3) of the DPA 2018 contains the new exemption which notably includes no provision that personal data must be processed <span style="text-decoration: underline;">only</span> for the special purposes: instead the dis-application of certain GDPR provisions for journalists will apply <em>'to the processing of personal data carried out for the special purposes</em>', whether or not the data are being processed for a second or ancillary purpose. This will avoid the scenario where the media potentially faced losing the protection of the exemption if they assisted the police in connection with a criminal investigation, and may also have an impact on online platforms and search engine providers. In the recent case of <a href="https://www.judiciary.gov.uk/wp-content/uploads/2018/04/nt1-Nnt2-v-google-2018-Eewhc-799-QB.pdf"><span style="text-decoration: underline;">NT1 and NT2 v Google LLC [2018] EWHC 799 (QB)</span></a>, Warby J countenanced that if Google were processing for the special purposes, they were not doing so "only" for the special purposes – that may now be of little significance. </p>
<p style="margin: 0cm 0cm 0pt; text-align: justify;"> </p>
<p style="margin: 0cm 0cm 0pt; text-align: justify;">Otherwise, the exemption criteria are substantively the same as to what they were under DPA 1998:</p>
<ol style="list-style-type: decimal;">
    <li style="color: rgb(0, 0, 0);">
    <p style="text-align: justify; color: rgb(0, 0, 0); margin-top: 0cm; margin-bottom: 0pt;">the data in question must be being processed with a view to the publication of journalistic material,</p>
    </li>
    <li style="color: rgb(0, 0, 0);">
    <p style="text-align: justify; color: rgb(0, 0, 0); margin-top: 0cm; margin-bottom: 0pt;">the data controller must <em>reasonably believe</em> that, having regard in particular to the special importance of the public interest in freedom of expression, publication would be in the public interest, and</p>
    </li>
    <li style="color: rgb(0, 0, 0);">
    <p style="text-align: justify; color: rgb(0, 0, 0); margin-top: 0cm; margin-bottom: 0pt;">the data controller must <em>reasonably believe</em> that the application of the listed GDPR provision would be incompatible with its journalistic purpose.</p>
    </li>
</ol>
<p style="margin: 0cm 0cm 0pt; text-align: justify;"> Assuming these criteria are met, a data controller will be exempt from complying with an extensive list of GDPR rights and obligations (which itself has substantially increased). Notably, Codes of Practice have added importance for a publisher seeking to rely on the exemption. The Act provides explicitly at para 26(5) that when forming a belief that publication is in the public interest a data controller <em>must</em> have regard to relevant codes of practice, namely the BBC Editorial Guidelines, the Ofcom Broadcasting Code and the Editors' Code of Practice. <span> </span></p>
<p style="margin: 0cm 0cm 0pt; text-align: justify;"> </p>
<p style="margin: 0cm 0cm 0pt; text-align: justify;"><strong>Statutory Stay </strong></p>
<p style="margin: 0cm 0cm 0pt; text-align: justify;"><strong> </strong></p>
<p style="margin: 0cm 0cm 0pt; text-align: justify;">Section 176 of the DPA 2018 replicates the statutory stay provision at s.32(4) of the DPA 1998, providing that where a data controller claims, or it appears to the court, that personal data are being processed only for the special purposes, with a view to publication of journalistic material and the data have not previously been published by the controller, the court must stay any data protection proceedings brought over such data. By contrast to the exemption itself, the requirement in this case is that data must be being processed 'only' for journalism – so publishers seeking to rely on the statutory stay must be confident the data are not being processed for another substantive purpose.</p>
<p style="margin: 0cm 0cm 0pt; text-align: justify;"> </p>
<p style="margin: 0cm 0cm 0pt; text-align: justify;">As in the DPA 1998, the Information Commissioner again may make a written negative determination, in effect as to whether such a stay is appropriate. Section 174(3)(b) of the Act provides that the Commissioner may determine whether personal data are either not being processed only for the special purposes (including journalism); or whether the data are being processed without a view to the publication of journalistic material that has not previously been published. The ICO's efforts to secure the right to also determine whether compliance with a relevant provision of the DPA 2018 was incompatible with the special purposes was unsuccessful. </p>
<p style="margin: 0cm 0cm 0pt; text-align: justify;"> </p>
<p style="margin: 0cm 0cm 0pt; text-align: justify;">Nonetheless, it remains open to a claimant facing the prospect or reality of a stay under section 176 to turn to the ICO and make a complaint to the Commissioner pursuant to section 165, although the ICO's powers to require the provision of information, co-operation and to enforce are limited where no determination under section 174 has been made. In any event, any outcome would not necessarily be final as a right of appeal exists under section 162 DPA 2018.</p>
<p style="margin: 0cm 0cm 0pt; text-align: justify;"><strong> </strong></p>
<p style="margin: 0cm 0cm 0pt; text-align: justify;"><strong>New Offences and new Defences</strong></p>
<p style="margin: 0cm 0cm 0pt; text-align: justify;"><strong> </strong></p>
<p style="margin: 0cm 0cm 0pt; text-align: justify;">Sections 170 and 171 of the DPA 2018 adds to the existing offence of unlawfully obtaining personal data a new offence of re-identification of de-identified personal data. Given the risk of impinging on investigative journalism, each offence provides expressly for new defences that mirror the special purposes exemption. </p>
<p style="margin: 0cm 0cm 0pt; text-align: justify;"> </p>
<p style="margin: 0cm 0cm 0pt; text-align: justify;">An offence will not be committed in either case if the data controller (1) acted for the special purposes, (2) with a view to publication of journalistic material, and (3) with a reasonable belief that their conduct was justified as in the public interest. These defences will be welcomed by the media, and will add to the protection afforded by the Crown Prosecution Service's 'Guidance for prosecutors on assessing the public interest in cases affecting the media'. </p>
<p style="margin: 0cm 0cm 0pt; text-align: justify;"><strong> </strong></p>
<p style="margin: 0cm 0cm 0pt; text-align: justify;"><strong>Assistance in special purposes proceedings</strong></p>
<p style="margin: 0cm 0cm 0pt; text-align: justify;"><strong> <br></strong>Section 175 DPA 2018 replicates the provision that a party who is subject to special purposes proceedings can apply to the Information Commissioner for assistance in those proceedings. However, before providing any such assistance, the Commissioner must be of the opinion that a matter carries substantial public importance.  </p>
<p style="margin: 0cm 0cm 0pt; text-align: justify;"> </p>
<p style="margin: 0cm 0cm 0pt; text-align: justify;">On the face of the Act, it is therefore open for either a prospective claimant or defendant, most likely one with limited resource but involved in a data dispute of significance to apply to the ICO for assistance in their claim. With the threshold of 'substantial public importance' markedly high and with the ICO able to simply apply to intervene in litigation instead of taking on the burden of assisting a party to a dispute, it remains to be seen whether this will be used by parties and how interventionist the Commissioner will be in future cases. </p>
<p style="margin: 0cm 0cm 0pt; text-align: justify;"> </p>
<p style="margin: 0cm 0cm 0pt; text-align: justify;"><strong>Guidance, Review and Reporting obligations</strong></p>
<p style="margin: 0cm 0cm 0pt; text-align: justify;"><strong> </strong></p>
<p style="margin: 0cm 0cm 0pt; text-align: justify;">Following legislative wrangling between the House of Commons and the House of Lords just days before the Bill received Royal Assent, and against the backdrop of arguments calling for 'Leveson 2', both the Secretary of State for Digital, Culture, Media and Sport and the Information Commissioner have had their responsibilities as watchdogs over the media increased.</p>
<p style="margin: 0cm 0cm 0pt; text-align: justify;"> </p>
<p style="margin: 0cm 0cm 0pt; text-align: justify;">Notably: </p>
<ul style="list-style-type: disc;">
    <li style="color: rgb(0, 0, 0);">
    <p style="text-align: justify; color: rgb(0, 0, 0); margin-top: 0cm; margin-bottom: 0pt;">the media has been singled out as an industry with an obligation on the Information Commissioner to produce guidance in the next year on how to seek redress against media organisations where an individual considers that a media organisation has failed to comply with data protection legislation (s.177 DPA 2018); this will not necessarily apply to online platforms. </p>
    </li>
    <li style="color: rgb(0, 0, 0);">
    <p style="text-align: justify; color: rgb(0, 0, 0); margin-top: 0cm; margin-bottom: 0pt;">The Information Commissioner must consult on, prepare and submit to the Secretary of State within 18 months a code of practice to be approved by Parliament containing practical guidance on compliant processing of personal data for the purposes of journalism and practice which is desirable having regard to the interests of data subjects and the special importance of the public interest in freedom of expression and information (s.124 DPA 1998);<span>  </span></p>
    </li>
    <li style="color: rgb(0, 0, 0);">
    <p style="text-align: justify; color: rgb(0, 0, 0); margin-top: 0cm; margin-bottom: 0pt;">the Information Commissioner is now also obliged to carry out periodic reviews of whether the data protection legislation is being complied with by the media and report her findings to the Secretary of State. The first review must be commenced within four and a half years and completed within six years, and then repeated every five years (s.178 DPA 2018 and Schedule 17).</p>
    </li>
    <li style="color: rgb(0, 0, 0);">
    <p style="text-align: justify; color: rgb(0, 0, 0); margin-top: 0cm; margin-bottom: 0pt;">Separately the Secretary of State must report every three years to Parliament on the use and effectiveness of the media's dispute resolution procedures in cases involving allegations of breaches of data protection legislation, specifically on any dispute resolution procedures provided by those who enforce codes of practice for relevant media organisations (s.179 DPA 2018). This will include IPSO, IMPRESS and, perhaps unintentionally since what constitutes an alternative dispute resolution procedure is not defined, potentially also OFCOM in so far as its code relates to on-demand publishers.</p>
    </li>
</ul>
<p style="margin: 0cm 0cm 0pt; text-align: justify;"><strong>Summary</strong></p>
<p style="margin: 0cm 0cm 0pt; text-align: justify;"><strong> </strong></p>
<p style="margin: 0cm 0cm 0pt; text-align: justify;">While the GDPR and DPA 2018 do not, on their face, require alterations to journalistic practice, there is cause for both optimism and a degree of caution for media organisations. <span> </span>The journalism exemption is marginally wider, and new data offences are counterbalanced by explicit public interest journalism defences, which provide welcome clarity. Perhaps most notable however are the provisions for continuing regulation and oversight of the media and its compliance with data protection legislation. With the Commissioner's obligations to produce a code of conduct for journalism, guidance to the public on seeking redress against media organisations, and to carry out periodic reviews of sector compliance, the need for publishers to ensure that their processing of personal data complies with the law is more important than ever.<span>  </span></p>
<p style="margin: 0cm 0cm 0pt; text-align: justify;"> </p>
<p style="margin: 0cm 0cm 0pt; text-align: justify;"> <em><span>RPC was instructed by the Media Lawyer's Association in relation to the Data Protection Bill.  </span></em> </p>]]></content:encoded></item><item><guid isPermaLink="false">{38AC8E70-95A3-41ED-A1B3-EAB4F22C1A47}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/vicarious-liability-of-data-controllers-the-morrisons-data-breach-case/</link><title>Vicarious liability of data controllers: The Morrisons data breach case </title><description><![CDATA[Following the conviction of Andrew Skelton, a former Morrisons employee, after he published Morrisons’ employees’ personal details on a file sharing website, a group of over 5,500 employees of Morrisons took action against the supermarket to recover compensation for breach of a statutory duty under the UK Data Protection Act 1998 (‘DPA’), as well as for breach of confidence and misuse of private information. ]]></description><pubDate>Wed, 28 Mar 2018 12:00:00 +0100</pubDate><category>Data and privacy</category><authors:names></authors:names><content:encoded><![CDATA[<p><span><strong>Following the conviction of Andrew Skelton, a former Morrisons employee, after he published Morrisons’ employees’ personal details on a file sharing website, a group of over 5,500 employees of Morrisons took action against the supermarket to recover compensation for breach of a statutory duty under the UK Data Protection Act 1998 (‘DPA’), as well as for breach of confidence and misuse of private information. </strong></span><span style="font-weight: lighter;"><strong>Morrisons was found to be vicariously liable for the criminal actions of its employee in copying and publishing employee data without authorisation, notwithstanding a finding that Morrisons had largely complied with its obligations under the DPA. The decision has implications for companies’ liability for the actions of employees acting on their own account, even where that company has fulfilled its compliance obligations as a data controller. </strong></span></p>
<p>Data controllers will be forgiven if the recent decision of Mr Justice Langstaff in Various Claimants v. Wm Morrisons Supermarket plc [2017] EWHC 3113 (QB), one of the first group data protection claims, in which Morrisons was found vicariously liable for the criminal actions of its employee in copying and publishing employee data without authorisation, notwithstanding a finding that the supermarket had largely complied with its obligations under the Data Protection Act 1998, engenders feelings of being under a barrage of legal and regulatory liability.</p>
<p>While the decision, which is under appeal, will add to the burden on organisations who are already preparing for the GDPR and facing the prospect of increased litigation by not-for-profit bodies, it will be of interest in relation to the exacting standards by which organisations are to be judged in the safeguarding of personal data under the seventh data protection principle.</p>
<h3>The facts </h3>
<p>A senior IT auditor at Morrisons, Andrew Skelton, had been running a personal sideline dealing in the sale of a slimming drug, which he purchased wholesale and sold on eBay. On occasion, he used Morrisons’ post room to send packages to his customers at his own cost. In May 2013, one such package came open in the post room and, containing a white powder, caused alarm and led to the police being called. The incident led to Skelton being suspended pending analysis of the powder. Once it was confirmed that the powder was not illegal, Skelton had been permitted to return to work in early July. He faced a disciplinary hearing which led to him being given the lowest available disciplinary sanction, a formal verbal warning which was recorded on his personnel file and would remain for six months. Skelton appealed against the sanction imposed, but his appeal was rejected when it was heard in August 2013.</p>
<p>Unknown to Morrisons at the time, in October 2013 Skelton used his work computer to conduct an internet search for ‘TOR’ or ‘The Onion Router,’ software capable of disguising the identity of a computer accessing the internet. </p>
<p>In November 2013, as part of his job Skelton was provided with a file containing personnel data, with a view to him passing it on to Morrisons’ external auditors. The file had been downloaded from Morrisons’ proprietary software by one of a limited number of authorised employees, whose access to the system was tracked, and contained information on almost 100,000 employees and included names, addresses, gender, date of birth, phone numbers, national insurance numbers, bank sort codes, bank account numbers and salaries. Due to the size of the file, an attempt to email the file was unsuccessful and so the information was saved to an encrypted USB stick and uploaded to Skelton’s laptop. Skelton copied the data together with other information onto an encrypted USB stick provided by the external auditors and passed it on to them.</p>
<p>On 14 November, Skelton purchased a new mobile phone. On 18 November 2013, Skelton inserted an unknown USB device into his laptop and, the Court found, had copied the payroll data onto the USB with the intention of criminally misusing the data.</p>
<p>On 16 December, and again unknown to Morrisons, Skelton attempted to access the TOR site from his work laptop.</p>
<p>Skelton uploaded the payroll data to a file sharing website in January 2014 and, apparently disappointed at the lack of reaction to the publication, anonymously sent CDs containing the data to three newspapers, together with a link to the data on the file sharing site on 13 March 2014. One of the newspaper recipients notified Morrisons, which took immediate steps to have the website taken down and informed the police. In the ensuing investigation, colleagues of Skelton’s were arrested and subsequently released without charge, one of whom had been the subject of a deliberate attempt by Skelton to frame him.</p>
<p>Skelton was arrested on 19 March 2014, and charged with an offence under the Computer Misuse Act 1990, under the Fraud Act 2006 and under s55 Data Protection Act 1998. He was tried and convicted in July 2015 and sentenced to a term of eight years imprisonment. At his criminal trial, the Recorder of Bradford found that following the disciplinary process against him, Skelton had gone on to “harbour very considerable bad feelings towards Morrisons” and “set about […] doing Morrisons some real damage.” </p>
<p> </p>
<h3>The claim</h3>
<p>5,518 of the affected employees brought a claim for compensation for breach of statutory duty under s4(4) DPA, and at common law for misuse of private information and breach of confidence. The Claimants argued that Morrisons bore primary and vicarious liability for Skelton’s acts.</p>
<p>The trial dealt only with liability, with quantum being left to be determined at a later date. The Claimants argued that, in relation to primary liability, Morrisons had failed to comply with the first, second, third, fifth and seventh data protection principles (1), that is to say the obligations to: process data fairly and lawfully and in accordance with the conditions set out in Schedules 2 and 3 of the Data Protection Act 1998, as appropriate; obtain data only for one or more specified and lawful purposes and not to further process the data in a manner incompatible with those purposes; ensure data is adequate, relevant and not excessive in relation to the purpose(s) for which they are processed; to retain data for no longer than is necessary for the purpose(s); and, to take appropriate technical and organisational measures to safeguard against unauthorised or unlawful processing of personal data and against accidental, loss, destruction of or damage to personal data.</p>
<p>In respect of these, the Claimants argued that they had not consented to Skelton’s processing, which was not fair or lawful, and that the criminal purposes for which Skelton processed their data did not comply with the second data protection principle. The complaints under the third and fifth data protection principles were not expanded upon during the course of the trial. Under the seventh data protection principle, the Claimants argued that it had been inappropriate to entrust Skelton with the payroll data on the basis that it was alleged that he was inappropriate to fulfil this role as “he had not yet been rehabilitated from very recent disciplinary action and was, to the knowledge of the Defendants, unhappy with the way in which the Defendant had dealt with the investigation and disciplinary process.”</p>
<p>The Claimants also argued that Morrisons should have identified the attempt to transfer data to Skelton via email, it had been inappropriate to transfer the payroll data on a USB stick, that there was inadequate management or mentoring of Skelton following the disciplinary process, Morrisons ought to have detected Skelton’s research relating to the TOR network on his work laptop, Morrisons should have denied Skelton access to the data, and Morrisons had failed to ensure that the payroll data was deleted after it had been transferred to KPMG.</p>
<p>The Defendant did not rely upon the defence under s13(3) Data Protection Act 1998, that such care had been taken as was reasonably required to comply with its obligations under the Act. This was because, it was argued, Skelton’s conduct was such as to place him in the role of data controller in respect of his copying and subsequent dissemination of the payroll data, and Morrisons was therefore not liable under the Act for his actions. </p>
<p> </p>
<h3>Judgment</h3>
<p>Langstaff J rejected the Claimants’ argument that to only hold a data controller liable for its own contraventions of its obligations under the DPA would make a mockery of the scheme. He held that Morrisons was not the data controller at the time of any breach of the first, second, third and fifth data protection principles and the only duty it could owe to the Claimants was that under the seventh data protection principle, i.e. to take appropriate technical and organisational measures to safeguard their personal data (2). Having regard to the Court of Appeal’s judgment in Vidal- Hall v. Google Inc (3), and the purpose ascribed to Directive 95/46/EC (4) of being to “provide a high level of protection to the right of privacy in respect of the management of personal data by data controllers,” the Judge found that he could not “construe either the Directive or the Act as requiring a data controller to be responsible even without fault for the subsequent disclosure by a third party of some of the information given to it (5).”</p>
<p>In relation to the application of the seventh data protection principle, Langstaff J found a correlation with the approach to the tort of negligence, and found that it afforded an indicative standard which ought to be applied, that is to say the standard is to be “judged by balancing the magnitude of the risk of the activity in question (itself a combination of the likelihood of injury and the severity of it should it occur) against the availability and cost of measures to prevent the risk materialising, and the importance of the object to be achieved by performing those actions (6).”</p>
<p>Accordingly, he found that the standard applicable to the protection of data relating to 100,000 employees would be higher than that applicable to “a small enterprise employing 6 or 7 workers (7).” The Judge held that the extraction and transfer of the data to Skeleton had been secure and, even if it had not been, was not the cause of the unauthorised disclosure of the data online. He also held that the storage of the data on Skelton’s encrypted laptop was appropriate, even after the data had been transferred to KPMG, to allow for any queries to be addressed and that this would have remained appropriate up until the conclusion of the audit (8).</p>
<p>The failure to ask Skelton whether the data had been deleted, or to check that it had been, before the conclusion of the audit was held not to constitute a breach of the seventh principle. While the Judge found that there was no organised system for the deletion of data from Skelton’s computer (being outside the usual secure repository for payroll data) and no failsafe, which he did consider to fall short of the requirements of the seventh principle, he also found that this neither caused nor contributed to Skelton’s disclosure of the data (9).</p>
<p>As to whether Morrisons ought to have refused Skelton access to the data, the Judge found that there was nothing about the white powder incident itself which suggested that Skelton could no longer be regarded as trustworthy (10), and noted that it “cannot sensibly be suggested that employees so warned cannot then be trusted to do their job or require to be supervised (11).” Nothing in his lack of motivation was indicative of the criminal conduct he was to embark upon. There had been no breach of the seventh principle in permitting Skelton access to the data.</p>
<p>The Judge rejected the suggestion that Skelton ought to have been the subject of monitoring and mentoring during the six month validity of the warning. He also rejected the suggestion that the attempt to email the data to Skelton was an opportunity to prevent him gaining access to the data.</p>
<p>Morrisons was not able to automatically detect whether employees might be using their systems to research the TOR, although access to the TOR would have been restricted. Records of every website request made were retained but, consistent with the approach of other large companies were not routinely reviewed unless it was necessary and appropriate to do so in any particular case. The Court considered that active and routine monitoring would be impracticable, disproportionate, unnecessary given that firewalls prevented access to undesirable material, would no doubt be seen as invasive of Article 8 rights, and would not itself have indicated Skelton’s unsuitability (12).</p>
<p>Having determined that Morrisons was not liable under the Data Protection Act 1998, Langstaff J also found that it had not misused, authorised the misuse of or permitted the misuse of private information and had not disclosed confidential information, and therefore bore no primary liability.</p>
<p>However, in considering Morrisons’ vicarious liability in accordance with the principles set out in Mohamud v. William Morrison Supermarkets plc (13), Langstaff J rejected the Defendant’s contentions that the statutory scheme under the DPA debarred the application of vicarious liability to a data controller or other liability otherwise than under the Act as being disproportionate, as the DPA neither expressly nor impliedly excluded such liability.</p>
<p>The Judge accepted the Claimants’ contention that if any misuse of personal data by an employee took the processing outside of the scope of the controller’s liability, then the scheme would fail to achieve the aim of the Directive in affording protection to data subject rights. Langstaff J was not persuaded by warnings of the “eye-watering liability” which would be imposed on data controllers by coupling the cost of compliance with the potential further liabilities, and suggested that this would be covered by appropriate insurance.</p>
<p>On the specific application of the principles of vicarious liability, Langstaff J found that “there was an unbroken thread that linked” Skelton’s work to the disclosure, that Skelton had been deliberately entrusted with the data by Morrisons, and was acting as an employee when he received the data. The Judge rejected the contention that the fact that the disclosures were made at a weekend, using personal equipment at home, disengaged them from his employment. Skelton’s motive was irrelevant in determining vicarious liability.</p>
<p>While recognising that Morrisons was a victim itself, which caused the Court to grant it permission to appeal, it was nevertheless right for it to be vicariously liable to the Claimants. </p>
<p> </p>
<h3>Comment </h3>
<p>The implication of the judgment is that notwithstanding an organisation achieving compliance with its obligations as a data controller, at not insignificant expense, data controllers may nevertheless be held liable for the conduct of an employee acting on their own account even where those actions are criminal and deliberately targeted at harming the organisation; there is an obvious tension in such a finding.</p>
<p>While regulatory compliance may save a data controller from the abundant fines available under the GDPR, this will not be sufficient to avoid the prospect of liability for compensation and costs in group litigation, whether brought by individuals themselves or by a not-for-profit on their behalf under the new rights afforded by the Regulation. Organisations need to take appropriate steps to prepare for such potential liability, considering insurance against the risk and having robust processes in place to mitigate the risks when a data breach occurs.</p>
<p>Data controllers, particularly large organisations, will also wish to take heed of the warning that the lack of a process for the deletion of data after use would not be compliant with the seventh principle; this is likely to be an area where many organisations’ systems would be found wanting. </p>
<p><em>This article was originally published in the February 2018 issue of the Leading Internet Case Law.</em></p>
<p> </p>
<p><strong>Notes</strong></p>
<p>1. Schedule 1, Data Protection Act 1998.<br>
2. V arious Claimants v. Wm Morrisons Supermarket plc [2017] EWHC 3113 (QB), para. 50.<br>
3. V idal-Hall v. Google Inc [2015]EWCA Civ 311, [2016] QB 1003.<br>
4. Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data.<br>
5. Ibid para. 57.<br>
6. Ibid, para. 68.<br>
7. Ibid, para. 69.<br>
8. Ibid, para. 80.<br>
9. Ibid, para. 120.<br>
10. Ibid, para. 90.<br>
11. Ibid, para. 91.<br>
12. Ibid, para. 104-105.<br>
13. [2016] UKSC 11.</p>]]></content:encoded></item><item><guid isPermaLink="false">{3199802A-F876-4E2A-A398-E6AF5C3BCDF8}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/thorny-issues-of-jurisdiction-and-claim-form-service-laid-bare-by-high-court/</link><title>Thorny issues of jurisdiction and claim form service laid bare by High Court</title><description><![CDATA[In Howard Kennedy v The National Trust for Scotland [2017] EWHC 3368 (QB), the High Court considered two complex issues: one relating to the doctrine of forum non conveniens and the other to the CPR provisions on service of a claim form.  In his judgment, handed down yesterday, Sir David Eady stayed the action in England & Wales on the basis that Scotland is the more appropriate forum.  He also provided guidance on the tricky interplay between deemed and actual service of a claim form, ultimately holding that the claim form in this case had been validly served in time.]]></description><pubDate>Thu, 18 Jan 2018 16:44:03 Z</pubDate><category>Data and privacy</category><authors:names>Alex Wilson, Samantha Thompson</authors:names><content:encoded><![CDATA[<p style="margin: 0cm 0cm 12pt;">The full decision can be found <a href="http://www.bailii.org/ew/cases/EWHC/QB/2017/3368.html"><span style="text-decoration: underline;">here</span></a>.</p>
<p style="margin: 0cm 0cm 12pt;"><strong>Facts</strong></p>
<p style="margin: 0cm 0cm 12pt;">This dispute arose after the Claimant, a photographer domiciled in Scotland, conducted a commercial photoshoot of a naked model on the grounds of Craigievar Castle in 2012, a property in Scotland which was gifted to the Defendant by Lord Sempill. <span> </span>According to the Claimant, permission for the shoot was orally agreed with a representative of the Defendant.<span>  </span>Four years later the episode came to the attention of the national press after Lord Sempill's daughter complained that the castle had been used for the purpose of taking nude photographs. <span> </span>The Defendant made press statements in February 2016 denying that the photoshoot had been authorised. <span> </span>These statements were subsequently reported in a number of media outlets such as the <em>Scottish Mail on Sunday</em>, the <em>Metro</em> and other publications in Italy, France and Brazil.</p>
<p style="margin: 0cm 0cm 12pt;">The Claimant issued a claim form on 24 February 2017 (the final day of the limitation period) alleging defamation, negligent misstatement and various breaches of the Data Protection Act 1998.<span>  </span>The claim form was sent by post to the Defendant's offices in Scotland on 23 August 2017 and it was received on 24 August 2017, the final day on which the claim form was valid (given that it was served out of the jurisdiction).</p>
<p style="margin: 0cm 0cm 12pt;">The issues before the court were (i) whether service of the claim form was valid in light of CPR r.6.14 and, (ii) if so, whether the action should be stayed on the basis that Scotland would be the more appropriate forum.<span>  </span>This article addresses these two issues, albeit out of turn.</p>
<p style="margin: 0cm 0cm 12pt;"><strong>Forum non conveniens</strong></p>
<p style="margin: 0cm 0cm 12pt;">The Claimant relied on EU case law (<a href="http://curia.europa.eu/juris/document/document.jsf?text=&docid=55027&pageIndex=0&doclang=en&mode=lst&dir=&occ=first&part=1&cid=654309"><span style="text-decoration: underline;">Owusu v Jackson (C-281/2002)</span></a> and <a href="http://curia.europa.eu/juris/document/document.jsf?docid=144487&doclang=EN"><span style="text-decoration: underline;">Maletic v lastminute.com GmbH (C-478-12)</span></a>) to argue that the court was precluded from considering forum non conveniens issues.<span>  </span>He submitted that, as his complaint relates to republication in states other than the UK (as well as the UK), the case is not "purely domestic" and therefore all jurisdictional matters should be governed by the <a href="http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=OJ:L:2012:351:0001:0032:en:PDF"><span style="text-decoration: underline;">Brussels Recast Regulation 2012/2015</span></a> (the <strong>Regulation</strong>) which precludes the discretion of the English Court to stay the claim on grounds of forum non conveniens . <span> </span>The Court rejected this argument, finding that the only jurisdictional competition was between the courts of Scotland and England & Wales (i.e. internal to the UK). <span> </span>The fact that the Claimant complained of third parties republishing the material outside of the UK did not constitute an "international element" sufficient to take the case out of the "purely domestic" category. The Court suggested that the case would be different if the Defendant had been domiciled in a different member state and sued in the UK, or if the Claimant had sued more than one media outlet, based in different jurisdictions. The court concluded that the only competing jurisdictions were those within the UK which were matters for internal determination by the UK Courts.<span>  </span>The Regulation was therefore not engaged, and the Court instead referred to the <a href="http://www.legislation.gov.uk/ukpga/1982/27/contents"><span style="text-decoration: underline;">Civil Jurisdiction and Judgments Act 1982</span></a> (the <strong>Act</strong>) to decide the issue (though it was informed by the EU's approach to jurisdiction). <span> </span></p>
<p style="margin: 0cm 0cm 12pt;">Considering whether to stay the proceedings under s49 of the Act, the Court found that the key question was whether Scotland was clearly the more appropriate jurisdiction for resolving the issues, in the interests of all the parties and the ends of justice.<span>  </span>Though he found that there were arguments for both jurisdictions, he was ultimately persuaded that Scotland was the more appropriate forum.<span>  </span>The two key factors were: (i) that both parties are domiciled in Scotland (and therefore the Defendant should be sued there as per Rule 1, Schedule 4 of the Act); and (ii) that the Scottish courts can deal with all the causes of action and the principal remedies sought.<span>  </span>Other factors cited in support of Scotland included the availability of the (Scotland-based) witnesses, and that the photoshoot at the centre of the case took place in Scotland.</p>
<p style="margin: 0cm 0cm 12pt;">The Court also went on to consider whether, if the claim were to go ahead in England & Wales, the recovery of global damages (i.e. damages in respect of all harm across multiple jurisdictions) would be available.<span>  </span>Applying the approach adopted by the CJEU in <a href="http://www.bailii.org/eu/cases/EUECJ/1995/C6893.html"><span style="text-decoration: underline;"><em>Shevill v Press Alliance </em>[1995] 2 AC 18</span></a> to the UK's internal jurisdictions, the Court found that where a libel is published in more than one jurisdiction in the UK, the litigant is given the choice of suing where the defendant is domiciled (the "general jurisdiction") where s/he can recover all relevant damages, or suing in each of the jurisdictions where harm is said to have incurred (the "special jurisdictions") and recovering the damages for the harm incurred in each jurisdiction individually.<span>  </span>The Court noted that the Claimant had chosen to claim in England & Wales only, but had not confined his claim to the harm caused here.<span>  </span>Based on the preceding analysis he concluded that had he permitted the Claimant's case to continue in England & Wales he would have struck-out the claim to global damages.<span>  </span>Though this observation was ostensibly obiter, the competing courts' respective ability to award global damages explicitly fed into factor (ii) above when the Court was considering whether or not to grant the stay. </p>
<p style="margin: 0cm 0cm 12pt;"><strong>Was the claim form validly served?</strong></p>
<p style="margin: 0cm 0cm 12pt;">This part of the dispute centred on the interplay between CPR r6.14 and r7.5(2).<span>  </span>The key question was whether r6.14 fixes the date on which service of a claim form occurs for all CPR purposes, or whether there remains a distinction between the actual date of service and the deemed date under the CPR.<span>  </span>It was important in this case because the deemed date of service pursuant to r6.14 was 25 August 2017 (i.e. two days after the claim form was posted), whereas the actual date the Defendant received the claim form was 24 August 2017.<span>  </span>Crucially, the last day for valid service was 24 August 2017.</p>
<p style="margin: 0cm 0cm 12pt;">Notably, if the claim form had been served within the jurisdiction the same issue would not have arisen, owing to a distinction between the wording in r7.5(1) (which deals with service in England & Wales) and r7.5(2) (which deals with service outside of the jurisdiction).<span>  </span>Whereas sub-para (1) only requires the Claimant to complete the relevant step (in this case, posting the claim form) within four months of issue, sub-para (2) requires that the claim form is <em>served</em> within six months of issue.<span>  </span>If sub-para (2) was articulated in the same way as (1), the Claimant would have indisputably validly served the claim form. </p>
<p style="margin: 0cm 0cm 12pt;">The Court reflected upon a significant number of cases on this point, many of which cannot be easily reconciled.<span>  </span>In <em>Brightside v RSM UK Audit</em> [2017] 1 WLR 1943, Andrew Baker J held the view that CPR r6.14 fixes the date for all CPR purposes, including the date of service in Scotland.<span>  </span>In contrast, Master McCloud in <em>Paxton Jones v Chichester Harbour Conservancy </em>[2017] EWHC 2270 found that the deeming provisions operate as a means of calculating other deadlines, such as the acknowledgement of service and defence. She reasoned that the alternative interpretation results in a two-day "dead period" at the end of a claim form's validity.</p>
<p style="margin: 0cm 0cm 12pt;">Ultimately, the Court found in favour of the Claimant.<span>  It</span> held that there is a distinction between the deemed date and actual date of service by drawing particular attention to the wording of r.6.14 which fixes the deemed date of service for "a claim form served". <span> It</span> was persuaded by Master McCloud's analysis and decided that Andrew Baker J's observations on the date of service in Scotland were obiter.<span>  </span>The Court further reasoned that the alternative finding would require the construction of a counter-factual history, namely that the claim form had not actually arrived on 24 August, even though there was no dispute between the parties that it had arrived on that date. <span> </span>The Court was not prepared to invalidate the claim form on the basis of a legal fiction without express wording in the CPR.<span>  </span>Nonetheless, it recognised that it was not an easy point to determine and suggested that greater clarity in the drafting would be helpful to ease the "unfortunate tension" between the CPR provisions. <span></span></p>
<p style="margin: 0cm 0cm 12pt;"><strong>Comment</strong></p>
<p style="margin: 0cm 0cm 12pt;">The application of the forum non conveniens discretion by the Court serves as a useful indication of how or whether the Courts will apply the Regulation in a case where, as is inevitable in modern defamation cases, there is online publication in a number of jurisdictions.<span>  </span>The mere reliance on third-party publications in jurisdictions outside of the UK did not provide a sufficient international element to engage the Regulation and take it out of "purely domestic" territory.</p>
<p style="margin: 0cm 0cm 12pt;">The decision also provides useful guidance on the application of the forum non conveniens discretion itself.<span>  </span>The domicile of the parties (and the Defendant in particular) is a key consideration, as is the capability of the competing jurisdiction's courts to provide substantial justice.<span>  </span>The way a claim is articulated may prove important, with the Court indicating that, had the claim been for damages relating to harm suffered in England & Wales only, the continuation of the case in England & Wales would not have necessitated strike-out of global damages and therefore the claim would not have had to "change fundamentally".</p>
<p style="margin: 0cm 0cm 12pt;">Whilst the Claimant was nevertheless successful in obtaining a declaration that the claim form was validly served, the complexity of the issue should serve as a warning to future claimants not to leave serving their claim forms to the wire!</p>
<p style="margin: 0cm 0cm 12pt;">RPC acted for the National Trust for Scotland in this case.<span>  </span>The Claimant has been granted permission to appeal the decision on the forum non conveniens stay (and the decision regarding global damages) and the Defendant has been granted permission to cross-appeal the decision on the validity of the claim form.</p>]]></content:encoded></item><item><guid isPermaLink="false">{4BD8D0AF-12DD-47C2-9827-DB8078C24E2B}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/brexit-managing-your-ip-and-data/</link><title>Brexit: Managing your IP and Data</title><description><![CDATA[<p>Our <a href="https://www.rpclegal.com/brexit-time-to-assess-your-exposure">Brexit Bulletin</a> in June 2017 was designed to highlight a number of areas businesses needed to consider as a result of Brexit and the timetable for implementation. It had been hoped that by now some clarity and certainty would have been achieved on some of the fundamental issues such as the Divorce Bill and the rights of EU and UK citizens residing in the EU and UK. This would have led to some progress being made on trade and customs arrangements. Unfortunately that has not been the case and in many respects the position is now more confused and negotiating positions have hardened for no apparent good commercial reasons.</p>
<p>While this is a gloomy picture for forward planning purposes some comfort should be gained from the fact that while the press headlines are dramatic there are many government offcials in the background working long hours on the detail of what it is hoped will be a satisfactory compromise for all parties. Already transition periods have been proposed and the reality is dawning that the break up is very complicated.</p>
<p>This paper looks at two areas of law that will be affected by Brexit, namely intellectual property rights and data protection. Our comments on these subjects cover legal issues and practical issues which companies will need to consider as the negotiations continue.</p>
<p>As ever, our team is on hand to field any questions you might have or to give you further clarity on any issues you might be facing.</p>]]></description><pubDate>Tue, 05 Dec 2017 16:55:59 Z</pubDate><category>Data and privacy</category><authors:names></authors:names><content:encoded><![CDATA[<p>Our <a href="https://www.rpclegal.com/brexit-time-to-assess-your-exposure">Brexit Bulletin</a> in June 2017 was designed to highlight a number of areas businesses needed to consider as a result of Brexit and the timetable for implementation. It had been hoped that by now some clarity and certainty would have been achieved on some of the fundamental issues such as the Divorce Bill and the rights of EU and UK citizens residing in the EU and UK. This would have led to some progress being made on trade and customs arrangements. Unfortunately that has not been the case and in many respects the position is now more confused and negotiating positions have hardened for no apparent good commercial reasons.</p>
<p>While this is a gloomy picture for forward planning purposes some comfort should be gained from the fact that while the press headlines are dramatic there are many government offcials in the background working long hours on the detail of what it is hoped will be a satisfactory compromise for all parties. Already transition periods have been proposed and the reality is dawning that the break up is very complicated.</p>
<p>This paper looks at two areas of law that will be affected by Brexit, namely intellectual property rights and data protection. Our comments on these subjects cover legal issues and practical issues which companies will need to consider as the negotiations continue.</p>
<p>As ever, our team is on hand to field any questions you might have or to give you further clarity on any issues you might be facing.</p>]]></content:encoded></item><item><guid isPermaLink="false">{83B682DF-7E10-48AF-9C66-44CBA955B75B}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/seriously-limiting-serious-harm/</link><title>Seriously limiting serious harm</title><description><![CDATA[Seriously limiting serious harm]]></description><pubDate>Tue, 12 Sep 2017 17:17:27 +0100</pubDate><category>Data and privacy</category><authors:names></authors:names><content:encoded><![CDATA[<p style="margin: 0cm 0cm 0pt; text-align: justify;"><span>Trumpeting the Defamation Act 2013 when it received Royal Assent, the Ministry of Justice publicised that s1(1) of the Act, which provides that "A statement is not defamatory unless its publication has caused or is likely to cause serious harm to the reputation of the claimant", established "a requirement for companies and individuals to show serious harm to establish a claim". The Act, according to Lord McNally, represented "the end of a long and hard fought battle to reform the libel laws in England and Wales". </span></p>
<p style="margin: 0cm 0cm 0pt; text-align: justify;"><span> </span></p>
<p style="margin: 0cm 0cm 0pt; text-align: justify;"><span>In its 2011 report, the Joint Committee on the Draft Defamation Bill indicated that the new threshold was necessary to strengthen the law and that it was essential to make sure that the issue was determined at an early stage in proceedings, notwithstanding the "front-loading" that would come with this. The potential impact of the publication of a rapid correction or apology or notice on an article in preventing serious harm from being caused was recognised.  </span></p>
<p style="margin: 0cm 0cm 0pt; text-align: justify;"><span> </span></p>
<p style="margin: 0cm 0cm 0pt; text-align: justify;"><span>The meaning and application of s1(1) has been considered in a handful of cases since coming into force on 1 January 2014, with a meandering path being drawn by the judiciary as to how and when the issue should be determined and the nature and extent of evidence that may be required, with a leaning toward serious harm being determined as a preliminary issue with evidence being called.    </span></p>
<p style="margin: 0cm 0cm 0pt; text-align: justify;"><span> </span></p>
<p style="margin: 0cm 0cm 0pt; text-align: justify;"><span>The Court of Appeal has now handed down judgment in Lachaux v AOL (UK), Independent Print Ltd & Evening Standard Ltd </span><a href="http://www.bailii.org/cgi-bin/format.cgi?doc=/ew/cases/EWCA/Civ/2017/1334.html&query=(lachaux)"><span style="text-decoration: underline;">[2017] EWCA Civ 1334</span></a><span>, indicating that rather than a wholesale reform of the law, the serious harm threshold represents a mere revision of the principle established in Thornton v Telegraph Media Group Ltd </span><a href="http://www.bailii.org/cgi-bin/format.cgi?doc=/ew/cases/EWHC/QB/2010/1414.html&query=(%5b2010%5d)+AND+(EWHC)+AND+(1414)"><span style="text-decoration: underline;">[2010] EWHC 1414</span></a><span> that in order to be defamatory a statement must surpass a threshold of seriousness, being a tendency to cause substantial harm. S1(1) therefore only requires there to be a tendency for the publication to cause serious harm. </span></p>
<p style="margin: 0cm 0cm 0pt; text-align: justify;"><span> </span></p>
<p style="margin: 0cm 0cm 0pt; text-align: justify;"><strong><span>Facts</span></strong></p>
<p style="margin: 0cm 0cm 0pt; text-align: justify;"><span> </span></p>
<p style="margin: 0cm 0cm 0pt; text-align: justify;"><span>The case of Lachaux concerned separate actions in respect of publications in 2014 by the Huffington Post, the Independent and the Evening Standard which, variously, suggested that Lachaux was guilty of domestic violence and abuse, child abduction, fabricating false allegations against his former partner and manipulating the Emirati legal system to unjustifiably deprive his former partner of access to their child. The Claimant attributed the publications to a campaign against him by his former partner. The Huffington Post removed its article and published an apology a number of months later, when it received the Claimant's complaint. </span></p>
<p style="margin: 0cm 0cm 0pt; text-align: justify;"><span> </span></p>
<p style="margin: 0cm 0cm 0pt; text-align: justify;"><span>The readership of the two Huffington Post articles was around 4,800 and between 154,000 and 232,000 for the print copies of the Independent articles, with 5,655 unique visitors online, and between 523,000 and 785,000 for the print copy of i. The Evening Standard's readership figures were between 1.67 million and 2.5 million for the print edition and 1,955 unique online visitors. </span></p>
<p style="margin: 0cm 0cm 0pt; text-align: justify;"><span> </span></p>
<p style="margin: 0cm 0cm 0pt; text-align: justify;"><strong><span>First instance decision </span></strong></p>
<p style="margin: 0cm 0cm 0pt; text-align: justify;"><strong><span> </span></strong></p>
<p style="margin: 0cm 0cm 0pt; text-align: justify;"><span>At </span><a href="https://www.judiciary.gov.uk/judgments/lachaux-v-independent-print-ltd-evening-standard-ltd-and-aol-uk-ltd-final/"><span style="text-decoration: underline;">first instance</span></a><span>, trial was directed of the preliminary issue of whether the publications had caused or were likely to cause serious harm to the Claimant's reputation, as well as in relation to the meaning of the publications and, in relation to the Huffington Post, whether the proceedings were an abuse of process. </span></p>
<p style="margin: 0cm 0cm 0pt; text-align: justify;"><span> </span></p>
<p style="margin: 0cm 0cm 0pt; text-align: justify;"><span>Mr Justice Warby held that s1(1) required a claimant to prove on the balance of probabilities that a statement had caused or was likely to cause serious harm, thus displacing the principle that libel was actionable without proof of damage. In making its determination the court could have regard not only to the meaning of the statement and the harmful tendency of that meaning, but also to all relevant circumstances including any evidence of what in fact happened. </span></p>
<p style="margin: 0cm 0cm 0pt; text-align: justify;"><span> </span></p>
<p style="margin: 0cm 0cm 0pt; text-align: justify;"><span>Warby J considered that while an inference of serious harm might be drawn, that may not be justified by the evidence and where an issue of whether serious harm was raised it would usually be preferable to deal with that as a preliminary issue.   </span></p>
<p style="margin: 0cm 0cm 0pt; text-align: justify;"><span> </span></p>
<p style="margin: 0cm 0cm 0pt; text-align: justify;"><span>The obiter view was expressed that, by contrast with the view of Mr Justice Bean in </span><a href="http://www.bailii.org/cgi-bin/format.cgi?doc=/ew/cases/EWHC/QB/2014/2831.html&query=(%5b2014%5d)+AND+(EWHC)+AND+(2831)"><span style="text-decoration: underline;">Cooke v MGN</span></a><span>, the time at which the threshold must be surmounted was at the time when serious harm is determined rather than when the claim was issued.   </span></p>
<p style="margin: 0cm 0cm 0pt; text-align: justify;"><span> </span></p>
<p style="margin: 0cm 0cm 0pt; text-align: justify;"><span>Applying those principles, all but the second Huffington Post article were held to pass the serious harm threshold. </span></p>
<p style="margin: 0cm 0cm 0pt; text-align: justify;"><span> </span></p>
<p style="margin: 0cm 0cm 0pt; text-align: justify;"><strong><span>Appeal </span></strong></p>
<p style="margin: 0cm 0cm 0pt; text-align: justify;"><span> </span></p>
<p style="margin: 0cm 0cm 0pt;"><span>The Defendants appealed against the findings that all but one of the articles complained of passed the serious harm threshold, leading the Claimant to argue that Warby J had failed to properly interpret and apply s1(1). </span></p>
<p style="margin: 0cm 0cm 0pt;"><span> </span></p>
<p style="margin: 0cm 0cm 0pt;"><span>Giving the judgment of the court, Lord Justice Davis dismissed as being undesirable the reliance upon comments by Ministers in evidencing the intentions of Parliament in enacting s1(1).  </span></p>
<p style="margin: 0cm 0cm 0pt;"><span> </span></p>
<p style="margin: 0cm 0cm 0pt;"><span>He concluded that the words "likely to cause" in s1(1) should not be understood as requiring a claimant to prove that it was more likely than not that serious harm would be caused, but rather that the words connote a "tendency" to cause serious harm. </span></p>
<p style="margin: 0cm 0cm 0pt;"><span> </span></p>
<p style="margin: 0cm 0cm 0pt;"><span>He rejected Warby J's finding that the presumption of damage had been abolished, which he considered was not clearly intended by Parliament, but did find that a raised threshold of harm was nevertheless compatible with the presumption of damage. </span></p>
<p style="margin: 0cm 0cm 0pt;"><span> </span></p>
<p style="margin: 0cm 0cm 0pt;"><span>He considered that the point at which harm to reputation occurs would ordinarily be at the point of publication. </span></p>
<p style="margin: 0cm 0cm 0pt;"><span> </span></p>
<p style="margin: 0cm 0cm 0pt;"><span>In relation to the need to prove serious harm, Davis LJ held that a preliminary hearing would not usually be necessary and it would be more appropriate, and indeed fairer to a claimant, for the issue to be resolved at trial. He determined that courts should be slow to direct a preliminary issue involving substantial evidence. Alternatively, if it was not appropriate to be left to trial, it might be speedily dealt with at the same time as an application for determination of meaning, whereby if it were determined that a publication conveys a serious defamatory imputation then an inference of serious reputational harm "ordinarily can and should be drawn", whereas a meaning that did not convey a serious defamatory imputation would leave the claim vulnerable to being struck out – but this would not be inevitable. Davis LJ indicated that he would not limit the drawing of an inference of serious harm merely in cases where allegations of terrorism or paedophilia were alleged. </span></p>
<p style="margin: 0cm 0cm 0pt;"><span> </span></p>
<p style="margin: 0cm 0cm 0pt;"><span>Use of the Jameel abuse jurisdiction or the summary judgment procedure under Part 24 were suggested as the preferred routes for defendants to deal with the issue of serious harm, with the example being given of this being appropriate where there was irrefutable evidence of very limited publication, no grapevine percolation and firm evidence that no one thought less of the claimant by reason of the publication.   </span></p>
<p style="margin: 0cm 0cm 0pt;"><span>Davis LJ endorsed the view of Judge Moloney QC in </span><a href="http://www.bailii.org/cgi-bin/format.cgi?doc=/ew/cases/EWHC/QB/2015/3769.html&query=((%5b2015%5d)+AND+(EWHC)+AND+(3769)"><span style="text-decoration: underline;">Theedom v Nourish Training Ltd</span></a><span> that the presentation of evidence as to serious harm would be of little assistance and would potentially duplicate arguments as to quantum, which would be best left to trial. He considered that avoiding a proliferation of pre-trial hearings would save costs and discourage heavy-handed conduct by "well-resourced defendants" and would be in accordance with the overriding objective.  </span></p>
<p style="margin: 0cm 0cm 0pt;"><span> </span></p>
<p style="margin: 0cm 0cm 0pt;"><span>The principles were drawn together at paragraph 82 as follows: </span></p>
<p style="margin: 0cm 0cm 0pt;"><span> </span></p>
<p style="margin: 0cm 0cm 0pt 36pt;"><em><span>(1) Section 1(1) of the 2013 Act has the effect of giving statutory status to Thornton, albeit also raising the threshold from one of substantiality to one of seriousness: no less, no more but equally no more, no less. Thornton has thus itself been superseded by statute.</span></em></p>
<p style="margin: 0cm 0cm 0pt 36pt;"><em><span> </span></em></p>
<p style="margin: 0cm 0cm 0pt 36pt;"><em><span>(2) The common law presumption as to damage in cases of libel, the common law principle that the cause of action accrues on the date of publication, the established position as to limitation and the common law objective single meaning rule are all unaffected by s.1 (1).</span></em></p>
<p style="margin: 0cm 0cm 0pt 36pt;"><em><span> </span></em></p>
<p style="margin: 0cm 0cm 0pt 36pt;"><em><span>(3) If there is an issue as to meaning (or any related issue as to reference) that can be resolved at a meaning hearing, applying the usual objective approach in the usual way. If there is a further issue as to serious harm, then there may be cases where such issue can also appropriately be dealt with at the meaning hearing. If the meaning so assessed is evaluated as seriously defamatory it will ordinarily then be proper to draw an inference of serious reputational harm. Once that threshold is reached further evidence will then be likely to be more relevant to quantum and any continuing dispute should ordinarily be left to trial.</span></em></p>
<p style="margin: 0cm 0cm 0pt 36pt;"><em><span> </span></em></p>
<p style="margin: 0cm 0cm 0pt 36pt;"><em><span>(4) Courts should ordinarily be slow to direct a preliminary issue, involving substantial evidence, on a dispute as to whether serious reputational harm has been caused or is likely to be caused by the published statement.</span></em></p>
<p style="margin: 0cm 0cm 0pt 36pt;"><em><span> </span></em></p>
<p style="margin: 0cm 0cm 0pt 36pt;"><em><span>(5) A defendant disputing the existence of serious harm may in an appropriate case, if the circumstances so warrant, issue a Part 24 summary judgment application or issue a Jameel application: the Jameel jurisdiction continuing to be available after the 2013 Act as before (albeit in reality likely only relatively rarely to be appropriately used).</span></em></p>
<p style="margin: 0cm 0cm 0pt 36pt;"><em><span> </span></em></p>
<p style="margin: 0cm 0cm 0pt 36pt;"><em><span>(6) All interlocutory process in such cases should be sought to be managed in a way that is proportionate and cost-effective and actively promotes the overriding objective.</span></em></p>
<p style="margin: 0cm 0cm 0pt 36pt;"><em><span> </span></em></p>
<p style="margin: 0cm 0cm 0pt 36pt;"><em><span>(7) Finally, it may be that in some respects the position with regard to bodies trading for profit, under s.1(2), will be different. I say nothing about that subsection which clearly is designed to operate in a way rather different from s.1(1).</span></em></p>
<p style="margin: 0cm 0cm 0pt;"><span> </span></p>
<p style="margin: 0cm 0cm 0pt;"><span>As a consequence, the Court held that an inference of serious reputational harm arose and, also having regard to the significant readership of the publications and the Defendants' status as influential and reputable publishers, the appeal was dismissed.</span></p>
<p style="margin: 0cm 0cm 0pt;"><span> </span></p>
<p style="margin: 0cm 0cm 0pt;"><span>An application for permission to appeal to the Supreme Court has been lodged on behalf of Independent Print Limited and Evening Standard Limited, but not yet determined.  </span></p>
<p style="margin: 0cm 0cm 0pt;"><span> </span></p>
<p style="margin: 0cm 0cm 0pt;"><strong><span>Comment </span></strong></p>
<p style="margin: 0cm 0cm 0pt;"><span> </span></p>
<p style="margin: 0cm 0cm 0pt;"><span>This is a disappointing and regressive judgment for defendants, which contrasts with the indications given by Parliament as to how they envisaged the new section would protect defendants and enable weak claims to be disposed of at an early stage. </span></p>
<p style="margin: 0cm 0cm 0pt;"><span> </span></p>
<p style="margin: 0cm 0cm 0pt;"><span>In practice, the decision gives little guidance on the circumstances in which an inference of serious harm might be drawn and therefore less serious imputations and/or cases involving Chase Level 2 and 3 meanings may well still result in preliminary issues being directed, whether in conjunction with a determination of meaning or on a standalone basis, albeit that such hearings and the evidence required for them may be curtailed.   </span></p>
<p style="margin: 0cm 0cm 0pt;"><span> </span></p>
<p style="margin: 0cm 0cm 0pt;"><span>The finding that serious harm occurs at the point of publication may limit the potential impact of the publication of a prompt apology, particularly in relation to cases bearing the most serious imputations. </span></p>
<p style="margin: 0cm 0cm 0pt;"><span> </span></p>
<p style="margin: 0cm 0cm 0pt;"><span>Pending the outcome of the application for permission to appeal, this long-awaited judgment will cause further uncertainty for parties and may lead to issues of serious harm being left for trial, thus leading to further resources being expended on unmeritorious claims. </span></p>]]></content:encoded></item><item><guid isPermaLink="false">{974AB574-CBB3-4BBC-8B8B-F8D609AE4EA4}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/government-sets-out-details-of-new-data-protection-legislation/</link><title>Government sets out details of new data protection legislation</title><description><![CDATA[The Government has today published a Statement of Intent setting out details of the forthcoming Data Protection Bill.  Matt Hancock MP, the Digital Minister, says that the reforms will "bring our data protection law up to date" whilst transferring the General Data Protection Regulation ('GDPR') into domestic law. The text of the Data Protection Bill is expected in early September.]]></description><pubDate>Mon, 07 Aug 2017 14:24:39 +0100</pubDate><category>Data and privacy</category><authors:names>Alex Wilson</authors:names><content:encoded><![CDATA[<p style="margin: 0cm 0cm 12pt; text-align: justify;"><span>The full text of the Statement can be found </span><a href="https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/635900/2017-08-07_DP_Bill_-_Statement_of_Intent.pdf"><span style="text-decoration: underline;">here</span></a><span>, with Matt Hancock's Letter to Stakeholders found </span><a href="https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/635869/2017-08-07_Data_protection_bill_stakeholder_letter.pdf"><span style="text-decoration: underline;">here</span></a><span>.  The Statement confirms that the Government will implement the GDPR and indicates the derogations it intends to exercise. We set out some highlights below.</span></p>
<p style="margin: 0cm 0cm 12pt; text-align: justify;"><span style="text-decoration: underline;">Children<br></span><span><br>Article 8 of the GDPR provides for children to be able to give their lawful consent to processing in connection with the provision of information society services where they are at least 16 years old, unless Member State Law provides for a lower age being not less than 13. </span></p>
<p style="margin: 0cm 0cm 12pt; text-align: justify;"><span>The Government proposes to allow children above the age of 13 to give consent to processing, with those under the age of 13 requiring the consent of a parent/guardian. </span></p>
<p style="margin: 0cm 0cm 12pt; text-align: justify;"><span>The Statement also indicates that as well as enforcing age limits, the Government expects responsible websites to prevent the exposure of children to inappropriate content. </span></p>
<p style="margin: 0cm 0cm 12pt; text-align: justify;"><span style="text-decoration: underline;">The Right to be Forgotten</span></p>
<p style="margin: 0cm 0cm 12pt; text-align: justify;"><span>In accordance with the Conservative manifesto commitment, individuals will be able to ask for their personal data to be erased in certain circumstances, including the removal of social media posts.  This will include, but appears not to be limited to, the ability to require the deletion of material posted before the age of 18 "subject to very narrow exemptions".  </span></p>
<p style="margin: 0cm 0cm 12pt; text-align: justify;"><span style="text-decoration: underline;">Profiling</span></p>
<p style="margin: 0cm 0cm 12pt; text-align: justify;"><span>The Government will implement the derogation under Article 22(2)(b) to allow automated processing in the absence of explicit consent or it being necessary for the entering or performance of a contract.  Individuals will have recourse for unfavourable, and presumably unjustified, automated decisions. </span></p>
<p style="margin: 0cm 0cm 12pt; text-align: justify;"><span>No indication is given as to what will be considered "legal or similarly significant effects", and therefore the circumstances in which a human element must be introduced, so it may be necessary to wait for the ICO's guidance following its Feedback request on profiling and automated decision-making, which was published in April. </span></p>
<p style="margin: 0cm 0cm 12pt; text-align: justify;"><span style="text-decoration: underline;">Criminal sanctions</span></p>
<p style="margin: 0cm 0cm 12pt; text-align: justify;"><span>The criminal offence at s55 Data Protection Act 1998 will be extended to cover not only obtaining, disclosing or procuring the disclosure of personal data without the consent of the data controller but also the retention of data.  The Government confirms that it shall introduce a new defence for journalistic activity, remedying the current discrepancy between the application of the public interest defence and the journalism exemption. </span></p>
<p style="margin: 0cm 0cm 12pt; text-align: justify;"><span>A new criminal offence of intentionally or recklessly re-identifying individuals from anonymised or pseudonymised data will also be introduced with an unlimited fine.</span></p>
<p style="margin: 0cm 0cm 12pt; text-align: justify;"><span style="text-decoration: underline;">Journalism Exemption</span></p>
<p style="margin: 0cm 0cm 12pt; text-align: justify;"><span>The journalism exemption set out in s32 of the Data Protection Act 1998 will remain, with the Statement specifically confirming that "the important role of journalists and whistleblowers in holding organisations to account and underpinning our free press will be protected by exemptions", with the current exemption used as a "baseline".  The Statement goes on to state that the Government considers the "existing exemptions…strike the right balance between privacy and freedom of expression". </span></p>
<p style="margin: 0cm 0cm 12pt; text-align: justify;"><span>This suggests that the exemption will be expanded to cover new rights afforded by the GDPR but may not result in the conditions for the application of the provision being revised.    </span></p>
<p style="margin: 0cm 0cm 12pt; text-align: justify;"><span style="text-decoration: underline;">Data relating to criminal convictions</span></p>
<p style="margin: 0cm 0cm 12pt; text-align: justify;"><span>The GDPR allows the UK to authorise the processing of personal data relating to criminal convictions and offences otherwise than by a public body or authority.  The government intends to exercise the derogation as there are many organisations that would not be classed as an 'official authority' who process criminal convictions data (e.g. insurers processing criminal convictions data for anti-fraud purposes or employers conducting permitted criminal records checks).</span></p>
<p style="margin: 0cm 0cm 0pt;"><span style="text-decoration: underline;">Public authorities</span></p>
<p style="margin: 0cm 0cm 0pt;"><span style="text-decoration: underline;"></span></p>
<p style="margin: 0cm 0cm 0pt;"><span><br>Public authorities, which are not defined under the GDPR, are restricted in the manner in which they can rely on the legitimate interests condition for processing.  The Government has indicated that it intends to use the definition set out under the Freedom of Information Act 2000, which for some quasi-public organisations (such as public service broadcasters) could result in a purposive approach. </span></p>
<p style="margin: 0cm 0cm 0pt;"><span> </span></p>
<p style="margin: 0cm 0cm 0pt;"><span style="text-decoration: underline;">ICO</span></p>
<p style="margin: 0cm 0cm 0pt;"><span style="text-decoration: underline;"></span></p>
<p style="margin: 0cm 0cm 0pt;"><span style="text-decoration: none;"></span></p>
<p style="margin: 0cm 0cm 0pt;"><span><br>The ICO shall continue to be the sole supervisory authority in the UK and, together with the UK National Accreditation Service (UKAS), shall be accredited to certify and issue data protection seals and marks for the purposes of demonstrating compliance.</span></p>
<p style="margin: 0cm 0cm 0pt;"><span> </span></p>
<p style="margin: 0cm 0cm 0pt;"><span style="text-decoration: underline;">Next steps<br></span></p><p style="margin: 0cm 0cm 0pt;"><br></p>
<p style="margin: 0cm 0cm 0pt;"><span style="text-decoration: underline;"></span></p>
<p style="margin: 0cm 0cm 0pt;"><span style="text-decoration: none;"></span></p>
<span>The draft Data Protection Bill itself is expected in early September.</span>]]></content:encoded></item><item><guid isPermaLink="false">{BBEF68C9-FCBD-4481-A6AF-05D44C7C77AE}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/when-can-publishing-newspaper-articles-amount-to-harassment/</link><title>When can publishing newspaper articles amount to harassment?</title><description><![CDATA[The High Court has struck out part of a harassment claim against the publisher of the Daily Mail and Mail Online.  Unless the Judge's order is successfully appealed, the remaining harassment claim will proceed to trial.]]></description><pubDate>Fri, 28 Jul 2017 15:37:58 +0100</pubDate><category>Data and privacy</category><authors:names>Keith Mathieson</authors:names><content:encoded><![CDATA[<p>Readers may remember some of the facts that gave rise to the harassment claim.  The claimant Zipporah Lisle-Mainwaring is a wealthy widow who bought an expensive property in Kensington with a view to converting it into a luxury residence for herself with a mega-basement containing a swimming pool, gym and cinema.  Following the refusal of planning permission (which was later granted), she took the unusual step of painting the front of the property in red and white candy stripes such that it stood out very conspicuously from its mews neighbours.  In the words of His Honour Judge Moloney QC sitting as a High Court judge: "Not surprisingly, this literally colourful action attracted much wider attention to the claimant and her planning dispute, as she must have realised would happen".           </p>
<p>The story came to the attention of the Mail, which made contact with the claimant and began publishing stories about her and her planning dispute.  Those contacts and stories are together alleged by the claimant to have constituted a course of conduct amounting to harassment of her.</p>
<p>The claim is slightly complicated by the existence of an earlier libel complaint against the Mail.  That complaint concerned two articles about the claimant's relationship with her step family and resulted in the issue of libel proceedings against the Mail.  Those proceedings were determined by HH Judge Parkes QC following the acceptance of an offer of amends.  That determination took place before Judge Moloney handed down his judgment in the harassment claim.</p>
<p>The judgment in the harassment claim sets out details of the 10 contacts and nine articles relied on by the claimant.  Only two of the 10 contacts with the claimant were to her directly: an email and a visit to her gated home in Geneva.  The other contacts were with her professional advisers.</p>
<p>The last contact and article were in July 2015.  The claimant had begun her libel action against the Mail in June.  In September the claimant's solicitors said they were thinking of amending their claim to plead harassment.  In November the claimant accepted the offer of amends in the libel action.  In December she sued for harassment. </p>
<p>Following service of the Defence and Reply the defendant publisher, Associated Newspapers, applied to strike out the harassment claim and/or sought summary judgment.  As Judge Moloney summarised them, the grounds of the application were essentially that the matters complained of were either incapable of constituting harassment at all or were insufficiently serious to render them actionable.  Associated further claimed that the harassment action was an abuse on <em>Jameel</em> grounds as the damages even if she succeeded could not possibly justify the huge costs and court time entailed.</p>
<p>The judge agreed with Associated that the correct approach was to ask whether the pleaded case "can possibly satisfy the Majrowski requirement that the conduct complained of is so oppressive as pass the threshold of criminality " (<em>Majrowski v Guy's and St Thomas's NHS Trust [2006] HL 34</em>) </p>
<p>The judge struck out the claim based on the journalistic contacts.  He noted that a degree of contact with the claimant and her advisers was unavoidable following her "dramatic act".  Not only was the journalists' behaviour well within the limits of what is acceptable (on the claimant's own case): it was "a tribute to <em>Reynolds </em>and the higher professional standards it has encouraged".  None of the acts complained of constituted harassment.</p>
<p>The judge declined to strike out the claim based on the articles.  The judge considered it "well arguable"  that the Mail had published the articles not because they were relevant to the planning dispute but because they were about someone their readers loved to hate and would therefore be further clickbait as they discredited her yet further.  Accordingly, he could not say the articles could never be said to constitute harassment.  Nor could it be said that the claimant, despite having already recovered libel damages for two of the articles, could never recover worthwhile damages for harassment.</p>
<p>The use of harassment as a cause of action against the media has been largely limited to the use of intrusive news gathering methods that go well beyond generally accepted limits.  The courts have, for example, granted injunctions in favour of beleaguered celebrities such as Amy Winehouse to stop paparazzi from chasing them on high speed motorbikes or placing them under siege in their own homes.  For a court to hold that a newspaper publisher is guilty of harassment by publishing a series of articles about a claimant, particularly a claimant who has already successfully sued them for libel, would be breaking new ground.  Further developments in this case will be watched with great interest.  Associated Newspapers is currently considering a possible appeal and the claimant has said that if Associated gets permission to appeal, she will seek to cross-appeal against the judge's finding against her.</p>
<span>RPC acted for Associated Newspapers in this case.</span>]]></content:encoded></item><item><guid isPermaLink="false">{50A01342-3A45-4675-B874-55FCFBCF41E5}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/pnm-blog/</link><title>Supreme Court endorses open justice principle</title><description><![CDATA[The Supreme Court has handed down its much anticipated judgment on reporting restrictions and the principle of open Justice in the case Khuja (formally PNM) v Times Newspapers Limited.]]></description><pubDate>Tue, 25 Jul 2017 15:11:28 +0100</pubDate><category>Data and privacy</category><authors:names></authors:names><content:encoded><![CDATA[<p style="margin: 0cm 0cm 12pt;">The Supreme Court has handed down its much anticipated judgment in <a href="https://www.supremecourt.uk/cases/docs/uksc-2014-0270-judgment.pdf"><span style="text-decoration: underline;">Khuja (formally PNM) v Times Newspapers Limited</span></a> . The judgment comes as a welcome restatement of the principles of open justice especially in the context of criminal investigations.</p>
<p style="margin: 0cm 0cm 12pt;">The facts are by now well known. An individual, Tariq Khuja (formally known by the initials PNM), was arrested along with nine others as part of an investigation by Thames Valley Police into child sex grooming (known as Operation Bullfinch). Mr Khuja was released on bail and was later released from arrest without any charge. The nine other men arrested by Thames Valley Police were charged with serious offences involving organised child sex grooming. At the trial of those nine men Mr Khuja's name was mentioned on multiple occasions. Operation Bullfinch is still an active investigation although there is no suggestion that Mr Khuja will face any further investigation.</p>
<p style="margin: 0cm 0cm 12pt;">The issue before the Supreme Court was whether the Times and the Oxford Mail should be able to publish information identifying Mr Khuja as someone who had been arrested, bailed and then de-arrested in connection with Operation Bullfinch. Alternatively, whether an injunction should be granted to prevent reporting of those details in circumstances where that publication may interfere with Mr Kuja's Article 8 right to a private and family life. Neither of the two newspapers sought to publish anything beyond material derived from the trial in which Mr Khuja was named.</p>
<p style="margin: 0cm 0cm 12pt;">Lord Sumption gave judgment for the majority. He was keen to stress that issues should be approached on the basis that there was a risk that anyone knowing the matters referred to at trial may conclude that Mr Khuja had been involved in sexual abuse notwithstanding that he had never been charged with any offence.<span>  </span></p>
<p style="margin: 0cm 0cm 12pt;">The leading judgment starts from the position that it is a cardinal principle of the UK justice system that justice is openly administered; that decisions of the court, which are acts of the state, should be open to public scrutiny. The judgment recognises that there will be cases in which it will be necessary to derogate from that principle, but that those situations will usually only arise when derogation is necessary to protect the administration of justice itself, or to protect vulnerable members of society.</p>
<p style="margin: 0cm 0cm 12pt;">In deciding whether or not an injunction should be granted the Supreme Court stressed that it was not possible for a person to have a reasonable expectation of privacy in matters discussed at a public trial. The only basis then, on which Mr Khuja could argue that his right to a private and family life had been invaded, was on the basis of the impact that publication of trial proceedings would have on his relations with his family and their relations with the community. The impact on Mr Khuja's family would arise from the damage to Mr Khuja's reputation resulting from the reporting of matters discussed in open court. </p>
<p> <span>The leading judgment recognises that the impact of reporting on Mr Khuja's family could be very serious. Lord Sumption pointed out that in both civil and criminal proceedings things are often said in court which affect third parties. However, in the context of court proceedings whatever is said about a third party is protected by privilege. The reporting of what is said in court proceedings is also protected by the absolute privilege from liability for defamation for fair, accurate and contemporaneous publication. The leading judgment reaffirms the position that this privilege is afforded so that open justice and the freedom of the press to report fairly and accurately on public judicial proceedings may be facilitated. The Supreme Court recognised that an unfortunate consequence of that system is that innocent people may suffer a collateral impact resulting from what is said about them in court. The majority were clear: that is the price to be </span>paid for open justice to be delivered.<span>   </span></p>
<p style="margin: 0cm 0cm 12pt;">In an action for defamation no injunction would be available to Mr Khuja on the basis of a fair and accurate report about what was said about him in court. Where an injunction on the grounds of direct damage to Mr Khuja's reputation was unavailable the Supreme Court found that it would not make sense to grant an injunction on the basis of the collateral impact on Mr Khuja's family arising from the same damage to Mr Khuja's reputation. Accordingly no injunction was granted to Mr Khuja and the Times and Oxford Mail were permitted to report proceedings, naming Mr Khuja.</p>
<p style="margin: 0cm 0cm 12pt;">Although the judgment is a useful analysis of the open justice principle it is also of interest because of what it contributes to the ongoing debate around reporting of criminal investigations. Lord Kerr and Lord Wilson in their dissenting judgment were concerned about the effect upon an innocent person's reputation arising from the publication of the fact of their arrest where no charge or conviction had followed. On top of this, in the context of reporting focusing on open justice and the operation of section 4(2) of the Contempt of Court Act, the dissenting judges were troubled that naming Mr Khuja would create a widespread belief that Mr Khuja was guilty of serious crimes (this was specifically acknowledged as a risk at the outset of the leading judgment). In these circumstances, the dissenting judges felt that<em> "the scales have descended heavily in favour of PNM's rights under article 8; that he was likely to have established his right to an injunction against identification at full trial." </em></p>
<p style="margin: 0cm 0cm 12pt;">The majority followed the approach set out in <a href="http://www.bailii.org/uk/cases/UKSC/2010/1.html"><em><span style="text-decoration: underline;">re Guardian News and Media </span></em></a><em><span>  </span></em>that <em>"the law proceeds on the basis that most members of the public understand that, even when charged with an offence, you are innocent unless and until proved guilty in a court of law." </em>Whilst the dissenting judges felt that this was a legal presumption that has no firm basis the majority approached the problem on the basis that the <em>"law must of course take the presumption of innocence as its starting point." </em></p>
<p style="margin: 0cm 0cm 12pt;">In terms of the competing interests in naming Mr Khuja the majority referred back to re Guardian News and Media Ltd and Lord Rodger's remarks that "<em>stories about particular individuals are simply much more attractive to readers than stories about unidentified people. It is just human nature." </em>As a result the majority found that PNM's identity would not be a peripheral or irrelevant feature on any report. The majority were careful to note that it does not always follow that if there is sufficient public interest in the reporting of proceedings there will be public interest in identifying the individual involved. In that respect the courts have put in place the system of derogations laid out above.</p>
<p> <span>Given the recent injunction cases of <em>AJS v News UK</em> and <a href="http://www.bailii.org/ew/cases/EWHC/QB/2016/2760.html"><span style="text-decoration: underline;"><em>ERY v ANL</em> </span></a> which have both involved the granting of injunctions to prevent the naming of those involved in criminal investigations, the judgment is a reminder that it is a central feature of the UK justice system that one is presumed innocent until proven guilty. When taken with the strong endorsement of the open justice principle the Supreme Court's judgment is a sensible validation of the media's presumptive entitlement to report on the details of criminal investigations aired in open court. </span></p>
<p> </p>
<p> </p>]]></content:encoded></item><item><guid isPermaLink="false">{2821FBA7-2D0A-4979-BB73-1EA7AAB3D1A4}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/brevan-howard-gagging-order-against-reuters-upheld-by-the-court-of-appeal/</link><title>Brevan Howard's gagging order against Reuters upheld by the Court of Appeal in breach of confidence case </title><description><![CDATA[The news agency, Reuters, has lost its appeal against an injunction, which prevented it from reporting leaked confidential and commercially sensitive information concerning a leading global alternative asset manager, Brevan Howard Asset Management LLP. ]]></description><pubDate>Mon, 10 Jul 2017 10:29:30 +0100</pubDate><category>Data and privacy</category><authors:names></authors:names><content:encoded><![CDATA[<p style="margin: 0cm 0cm 12pt;">The case is an interesting reminder of how the public interest test is applied in breach of confidence cases, as distinct from other causes of action such as misuse of private information and libel.The Court of Appeal judgment can be found <a href="http://www.bailii.org/ew/cases/EWCA/Civ/2017/950.html"><span style="text-decoration: underline;">here</span></a>.</p>
<p style="margin: 0cm 0cm 12pt;"><strong>The facts</strong></p>
<p style="margin: 0cm 0cm 12pt;">In this case, an application by Brevan Howard for an interim non-disclosure order against Reuters had been heard and <a href="http://www.bailii.org/cgi-bin/format.cgi?doc=/ew/cases/EWHC/QB/2017/644.html&query=(BREVAN)+AND+(HOWARD)+AND+(ASSET)+AND+(MANAGEMENT)"><span style="text-decoration: underline;">granted</span></a> by Mr Justice Popplewell in March 2017. The commercial information at the heart of the dispute had been disclosed to 36 prospective professional investors in circumstances of strict confidence. Brevan Howard had taken several different steps to communicate and preserve the confidential nature of the information. For example, each recipient had been sent the documents with password protection, with the password being unique to each recipient.<span>  </span>The first page of the package of documents was headed "Private and Confidential" and "Not for Distribution”.<span>  </span>The package stated on its front page: </p>
<p style="margin: 0cm 0cm 12pt;"><em>"Disclaimer and Important Information:<span>  </span></em></p>
<p style="margin: 0cm 0cm 12pt;"><em>This document has been provided specifically for the use of the intended recipient only and must be treated as proprietary and confidential.<span>  </span>It may not be passed on nor reproduced in any form in whole or in part in any circumstances without express prior written consent from Brevan Howard.<span>  </span>Without limitation to the foregoing any text and statistical or any portion thereof contained in this document may not be permanently stored in a computer, published, re-written for broadcast or publication or redistributed in any medium except with the express prior written permission of Brevan Howard.”</em></p>
<p style="margin: 0cm 0cm 12pt;">Reuters had obtained the information from a confidential source and approached Brevan Howard for comment prior to publication – which in turn triggered Brevan Howard's injunction application. </p>
<p style="margin: 0cm 0cm 12pt;"><strong>The decision to grant the injunction at first instance</strong></p>
<p style="margin: 0cm 0cm 12pt;">In granting the injunction the Judge applied section 12 of the Human Rights Act 1998, which is relevant as the application sought to restrain the freedom of expression of Reuters protected by Article 10 of the European Convention of Human Rights. Thus Brevan Howard had to and did establish that, notwithstanding the importance of the Article 10 Convention right to freedom of expression and the extent to which the information was: a) already in the public domain (or about to be); and b) in the public interest, it was more likely than not to establish at trial that publication should not be allowed.</p>
<p style="margin: 0cm 0cm 12pt;">The Judge held that all of the relevant ingredients of a breach of confidence action had been made out: the information had the necessary quality of confidence about it and had been imparted in confidential terms. Reuters were on notice of the confidential nature of the information. Furthermore, although evidence of detriment was not a necessary ingredient, it was clear on the facts that the information would have the potential to be valuable to Brevan Howard's competitors and damaging to its business if disseminated more widely.</p>
<p style="margin: 0cm 0cm 12pt;">In terms of whether the identifiable public interest in the information met the relevant test, the Judge held that in all the circumstances, it was not in the public interest that the duty of confidence should be breached. In particular the Court (applying <em>Associated Newspapers Ltd v HRH Prince of Wales </em>[2002] Ch.57) impressed the importance of establishing not just that there is a public interest in publication; but also that there is a public interest in breaching the confidence which attaches to the information. That involves weighing the relative importance of the maintenance of confidentiality against the relative importance of the public interest in publication and is a fact specific exercise in each case. </p>
<p style="margin: 0cm 0cm 12pt;">In this case the Judge found that the maintenance of confidentiality outweighed the public interest. </p>
<p style="margin: 0cm 0cm 12pt;">The Judge also commented that a significant factor in the case was the fact that there was no evidence of iniquity – i.e. it was not necessary to correct any false impression created by Brevan Howard, or to reveal any illegal or immoral dealing, to expose hypocrisy or to expose some improper practice or concealment, nor even to demonstrate incompetence.<span>  </span>In this respect the Judge relied upon <em>Lion Laboratories Ltd v Evans [1985] 1 QB 526</em> as establishing that there is no rule that it is necessary to demonstrate iniquity in order to justify a breach of confidence and that a balancing exercise falls to be performed on the facts.<span>  </span></p>
<p style="margin: 0cm 0cm 12pt;"><strong>The appeal</strong></p>
<p style="margin: 0cm 0cm 12pt;">Reuters appealed the decision. The basis of the appeal was that the Judge had erred by failing to conduct a proper balancing and proportionality exercise because he adopted (what the written grounds of appeal described as:) a “sliding scale of information by type or category”, with the disclosure of iniquity and hypocrisy and the correction of a misimpression by the claimant at the top. The complaint was that the Court's starting point had been wrong, as the fact that there was no evidence of iniquity should not have been a significant factor in the balancing exercise conducted by the Court. According to Reuters, this error led the Court to give insufficient weight to a range of important matters of public interest.<span>  </span></p>
<p style="margin: 0cm 0cm 12pt;">However the Court of Appeal disagreed with Reuters and dismissed the appeal. The Court of Appeal held that the Judge at first instance made no error of principle or law.<span>  </span>His determination that the balance came down in favour of the preservation of the confidentiality of Brevan Howard’s information and that the grant of an injunction was a proportionate exception to Reuters’ right to freedom of expression under Article 10 were conclusions that he was entitled to reach. </p>
<p style="margin: 0cm 0cm 12pt;">The Court of Appeal held that the first instance decision merely followed the relevant common law: namely<em> the Prince of Wales case</em>, and relevant European jurisprudence, which emphasised the important public interest in the observance of duties of confidence and that this was a highly significant element to be weighed in the relevant balancing exercise. Further the Court of Appeal determined that Reuters' criticism of the Judge's reliance upon<em> Lion Laboratories </em>(and in particular Griffiths LJ's comment in that it will only be “an exceptional case in which a defence of public interest which does not involve iniquity on the part of the plaintiff will justify refusing the injunction”) was misplaced. The Court of Appeal felt that this statement was not inconsistent with <em>the Prince of Wales case</em> as it was merely an indication that, in carrying out the necessary balancing exercise, there must be sufficiently significant matters of public interest in favour of publication to outweigh the public interest in the observance of duties of confidence. In fact the importance of <em>Lion Laboratories</em> was that it made clear that in cases such as these, significant matters of public interest are not confined to the disclosure of iniquity. And in any event, the Court of Appeal said that the Judge had already completed the balancing and proportionality exercise in his judgment before he made any reference to <em>Lion Laboratories</em>.<span>  </span></p>
<p style="margin: 0cm 0cm 12pt;">In short the Court of Appeal did not find that the Judge had made any error of principle or law and supported the balancing exercise that had been undertaken by the Court in considering the relevant public interest test. </p>
<p style="margin: 0cm 0cm 12pt;"><strong>Comment</strong></p>
<p style="margin: 0cm 0cm 12pt;">Given the inherent nature of Brevan Howard's non-disclosure application much of the underlying facts in this case were heard and considered via private hearings. This prevents any qualitative assessment of the public interest balancing exercise that was carried out by the Court at first instance and then reconsidered by the Court of Appeal. However, it is clear from the Appeal judgment that this decision must be hugely frustrating for Reuters who submitted that the relevant underlying evidence supported "an exceptionally strong case of public interest, which engaged all the strands of the case law on public interest".<span>  </span></p>
<p style="margin: 0cm 0cm 12pt;">Further, in contrast to how a public interest defence is often advanced in defamation, the Court of Appeal was unwilling to take into account Reuters' responsible journalism in providing Brevan Howard with considerable detail about the intended publication, seeking comment from and giving assurances to Brevan Howard that Reuters would fairly report any such comment. This unfortunately means that there is a clear disincentive for responsible news agencies like Reuters to contact subjects of public interest stories prior to publication. Whether or not publication without taking such steps is worth the risk may be determined in this case in the unlikely event that the claim continues to a full trial of the substantive issues.</p>
<p style="margin: 0cm 0cm 12pt;">For now the main takeaways from this case are that: 1) in the context of breach of confidence claims, any public interest balancing exercise must find "sufficiently significant matters of public interest" in favour of publication to outweigh the public interest in the observance of duties of confidence; 2) sufficiently significant matters of public interest are not confined to the disclosure of iniquity (for example: disclosure of some sort of wrong-doing, hypocrisy, deceit or concealment); and 3) as ever in the world of media litigation, the outcome of breach of confidence claims/applications for interim injunctive relief very much depends upon the individual (and often concealed to the public) facts of the case.</p>]]></content:encoded></item><item><guid isPermaLink="false">{D69ED05F-43E9-49CF-BC46-9828CAE472F3}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/cfas-and-ate-premiums-out-of-the-running-in-freedom-of-expression-cases/</link><title>CFAs and ATE premiums out of the running in freedom of expression cases</title><description><![CDATA[Supreme Court tips media organisations' Article 10 rights over obligation to pay claimants' additional liabilities in freedom of expression cases ]]></description><pubDate>Tue, 11 Apr 2017 10:50:30 +0100</pubDate><category>Data and privacy</category><authors:names></authors:names><content:encoded><![CDATA[<p style="text-align: justify;">In the case of Times Newspapers Ltd v Flood; Miller v Associated Newspapers Ltd; and, Frost and others v MGN Ltd <a href="https://www.supremecourt.uk/cases/docs/uksc-2015-0045-judgment.pdf">[2017] UKSC 33</a>, the defendant media organisations each brought an appeal to the Supreme Court in relation to the obligation that they pay additional liabilities in cases engaging their right to freedom of expression. The Court found infringements of the media's Article 10 rights in two of the three appeals, but nevertheless dismissed each of them.   </p>
<p style="text-align: justify;"><span>The arguments emanated from the 2011 </span><a href="http://hudoc.echr.coe.int/eng?i=001-102965">decision</a><span> of the European Court of Human Rights that MGN's Article 10 rights had been infringed by having to reimburse the supermodel Naomi Campbell the success fee incurred following her successful privacy and data protection claim over the 2001 publication of a photograph of her attending Narcotics Anonymous. This argument had previously been </span><a href="https://www.publications.parliament.uk/pa/ld200506/ldjudgmt/jd051020/camp-1.htm">rejected</a><span> by the House of Lords in 2005.</span></p>
<p><span>Notwithstanding this, publication and privacy claims were one of the very few categories of proceedings in which it had remained permissible, since the Legal Aid, Sentencing and Punishment of Offenders Act 2012 came into force on 1 April 2013, for successful claimants to recover success fees and ATE premiums under the Access to Justice Act 1999.</span></p>
<p><span>Associated Newspapers' appeal related to an order that they pay success fees of £587,000 and an ATE premium of £248,000 in addition to base costs to a claimant, Mr Miller, who had entered into the relevant agreements in 2009. He had been awarded £65,000 damages over a defamatory allegation that there were grounds to suspect his management consultancy had received public contracts as a result of "improper conduct and cronyism".</span></p>
<p><span>MGN's appeal related to the additional liabilities sought to be recovered by representative claimants in the phone hacking litigation, who had entered into the agreements between 2011 and 2014. These included the costs in the Court of Appeal, where sums of £645,799.88 and £318,000 were being sought to be recovered by the claimants in respect of success fees and ATE premium, respectively, in addition to base costs of £739,456.87.</span></p>
<p><span>Times Newspapers' appeal related to the order of Davies J that it should pay the costs, including additional liabilities, of proceedings brought by a Metropolitan Police officer concerning an allegation of possible corruption, notwithstanding that it had successfully advanced a Reynolds responsible journalism defence to a large part of the claim. These agreements had been entered into in 2007 and 2010.</span></p>
<p><span>Lord Neuberger, giving the judgment of the Court, opined that there was a very powerful argument for concluding that there is a general rule that, where a claim against a publisher involves a restriction on freedom of expression, as a matter of domestic law it would normally infringe the defendant's Article 10 rights to require it to pay additional liabilities incurred by a successful claimant pursuant to the Access to Justice Act 1999. However, on account of the UK Government not being a party to the proceedings, the Supreme Court declined to determine the issue. Nevertheless, it determined the appeals on the basis that such a rule did apply, making such an outcome the odds on favourite in any subsequent proceedings.</span></p>
<p> <span>Associated Newspapers was first out of the gates, with the Supreme Court concluding that upholding the costs order against it would infringe its Article 10 rights. But the Court went on to decide that to deprive Mr Miller of the costs for which he was, at least on paper, liable to his insurers and legal representatives would lead to an infringement of his property rights under Article 1 of Protocol 1. In something of a photo finish, the Supreme Court decided that Associated Newspapers' appeal ought to be dismissed because to allow the appeal would involve a greater injustice.</span></p>
<p> <span>Times Newspapers was saddled with the broad judicial discretion in relation to costs and the Supreme Court determined that the first instance judge had been entitled to award the Claimant costs as the overall winner, rather than taking an issue based approach. On the Article 10 issue, however, the Supreme Court considered that the Times was in the same position as Associated and an obligation to pay additional liabilities was an infringement of its Article 10 rights.</span></p>
<p><span>The Court considered MGN Ltd to be reined in by the unlawful conduct underlying the claims, which adversely affected the weight to be afforded to its  Article 10 rights, and disbarred it from relying on the principle that additional liabilities would constitute an infringement.</span></p>
<p><span>While each of the appeals was dismissed, claimants and their legal representatives would be blinkered if they considered that the Supreme Court had given the recovery of additional liabilities a clean bill of health in freedom of expression cases. It will be necessary for the Government to review its approach to enabling access to justice in media cases and remedy the infringements in these appeals, and indeed in other proceedings. In the meantime, media organisations will be chomping at the bit to challenge additional liabilities incurred subsequent to the Strasbourg and Supreme Court judgments.  </span></p>
<p style="text-align: justify;"><span>RPC represented Associated Newspapers Ltd and MGN Ltd in their appeals</span></p>
<p style="text-align: justify;"><span style="font-weight: lighter; text-align: left;"></span></p>]]></content:encoded></item><item><guid isPermaLink="false">{C39FDE32-A842-4D72-80F3-9DF8E2A76EA8}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/eleven-more-charities-fined-by-ico-in-wealth-screening-probe/</link><title>Eleven more charities fined by ICO in 'wealth screening' probe</title><description><![CDATA[The ICO has fined a further eleven charities following an investigation that revealed widespread misuse of donors' personal data.]]></description><pubDate>Fri, 07 Apr 2017 13:08:35 +0100</pubDate><category>Data and privacy</category><authors:names></authors:names><content:encoded><![CDATA[<p><span>The ICO investigation, which took place between 2015 and 2017, revealed serious breaches of the Data Protection Act, which included charities:</span><span> </span></p>
<ol>
    <li><span>hiring companies to investigate income, property values and lifestyles of potential donors so that they could be ranked based on wealth </span></li>
    <li><span>piecing together information about the donor that the donor did not provide, for example, using an old telephone number to find a new one</span></li>
    <li><span>sharing donor information with other charities without donor consent</span></li>
</ol>
<p><span> </span><span>As part of its investigation, the ICO has already fined the British Heart Foundation and the RSPCA for similar practices (see </span><a href="https://www.rpclegal.com/perspectives/data-and-privacy/secret-wealth-screening-by-charities-breaks-data-laws">here)</a><span>.  Eleven other charities have now also received fines:</span><span> </span></p>
<ul style="list-style-type: disc;">
    <li><span>Battersea Dogs' and Cats' Home (£9,000)</span></li>
    <li><span>Cancer Research UK (£16,000)</span></li>
    <li><span>Cancer Support UK (formerly Cancer Recovery Foundation UK) (£16,000)</span></li>
    <li><span>Great Ormond Street Hospital Children's Charity (£11,000)</span></li>
    <li><span>Macmillan Cancer Support (£14,000)</span></li>
    <li><span>Oxfam (£6,000)</span></li>
    <li><span>The Guide Dogs for the Blind Association (£15,000)</span></li>
    <li><span>The International Fund for Animal Welfare (£18,000)</span></li>
    <li><span>The National Society for the Prevention of Cruelty to Children (£12,000)</span></li>
    <li><span>The Royal British Legion (£12,000)</span></li>
    <li><span>WWF-UK (£9,000)</span></li>
</ul>
<p><span> </span><span>The Information Commissioner, Elizabeth Denham, reduced the fines significantly to avoid causing additional distress to donors. However, her message to the charities was unequivocal: "</span><em>While we will continue to educate and support charities, we have been clear that what we now want, and expect, is for charities to follow the law</em><span>.”</span></p>
<p><span> </span><span>The fines bring a close to the ICO's investigation into charities. For further information, see the </span><span><a href="https://ico.org.uk/about-the-ico/news-and-events/news-and-blogs/2017/04/ico-fines-eleven-more-charities/">ICO blog post</a></span><span>.</span></p>]]></content:encoded></item><item><guid isPermaLink="false">{67604F75-4F9D-4739-919F-1B77CEBECBC8}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/secret-wealth-screening-by-charities-breaks-data-laws/</link><title>Secret 'wealth-screening' by charities breaks data laws</title><description><![CDATA[An ICO investigation into charity fundraising practices has led to two charities being fined and eleven being issued with Notices of Intent to fine.]]></description><pubDate>Mon, 20 Mar 2017 14:00:00 Z</pubDate><category>Data and privacy</category><authors:names></authors:names><content:encoded><![CDATA[<p>The ICO investigation revealed multiple data protection breaches by charities, including the secret wealth screening of donors in order to target them for more money.<strong> </strong></p>
<p>The ICO's investigation, which took place during 2015/16, revealed numerous serious and widespread data protection breaches in the charity and fundraising sector.  In particular, the ICO found that charities: </p>
<ol>
    <li>employed wealth management companies to secretly screen the wealth of their donors, in order to target them for more money; </li>
    <li>shared donor data with each other without permission; and</li>
    <li>used companies to "fill in gaps" in personal information provided by donors. For example, where a donor only provided an email address, the charity would engage a company to find out the donor's telephone number and/or postal address, so that the charity could also contact the donor using these additional contact details. </li>
</ol>
<p>Such practices were conducted without the permission or knowledge of donors. </p>
<p>The British Heart Foundation and the RSPCA are the first to be fined - <a href="https://ico.org.uk/action-weve-taken/enforcement/british-heart-foundation-cmp/">£18,000</a><span> </span> and <a href="https://ico.org.uk/action-weve-taken/enforcement/rspca-cmp/">£25,000</a><span> </span>respectively.  </p>
<p>The practices adopted by the charities have been slammed by Information Commissioner, Elizabeth Denham.  She expressed concern that the: “<em>widespread disregard for people’s privacy will be a concern to donors, but so will the thought that the contributions people have made to good causes could now be used to pay a regulator’s fine for their charity’s misuse of personal information</em>.”</p>
<p>The ICO is now focusing on educating charities on their data protection obligations. For further information, see the <a href="https://ico.org.uk/about-the-ico/news-and-events/news-and-blogs/2016/12/ico-investigation-reveals-how-charities-have-been-exploiting-supporters/ ">ICO blog statement</a>.<span style="font-weight: lighter;"> </span></p>
<div> 
<div>
<div id="_com_1" language="JavaScript">  </div>
</div>
</div>]]></content:encoded></item><item><guid isPermaLink="false">{BACDDFA6-2BC2-48F1-A82F-08A56C832DD3}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/italian-data-protection-authority-issues-fines-totalling-more-than-11m-for-illegal-data-processing/</link><title>Italian data protection authority issues fines totalling more than €11m for illegal data processing</title><description><![CDATA[The fines are thought to be the highest ever issued by a European data protection authority.]]></description><pubDate>Tue, 14 Mar 2017 14:45:29 Z</pubDate><category>Data and privacy</category><authors:names></authors:names><content:encoded><![CDATA[<p>The illegal data processing was discovered as part of a money laundering investigation into Sigue Global Services Ltd and four other companies.  The investigation discovered that funds had been divided up and falsely attributed to thousands of unsuspecting individuals before being transferred abroad.  This was done to ensure that the transfers fell below the financial limit over which stringent money laundering checks would be applied.</p>
<p>The Italian data protection authority found that the personal data of the individuals who had funds falsely attributed to them had been processed illegally.  In particular, the individuals had not consented to the processing of their personal data.  Given the seriousness of the crime and the number of individuals involved, the Italian data protection authority fined the companies €5.88m, €1.59m, €1.43m, €1.26m and €0.85m respectively.</p>
<span> </span>
<p style="margin: 0cm 0cm 0pt;">This decision is notable for the scale of the fines.<span>  </span>In the UK, the Information Commissioner's Office may only impose fines up to £500k for data breaches (although other regulators, such as the FCA can impose larger fines, where applicable).<span>  </span>Fines of this magnitude (and larger) are likely to become more common when the GDPR comes into force in May 2018, when national regulators will be able to impose fines of up to €20m or 4% of total worldwide annual turnover.</p>]]></content:encoded></item><item><guid isPermaLink="false">{252CA5AE-B842-477A-8763-287F2D160A24}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/scottish-court-awards-17000-damages-for-distress-caused-by-neighbours-cctv-surveillance/</link><title>Couple awarded £17,000 damages for distress caused by neighbour's CCTV surveillance</title><description><![CDATA[The compensation is an example of the rise of "distress" claims as a result of breaches of the Data Protection Act 1998 (DPA).]]></description><pubDate>Wed, 22 Feb 2017 12:00:00 Z</pubDate><category>Data and privacy</category><authors:names></authors:names><content:encoded><![CDATA[<p>The complaint was raised in the Scottish courts by a couple who lived in a flat above a guesthouse, whose owner installed CCTV and audio recording equipment to their shared building.  The CCTV was set to record 24 hours a day (storing 5 days' worth of data at any time) and could be accessed remotely.</p>
<p>From 2013, the CCTV cameras were set up to cover the couple's private property (including the entrance to their flat and their garden).  The owner's husband taunted the couple, saying he could listen to private conversations in their garden.  The couple feared that private conversations within their flat were being recorded, leading to feelings of anger, stress and frustration.</p>
<p>The court found that the guesthouse owner, as the data controller, had breached several of the data protection principles under the DPA.  In giving his judgment, Sheriff Ross found the data processing to be intrusive, excessive, unjustified and "an effort to oppress".</p>
<p>Sheriff Ross referred to the 2015 Court of Appeal case <em>Google v Vidal-Hall</em>, which established a right to compensation for distress only for breaches of the DPA.  Before the 2015 ruling, compensation was only available in circumstances where some financial loss had been suffered.</p>
<p>There is no statutory guidance as to compensation for distress claims under the DPA, so Sheriff Ross accepted the couple's calculation of damages.  This was based on a sum of £10 per day for each of them, multiplied by the number of days the data processing had taken place in breach of the DPA.  One month of days was deducted to account for when the couple were likely to be absent from the property (eg on holiday). </p>
<span>It will be interesting to see whether this method of calculating damages by reference to a daily figure will be followed in future cases elsewhere in the UK, or whether a lump sum approach will be favoured by claimants and/or the courts.  In any event, this decision sets down a marker for future "distress" claims relating to breaches of the DPA and provides an example of how to quantify damages for such claims.  </span>]]></content:encoded></item><item><guid isPermaLink="false">{390C576D-F6FD-40AA-BFE9-5711D097809B}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/brexit-does-not-spell-the-end-of-the-gdpr/</link><title>Brexit does not spell the end of the GDPR</title><description><![CDATA[Whether or not the GDPR will remain a part of UK law will depend on the path of the Brexit negotiations. A post-Brexit UK government may wish to avoid implementing some of the more onerous parts of the GDPR, if possible.<br>
<div> </div>]]></description><pubDate>Wed, 08 Feb 2017 11:12:14 Z</pubDate><category>Data and privacy</category><authors:names></authors:names><content:encoded><![CDATA[Whether or not the GDPR will remain a part of UK law will depend on the path of the Brexit negotiations. A post-Brexit UK government may wish to avoid implementing some of the more onerous parts of the GDPR, if possible.<br>
<div> </div>]]></content:encoded></item><item><guid isPermaLink="false">{D6699813-C8BF-447A-AA5D-E5773894A303}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/investigatory-powers-act-gets-royal-assent/</link><title>Investigatory Powers Act gets royal assent</title><description><![CDATA[This week, the Queen gave royal assent to the Investigatory Powers Bill (aka "The Snoopers Charter"), marking the end of the controversial bill's passage into law.]]></description><pubDate>Fri, 02 Dec 2016 13:58:15 Z</pubDate><category>Data and privacy</category><authors:names></authors:names><content:encoded><![CDATA[<span></span>
<p style="text-align: justify;" dir="LTR">The Investigatory Powers Act 2016 introduces several new powers, which the Home Office says will ensure that law enforcement and the security services "<em>have the powers they need in a digital age to disrupt terrorist attacks</em>". While the Act restates many existing powers, some of the new powers have attracted criticism as undermining privacy rights, including:</p>
<ul>
    <li dir="LTR"><strong>Collection of Internet Connection Records: </strong>Internet and communications companies will have to retain meta data of customers' browser history for 12 months. This information includes which websites users have visited, when and for how long. Some 48 authorities, including government departments, police forces, local councils and HMRC, will be able to request this information.</li>
    <li dir="LTR"><strong>Equipment interference warrants: </strong>For the first time, the Home Secretary will have the power to permit security services to hack into computers, networks, mobile devices and servers.</li>
    <li dir="LTR"><strong>Access to "bulk" personal data sets: </strong>The Home Secretary may issue warrants to the security services to allow access to large data sets held by public and private organisations, or to permit large scale hacks, including in overseas operations.</li>
</ul>
<p style="text-align: justify;" dir="LTR">Despite government assurances of proper oversight (there will be a new Investigatory Powers Commissioner and a "double-lock" mechanism for some of the more intrusive powers), civil liberties campaigners have criticised the Act. Bella Sankey, the Policy Director for Liberty, said the new powers "open every detail of every citizen's online life up to state eyes, drowning the authorities in data and putting innocent people's personal information at massive risk."<span> </span></p>
<p style="text-align: justify;" dir="LTR">An online petition to repeal the Act has gained over 145,000 signatures. The government has confirmed that a number of provisions in the bill will not be in place for some time. </p>
<span></span>
<p style="text-align: justify;" dir="LTR">Against the backdrop of recent high profile data breaches, a key concern for everyone must be whether the companies that collect the data (and the authorities that access it) can keep such data secure. Internet records would be a prize target for the hacker who manages to access them! </p>
<p style="text-align: justify;" dir="LTR"> </p>
<p style="text-align: justify;" dir="LTR"> </p>]]></content:encoded></item><item><guid isPermaLink="false">{3A685F18-3BFE-4346-BE3C-0D67FB43B31B}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/ico-issues-record-400-000-fine-for-talktalk-data-breach/</link><title>ICO issues record £400,000 fine for TalkTalk data breach</title><description><![CDATA[The record fine is an indication that the new Information Commissioner, Elizabeth Denham, is looking to take a robust approach to enforcement ahead of the introduction of the GDPR in May 2018.]]></description><pubDate>Tue, 11 Oct 2016 10:05:15 +0100</pubDate><category>Data and privacy</category><authors:names></authors:names><content:encoded><![CDATA[<p style="margin: 0cm 0cm 12pt;">In October 2015, a hacker accessed the personal data of 156,959 TalkTalk customers including names, addresses, dates of birth, phone numbers and email address, as well as bank details of over 15,000 customers.<span>  </span>The data was obtained through an attack on three vulnerable web pages inherited from TalkTalk's acquisition of Tiscali's UK operations in 2009, which enabled access to a database holding customer information.</p>
<p style="margin: 0cm 0cm 12pt;">The ICO investigation found that TalkTalk failed to implement even the most basic cyber security measures.<span>  </span>The ICO found that:</p>
<ul>
    <li style="margin: 0cm 0cm 12pt;">TalkTalk was not aware that its database software was outdated and that it was affected by a bug, for which a fix was readily available; </li>
    <li style="margin: 0cm 0cm 12pt;">the hacker used a common technique known as SQL injection, which TalkTalk ought to have known about and defended against, having been subject to two similar attacks in 2015.</li>
</ul>
<p style="margin: 0cm 0cm 12pt;">The fine sends a strong message to businesses of the importance of keeping personal data secure.<span>  </span>Denham said the record fine is "<em>a warning to others that cyber security is not an IT issue, it is a boardroom issue</em>".<span>  </span></p>
<span>The ICO's fine pales in comparison to the commercial damage suffered by TalkTalk, including reported costs of £60m and the loss of 101,000 customers. But penalties could soon be much higher.  The introduction of the GDPR in May 2018 will enable national regulators to impose fines of up to </span><span>€</span><span>20m or 4% of total worldwide annual turnover.</span>]]></content:encoded></item><item><guid isPermaLink="false">{543C0D56-DF52-44CB-BC59-6D0FD4A7EAFF}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/max-schrems-toppled-safe-harbor-will-the-model-clauses-be-next/</link><title>Max Schrems toppled Safe Harbor – will the Model Clauses be next?</title><description><![CDATA[On Monday, the Irish Data Protection Commissioner announced that it intends to seek clarification on the legal status of the EU Standard Contractual Clauses (the Model Clauses). ]]></description><pubDate>Fri, 27 May 2016 15:09:11 +0100</pubDate><category>Data and privacy</category><authors:names></authors:names><content:encoded><![CDATA[<p>As part of its ongoing investigation into privacy activist Schrems' complaint against Facebook, the Irish DPC will seek declaratory relief in the Irish High Court (and a referral to the CJEU) in order to determine the legal status of data transfers to the US under the Model Clauses.  </p>
<p>Like many organisations that relied on Safe Harbor, almost immediately after the CJEU's decision in the <a href="/thinking/data-and-privacy/eu-court-declares-safe-harbor-datatransfer-agreement-invalid/">Schrems cases</a>, Facebook Ireland entered into a Model Clauses contract with its US parent in order to justify its data transfers to the US.  This allowed Facebook to carry on with its business as usual, despite the Schrems decision.  </p>
<p>However, even at the time, it was clear that the Schrems decision also raised questions about the validity of the Model Clauses - the logic being that no contractual terms between parties can adequately protect a data subject if the US (or any state) chooses to 'overreach' in a manner that is contrary to European ideals of privacy.  The CJEU could therefore conclude that the Model Clauses are as flawed as Safe Harbor.  </p>
<p>European data protection regulators have been attempting to address this issue with the proposed "Privacy Shield".  But the negotiations on this are going  more slowly than planned.  Both the Article 29 Working Party and the European Parliament have called for further improvements to the proposals. </p>
<p>Meanwhile, the Model Clauses remain a valid justification to transfer personal data to the US (and to other countries outside the EEA) and there is no need to take any immediate action in respect of such transfers.  However, the action of the Irish DPC will put additional pressure on the EU and the US to push through the Privacy Shield proposals, and in a way that meets all the standards set out by the CJEU in the Schrems decision.</p>]]></content:encoded></item><item><guid isPermaLink="false">{DEAC5099-8E66-4811-B764-37495FD98012}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/ico-updates-direct-marketing-guidance/</link><title>ICO updates Direct Marketing Guidance </title><description><![CDATA[On 24 March 2016 the Information Commissioner's Office (ICO) published a long-awaited update to its Direct Marketing Guidance (the Guidance). ]]></description><pubDate>Mon, 04 Apr 2016 11:38:00 +0100</pubDate><category>Data and privacy</category><authors:names></authors:names><content:encoded><![CDATA[<p>The aim of the Guidance is to help organisations comply with their obligations under the Data Protection Act 1998 and the Privacy and Electronic Communications Regulations 2003 when carrying out direct marketing, with a focus on marketing via calls, texts and other electronic means. Key changes include new guidance on:</p>
<p style="margin-left: 40px;">• marketing by not-for-profit organisations;</p>
<p style="margin-left: 40px;">• indirect (third party) consent and using bought-in marketing lists; and</p>
<p style="text-align: justify; margin-left: 40px;">• obtaining freely given consent. </p>
<p style="text-align: justify;"><strong>Not-for-profit organisations</strong></p>
<p style="text-align: justify;">Perhaps the most significant change is that the Guidance places greater emphasis on scenarios involving charities, political parties and other not-for-profit organisations. Charities are required to follow the same rules as any other organisation and the updated Guidance reflects the difficulties some charities have found in meeting that requirement. This complements the ICO's ongoing work with the charity sector (for example, the ICO has signed undertakings with both British Red Cross and Age International, committing both charities to best practice around their fundraising calls).</p>
<p style="text-align: justify;">The Guidance makes it explicitly clear that direct marketing is not limited to advertising goods or services for sale and therefore "includes promoting an organisation's aims and ideals". It also states that the definition of direct marketing will cover any messages that contain marketing elements even if this is not the main purpose of the message and provides helpful examples of such messages.</p>
<p style="text-align: justify;"> <strong>Indirect (third party) consent</strong></p>
<p style="text-align: justify;">The updated Guidance provides organisations with more direction around indirect consent, which is defined as "situations where a person tells one organisation that they consent to receiving marketing from other organisations". This is unsurprising following the news that the <a href="https://ico.org.uk/about-the-ico/news-and-events/news-and-blogs/2016/03/uk-cold-call-capital-named-after-more-fines-issued/"><span style="text-decoration: underline;">ICO issued fines totalling £225,000 to two companies in Swansea </span></a>on the same day that the updated Guidance was published. Both companies had made calls based on lists provided by third parties.</p>
<p style="text-align: justify;">The latest Guidance makes it clearer that a broad general consent obtained through phrases such as 'are you happy to receive marketing from selected third parties' will rarely amount to an effective consent for third party marketing. For indirect consent to be valid it needs to be "clear and specific enough" which in essence means that the customer must have anticipated that their details would be passed to the organisation in question, and that they were consenting to messages from that organisation. Any entities that buy in marketing lists should therefore take note of these requirements.</p>
<p style="text-align: justify;"> <strong>Freely given consent</strong></p>
<p style="text-align: justify;">More clarification is provided on consent being "freely given". Organisations should not "coerce or unduly incentivise" people to consent to marketing calls. The ICO recommends that marketing consent should not be made a condition of subscription unless the organisation can "clearly demonstrate how consent to marketing is necessary for the service and why consent cannot be sought separately". This is a high hurdle to overcome and therefore organisations should think carefully before including such conditions.</p>
<p style="text-align: justify;"> <strong>Going forwards</strong></p>
<p style="text-align: justify;">Steve Wood, the ICO's Head of Policy Delivery, admitted in a <a href="https://iconewsblog.wordpress.com/2016/03/24/talked-about-marketing-guidance-gets-update/"><span style="text-decoration: underline;">blog</span></a> accompanying the publishing of the Guidance that many readers may have been hoping for more detailed guidance relating to specific service sectors. However, he also noted that to "create several different strands of guidance for several different sectors would create a confused picture" as the law applies to all organisations who are engaging in direct marketing activity.</p>
<p style="text-align: justify;">Regardless of the differences amongst sectors, the Guidance is a useful tool for organisations engaging in direct marketing and, as Steve Wood points out, "organisations should find reading the guidance far cheaper than fines for getting their marketing wrong".</p>]]></content:encoded></item><item><guid isPermaLink="false">{D4D51861-C10D-4B89-8528-592013CC8A59}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/court-of-appeal-injuncts-revelation-of-celebritys-extramarital-threesome/</link><title>CofA injuncts revelation of celebrity's extramarital threesome </title><description><![CDATA[The Court of Appeal has granted a privacy injunction (its first since 2011) to prevent the Sun on Sunday revealing details of a well-known entertainer’s extramarital threesome (PJS v News Group Newspapers Ltd [2016] EWCA Civ 100).]]></description><pubDate>Wed, 23 Mar 2016 11:56:00 Z</pubDate><category>Data and privacy</category><authors:names>Alex Wilson</authors:names><content:encoded><![CDATA[<p style="margin: 0cm 0cm 0pt;"><strong><span style="color: black;">Background</span></strong></p>
<p style="margin: 0cm 0cm 0pt;"> </p>
<p style="margin: 0cm 0cm 0pt;"><span style="color: black;">The Claimant, PJS, is in the entertainment industry and is married to YMA, another well-known individual in the same business.  They have been married for many years and have young children.  In 2007/8, the Claimant met an individual with whom he started a sexual relationship.  The individual in question also had a partner, and in 2011 the Claimant asked whether the partner would be “up for a three-way”.  They were, and PJS met with the couple for an extramarital threesome.</span></p>
<p style="margin: 0cm 0cm 0pt;"> </p>
<p style="margin: 0cm 0cm 0pt;"><span style="color: black;">Around January 2016, the couple with whom the Claimant had a threesome approached the Sun on Sunday to tell them about their sexual encounters with the Claimant.  The Sun on Sunday decided it would publish the story and on 14 January 2016 the Claimant was contacted to be informed of the position.  The Claimant commenced proceedings and applied for an injunction to restrain the Sun on Sunday from publishing the proposed story.</span></p>
<p style="margin: 0cm 0cm 0pt;">  </p>
<p style="margin: 0cm 0cm 0pt;"><span style="color: black;">The Defendant opposed the injunction on the basis that the Claimant and YMA had put many details of their relationship in the public domain and had portrayed an image of commitment.  Accordingly, it would be in the public interest to publish an account of the Claimant’s sexual exploits with others, correcting that false image, which would contribute to a relevant on-going public debate.  If someone makes false public statements about themselves or presents a false image to the public then there is a public interest in setting the record straight (Rio Ferdinand v MGN Limited </span><span style="color: #666666;"><a href="http://www.bailii.org/ew/cases/EWHC/QB/2011/2454.html"><span style="color: blue; text-decoration: underline;">[2011] EWHC 2454 (QB)</span></a></span><span style="color: black;">).</span></p>
<p style="margin: 0cm 0cm 0pt;"> </p>
<p style="margin: 0cm 0cm 0pt;"><span style="color: black;">The Claimant and YMA denied that the article was relevant to any public debate and maintained that they had not courted publicity about their private life.  Their relationship was an open one, and YMA accepted that from time to time the Claimant had sexual encounters with others.  Their relationship was one of commitment and they provided a loving home for their children.</span></p>
<p style="margin: 0cm 0cm 0pt;"> </p>
<p style="margin: 0cm 0cm 0pt;"><span style="color: black;">Cranston J refused the injunction.  He did not accept that publication would contribute to an on-going public debate, but accepted that there was a public interest in publication.  He found that the Claimant and his partner portrayed an image of commitment and that, having promoted that particular public image, there is a public interest in correcting it when the Claimant has engaged in casual sexual relationships.  The judge accepted the Claimant’s submission, however, that portraying an image of commitment does not necessarily mean that they do not engage in sexual relations with other people.  He also identified the Article 8 rights of the children as being a relevant consideration.  The injunction was nevertheless refused and the Claimant appealed.</span></p>
<p style="margin: 0cm 0cm 0pt;"><span> </span></p>
<p style="margin: 0cm 0cm 0pt;"><strong><span style="color: black;">The Court of Appeal Decision</span></strong></p>
<p style="margin: 0cm 0cm 0pt;"><span style="color: black;"> </span></p>
<p style="margin: 0cm 0cm 0pt;"><span style="color: black;">The Court of Appeal allowed the appeal and granted the injunction.</span></p>
<p style="margin: 0cm 0cm 0pt;"><span style="color: black;"> </span></p>
<p style="margin: 0cm 0cm 0pt;"><span style="color: black;">Jackson LJ, with whom King LJ agreed, accepted that the Court of Appeal should not intervene with the first instance judge’s balancing of Articles 8 and 10 unless they have erred in principle or reached a conclusion which was plainly wrong or outside the ambit of conclusions that a judge could reasonably reach (the threshold set by AAA v Associated Newspapers Ltd </span><span style="color: #666666;"><a href="http://www.bailii.org/ew/cases/EWCA/Civ/2013/554.html"><span style="color: blue; text-decoration: underline;">[2013] EWCA Civ 554</span></a></span><span style="color: black;">).  He reached the conclusion, however, that there were two significant shortcomings in the first instance decision.</span></p>
<p style="margin: 0cm 0cm 0pt;"><span style="color: black;"> </span></p>
<p style="margin: 0cm 0cm 0pt;"><span style="color: black;">He found that the judge had not properly explained how he had taken the Article 8 rights of the children into account and also that the portrayal of commitment by the Claimant and YMA did not present a false image requiring correction.  He concluded that the Court of Appeal should therefore conduct its own balancing exercise between Articles 8 and 10.</span></p>
<p style="margin: 0cm 0cm 0pt;"><span style="color: black;"> </span></p>
<p style="margin: 0cm 0cm 0pt;"><span style="color: black;">The Court considered whether the public image that the Claimant and YMA had portrayed went further than portraying commitment, i.e. whether they were presenting an image of monogamy to the world.  In the bundle of public domain material that had been publicised by the Claimant, submitted by the Defendant, there were two references to monogamy.  These were, however, before the Claimant began his extramarital sexual relationship with the individual he met in 2007/8.  The Court found that the picture which emerges from the public domain material was not one of total marital fidelity, but rather a picture of a couple who are in a long term, loving and committed relationship.  It found that, on the present evidence, that image is an accurate one and publishing details of an extramarital sexual relationship would not therefore be correcting a false image.</span></p>
<p style="margin: 0cm 0cm 0pt;"><span style="color: black;"> </span></p>
<p style="margin: 0cm 0cm 0pt;"><span style="color: black;">The Court agreed with Cranston J that publication would not contribute to a relevant public debate, which was raised again by the Defendant in its respondent’s notice.  The Defendant had also raised the argument that publication of the material fell within its freedom to criticise the Claimant as a public figure.  The Court accepted the Defendant’s Article 10 rights in this regard, but found that the Claimant’s Article 8 rights prevailed.  The Court found that the Claimant had an expectation that his sexual encounters would remain private and that the proposed story, if published, would have a devastating effect on him.  The Court also considered that the Claimant’s children would be the subject of increased press attention and that they would be bound to learn about the matters from school friends or the internet in due course.</span></p>
<p style="margin: 0cm 0cm 0pt;"><span style="color: black;"> </span></p>
<p style="margin: 0cm 0cm 0pt;"><span style="color: black;">The Court of Appeal was satisfied that the Claimant was likely (i.e. more probable than not, as per Cream Holdings v Banerjee </span><span style="color: #666666;"><a href="http://www.bailii.org/uk/cases/UKHL/2004/44.html"><span style="color: blue; text-decoration: underline;">[2004] UKHL 44</span></a></span><span style="color: black;">) to establish that publication should not be allowed at trial, therefore satisfying the test in section 12(3) of the Human Rights Act 1998.  The injunction was therefore granted. </span></p>
<p style="margin: 0cm 0cm 0pt;"><span style="color: black;"> </span></p>
<p style="margin: 0cm 0cm 0pt;"><strong><span style="color: black;">Comment</span></strong></p>
<p style="margin: 0cm 0cm 0pt;"><strong><span style="color: black;"> </span></strong></p>
<p style="margin: 0cm 0cm 0pt;"><span style="color: black;">The decision is surprising for a number of reasons.</span></p>
<p style="margin: 0cm 0cm 0pt;"><span style="color: black;"> </span></p>
<p style="margin: 0cm 0cm 0pt;"><span style="color: black;">The Court of Appeal entered into its own balancing exercise of the Article 8 and 10 rights of the Claimant and Defendant, overcoming the high threshold set by AAA, with considerable ease.  Despite the fact that Cranston J had referred to and considered the Article 8 rights of the children, the Court found shortcomings in the fact that he had not properly explained how he had taken them into account.  The Court also pounced on Cranston J’s acceptance that a portrayal of an image of commitment does not necessarily mean monogamy, and therefore disagreed that there was a false image requiring correction.</span></p>
<p style="margin: 0cm 0cm 0pt;"><span style="color: black;"> </span></p>
<p style="margin: 0cm 0cm 0pt;"><span style="color: black;">The Court of Appeal seemed all too ready to enter into its own balancing exercise between Article 8 and 10, something it perhaps should not have done.</span></p>
<p style="margin: 0cm 0cm 0pt;"><span style="color: black;"><br>
</span><span style="color: black;">Most surprising, however, is the Court of Appeal's view of what constitutes a 'committed relationship'.  It has established a strict approach to considering what public image has been portrayed by a Claimant, which may or may not require correction.  Because there were no specific references to monogamy <em>after</em> the extramarital sexual encounter in question, the court found that portraying an image of 'commitment' was not false.  Considering that a relationship can be committed yet involve extramarital threesomes is a somewhat liberal interpretation by the Court of Appeal...</span><span style="color: black;"><br>
</span></p>]]></content:encoded></item><item><guid isPermaLink="false">{C1B60921-CEC9-4EE0-8233-B60FF59CC7D8}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/rpc-hosts-seminar-on-data-privacy-and-the-media/</link><title>RPC hosts seminar on 'Data Privacy and the Media' </title><description><![CDATA[On 28 January 2016, RPC hosted a 'Question Time' style panel discussion for a range of media lawyers on data protection and its particular relevance to the media industry and media companies.]]></description><pubDate>Tue, 02 Feb 2016 12:00:00 Z</pubDate><category>Data and privacy</category><authors:names>Alex Wilson</authors:names><content:encoded><![CDATA[<p style="margin: 0cm 0cm 0pt;"><span style="color: #000000;">The panel, chaired by RPC partner Keith Mathieson, comprised Antony White QC (Matrix Chambers), Catrin Evans QC (One Brick Court), Nicola Cain (Head of Legal – Freedom of Information & Contentious Data Protection at the BBC) and Robin Hopkins (11KBW).</span></p>
<p style="margin: 0cm 0cm 0pt;"><span style="color: #000000;"> </span></p>
<p style="margin: 0cm 0cm 0pt;"><span style="color: #000000;">The discussion covered a wide range of data protection related topics such as the General Data Protection Regulation, the 'right to be forgotten', subject access requests, the journalistic exemption under s32 of the Data Protection Act 1998 ('DPA') and a comparison of data protection claims with claims for misuse of private information and defamation.  Some highlights of the discussion are set out below.</span></p>
<p style="margin: 0cm 0cm 0pt;"><span style="color: #000000;"> </span></p>
<p style="margin: 0cm 0cm 0pt;"><span><span style="color: #000000;">The panel were asked whether, in future, those who claim their privacy has been infringed by the media would be likely to focus their claims on a breach of their data protection rights as opposed to a claim in misuse of private information ('MPI').  A comparison was drawn between the pleadings in <em>Weller v Associated Newspapers Limited</em></span><span style="color: #000000;"> and the recent claim filed against the same newspaper by Ashton Kutcher, Mila Kunis and their daughter.  The former was run as a MPI / Article 8 claim with a data protection claim parasitic to the privacy claim.  The latter, however, is pleaded predominantly as a data protection claim with a misuse of private information claim bolted on.  This represents the recent trend, particularly in light of the decision in </span><em><span style="color: #000000;">Vidal-Hall v Google</span></em><span style="color: #000000;">, of privacy claims being re-drafted as breaches of data protection rights.</span></span></p>
<p style="margin: 0cm 0cm 0pt;"><span style="color: #000000;"> </span></p>
<p style="margin: 0cm 0cm 12pt;"><span style="color: #000000;">A perceived attraction to claimants of a data protection claim over a MPI claim is that the cause of action does not require any privacy or for Article 8 to be engaged – the DPA only requires processing of personal data.  Both of the aforementioned claims concerned photographs of children in public places, however the Kutcher claim is brought by both parents as well as the daughter (whereas the Weller claim was only brought on behalf of the children).  Later in the evening the example of someone arrested in a public place was discussed – if an arrest took place in public then a reasonable expectation of privacy would be hard to prove, whereas an action under the DPA might still be available.  Further possible benefits to data protection claims were highlighted such as that they are not concerned with any Article 8 seriousness thresholds and the variety of technical provisions in the DPA means that claimants have lots of options available when trying to establish a breach. Whilst data protection claims were described by one panellist as an easier and more accessible tool for claimants than the more established MPI cause of action at present, people are likely to continue to use both causes of action as they advantage claimants in different ways.</span></p>
<p style="margin: 0cm 0cm 12pt;"><span style="color: #000000;">However, data protection claims are faced with the journalistic exemption provided by s32 of the DPA, which exempts the processing of personal data if the data controller believes publication would be in the public interest and that compliance with the DPA provisions would be incompatible with the special purposes of journalism.  Section 32 also provides a procedural obstacle for claimants seeking to get hold of unpublished journalistic material.  Once s32 is invoked, the claim is stayed unless a claimant can persuade the ICO that the material is not being processed solely for journalistic purposes or with a view to publication.  </span></p>
<p style="margin: 0cm 0cm 0pt;"><span style="color: #000000;">The panel were also asked whether there was any form of triviality threshold in relation to data protection so that 'Jameel abuse' type arguments could be deployed in the context of a data protection claim.  The panel referred to the Court of Appeal's judgment in Vidal-Hall where such arguments were not ruled out as a matter of principle in relation to data protection claims.  The reality of harm alleged in a data protection claim should certainly be examined by defendants.  The panel remarked how it is currently ripe for the courts to examine whether typical barriers to libel claims such as seriousness, limitation and the various defences can be side-stepped by bringing a claim under the DPA.</span></p>
<p style="margin: 0cm 0cm 0pt;"><span style="color: #000000;"> </span></p>
<p style="margin: 0cm 0cm 0pt;"><span><span style="color: #000000;">Section 32 was the subject of further discussion throughout the evening.  The panel were asked to what extent could 'celebrity gossip' stories satisfy the public interest requirements of s32.  The panel referred to the powerful defence of the importance of freedom of speech expressed by Lord Falconer during Lords debates on the Data Protection Bill (his statements can be found in Hansard, in particular </span><a href="http://hansard.millbanksystems.com/lords/1998/feb/02/data-protection-bill-hl-1#S5LV0585P0_19980202_HOL_120"><span style="color: #0000ff; text-decoration: underline;">here</span></a><span style="color: #000000;"> and </span><a href="http://hansard.millbanksystems.com/lords/1998/mar/24/data-protection-bill-hl#S5LV0587P0_19980324_HOL_150"><span style="color: #0000ff; text-decoration: underline;">here</span></a><span style="color: #000000;">).  Lord Falconer, whilst explaining the public interest requirements of the journalistic exemption, stated that:  "</span><em><span style="color: #000000;">'public interest' does not mean that the public are interested.  It means something wider than that; namely, that there is a public interest having regard to the special importance of freedom of expression, but in relation to a particular story the press should be free to express it".</span></em><span style="color: #000000;">  Furthermore, he stated "</span><em><span style="color: #000000;">The Bill explicitly directs particular attention…to the special importance of the public interest in freedom of expression.  This gives the weighting which we believe is required by the reconciliation of the rights to privacy and freedom of expression by suggesting that there is a general sense in which publication per se is an exercise of freedom of speech in which there is a general public interest"</span></em><span style="color: #000000;">.</span></span></p>
<p style="margin: 0cm 0cm 0pt;"><span style="color: #000000;"> </span></p>
<p style="margin: 0cm 0cm 0pt;"><span style="color: #000000;">Finally, the panel also drew the audience's attention to Recital 17 of the new General Data Protection Directive which should clear up the issue which was central to the Mosley and Hegglin claims against Google: the provisions of the GDPR will be without prejudice to the safe harbours offered to online intermediaries in the E-Commerce Directive.</span></p>
<p style="margin: 0cm 0cm 0pt;"><span style="color: #000000;"> </span></p>
<p style="margin: 0cm 0cm 0pt;"><span style="color: #000000;">Thanks must go to Antony, Catrin, Nicola and Robin for comprising the panel and offering their expert insights.  Thanks also to all those who attended and contributed to the lively and interesting discussion.</span></p>]]></content:encoded></item><item><guid isPermaLink="false">{E0C86F4E-3AE1-4E92-9047-FC51BCAA6684}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/toying-with-cyber-security/</link><title>Toying with cyber security </title><description><![CDATA[VTech is a multi-billion-dollar global supplier of electronic toys and learning products for children, and reportedly the world’s biggest manufacturer of cordless telephones. In short, it is a giant company producing high-tech electronic goods – surely, you might think, capable of fending off a cyber-attack.<br><br>]]></description><pubDate>Thu, 14 Jan 2016 19:49:00 Z</pubDate><category>Data and privacy</category><authors:names></authors:names><content:encoded><![CDATA[VTech is a multi-billion-dollar global supplier of electronic toys and learning products for children, and reportedly the world’s biggest manufacturer of cordless telephones. In short, it is a giant company producing high-tech electronic goods – surely, you might think, capable of fending off a cyber-attack.<br><br>]]></content:encoded></item><item><guid isPermaLink="false">{C97C5E94-353E-484C-936D-33424EEEED09}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/publisher-of-the-daily-telegraph-fined-30000-for-general-election-email-campaign/</link><title>Daily Telegraph publisher fined £30k for general election email campaign </title><description><![CDATA[On 15 December 2015 the Information Commissioner's Office (ICO) issued Telegraph Media Group Limited (the Telegraph) with a Monetary Penalty Notice ]]></description><pubDate>Wed, 30 Dec 2015 12:04:00 Z</pubDate><category>Data and privacy</category><authors:names></authors:names><content:encoded><![CDATA[(see <a href="https://ico.org.uk/media/action-weve-taken/mpns/1560367/telegraph-monetary-penalty-notice.pdf"><span style="text-decoration: underline;">here</span></a>) under section 55A of the Data Protection Act 1998 (<strong>DPA 1998</strong>) following a "serious contravention" of Regulation 22 of the Privacy and Electronic Communications (<strong>EC Directive</strong>) Regulations 2003 (<strong>PECR 2003</strong>).
<p><span>On 7 May 2015, the date of last year's general election, a letter from the Editor of The Daily Telegraph was attached to the regular "morning briefing" e-bulletin sent to those who had subscribed to the Telegraph's "editorial content" mailing list. The letter included a copy of that day's lead story endorsing David Cameron, stated that the election was the most important since 1979, asked "do we continue under the Conservatives with the open, enterprise-led economic approach that has underpinned our prosperity for nearly 40 years? Or do we revert to an old-style, "government-knows-best" culture championed by the most leftwing Labour leader for a generation?" and stated "The Daily Telegraph urges its readers to vote conservative".</span></p>
<p>Regulation 22 of PECR 2003 precludes the transmission of unsolicited communications for the purposes of direct marketing except where the recipient has consented (Regulation 22(2)) and/or where contact details have been obtained in the course of a sale or negotiations for the sale of a product or service to the recipient, the direct marketing is in respect of similar products and services offered by the seller and the recipient has been given a means of refusing (Regulation 22(3)). The latter provision is known as the "soft opt-in rule". The ICO considered that direct marketing included the promotion of particular views or campaigns such as those of a political party.</p>
<p>The ICO held that some of the subscribers to the "editorial content" mailing list had opted out of receiving marketing communications from the Telegraph but others had not and that the "soft-opt in rule" did not apply here as it did not extend to charity fundraising and political campaigning. It found that the letter was promoting the Conservative Party's election campaign and that subscribers to the "editorial content" mailing list had not provided the Telegraph with specific consent to receive such a communication.</p>
<p>In considering whether the requirements for a Monetary Penalty Notice under section 55A were met, the ICO held that the Telegraph was responsible for the contravention of Regulation 22(2) PECR 2003 and that the contravention was "serious" because of its scale. It did not find that the contravention was deliberate, but held that it was negligent as 1) the Telegraph knew or ought reasonably to have known that there was a risk that the contravention would occur given that it sent marketing communications to readers by email on a regular basis and could therefore reasonably be supposed to have been aware of its responsibilities and 2) the Telegraph failed to take reasonable steps to prevent the contravention. In this instance reasonable steps would have included obtaining specific consent.</p>
<p>In reaching a figure of £30,000 for the Monetary Penalty Notice (to be reduced to £24,000 if payment is made by 14 January 2016, the date for payment otherwise being 15 January), the ICO considered that the 17 complaints received by the Telegraph and the ICO constituted an aggravating factor and that the following were mitigating factors:</p>
<ul>
    <li>the contravention was unprecedented;</li>
    <li>it was unlikely to cause substantial damage or substantial distress to the Telegraph's readers;</li>
    <li>the Telegraph had taken substantial remedial action and fully co-operated with the ICO; and</li>
    <li>there was potential for significant damage to the Telegraph's reputation as a result of the contravention which may affect future business.</li>
</ul>
<p>The ICO's response indicates a robust approach to enforcement of PECR 2003. Steve Eckersley, Head of Enforcement at the ICO, said "People signed up to The Telegraph's email service so they could catch up on the news or find out about subjects they were interested in. They did not expect to be told who they should be voting for". It appears that the letter was attached after a last minute instruction from editorial staff, but while this was a factor, Mr Eckersley stated that "Regardless of the circumstances, this organisation fell short of the law and we have acted". It is clear that all data controllers must be pro-active in ensuring compliance with the various data protection rules and that all forms of marketing communication should be reviewed for potential legal implications. While the £30,000 fine here was relatively low given the prevalence of mitigating factors, the maximum fine that the ICO can impose on data controllers is £500,000, so the financial implications (not to mention the reputational impact) of a breach can be severe. The ICO guidance on the PECR 2003 can be found <a href="https://ico.org.uk/for-organisations/guide-to-pecr/introduction/what-are-pecr/"><span style="text-decoration: underline;">here</span></a>.</p>]]></content:encoded></item><item><guid isPermaLink="false">{4A5BED9E-2CC1-42C2-803F-114001B4A9F8}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/new-eu-data-protection-rules-finally-agreed/</link><title>New EU data protection rules (finally!) agreed </title><description><![CDATA[On the 17th of December, and after much negotiation, a final draft of the new General Data Protection Regulation (GDPR) was approved by the Civil Liberties, Justice and Home Affairs (LIBE) committee of the European Parliament.]]></description><pubDate>Fri, 18 Dec 2015 12:07:00 Z</pubDate><category>Data and privacy</category><authors:names></authors:names><content:encoded><![CDATA[<p><span>The GDPR will replace the various fragmented privacy rules for EU member states, and will impose stricter EU-wide obligations on those processing personal data. </span><span> </span></p>
<p><span>The agreed draft imposes new obligations on both data controller<span style="color: #1f497d;">s</span> and data processor<span style="color: #1f497d;">s</span>, and enshrines various new rights for data subjects. </span><span> </span></p>
<p><span>Compromises were finally agreed on the most contentious points, including setting the penalty for serious breaches of the data rules at up to 4% of a company's annual turnover or EUR 20,000,000, whichever is higher.  A last minute attempt to require parental consents for all under-16s signing up to 'information society services' was rejected.  Instead it will be left up to individual member states to set the limit for parental consent for such personal data use, somewhere between 13 and 16 years of age. </span><span> </span></p>
<p><strong><span>What's next? </span></strong><span> </span></p>
<p><span>The legislation must be formally adopted by EU governments and the European Parliament.  This is likely to happen in January or February of 2016.  The GDPR will then come into force in 2018.</span><span> </span></p>
<p><span>See here for more information: <a href="http://europa.eu/rapid/press-release_IP-15-6321_en.htm"><span style="text-decoration: underline;">http://europa.eu/rapid/press-release_IP-15-6321_en.htm</span></a></span></p>]]></content:encoded></item><item><guid isPermaLink="false">{1776A151-06B7-4F78-8E87-42B5FA48AC05}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/national-grid-gas-plc-hit-with-2m-fine-for-health-and-safety-breach/</link><title>National Grid hit with £2m fine for health and safety breach</title><description><![CDATA[<p style="text-align: justify;">On 7 December 2015, National Grid Gas plc was ordered to pay a £2m fine and costs of £36,102.90 after pleading guilty to a breach of Section 3(1) of the Health and Safety at Work etc. Act 1974.</p><p style="text-align: justify;"><br></p>]]></description><pubDate>Fri, 11 Dec 2015 12:53:00 Z</pubDate><category>Data and privacy</category><authors:names></authors:names><content:encoded><![CDATA[<p style="text-align: justify;">On 7 December 2015, National Grid Gas plc was ordered to pay a £2m fine and costs of £36,102.90 after pleading guilty to a breach of Section 3(1) of the Health and Safety at Work etc. Act 1974.</p><p style="text-align: justify;"><br></p>]]></content:encoded></item><item><guid isPermaLink="false">{AFA30CFC-A27B-46D7-8067-365D6E2CAB78}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/serbian-forum-shopper-in-breach-of-his-duty-of-full-and-frank-disclosure-has-his-privacy/</link><title>Serbian forum shopper in disclosure breach of duty has privacy and libel action struck out </title><description><![CDATA[On 23 November 2015 Sir Michael Tugendhat set aside an order for service out of the jurisdiction of proceedings for the misuse of private information and libel which had been made by Master Roberts on 31 March 2015 in respect of an article in Politika,]]></description><pubDate>Mon, 07 Dec 2015 12:22:00 Z</pubDate><category>Data and privacy</category><authors:names></authors:names><content:encoded><![CDATA[<p>a Serbian language newspaper circulating in Serbia and neighbouring countries in hard copy and available in this country only on the internet.  Sir Michael held that the Claimant was in breach of his duty of full and frank disclosure and the case is a significant reminder of the duty of candour that rests upon a claimant when seeking permission to serve outside the jurisdiction under CPR 6.36 and of the perils of over-enthusiastic attempts to squeeze foreign claims into this jurisdiction.  The case is also important on the question of how section 9(2) Defamation Act 2013 requiring evidence that England and Wales is "<em>clearly the most appropriate place in which to bring an action in respect of the statement</em><span>" is to be interpreted and the burden it places on a Claimant which the judge decided had not been discharged in this case.</span></p>
<p>The claim was brought by a businessman who claimed that his closest ties were in London pointing out that he had studied there and been resident there and ran a successful UK-based company and that he spent most of his time in the UK, India and Austria.  He did disclose that he was a member of the Supervisory Board of a large commercial enterprise in Serbia but he <em>failed to disclose to the Master that he was also of Serbian nationality and travelled to Serbia using his Serbian passport, that his mother was half-Serbian; that he was raised in Serbia until he was aged nine and that his foreign residences included a substantial apartment in Belgrade.</em></p>
<p>The allegations were of a serious nature relating to the disclosure of bank transfers said to have been made by him to Switzerland raising suspicions that he was guilty of unlawful tax evasion.  All the articles were written in the Serbian language but reliance was placed on Google Translate where one could obtain a reasonably accurate and consistent version of the article.  The case proceeded on the basis that the words complained of were capable of causing serious harm threshold meeting the threshold under Section 1 Defamation Act 2013 and that the allegations related to private information.</p>
<p>The Claimant had in accordance with Para 3.1 of Practice Direction 6B to prove that there was a serious issue to be tried on the merits with a real prospect of success, that there was a good arguable case that the claim fell within one or more classes of case in which permission to serve out of a jurisdiction may be given and that England was clearly the appropriate forum for the trial of the dispute.  Had that been the sole issue, Sir Michael would probably have held that there was a good arguable case for service outside the jurisdiction and serious issues to be tried.</p>
<p><span>Sir Michael approved the description in Gatley on Libel and Slander at Para 24.29 as to the relevant factors to be considered under Section 9 Defamation <em>Act </em>2013 in deciding whether or not England and Wales was clearly the most appropriate place in which to bring the defamation action such as: the proportion of times that the article was published in England as opposed to elsewhere; the amount of damage to the claimant's reputation in England and Wales compared with elsewhere; the extent to which the publication was targeted at a readership in England and Wales compared with elsewhere; and whether there was reason to think that the claimant would not receive a fair hearing elsewhere as well as the convenience of witnesses and the relative expense of suing in different jurisdictions.</span></p>
<p>The law imposes a duty of full and frank disclosure on all applications made without notice such as an application for permission to serve proceedings out of the jurisdiction and this involves a full and fair disclosure of those facts which it was material for the court to know. </p>
<p>The proceedings followed a rather surprising course.  There appeared to be some evidence that the number of publishees in England had been considerably overstated.  It seems that there were no more than 70, although the court was initially given the impression that the downloads were in the thousands.  It appeared that inadvertently a misleading answer had been given to the Master about the Claimant's nationality owing to a misunderstanding in that the Master was wrongly told – when he asked - that the Claimant was an Indian national.  After permission had been given the defendants happened to discover from a brochure from the London Business School that the Claimant was referred to as having joint Indian and Serbian nationality.  However, even more significantly and surprisingly, the Claimant's solicitors had deliberately taken the view that it was not necessary to disclose that the Claimant had a Serbian passport or that he was of Serbian nationality.  This, in the view of Sir Michael, had led to the court being misled and the failure to disclose this was a serious one and a matter of concern.  Leading Counsel who had not appeared before the Master accepted that the Claimant's Serbian citizenship should have been disclosed and apologised for the omission.  However, he was unable to persuade the judge who concluded that the Master had been misled to do other than to conclude that this was a material non-disclosure and to set the order for service outside the jurisdiction aside.  The case underlines the danger of deciding to omit evidence as a matter of judgement- in this instance misjudgement – when making an ex parte application to the court.</p>
<p>This was the first time the Court had considered Section 9 Defamation Act 2013 and the question of proving that England and Wales was clearly the most appropriate place for the case to be heard.  The judge recognised that this placed a heavy evidential burden on the Claimant in multi-jurisdictional publications in that he would have to produce evidence of damage in all the relevant countries where he had a reputation to enable the court to decide the relevant merits of bringing an action in a particular country. It could be unduly difficult for Claimants but that was what Parliament evidently had in mind.  It will certainly add a layer of expense to such applications which engage Section 9.  The judge considered that the case had its most real and substantial connection with Serbia and that there was no compelling reason why the case could not be heard in Serbia. He did not consider that there was sufficient evidence to suggest that the claimant could not obtain a fair trial in Serbia.</p>
<p>The jurisdictional test in relation to the misuse of private information was somewhat different for deciding whether to permit service out of the jurisdiction.  Section 9 did not apply.  The question was whether in all the circumstances England was clearly or distinctly the appropriate forum for the trial and that the court ought in all the circumstances to exercise its discretion to permit service out of the jurisdiction.  The judge accepted that there was a good arguable case that the Claimant's private information in the form of international bank transfers had ben misused by publication on the internet, although he had some doubts as to whether an injunction was likely to be granted, if the Claimant succeeded. However, the order for service out in relation to the misuse of private information was likewise tainted by the non-disclosure.  Furthermore the judge was of the view that the case had a substantial connection with Serbia, that it dealt with an bank account in Serbia, that the harm complained of was closely connected with Serbia and that the Serbian Court would be better placed to assess the strength of the Defendant's public interest defence and to a decide on the propriety of the journalist's conduct.  The witnesses spoke Serbian and it would add to the cost of the proceedings for the case to be heard in England.  He therefore concluded that Serbia was clearly and distinctly the appropriate forum for the hearing of the misuse of private information claim.</p>
<p> </p>
<p><a href="http://www.bailii.org/ew/cases/EWHC/QB/2015/3380.html" style="text-align: justify;"><span style="text-decoration: underline;"><em><span>Ahuja v Politika Novin </span></em>[2015] EWHC 3380</span></a></p>]]></content:encoded></item><item><guid isPermaLink="false">{DE898E56-9681-4B42-9294-6F8A5634B184}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/twitter-found-to-be-unsuitable-means-of-communicating-foia-request/</link><title>Twitter found unsuitable means of communicating FOI request </title><description><![CDATA[The First Tier Tribunal (Information Rights) (the Tribunal) has held that a request under the Freedom of Information Act 2000 made via Twitter is not valid.]]></description><pubDate>Fri, 27 Nov 2015 12:35:00 Z</pubDate><category>Data and privacy</category><authors:names></authors:names><content:encoded><![CDATA[<p>The request was made by a Twitter user with the username @FOIkid for information held by the Department of Work and Pensions. The Information Commissioner found that the request was a valid request because under section 8 of FOIA the information available from the requester's Twitter handle provided an address for a response to be sent to and clearly displayed the requester's name.  The IC did note that Twitter could present problems when responding substantively to FOI requests due to the abbreviated nature of tweets. The IC found that this difficulty could easily be circumvented by sending information in a more conventional document format, perhaps linked to from a tweet. </p>
<p>The Tribunal <a href="http://www.informationtribunal.gov.uk/DBFiles/Decision/i1670/Ghafoor, Bilal EA.2015.0140 (10.11.15).pdf"><span style="text-decoration: underline;">overturned the decision.</span></a> They found that the requirements of section 8 of the FOIA had not been satisfied because the tweet had not included the requester's real name, just his twitter username. The Tribunal also found that Section 8 had not been satisfied as a Twitter username is not an address suitable for corresponding about FOIA requests. </p>
<p>Section 8 of the FOIA does not expressly require a requester to give their real name. The Tribunal considered that in any event a public authority is entitled to know a requester's real name in order to consider whether a request is vexatious or may exceed the costs limit (see sections 12 and 14 of the FOIA). It should be noted that the Tribunal did not consider that the requester's name was available on his publicly available Twitter profile. Of course, a public authority is under a <a href="https://ico.org.uk/media/for-organisations/documents/1143/good_practice_advice_assistance.pdf"><span style="text-decoration: underline;">duty to provide advice and assistance </span></a>to individuals making FOI requests. Taking the step of identifying the real name of a Twitter user does not seem unnecessarily burdensome in this context. Indeed, would the result have been different if the requester's Twitter username had contained his real name? </p>
<p>The second reason given was that "<em>a means of communication which is limited to 140 characters is unsuitable for correspondence between the public authority and the requester concerning the request</em>." It is interesting to note that there is nothing in Section 8 of the FOIA that expressly requires that an address for correspondence must be an address "suitable" for correspondence on an FOIA request. There is clearly an element of subjectivity around the term "suitability." It is easy to see how a public authority's view of the suitability of a means of communication would differ from a tech savvy FOI requester. </p>
<p>The decision of the Tribunal implies that Twitter should not be used as a means of submitting FOI requests and would appear to have some grave flaws. In any event the ruling of the Tribunal appears to place the <a href="https://ico.org.uk/media/for-organisations/documents/1164/recognising-a-request-made-under-the-foia.pdf"><span style="text-decoration: underline;">ICO's guidance</span></a> on FOI requests made through social media sites such a Twitter into some doubt. </p>]]></content:encoded></item><item><guid isPermaLink="false">{B4EF1391-DA96-4E92-B01C-DE322AFB150D}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/former-mp-tim-yeo-loses-libel-action-against-the-sunday-times/</link><title>Tim Yeo loses libel action against Sunday Times </title><description><![CDATA[The High Court has today dismissed an action by Tim Yeo, the former MP for South Suffolk and Chairman of the Energy and Climate Change Select Committee, against Times Newspapers Limited in an important judgment on the Reynolds defence and the scope of politicians' Article 8 rights.]]></description><pubDate>Wed, 25 Nov 2015 12:40:00 Z</pubDate><category>Data and privacy</category><authors:names></authors:names><content:encoded><![CDATA[<p><strong>Facts</strong></p>
<p>The claim was based on a number of articles published in June 2013 following an undercover investigation by the newspaper's 'Insight' team. The Claimant had attended a lunch at Nobu with two journalists posing as members of a fictitious consultancy firm seeking to employ him on behalf of a leading solar technology developer in the Far East.</p>
<p>At a pre-trial <a href="http://www.bailii.org/ew/cases/EWHC/QB/2014/2853.html"><span style="text-decoration: underline;">hearing</span></a> in July 2014, Warby J held that the main articles carried a meaning that Mr Yeo:</p>
<p>"1) was prepared to act, and had offered himself as willing to act in a way that was in breach of the Code of Conduct of the House of Commons by acting as a paid Parliamentary advocate who would: a) push for new laws to benefit the business of a client for a fee of £7,000 a day; and b) approach Ministers, civil servants and other MPs to promote a client's private agenda in return for cash";</p>
<p>2) by behaving in the manner referred to in the articles had acted scandalously, and shown willing to abuse his position in Parliament to further his own financial and business interests in preference to the public interest".</p>
<p>The newspaper raised defences of justification, honest comment and/or Reynolds privilege. Publication of the articles largely took place prior to the Defamation Act 2013 ("DA 2013") coming into force with the online versions available thereafter, though it was common ground that for the purposes of these proceedings the available defences were substantially the same.</p>
<p><strong>Judgment</strong></p>
<p>Warby J found that all the pleaded defences were made out and dismissed the claim. He found that Mr Yeo went to the lunch knowing that its purpose was to discuss the prospect of paid consultancy for a private client. He found that at the lunch Mr Yeo then had expressed a willingness to undertake Parliamentary advocacy on behalf of that private client.</p>
<p>The Judge concluded that the journalists giving evidence on behalf of the newspaper had conducted themselves "courteously and fairly" in the box and their evidence had been "clear and cogent". In relation to Mr Yeo, the Judge took the view that some of his evidence was "utterly implausible". As to his evidence that he had forgotten that the meeting was to discuss work for generous remuneration, the Judge stated that it was "not credible" that this was not in the Claimant's mind, and that "in my judgment this evidence was untrue. I am not persuaded that it was honest either". Other parts of his evidence were deemed "close to absurd" and "false and, in my judgment, dishonest". In considering the Claimant's evidence on the issue of at what point he became aware that the undercover journalists were asking him to act as a lobbyist on their behalf, Warby J noted that "When a fish wriggles on a hook, it goes deeper into the mouth and guarantees that the fish will not escape. So with Mr Yeo's evidence on this issue".</p>
<p><strong>Comment</strong></p>
<p>Of particular significance was the Judge's discussion of the Reynolds defence, in which he reviewed the relevant case law and made some important observations:</p>
<ol>
    <li>Detailed and subtle criticisms of journalistic conduct by a claimant seeking to undermine a Reynolds defence would only have a proper place if there was "such an accumulation of reasonable points…that they could be said, in the mass, to support an allegation of systematic bias or unfairness;</li>
    <li>When interpreting what Mr Yeo had said at the lunch meeting, the journalists were required to take a fair-minded attitude and approach but were not "duty bound to search out alternative interpretations, if these are far-fetched, speculative or improbable".</li>
    <li>That editorial oversight of what journalists are doing should involve actual checking of proposed content against source material, but the fact there might be room for improvement in this regard did not mean the journalistic process was irresponsible;</li>
    <li>That in sending a "front-up" letter two days prior to publication, the publisher had provided a reasonable opportunity for Mr Yeo to comment. The Judge concluded that stories such as this were peculiarly vulnerable to having their impact undermined by spoiling tactics. Specifically, the "risks are exacerbated if the story is objectively sensational and the subject is someone, such as an experienced MP, well versed in mechanisms for managing or influencing the news". If the impact of such stories was dissipated the public interest would be harmed, the story would attract less attention and there would be some waste of the resources of the media organisation that created it. This was a disincentive to investigative journalism and the fairness to the subject had to be balanced against these factors;</li>
    <li>A judgment had to be made as to how much of the underlying evidence should be made available to the subject of a story in order to allow a reasonable chance for comment. In cases involving undercover recordings, it might be responsible to provide a full transcript of what was said; however account had to be taken of the risk that such material could be cherry picked by the subject to allege misrepresentation and that their statements had been taken out of context. In this case the decision not to provide Mr Yeo with a transcript had not been irresponsible.</li>
    <li>The journalists also did not need to publish a full transcript of the lunch meeting with the articles in order to be responsible. The Judge found that the journalists' role is to distil rather than to act as historians or archivists.</li>
    <li>The journalists' duty to reflect the 'totality' of the evidence in the published article should not be taken too literally. In a case such as this it would be 'fair' to present readers with factual conclusions honestly and reasonably drawn by journalists who witnessed key events; it was permissible to summarise and to be selective. While it might be unfair to misrepresent the evidential picture or to present it in a wholly unbalanced way, 'fairness' did not require publishers to present readers with all the factual material that could support a competing assessment.</li>
</ol>
<p>Another important finding of the Judge was that, as the articles related wholly and exclusively to the conduct of the Claimant, who was a serving MP and Committee chair, rather than to his personal or private life, Article 8 was not engaged. Specifically, the attack on his reputation did not lead to consequences of a sufficient nature or gravity to engage Article 8 and his 'personal integrity' was not undermined.</p>
<p>Overall, the decision is welcome and important as it affirms the applicability of the Reynolds defence to matters of clear public interest where the journalism is responsible. Warby J has also indicated that the approach to the new statutory defence is likely to broadly follow that taken in respect of Reynolds. The fact that the Claimant lost the claim in its entirety highlights the risks for litigants that are subjects of such stories. The weight of the defeat and nature of the decision has led to the Claimant agreeing to pay the Defendant's costs on an indemnity basis, which is highly unusual in defamation actions. Ultimately the judgment constitutes a robust defence of investigative journalism and reiterates that those who choose to play a role in public life must understand that this greatly increases the scope for their actions to be legitimately scrutinised and criticised.</p>
<p>RPC (Keith Mathieson and Harry Kinmonth) acted for Times Newspapers Limited in the case.</p>]]></content:encoded></item><item><guid isPermaLink="false">{7CD96D3B-EF23-4AB6-8044-87E5460C87C2}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/court-of-appeal-upholds-privacy-claim-by-family-of-paul-weller/</link><title>CofA upholds privacy claim by Paul Weller family</title><description><![CDATA[The Court of Appeal has upheld a High Court finding that the publishers of Mail Online infringed the privacy of three of Paul Weller's children by publishing unpixellated pictures of them on a family shopping trip in LA. ]]></description><pubDate>Fri, 20 Nov 2015 12:53:00 Z</pubDate><category>Data and privacy</category><authors:names></authors:names><content:encoded><![CDATA[<p><span>The claimants in Weller & ors v Associated Newspapers Limited were three of Paul Weller's children: Dylan, 16, and 10-month-old twins John-Paul and Bowie. Dingemans J found that the defendant was liable for misuse of private information and/or for breach of the Data Protection Act. He awarded £5,000 to Dylan Weller and £2,500 to each of the twins.  </span><span>That decision is discussed in Louise Turner's blog post </span><a href="http://www.rpclegal.com/index.php?option=com_easyblog&view=entry&id=1097&Itemid=107" target="_blank"><span style="text-decoration: underline;">here</span></a><span>.</span></p>
<p><span></span><strong><span>Grounds of appeal</span></strong></p>
<p><strong><span></span></strong><span>Mail Online advanced two grounds of appeal:</span></p>
<ol>
    <li><span>It was not actionable to publish an innocuous photograph of a child (or any person) taken in a public street without consent where nothing inherently private is shown: to conclude that a reasonable expectation of privacy arose in such circumstances would in effect create an image right in English law when no such right exists; and</span></li>
    <li><span>The judge should have taken account of the law applicable to the place where the pictures were taken (the taking and publication of the photographs being permitted under Californian law).   </span></li>
</ol>
<p><strong><span>Reasonable expectation of privacy</span></strong></p>
<p><strong><span></span></strong><span>In dismissing the appeal the Court of Appeal said the assessment of whether a child has a reasonable expectation of privacy was an objective test, in which weight was accorded to the reasonable expectation of the parents. It made the following observations:</span> </p>
<ul>
    <li><span>A child does not have a separate right to privacy by virtue only of being a child.</span></li>
    <li><span>But there are several considerations which are relevant to children which mean that a child may sometimes have a reasonable expectation of privacy when an adult would not.</span></li>
    <li><span>All the circumstances of the case should be taken into account when deciding whether a child has a reasonable expectation of privacy: see para 36 of <em><a href="http://www.bailii.org/ew/cases/EWCA/Civ/2008/446.html" target="_blank"><span style="text-decoration: underline;">Murray</span></a></em>.</span> </li>
</ul>
<p><span>The Court considered that a child’s age could mean that when deciding on whether a child's autonomy should be protected the conduct of the child’s parents and the experience of the court should be drawn upon to inform the decision. It noted that children are not in a position to choose whether they are in a public or a private place or to interact in a private or public way - a child’s reasonable expectation of privacy must be seen in the light of the way in which their family life is conducted. Further, a lack of parental consent to an intrusion into a child’s life was thought to carry particular weight as it is a child’s parents who frame the context for their family life.</span> </p>
<p><span>The Court acknowledged that a young child may not be physically aware of an intrusion but it considered that the impact of publication could go beyond the effect on the child and might entail security and safety concerns or the potential for bullying and embarrassment.</span> </p>
<p><span>The Court agreed that the nature of local law was a factor to be taken into account when considering the reasonable expectation of privacy. However, it found that the judge had taken account of the local law even though he had not indicated how much weight he had accorded to it.</span> </p>
<p><strong><span>The balancing exercise</span></strong> </p>
<p><span>While Mail Online's Article 10 rights were not to be "trumped" by a child's Article 8 rights, the welfare of children is a primary concern. There were difficulties in assessing the harm that might be suffered by a child from an invasion of privacy, but the court should apply “common sense and its own experience.” </span> </p>
<p><strong><span>The Court's findings</span></strong> </p>
<p><span>In the circumstances it was found that all three of the children had a reasonable expectation of privacy. Specific weight was accorded to the fact that although the claimants were in public, they were engaged in a family activity. In the Court's view this distinguished the case from Baroness Hale's example of Naomi Campbell popping out to the shops to buy a carton of milk. The fact that the claimants were children was a critical factor. It did not matter that the children’s parents were celebrities: the children should be treated in the same way as those of a child whose parents were not in the public eye.</span> </p>
<p><strong><span>Comment</span></strong> </p>
<p><span>Despite the Court having recognised that children do not have special privacy rights, the judgment appears in effect to have conferred a degree of protection on children that goes beyond that available to adults. Further, the Court's view that a "family element" gives rise to a reasonable expectation of privacy would seem to extend privacy rights beyond their proper scope as it is possible to imagine many "family" situations which do not involve children where there can be no reasonable expectation of privacy, e.g. a couple going to the cinema or a grown-up family attending a wedding. Even extending protection to events with a "family element" involving young children seems a step too far – how is the press now to understand the meaning of popping out for a pint of milk if this is not to cover anodyne domestic activities, whether or not they involve children? </span> </p>
<p><span>Mail Online is seeking to appeal the decision to the Supreme Court.</span></p>]]></content:encoded></item><item><guid isPermaLink="false">{3DBB8941-70B4-4531-8EBF-1FCDA624432F}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/data-leaks-a-portent-of-the-future/</link><title>Data leaks - a portent of the future? </title><description><![CDATA[The Culture, Media and Sport Committee have launched an inquiry in the wake of the recent cyber-attack on the TalkTalk website on 21 October,]]></description><pubDate>Fri, 20 Nov 2015 12:44:00 Z</pubDate><category>Data and privacy</category><authors:names>Alex Wilson</authors:names><content:encoded><![CDATA[<p>which affected nearly 157,000 customers and 1,200,000 email addresses, names and phone numbers as well as details relating to thousands of bank accounts, credit and debit cards.  The attack has led to the arrest of 4 individuals on suspicion of offences under the Computer Misuse Act 1990 ("CMA 1990").  It recently emerged that one of those arrested, a 15 year old boy in Northern Ireland, is suing three national newspapers for an alleged breach of privacy.</p>
<p><span>Under the Data Protection Act 1998 ("DPA 1998") 'personal data' is defined as that which relates to a living individual who can be identified either 1) from the data or 2) from the data and other information in the possession of, or likely to come into the possession of, the data controller.  This broad definition potentially means that a large amount of the data held by companies will be the personal data of customers.  Such personal data must be processed in accordance with the Data Protection Principles set out in the Act, which include, in the specific context of cyber-attacks, requirements that processing be fair and lawful and in accordance with the rights of data subjects, and that appropriate technical and organisational measures be taken against unauthorised or unlawful processing.  It is clear that cyber-attacks could potentially give rise to legal implications under the Act for perpetrators, companies and individuals.</span></p>
<p><span></span><span>The Committee's inquiry is intended to explore the circumstances surrounding the cyber-attack and the wider implications for telecoms and internet service providers.  They are seeking written submissions by 23 November on several matters, including:</span></p>
<ol>
    <li><span>The robustness of measures that telecoms and internet service providers employ to protect their customers' personal data and the level of investment being made to ensure that their systems remain secure and anticipate future threats;</span></li>
    <li><span>The nature, role and importance of encryption in protecting personal data;</span></li>
    <li><span>The adequacy of the supervisory, regulatory and enforcement regimes currently in place;</span></li>
    <li><span>The adequacy of the redress mechanisms and compensatory measures for consumers; and</span></li>
    <li><span>Likely future trends in hacking, technology and security.</span><span> </span></li>
</ol>
<p><span>The launch of the inquiry is timely as recent months have seen an increasing number of corporate data protection incidents, with other household names such as Morrisons and British Gas among those affected.</span><span> </span></p>
<p><span>The Morrisons data breach illustrates that companies must guard against both external and internal threats, as the perpetrator was an employee. <span style="color: #1f497d;"> </span>On 17 July Andrew Skelton, 43, was found guilty of fraud, securing unauthorised access to computer material and disclosing personal data. <span style="color: #1f497d;"> </span>He had previously been a senior internal auditor at the company and was sentenced to 8 years imprisonment for the offences, which involved details of nearly 100,000 of the supermarket giant's staff being leaked onto various websites. The data included names, addresses and bank account details. <span style="color: #1f497d;"> </span>While firms cannot always prevent data breaches by employees, a proactive and sensible approach to data protection is essential.  </span><span> </span></p>
<p><span>However, it would be wrong to think that that cyber-attacks are only directed at companies. An incident on 28 October led to the email addresses and account passwords of 2,200 British Gas customers being posted online. They were removed on the same day after the company discovered the leak in the course of routine checks. British Gas insisted that its secure data storage systems had not been affected and that payment data such as bank account or credit card details was encrypted.  One theory is that the leak was the result of a 'phishing' attack. If this is the case it would mean that the data had been obtained by individuals concealing their identities, perhaps by masquerading as British Gas, in order to procure the details from customers themselves by deceiving them into a false position of trust. <span style="color: #1f497d;"> </span>If this is the case then it demonstrates that the responsibility for protecting personal details cannot be confined to firms. <span style="color: #1f497d;"> </span>Although they are obvious targets in light of the large volumes of data that they process, individuals must also take care not to inadvertently disclose their personal data to criminals.</span><span> </span></p>
<p><span>The complex legal position in relation to data protection is made more difficult by the fact that the law is perpetually playing catch-up in the face of technological developments. Legislation in the data protection field is dated, with the DPA 1998 and CMA 1990 presenting obvious examples of statues drafted in the early days of mass computer ownership and before the onset of the internet age. <span style="color: #1f497d;"> </span>The civil law position is likely to be modified in 2016 by the General Data Protection Regulation, which is still being formulated and will replace the 1995 Data Protection Directive upon which the DPA 1998 is based. <span style="color: #1f497d;"> </span>Consumers are understandably concerned about their data in light of these incidents and it is to be hoped that the inquiry thoroughly reviews the current position. <span style="color: #1f497d;"> </span>Cyber-attacks are likely to increase in frequency and become more technologically sophisticated, so it is essential that individuals, companies and other organisations are as well prepared as possible to face what is clearly a substantial threat.</span><span></span></p>
<p><span> </span></p>
<p><span><em>Written by Alex Wilson and Nathan Webb</em></span></p>]]></content:encoded></item><item><guid isPermaLink="false">{BB8E8CDD-A172-42E7-B1B8-52121C707153}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/18-months-on-the-ico-reflects-on-google-spain/</link><title>18 months on - the ICO reflects on Google Spain </title><description><![CDATA[The ICO has recently blogged on the cases it has received in the year and a half since the Google Spain decision last May. ]]></description><pubDate>Wed, 11 Nov 2015 13:40:00 Z</pubDate><category>Data and privacy</category><authors:names>Alex Wilson</authors:names><content:encoded><![CDATA[<p style="text-align: justify;">The author David Smith, the Deputy Commissioner and Director of Data Protection, described the effect of the judgment as something of an anti-climax; the ICO has required Google to de-list search results in only 20% of cases received.<span> </span></p>
<p style="text-align: justify;"><span>The ICO consistently receive roughly 15 – 30 eligible cases per month and, as at 13 August 2015, 441 of the total 472 cases received were closed.  Mr Smith draws our attention to the <a href="https://ico.org.uk/for-organisations/search-result-delisting-criteria/" target="_blank"><span style="text-decoration: underline;">search result delisting criteria</span></a> it applies when deciding whether to delist.  In the cases where the ICO disagrees with Google's decisions, the most common factor is that the passage of time means the ICO considers the information no longer relevant.</span><span></span></p>
<p style="text-align: justify;"><span></span><span>It is striking that a very small percentage of Google's delisting decisions are being referred to the ICO.  As at 11 November, Google had received 42,439 delisting requests from individuals with a connection to the UK and had removed 62.1% of the 160,054 URLS they related to.  That means that, of the unremoved requests, less than 2% are being referred to the ICO.  The latest figures can be found <a href="http://www.google.com/transparencyreport/removals/europeprivacy/" target="_blank"><span style="text-decoration: underline;">here</span></a>.</span><span></span></p>
<p style="text-align: justify;"><span></span><span>Mr Smith also highlighted the <a href="https://ico.org.uk/about-the-ico/news-and-events/news-and-blogs/2015/08/ico-orders-removal-of-google-search-results/" target="_blank"><span style="text-decoration: underline;">first enforcement notice </span></a>issued against Google in August, where the ICO ordered Google to remove nine search results brought up by entering an individual's name.  Google has so far removed the links from the European versions of its search engine but the ICO considers that it should remove the links so that anyone accessing any Google search service from within the UK (using the example of someone using google.com in Newcastle) will not be able to see them.  The ICO therefore <a href="https://ico.org.uk/action-weve-taken/enforcement/google-inc/" target="_blank"><span style="text-decoration: underline;">clarified the enforcement notice </span></a>in October, ordering that links should not be visible to anyone directly accessing any Google search services from within the UK.  William Malcolm, Senior Privacy Counsel at Google, stated this morning at the ICO Data Protection Policy Conference in London that Google are still considering their options and have until the end of November to respond.</span><span></span></p>
<p style="text-align: justify;"><span></span><span>This will no doubt be watched with interest.  The French privacy regulator (the CNIL) also ruled in September that Google must extend delisting to all of its websites, not just those with European domain names.  The European regulators seem determined to close the loophole that allows searchers to defeat the Google Spain judgment by simply using google.com.  Questions surrounding the jurisdiction of authorities to require non-European companies to respect European laws when offering their services in Europe remain, and will surely be tested in the months to come.</span></p>]]></content:encoded></item><item><guid isPermaLink="false">{AB9446D0-8084-43ED-940F-9A913D74EC16}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/draft-investigatory-powers-bill-unveiled/</link><title>Draft Investigatory Powers Bill unveiled </title><description><![CDATA[The draft Investigatory Powers Bill was laid before Parliament on Wednesday and leading political figures have already been attempting to calm fears surrounding the so-called 'snooper's charter'. ]]></description><pubDate>Fri, 06 Nov 2015 13:47:00 Z</pubDate><category>Data and privacy</category><authors:names>Alex Wilson</authors:names><content:encoded><![CDATA[<p>The bill will govern - and strengthen - the powers available to law enforcement, the security and intelligence agencies and the armed forces to acquire the content of communications or communications data.</p>
<p><span>A "double-lock" approach is being proposed, which would require a judge to approve an interception warrant signed by the Secretary of State.  The Attorney-General, writing in The Times on Thursday, reassured that the provisions will provide sufficient civil liberties safeguards, although he acknowledged that the approval of a judicial commissioner would not be required in "urgent cases".  Theresa May in a <a href="https://www.gov.uk/government/speeches/home-secretary-publication-of-draft-investigatory-powers-bill"><span style="text-decoration: underline;">Commons statement</span></a> on Wednesday said that it was a departure from the heavily criticised 'snooper's charter' – blocked by the Liberal Democrats during the last government - and will provide "some of the strongest protections and safeguards anywhere in the democratic world and an approach that sets new standard for openness, transparency and oversight".</span></p>
<p><span></span><span>There is concern, especially in light of recent uses of RIPA against journalists and the seizure of a Newsnight journalist's laptop under the Terrorism Act, as to how the new powers will apply to journalistic sources.</span></p>
<p><span></span><span>A code of practice will be written into statute, ensuring that safeguards are in place before any interception warrant is authorised that involves confidential information relating to sensitive professions such as journalists. However applications to the judicial commissioner can be made without the knowledge of the media organisation concerned, meaning that public interest and press freedom arguments for maintaining source protection will not be put forward, which can only be properly done by the media organisation involved.</span></p>
<p><span></span><span>The Attorney General has stated that the draft bill has a "long way to go" before being passed into law.  "In that time, I would urge the legal profession to engage with the content and make their views known", he said.</span></p>]]></content:encoded></item><item><guid isPermaLink="false">{CF5A4AAF-956F-48A7-AABD-17403D91C7B5}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/eu-court-declares-safe-harbor-datatransfer-agreement-invalid/</link><title>EU court declares 'safe harbor' data-transfer agreement invalid </title><description><![CDATA[The Court of Justice of the EU (CJEU) has declared that the "Safe Harbor" framework agreement cannot be relied upon to justify transfers of personal data from the EU to the US.]]></description><pubDate>Wed, 07 Oct 2015 13:51:00 +0100</pubDate><category>Data and privacy</category><authors:names></authors:names><content:encoded><![CDATA[<p><strong>Facts</strong></p>
<p><strong> </strong>Safe Harbor is an agreement between the US and the EU designed to create a streamlined way to transfer personal data from Europe to US firms in accordance with European data protection rules.  These rules allow such transfers only where there is "adequate" protection for the privacy of European data subjects.  Safe Harbor is a simple, widely used way to let US firms self-certify their compliance with these rules, which might otherwise require those firms to enter into more complex contractual arrangements.  Over 4,000 US companies are currently Safe Harbor self-certified.  </p>
<p>This case arose from a complaint to the Irish Data Protection Commissioner by Austrian student, Max Schrems.  Schrems has been a Facebook user since 2008 (through its European subsidiary, Facebook Ireland).  For many years, Facebook Ireland has relied on Safe Harbor to justify the routine transfers of some, or all, of the personal data of Facebook's European users to the US (for processing by Facebook Inc).</p>
<p>Schrems' complaint arose in light of Edward Snowden's revelations about the secret data collection activities of the US National Security Agency (<strong>NSA</strong>).  Schrems complained to the Commissioner that the practice of mass, indiscriminate surveillance in force in the US meant that the US did not provide "adequate" protections for the privacy of European data subjects.  The Commissioner rejected the complaint on the grounds that it was bound by the Safe Harbor principles, under which the European Commission had decided that the US did meet this standard.  The Commissioner also rejected Schrems assertion that it must do further checks on Facebook to ensure that adequate measures were in place.</p>
<p>The CJEU rejected the Commissioner's position, and found that the Safe Harbor process was invalid.  The CJEU found that it did not provide adequate protection because the US laws which could overrule the Safe Harbor principles went beyond what was strictly necessary and proportionate to protect the US's national security, and left the European data subject without effective legal protection.  The CJEU also found that nothing should prevent a national data protection authority from examining claims concerning such data transfers.</p>
<p>Following the decision, the matter will go back to the Irish Commissioner, who will have to decide whether Facebook passes the adequacy test.  </p>
<p><strong>Impact of the decision</strong></p>
<p>It would be easy to be alarmist at this stage.  Although Safe Harbor in its current form is no longer a viable option, the ICO has already acknowledged that companies relying on Safe Harbor will need time to review their data transfers to the US in order to ensure that they comply with the law. </p>
<p>The decision does not prevent transfers of personal data transfers between the US and EU; other ways to ensure "adequate" protection remain, such as model contractual clauses, binding corporate rules, consents, etc.  Arguably, the decision does also raise questions about these methods in that no contract between parties can adequately protect a data subject if the US (or any state) chooses to 'overreach' in a manner that is contrary to European ideals of privacy.  European data protection regulators will have to address this issue directly, as a matter of urgency.    </p>
<p>Privacy campaigners such as Schrems and Snowden have welcomed the decision, while global businesses such as IBM have criticised it.  IBM has despaired of a "highly uncoordinated approach to Internet regulation… creating significant commercial uncertainty".</p>
<p>Talks are underway about "Safe Harbor 2", although the added political heat that this decision brings may well add to the already considerable delays in getting this agreed. </p>
<p>In the vacuum created by the decision, each data protection regulator could potentially set its own standards for US transfers, which would further complicate the regulatory landscape in Europe.  However, any suggestion that this may result in countries suspending data transfers to the US seems unlikely in the short term, especially since the US is already in the process of enacting some legislation to curb the perceived excesses of the NSA.</p>]]></content:encoded></item><item><guid isPermaLink="false">{FEEC9A05-9F68-4890-AB49-0EB51010DE92}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/privacy-rights-when-you-dont-expect-them-the-case-of-jr38-for-judicial-review/</link><title>Privacy rights when you don’t expect them - the case of JR38 </title><description><![CDATA[Yesterday, the Supreme Court unanimously dismissed an appeal by an Appellant involved in rioting in Derry in 2014.]]></description><pubDate>Fri, 03 Jul 2015 13:55:00 +0100</pubDate><category>Data and privacy</category><authors:names></authors:names><content:encoded><![CDATA[<p>The Appellant (referred to as "JR38") was 14 when the rioting occurred, and photographs taken of him while it was taking place were subsequently published in the Derry News and Derry Journal respectively as part of a police campaign to identify wrongdoers. The Appellant complained that the publication of the photographs violated his privacy rights under Article 8 of the European Convention of Human Rights ('ECHR').</p>
<p>The really interesting part of this case was the Court's analysis of when Article 8 is engaged.  Is it engaged only where the individual concerned has a reasonable expectation of privacy, or can people have privacy rights even when they don't expect to?</p>
<p><strong>Divisional Court decision</strong></p>
<p>The Court noted that Article 8 is the provision of the ECHR with the "<em>broadest potential scope of application</em>", and therefore the engagement of this right covers a wide ambit of an individual's activity.</p>
<p>The majority of the Divisional Court held that the Appellant's Article 8 rights were engaged because (in a slightly circular explanation): </p>
<p>"<em>Given the breadth of the concept of private life the publication of photographs suggesting that police wished to identify this child in connection with these serious offences was an intrusion into his private life</em>". </p>
<p>However this was not a unanimous reading of Article 8, with Higgins LJ concluding that it was not engaged in this case because: </p>
<p>"<em>The answer to the question whether a private life right exists in a public setting will be found by considering whether the person had a reasonable expectation of privacy in the public circumstances in which he placed or found himself.  In this case the applicant placed himself in public view among a crowd of other persons engaged, allegedly, in public disorder.  He was open to public view by anyone who happened to be watching, be they police of civilians.  He took the risk of his presence and any activities being observed and noted down or otherwise recorded</em>". </p>
<p>Despite the majority ruling that the Appellant's Article 8 rights were engaged, JR38's claim failed because the interference with this right was said to be justified as it was necessary for the administration of justice and was not excessive in the circumstances. The Appellant appealed. </p>
<p><strong>Supreme Court decision </strong> </p>
<p>The Supreme Court unanimously dismissed the appeal, however the tribunal was again divided on whether Appellant's Article 8 right was engaged.</p>
<p>Lord Kerr noted that prima facie, the taking and use of a photograph of an individual will fall within the ambit of Article 8.  However, he commented that: </p>
<p>"<em>The essential question is whether it is removed from that ambit because of the activity in which the person is engaged at the time the photograph was taken and because the person could not have a reasonable expectation that his or her right to respect for private life arose in those particular circumstances</em>". </p>
<p><strong><em>Those that thought Article 8 was engaged </em></strong> </p>
<p>Lord Kerr, with whom Lord Wilson agreed, held that Article 8 was engaged; although, like Divisional Court, he decided the interference was justified for the prevention of crime and prosecution of offenders.  </p>
<p>He held that a nuanced approach was needed to reach a conclusion on whether Article 8 was engaged.  It was necessary to not only examine whether the person asserting the right had a reasonable expectation of privacy, but also other factors such as an applicant's age, consent, the risk of criminalisation or stigmatism and the purpose that the photographs were used for. </p>
<p>"<em>To elevate reasonable expectation of privacy to a position of unique and inviolable influence is to exclude all such factors from consideration and I cannot accept that this a proper approach.</em> </p>
<p><em>As I have said, reasonable expectation of privacy will often be a factor of considerable weight; it might even be described as 'a rule of thumb' but to make it an inflexible, wholly determinative test is, in my opinion, to fundamentally misunderstand the proper approach to the application of article 8 and to unwarrantably proscribe the breadth of its possible scope</em>". </p>
<p>Lord Kerr determined the key issue was not the rioting itself but the publication of the photographs and the potential effect this would have had.  He held that given the age of the Appellant when the photographs were published, and recognising the potential effect that the publication may have had on him, it was clear that Article 8 must be engaged. </p>
<p><strong><em>Those that didn't </em></strong> </p>
<p>Conversely, Lord Toulson, with whom Lord Clarke agreed, held that Article 8 was not engaged. </p>
<p>Lord Toulson noted that the "<em>touchstone</em>" for engagement of Article 8 is whether the Applicant had a reasonable expectation of privacy.  That interaction in the form of a public riot "<em>is not the kind of activity which article 8 exists to protect</em>".  There was no reasonable expectation of privacy in these circumstances.  He held that in any event, if Article 8 was found to be engaged, the interference would be justified. </p>
<p>Lord Clarke agreed with Lord Toulson, commenting that </p>
<p>"… <em>the criminal nature of what the appellant was doing was not an aspect of his private life that he was entitled to keep private …He could not have had an objectively reasonable expectation that such photographs, taken for the limited purpose of identifying who he was, would not be published". </em> </p>
<p><strong>Comment</strong> </p>
<p>The test of whether a person had a reasonable expectation of privacy is already a difficult one to apply when trying to predict whether publishing articles or otherwise making information available will engage someone's Article 8 rights. If Lord Kerr is right, and it is possible for Article 8 to be engaged even in cases where the person involved could not have expected privacy, that can only make things even harder for publishers.  </p>
<p>It may be that Lord Toulson's conclusions, coupled with the fact that Lord Kerr still placed significant stress on a person's reasonable expectations, mean that the analysis will remain the same in most cases.  However, there must now be some cases where Article 8 will have a broader scope than was previously thought… </p>
<p><em>Written by Elizabeth Wiggin and Harry Kinmonth</em></p>]]></content:encoded></item><item><guid isPermaLink="false">{78E0EA14-DC64-4DE6-A1A8-C4B66859E92D}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/gulati-and-ors-v-mgn-ltd-mgn-appeals-against-hacking-awards/</link><title>MGN appeals against hacking awards in Gulati case</title><description><![CDATA[MGN today sought permission to appeal against the very large awards of damages made by Mr Justice Mann in the eight test claims in the hacking litigation arising out of voicemail interception at Mirror Group Newspapers.]]></description><pubDate>Wed, 10 Jun 2015 06:35:00 +0100</pubDate><category>Data and privacy</category><authors:names></authors:names><content:encoded><![CDATA[<p>Permission was refused by the Judge. MGN will now seek permission from the Court of Appeal.</p>
<p>MGN would have accepted a judgment that awarded the victims of hacking fair compensation. It has apologised to those people whose voicemail messages were hacked by its journalists and agreed to pay them compensation. MGN's quarrel is over the amount of the compensation the judge has ordered. The smallest award was £85,000. The largest was £260,250. If permission is granted by the Court of Appeal in due course, MGN will argue that these awards bear no proper relation to the injuries suffered, to previous awards in comparable cases or indeed to the value of money itself.</p>
<p>Substantial as the awards against MGN were, the eight claimants had pressed the trial judge for even larger sums, as the following table shows: </p>
<table style="margin-left: 1pt;" border="1" cellspacing="0" cellpadding="0" sizcache="2" sizset="0">
    <tbody sizcache="2" sizset="0">
        <tr>
            <td valign="top" style="border-width: 1pt; border-style: solid; padding: 0cm 5.4pt; width: 123.1pt; text-align: left;">
            <p style="text-align: center;"><sub><strong><span>Claimant</span></strong></sub></p>
            </td>
            <td valign="top" style="border-width: 1pt 1pt 1pt medium; border-style: solid solid solid none; padding: 0cm 5.4pt; width: 123.2pt; text-align: left;">
            <p style="text-align: center;"><sub><strong><span>Claimant's Proposed Damages</span></strong></sub></p>
            <p style="text-align: center;"><sub><strong><span>£</span></strong></sub></p>
            </td>
            <td valign="top" style="border-width: 1pt 1pt 1pt medium; border-style: solid solid solid none; padding: 0cm 5.4pt; width: 123.2pt; text-align: left;">
            <p style="text-align: center;"><sub><strong><span>Damages Awarded</span></strong></sub></p>
            <p style="text-align: center;"><sub><strong><span>£</span></strong></sub></p>
            </td>
        </tr>
        <tr>
            <td valign="top" style="border-width: medium 1pt 1pt; border-style: none solid solid; padding: 0cm 5.4pt; width: 123.1pt; text-align: left;">
            <p style="text-align: center;"><sub><span>Alan Yentob</span></sub></p>
            </td>
            <td valign="top" style="border-width: medium 1pt 1pt medium; border-style: none solid solid none; padding: 0cm 5.4pt; width: 123.2pt; text-align: left;">
            <p style="text-align: center;"><sub><span>250,000</span></sub></p>
            </td>
            <td valign="top" style="border-width: medium 1pt 1pt medium; border-style: none solid solid none; padding: 0cm 5.4pt; width: 123.2pt; text-align: left;">
            <p style="text-align: center;"><sub><span>85,000</span></sub></p>
            </td>
        </tr>
        <tr>
            <td valign="top" style="border-width: medium 1pt 1pt; border-style: none solid solid; padding: 0cm 5.4pt; width: 123.1pt; text-align: left;">
            <p style="text-align: center;"><sub><span>Lauren Alcorn</span></sub></p>
            </td>
            <td valign="top" style="border-width: medium 1pt 1pt medium; border-style: none solid solid none; padding: 0cm 5.4pt; width: 123.2pt; text-align: left;">
            <p style="text-align: center;"><sub><span>366,000</span></sub></p>
            </td>
            <td valign="top" style="border-width: medium 1pt 1pt medium; border-style: none solid solid none; padding: 0cm 5.4pt; width: 123.2pt; text-align: left;">
            <p style="text-align: center;"><sub><span>72,500</span></sub></p>
            </td>
        </tr>
        <tr>
            <td valign="top" style="border-width: medium 1pt 1pt; border-style: none solid solid; padding: 0cm 5.4pt; width: 123.1pt; text-align: left;">
            <p style="text-align: center;"><sub><span>Robert Ashworth</span></sub></p>
            </td>
            <td valign="top" style="border-width: medium 1pt 1pt medium; border-style: none solid solid none; padding: 0cm 5.4pt; width: 123.2pt; text-align: left;">
            <p style="text-align: center;"><sub><span>654,000</span></sub></p>
            </td>
            <td valign="top" style="border-width: medium 1pt 1pt medium; border-style: none solid solid none; padding: 0cm 5.4pt; width: 123.2pt; text-align: left;">
            <p style="text-align: center;"><sub><span>201,250</span></sub></p>
            </td>
        </tr>
        <tr>
            <td valign="top" style="border-width: medium 1pt 1pt; border-style: none solid solid; padding: 0cm 5.4pt; width: 123.1pt; text-align: left;">
            <p style="text-align: center;"><sub><span>Lucy Taggart</span></sub></p>
            </td>
            <td valign="top" style="border-width: medium 1pt 1pt medium; border-style: none solid solid none; padding: 0cm 5.4pt; width: 123.2pt; text-align: left;">
            <p style="text-align: center;"><sub><span>652,000</span></sub></p>
            </td>
            <td valign="top" style="border-width: medium 1pt 1pt medium; border-style: none solid solid none; padding: 0cm 5.4pt; width: 123.2pt; text-align: left;">
            <p style="text-align: center;"><sub><span>157,250</span></sub></p>
            </td>
        </tr>
        <tr>
            <td valign="top" style="border-width: medium 1pt 1pt; border-style: none solid solid; padding: 0cm 5.4pt; width: 123.1pt; text-align: left;">
            <p style="text-align: center;"><sub><span>Shobna Gulati</span></sub></p>
            </td>
            <td valign="top" style="border-width: medium 1pt 1pt medium; border-style: none solid solid none; padding: 0cm 5.4pt; width: 123.2pt; text-align: left;">
            <p style="text-align: center;"><sub><span>520,000</span></sub></p>
            </td>
            <td valign="top" style="border-width: medium 1pt 1pt medium; border-style: none solid solid none; padding: 0cm 5.4pt; width: 123.2pt; text-align: left;">
            <p style="text-align: center;"><sub><span>117,500</span></sub></p>
            </td>
        </tr>
        <tr>
            <td valign="top" style="border-width: medium 1pt 1pt; border-style: none solid solid; padding: 0cm 5.4pt; width: 123.1pt; text-align: left;">
            <p style="text-align: center;"><sub><span>Shane Roche</span></sub></p>
            </td>
            <td valign="top" style="border-width: medium 1pt 1pt medium; border-style: none solid solid none; padding: 0cm 5.4pt; width: 123.2pt; text-align: left;">
            <p style="text-align: center;"><sub><span>520,000</span></sub></p>
            </td>
            <td valign="top" style="border-width: medium 1pt 1pt medium; border-style: none solid solid none; padding: 0cm 5.4pt; width: 123.2pt; text-align: left;">
            <p style="text-align: center;"><sub><span>155,000</span></sub></p>
            </td>
        </tr>
        <tr>
            <td valign="top" style="border-width: medium 1pt 1pt; border-style: none solid solid; padding: 0cm 5.4pt; width: 123.1pt; text-align: left;">
            <p style="text-align: center;"><sub><span>Paul Gascoigne</span></sub></p>
            </td>
            <td valign="top" style="border-width: medium 1pt 1pt medium; border-style: none solid solid none; padding: 0cm 5.4pt; width: 123.2pt; text-align: left;">
            <p style="text-align: center;"><sub><span>886,000</span></sub></p>
            </td>
            <td valign="top" style="border-width: medium 1pt 1pt medium; border-style: none solid solid none; padding: 0cm 5.4pt; width: 123.2pt; text-align: left;">
            <p style="text-align: center;"><sub><span>188,250</span></sub></p>
            </td>
        </tr>
        <tr>
            <td valign="top" style="border-width: medium 1pt 1pt; border-style: none solid solid; padding: 0cm 5.4pt; width: 123.1pt; text-align: left;">
            <p style="text-align: center;"><sub><span>Sadie Frost</span></sub></p>
            </td>
            <td valign="top" style="border-width: medium 1pt 1pt medium; border-style: none solid solid none; padding: 0cm 5.4pt; width: 123.2pt; text-align: left;">
            <p style="text-align: center;"><sub><span>1,059,000</span></sub></p>
            </td>
            <td valign="top" style="border-width: medium 1pt 1pt medium; border-style: none solid solid none; padding: 0cm 5.4pt; width: 123.2pt; text-align: left;">
            <p style="text-align: center;"><sub><span>260,250</span></sub></p>
            </td>
        </tr>
    </tbody>
</table>
 
<p>The trial in March 2015 related to eight "Representative Claimants" who had been selected to run their claims to trial to enable damages to be awarded in those claims and, in doing so, provide guidance for other similar claims against MGN. The purpose of an appeal is therefore not just to reduce the damages payable to the eight Representative Claimants, but to provide a more suitable framework for the settlement of future claims. </p>
<p><strong>Why did the Court make such large awards of damages?</strong></p>
<p><strong> </strong>MGN submitted at trial that each claimant should receive a single award representing the extent of the perceived distress caused by the wrong-doing. In particular, MGN said the Court should apply the tariff for assessing injury to feelings that was established in <span style="text-decoration: underline;">Vento v Chief Constable of West Yorkshire</span>.</p>
<p>Mann J rejected this submission, preferring the "layered" approach urged on him by the Claimants. His approach was to build up the sum of damages awarded by way of separate layers as follows: </p>
<ol>
    <li> An award for each and every article that was either admitted or held to be the product of voicemail interception and/or blagging. Some of these awards were modest (£750), others much greater (£40,000).  In addition, for certain claimants, a separate award in relation to the articles was made for any additional elements of distress that were held not to have been encapsulated by the single awards given for each individual article. These additional elements included additional anxiety or distress caused by the pattern of intrusion evidenced by the articles or the general and accumulating upset, suspicion and undermining of relationships to which the publications gave rise.</li>
    <li>A separate award for the hacking to compensate generally for the relevant invasions of privacy. This head of damages seems to have been broken down further into the following sub-heads:
    <ol style="list-style-type: lower-alpha;">
        <li>damages for frequency and longevity of hacking (which included a sum of £10,000 for each year of hacking); and</li>
        <li>damages for general distress and the long term effects of hacking (such as effect on relationships).</li>
    </ol>
    </li>
    <li>A separate award for the blagging of personal information via private investigators; and</li>
    <li>An award for aggravated damages.</li>
</ol>
<p>The Court repeated a number of times in the judgment that despite the inherently overlapping nature of the various heads of damages described above, it had considered and avoided any double counting. However the process by which the Court achieved this is not explained in any detail in the judgment.</p>
<p>The Court also stated that a final review of the aggregated damages awards had been undertaken to ensure overall proportionality. Again this process is not fully explained in the judgment and is hard to understand by reference to existing authorities on damages for non-pecuniary loss.</p>
<p><strong>The grounds of appeal</strong></p>
<p><strong> </strong>The grounds on which MGN sought permission to appeal were as follows: </p>
<p style="margin-left: 36pt;">(a)        The awards are out of all proportion to the harm suffered when consideration is given to the accepted scale of damages for personal injuries. The judge erred by proceeding on the basis that the global award did not need to be proportionate to that scale and that he could focus on compensation by adopting a "single wrong by single wrong" basis for compensation.</p>
<p style="margin-left: 36pt;">(b)        The size of the awards is disproportionate by reference to awards by the European Court of Human Rights for breaches of privacy.</p>
<p style="margin-left: 36pt;">(c)        There has been double-counting in the awards of damages: first in awarding damages for the fact of hacking, having already made awards for published articles; second for awarding an additional sum for general upset and effect on relationships; and third for treating each article in isolation.</p>
<p style="margin-left: 36pt;">(d)        The judge was wrong to reject MGN's submission that damages for breach of privacy are compensation for injured feelings and are not intended to mark wrongdoing, such damages being vindicatory in effect and therefore contrary to the principles stated in <span style="text-decoration: underline;">Lumba v Secretary of State for the Home Department.</span> </p>
<p style="margin-left: 36pt;">Louise Turner is a Senior Associate at RPC who act for MGN Limited in these proceedings</p>]]></content:encoded></item><item><guid isPermaLink="false">{3BE6AF85-DAF7-491B-9B2B-B0E7FE9FA195}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/size-doesnt-matter/</link><title>Size doesn't matter: regulating "big data" in a "small data" world </title><description><![CDATA[For many, the potential benefit from analysing enormous big data datasets is undeniable. However, the view of Europe’s most high profile data protection think tank, the Article 29. Data Protection Working Party (the WP29), is that the real value of big data remains to be proven. Either way, big data creates challenges for traditional data regulation regimes.<br><br>]]></description><pubDate>Mon, 04 May 2015 19:49:00 +0100</pubDate><category>Data and privacy</category><authors:names></authors:names><content:encoded><![CDATA[For many, the potential benefit from analysing enormous big data datasets is undeniable. However, the view of Europe’s most high profile data protection think tank, the Article 29. Data Protection Working Party (the WP29), is that the real value of big data remains to be proven. Either way, big data creates challenges for traditional data regulation regimes.<br><br>]]></content:encoded></item><item><guid isPermaLink="false">{0E62B5DA-7C03-404E-97DC-931ABADBDFB6}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/the-future-of-safe-harbour/</link><title>The future of "Safe Harbour" </title><description><![CDATA[The Article 29 Working Party (WP29), a European advisory body on data protection and privacy issues, is the latest organisation to wade into the debate.<br><br>]]></description><pubDate>Mon, 04 May 2015 19:49:00 +0100</pubDate><category>Data and privacy</category><authors:names></authors:names><content:encoded><![CDATA[The Article 29 Working Party (WP29), a European advisory body on data protection and privacy issues, is the latest organisation to wade into the debate.<br><br>]]></content:encoded></item><item><guid isPermaLink="false">{3D6398E5-55C3-400A-813A-C57F9CE7159D}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/compensation-for-distress-only-claims-under-dpa/</link><title>Compensation for "distress-only" claims under DPA </title><description><![CDATA[In a heavily anticipated judgment handed down on 27 March 2015, the Court of Appeal made a decision that has the potential to significantly expand the scope of data protection rights in this jurisdiction.<br><br>]]></description><pubDate>Sun, 03 May 2015 19:49:00 +0100</pubDate><category>Data and privacy</category><authors:names></authors:names><content:encoded><![CDATA[In a heavily anticipated judgment handed down on 27 March 2015, the Court of Appeal made a decision that has the potential to significantly expand the scope of data protection rights in this jurisdiction.<br><br>]]></content:encoded></item><item><guid isPermaLink="false">{ECDA1794-8A4D-46E3-B210-A5AC5CDB744C}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/google-v-vidal-hall-the-rise-and-rise-of-data-protection-rights/</link><title>Google v Vidal-Hall: the rise and rise of data protection rights</title><description><![CDATA[In an important decision handed down on Friday, the Court of Appeal confirmed that misuse of private information is a tort, and that claimants may recover damages under the Data Protection Act 1998 (the "DPA") for distress without also proving pecuniary losses.]]></description><pubDate>Tue, 31 Mar 2015 06:52:00 +0100</pubDate><category>Data and privacy</category><authors:names></authors:names><content:encoded><![CDATA[<p>(<a href="http://www.bailii.org/ew/cases/EWCA/Civ/2015/311.html" target="_blank"><span style="text-decoration: underline;"><em>Google Inc v (1) Judith Vidal-Hall (2) Robert Hann (3) Marc Bradshaw </em>[2015] EWCA Civ 311</span></a>)</p>
<p>The claim concerned the collection of alleged private information by Google regarding the claimants' </p>
<p>internet usage.  This information consisted of Browser-Generated Information ("<strong>BGI</strong>") which was collected without the claimants' authorisation.  The BGI was collected using cookies, which could recognise the specific browser that was creating the BGI.  The claimants alleged that Google then offered their BGI to advertisers who could then target each of them specifically based on their browsing history.</p>
<p>The procedural background to the appeal is convoluted, but essentially the claimants sought and obtained permission to serve their claim out of the jurisdiction on Google in the US.  Google unsuccessfully applied to have that permission set aside before Tugendhat J and so appealed the judge's decision to the Court of Appeal.   </p>
<p style="text-align: left;">The appeal raised four issues:</p>
<ol>
    <li>whether misuse of private information is a tort (this having procedural relevance to whether or not the claimants were entitled to serve Google out of the jurisdiction);</li>
    <li>the meaning of 'damage' under s.13 DPA, and, in particular, whether there could be a claim for compensation without pecuniary loss;</li>
    <li>whether there was a serious issue to be tried that the BGI was personal data under the DPA, justifying service out of the jurisdiction; and</li>
    <li>whether, in relation to the claims for misuse of private information and under the DPA, there was a real and substantive cause of action, again meaning that the Court should exercise its discretion to permit service out of the jurisdiction. </li>
</ol>
<p style="text-align: left;"><strong><em>Misuse of private information is a tort </em></strong> </p>
<p style="text-align: left;">The Court confirmed that misuse of private information is a tort and not an equitable wrong (albeit that it was borne out of the equitable wrong of breach of confidence).   The Court reasoned that it was not bound by its decision in <em>Douglas v Hello (No 3) </em>[2003] EWHC 55(Ch), where obiter comments were made to the contrary. <em> </em>Instead it held that in other cases misuse of private information had been referred to as a tort and <em>"…these references cannot be dismissed as a mere loose use of language; they connote an acknowledgment, even if only implicitly, of the true nature of the cause of action</em>".   </p>
<p style="text-align: left;"><strong><em>The meaning of damage under s.13 DPA</em></strong> </p>
<p style="text-align: left;">It was common ground that the wording of section 13(2) requires a claimant to have suffered pecuniary loss before they can recover any compensation for distress under the DPA (albeit that there is an exception for certain processing by the media).  The argument instead focussed on whether or not this provision was compatible with the EU legislation which gave rise to it and, if it was not compatible, whether the Court could do anything about it. </p>
<p style="text-align: left;">The DPA was intended to implement Directive (95/46/EC) (the "<strong>Directive</strong>"), which protects the processing of personal data and the free movement of data.   Article 23 of the Directive addresses the issue of compensation when a data controller contravenes the Directive, and the Court held that, unlike section 13(2), <em>"… article 23 of the Directive does not distinguish between pecuniary and non-pecuniary damage</em>".  As a result, the Court determined that the principles of compensation under Article 23 and damages under s.13 were incompatible, and that s.13(2) had not effectively transposed Article 23 into domestic law.  </p>
<p style="text-align: left;">The Court commented that if 'damage' was restricted to 'pecuniary damage' in the manner that section 13(2) dictates, <em>"…such a restrictive interpretation would substantially undermine the objective of the Directive</em>", namely to protect the rights and freedoms of individuals with respect to the processing of their personal data (and not just the individuals' pecuniary interest in that personal data).</p>
<p style="text-align: left;">The question then became whether the Court could do anything about this incompatibility.  The Court held that s.13 was a "<em>central feature</em>" of the DPA and so the <em>Marleasing</em> principle (whereby directives can be given indirect effect by the courts via purposive interpretation of national legislation) could not be invoked.  </p>
<p style="text-align: left;">The Court then considered whether Article 47 could have an effect in this case.  Article 47 provides that everyone whose rights under the Charter of Fundamental Rights have been violated has a right to an effective remedy for that violation.  These rights include the right to privacy under Article 7 and data protection rights under Article 8 of the Charter.  </p>
<p style="text-align: left;">The Court concluded that, if the requirement for pecuniary damage in section 13(2) was enforced, the claimants would have no effective remedy even though their fundamental rights under Articles 7 and 8 had been engaged. Section 13(2) was therefore incompatible with Article 47 of the Charter, and so the Court was compelled to disapply it on that basis. </p>
<p style="text-align: left;">By removing section 13(2) in this way and giving horizontal direct effect to Article 47 of the Charter, the Court held that the Claimants could claim compensation for distress alone (without needing to show any pecuniary loss). </p>
<p style="text-align: left;"><strong><em>BGI as personal data and a real and substantive cause of action</em></strong> </p>
<p style="text-align: left;">In the context of this appeal, the Court did not need to determine the issue of whether BGI was personal data; however it held that it was clearly arguable that it was.  The Court determined that there were serious issues to be tried and noted that "<em>… these claims raise serious issues which merit a trial...the damages may be small, but the issues of principle are large</em>". </p>
<p style="text-align: left;"><strong><em>Comment</em></strong> </p>
<p style="text-align: left;">If this decision survives any further appeal (and there are fair grounds for Google to feel hard done-by) the decision is likely to have significant repercussions with respect to data protection claims in the UK.  We will have to wait and see just how claimants seek to rely on the precedent, but there can be little doubt that they will do so, and that the recent invigoration of DPA claims and the rise of stand-alone data protection rights is set to continue (as per <em>Google Spain</em>, <em>Mosley</em>). </p>
<p style="text-align: left;">The fact that pecuniary loss would no longer be a threshold requirement for a DPA claim clearly broadens the scope for such claims.  But what will be more interesting (and unpredictable) is how the Court's use of Article 47 to disapply section 13(2) will be relied on in future cases. </p>
<p style="text-align: left;">For example, the wording of section 10(1) of the DPA allows an individual to object to the processing of his or her personal data only if the processing is likely to cause substantial damage or distress and that damage or distress is unwarranted.  Could one argue this is a restrictive interpretation of Article 14 of the Directive?  If so, is it possible that Article 47 could kick in again to provide claimants with broader rights to object than section 10 currently provides?  Watch this space.</p>]]></content:encoded></item><item><guid isPermaLink="false">{49C2335C-03A9-4CED-8853-615FCE08937E}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/the-91-year-old-activist-and-the-angry-neighbour-the-supreme-court-considers-the-limits/</link><title>91 year-old activist and angry neighbour: Supreme Court looks at police retention of personal data </title><description><![CDATA[Case report: R (Catt) v Commissioner of Police of the Metropolis and ACPO and R (T) v Commissioner of Police of the Metropolis [2015] UKSC 9]]></description><pubDate>Mon, 09 Mar 2015 07:20:00 Z</pubDate><category>Data and privacy</category><authors:names></authors:names><content:encoded><![CDATA[<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>In a decision handed down <span style="color: #ff0066;"><a href="http://www.bailii.org/uk/cases/UKSC/2015/9.html"><span style="color: #ff0066; text-decoration: underline;">last week</span></a></span>, the Supreme Court has decided that the police were entitled to retain personal data regarding a 91 year-old peace activist and a woman who got into a minor dispute with a neighbour, even though in both cases the individuals' article 8 rights to privacy were engaged.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The first of the two linked appeals related to Mr Catt, an elderly man from Brighton who has been active in the peace movement since the 1940s and, during that period, has attended numerous public demonstrations. This has included demonstrations where a minority have resorted to violence (including a rather ominously named group called "<em>Smash EDO</em>"); although Mr Catt himself never engaged in any violet behaviour and has never been convicted of any offence. Purely as a result of his recorded attendance at such demonstrations, he found that certain information about him had been included on the so-called "Domestic Extremism Database".</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The second appeal related to Ms T, who got into an argument with a neighbour which resulted in the police sending a letter informing her that an allegation of harassment had been made against her (no further steps were taken). Records of this letter were then retained on police databases. </span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Interestingly, both cases involved personal data consisting entirely of records made of actions that had taken place in public (i.e. Mr Catt's actions at public protests and Ms T's actions in common spaces of a block of flats). </span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The court proceeded on the assumption that the state's systematic collection and storage in retrievable form even of public information about an individual engages article 8(1) as an interference with private life. The question to decide was therefore whether this interference was permitted under the exception in article 8(2) on the basis that: (a) the retention of the data was "<em>in accordance with the law</em>" and (b) it was "<em>necessary</em>", in that it was proportionate to the objectives concerned. </span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Regarding the first question, Lord Sumption, who gave the leading judgment, reviewed how the police powers to obtain and store information are regulated (i.e. via the Data Protection Act 1998 ("DPA") and various codes of practice and guidance that have been issued on the DPA's application to police powers) before concluding that the police's data retention regime was in accordance with the law. </span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>This left the key question of the appeals being whether the interference with Mr Catt and Ms T's article 8 rights on the facts of each case was proportionate to the objective of maintaining public order and preventing or detecting crime. </span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>In Mr Catt's case, the court found (Lord Toulson dissenting) that the interference was proportionate. Lord Sumption gave some important guidance on how intelligence gathering should be viewed in the context of the DPA (see paragraph 31). He also emphasised that, just because Mr Catt had not committed and is not likely to commit an offence, that does not make the information held on the database about him irrelevant (para 35): </span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>"<em>the material is relevant not primarily for the purpose of establishing criminality against Mr Catt but for the purpose of studying the methods and organisation of a violent organised group whose demonstrations he attends.</em>" </span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Lord Toulson dissented on the basis that he did not think police investigations would be hampered by information such as this being deleted from their databases. He felt that the deletion of this data was further justified in this case given Mr Catt was doing no more than exercising his democratic right to peaceful protest: "<em>in a modern society the state has very extensive powers of keeping records on its citizens. If a citizen's activities are lawful, they should be free from the state keeping a record of them unless, and then only for as long as, such a record really needs to be kept in the public interest</em>". Unfortunately for Mr Catt, Lord Toulson was in a minority of one. </span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>In Ms T's case, the court observed that the record of her being sent a warning letter was only kept for two and a half years (albeit that the general policy allowed such material to be kept for up to 12 years). They came to the view that there were very good reasons to keep records of cases involving harassment, and that the interference with her rights in this particular case was proportionate. As Lady Hale explained (para 54): </span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>"<em>particularly in disputes between neighbours and in cases of domestic ill-treatment and abuse, the police response to a new complaint will be affected by knowing whether other complaints have been made in the past against the same person… Domestic violence often escalates in seriousness with each new incident, and the police have to be aware of this when considering how to respond.</em>" </span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>This decision provides yet another example of the courts trying to strike a balance between the need to protect individuals' article 8 rights and the need to allow other competing interests to be pursued (here the detection of crime) in a society where increasing volumes of data can and are being collected and retained in searchable form. While the case provides important guidance on the retention of personal data by the police, it also is of interest for the following broader reasons: </span></p>
<ol style="margin-top: 0cm;">
    <li style="margin: 0cm 0cm 10pt; text-align: justify; color: #000000;"><span>The judges made it very clear that a complainant's first port of call when they believe there has been a breach of their data privacy rights should be the Information Commissioner (see para 45 in particular), with the hint that there may be costs implications for those who decide to go to court instead. </span></li>
    <li style="margin: 0cm 0cm 10pt; text-align: justify; color: #000000;"><span>The balance that any particular judge will strike between article 8 and the multitude of competing rights and interests on the facts of a particular case is, as we well know, extremely hard to predict.  The fact that such eminent judges as Lord Sumption and Lord Toulson reached very different conclusions on the facts of Mr Catt's case is just the latest example of this. </span></li>
    <li style="margin: 0cm 0cm 10pt; text-align: justify; color: #000000;"><span>The perception a particular judge has of a data controller's resources is likely to have an impact on how the balance is struck.  Lord Sumption concluded that, even if the police had not been entitled to retain the information they did, the labour involved in reviewing their databases in order to ensure people like Mr Catt were excluded "<em>would be disproportionate to the value of the exercise</em>" and would be "<em>a major administrative exercise</em>" which would not be justified. However, no evidence appears to have been provided by the police to show they would not be able to cope with such a task. It seems that Lord Sumption may have assumed that the police, being a public body funded by the tax payer, would not be able to handle too onerous an obligation to weed out irrelevant and outdated information from their databases. This contrasts with the assumptions other decision-makers have made of certain large private sector data controllers; namely that they are large enough, rich enough and sophisticated enough to be expected to cope with very significant administrative burdens in order to comply with their data protection obligations (the <em>Costeja</em> decision being the obvious example). Regardless of whether or not either of these assumptions are justified, it gives some indication of the sorts of perception issues which are impacting on decision making in this greyest of areas.</span></li>
</ol>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"> </p>]]></content:encoded></item><item><guid isPermaLink="false">{A82BF95C-E4BC-4021-85F9-50CCA31B6B25}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/apps-regulators-across-the-globe-push-for-data-transparency/</link><title>Apps: regulators globally push for data transparency </title><description><![CDATA[That’s a recent BBC headline highlighting the extensive amount of personal information that new technology is capable of collecting from its users. The same is especially true in the case of mobile applications. For example, Amazon has released “Amazon Echo”, a speaker that uses voice recognition to “hear you from across the room” and sync with your mobile to control your alarms, music and shopping lists; not to mention the development in finger print technology which can be used as an alternative to cookies in tracking website activity.<br><br>]]></description><pubDate>Mon, 16 Feb 2015 19:49:00 Z</pubDate><category>Data and privacy</category><authors:names></authors:names><content:encoded><![CDATA[That’s a recent BBC headline highlighting the extensive amount of personal information that new technology is capable of collecting from its users. The same is especially true in the case of mobile applications. For example, Amazon has released “Amazon Echo”, a speaker that uses voice recognition to “hear you from across the room” and sync with your mobile to control your alarms, music and shopping lists; not to mention the development in finger print technology which can be used as an alternative to cookies in tracking website activity.<br><br>]]></content:encoded></item><item><guid isPermaLink="false">{A94C861B-CF1C-4057-94A8-F63A26E644A4}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/court-of-appeal-applies-rare-19th-century-tort-in-granting-injunction/</link><title>CofA applies rare 19th Century tort in granting injunction </title><description><![CDATA[The Court of Appeal has granted an injunction against the publication of a well-known performing artist's book to protect the rights of his son, not on the basis of misuse of private information but because publication would be likely to cause psychological harm to the son.]]></description><pubDate>Tue, 04 Nov 2014 07:32:00 Z</pubDate><category>Data and privacy</category><authors:names>Alex Wilson</authors:names><content:encoded><![CDATA[<p>OPO v MLA [2014] EWCA Civ 1277</p>
<p>The proceedings were anonymised by order of the court and the appeal was heard in part in private and otherwise subject to restrictions on publication of any material that might directly or indirectly identify the son. </p>
<p><strong>Background facts</strong> </p>
<p>MLA, a young performing artist, had written a semi-autobiographical book. Described by the judge in this case as "striking prose", the book gave accounts of the serious childhood sexual abuse he personally had suffered whilst at school and told of his traumatisation and subsequent episodes of severe mental illness and self-harm. </p>
<p>MLA had dedicated the book to his son by his first marriage, OPO, and sections of the book were written directly to him. OPO had lived in the UK until his parents' divorce and now lives abroad with his mother. OPO suffers from significant disabilities; he has a diagnosis of a combination of ADHD, Asperger's, Dysgraphia and Dyspraxia. Two psychologists suggested that the publication of the book revealing the accounts of the sexual abuse and mental illness suffered by his father would "be likely to exert a catastrophic effect on OPO's self-esteem and to cause him enduring psychological harm" and that "he might attempt to act out some of the descriptions" in the book. </p>
<p>OPO applied for an injunction, through BHM (his mother and litigation friend), restraining publication of the book on three grounds: i) publication would represent misuse of private information; ii) publication would be negligent, in a breach of duty owed by MLA to his son; and iii) publication would cause intentional harm, infringing the tort recognised in Wilkinson v Downton [1897] QB 57, a rarely used principle of law where liability is incurred if a defendant wilfully does an act calculated to cause psychological harm. </p>
<p>The injunction was opposed by MLA, who contended that none of the causes of action had any prospects of success, the grant of an injunction could not be justified in accordance with s.12 Human Rights Act 1998 and the applicable law to any cause of action would be that of the country in which OPO lived, not the UK. </p>
<p>The judge at first instance refused the injunction, holding that none of the three causes of action argued had any real prospects of success. OPO appealed. </p>
<p><strong>Decision</strong> </p>
<p>The Court of Appeal allowed the appeal and granted an injunction to restrain publication of the book. </p>
<p><em>Cause of action</em> </p>
<p>Arden LJ agreed with the judge at first instance that OPO did not have a viable cause of action in misuse of private information, stating that the information likely to cause harm to OPO all related to MLA, and was not any misuse of OPO's private information. Arden LJ also held that there was no cause of action for a claim in negligence, stating that a duty of care could not be imposed on a parent towards his child. Arden LJ overturned the judge at first instance, however, by holding that OPO had a viable cause of action in the Wilkinson v Downton tort. </p>
<p>In establishing the tort, Arden LJ held that it was not necessary (as had been deemed in previous caselaw) that the communication had to be false. The tort required conduct that was unjustifiable in the circumstances. </p>
<p>Furthermore, Arden LJ held that intention could be imputed if the harm was likely to be caused and a defendant carried on doing the relevant act. She held that the communication did not have to be stated directly to OPO, it was sufficient that the relevant information was disseminated to the world at large provided there was a risk it would reach him. She noted that the book was dedicated to him and sections were directed at him; MLA could not say that he did not intend the book to reach his son and, given that OPO was described as "computer savvy", there was a risk he would see it. </p>
<p><em>Section 12 Human Rights Act 1998</em> </p>
<p>Arden LJ held that an injunction would be granted. Section 12 Human Rights Act 1998 states that no injunction is to be granted unless the Court is satisfied that the applicant is 'likely' to establish that publication should not be allowed. Arden LJ held that OPO had demonstrated sufficiently favourable prospects of establishing that his claim under Wilkinson v Downton would be successful. The Court held that it did not need to consider whether OPO was 'more likely than not' to succeed; a lower standard was justified given the risk of serious harm to OPO if the injunction were not granted. </p>
<p>In reaching this conclusion the Court applied Cream Holdings v Banerjee [2005] 1 AC 253, which states that the Court is not compelled to apply the 'more likely than not' test and that it is entitled to have regard to other factors and apply the 'sufficiently favourable' prospects of success test in certain circumstances. </p>
<p><em>Choice of law</em> </p>
<p>Arden LJ held that English law would be applied. The question of choice of law had to be determined in accordance with the Rome II Regulation. Article 4(1) provides the normal rule that the applicable law will be that of where the damage occurs. Article 4(3), however, provides that different law would be applied if it is "clear from all the circumstances of the case that the tort is manifestly more closely connected with a country other than that indicated by Article 4(1)". </p>
<p>As OPO lived in a foreign country, it was argued that the damage would occur in that country and that country's law would therefore govern the dispute. However, given that the book was written and published in the UK, the threat to cause harm emanated from the UK and OPO may be in the UK when he comes across the material, Arden LJ held that the claim was manifestly more closely connected with the UK than OPO's home country and UK law would therefore apply. </p>
<p><strong>Comment</strong> </p>
<p>This decision is a rare application of the "obscure" and "seldom used" tort recognised in Wilkinson v Downton. Arden LJ extended the tort in so far as that the communication need not be false, the communication did not have to be directed at the 'victim' and intention may be imputed to the Defendant. </p>
<p>This case also sees the application of Cream Holdings by the Court of Appeal whereby the threshold required under s12 Human Rights Act may be reduced in circumstances where the consequences of publication would be especially serious. </p>
<p>Publishers should be cautious to bear this decision in mind when publishing material that it could be deemed to cause psychological harm to an individual, even when the material is truthful and it was not the direct intention to cause such harm <span size="3" face="Calibri">– although the publication of the information must be "unjustifiable". It also serves as an example of where, when the potential harm of publication is especially severe, an injunction may be granted when there are only 'sufficiently favourable' prospects of success.</span> </p>
<p> </p>
<p><sub><span>Update:  MLA has since lodged an application for permission to appeal with the Supreme Court.</span></sub></p>]]></content:encoded></item><item><guid isPermaLink="false">{E500CFE1-C395-4A8F-A03F-A94B1C509808}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/no-loss-of-confidence-establishing-causation-in-confidential-information-claims/</link><title>No loss of confidence – causation in confidential information claims </title><description><![CDATA[Richmond Pharmacology Ltd v Chester Overseas Ltd, Milton Levine and Larry Levine [2014] EWHC 2692 (Ch)]]></description><pubDate>Tue, 07 Oct 2014 07:46:00 +0100</pubDate><category>Data and privacy</category><authors:names>David Cran</authors:names><content:encoded><![CDATA[<p style="text-align: justify;">This case is an interesting example of a claim for breach of confidence (both in contract and in equity) where, although liability was established, only nominal damages (£1) were awarded to the Claimant. </p>
<p style="text-align: justify;">It illustrates the importance of a Claimant properly valuing its claim and establishing the causal link between the breach committed by a defendant and the loss suffered. </p>
<p style="text-align: justify;"><strong>Background</strong></p>
<p style="text-align: justify;">The case was brought by Richmond (a company specialising in the design and conduct of pharmaceutical clinical trials for drug development) for damages or equitable compensation against Chester and two Levine brothers, for whom the share capital of Chester was held in trust (the <strong>Levines</strong>). </p>
<p style="text-align: justify;">Chester owned 44% of Richmond's share capital, with three doctors who founded the company (the <strong>Founders</strong>) owning the remaining 56%. In addition, the Levines were directors of Richmond (as representatives of Chester). The Levines were therefore entitled to receive detailed information about Richmond's business, including accounting information. </p>
<p style="text-align: justify;">Under Richmond's shareholder agreement (the <strong>Shareholder Agreement</strong>) Chester was required to keep company information confidential except in certain specified circumstances, including (i) where approved by the Board; (ii) where disclosure might be required to vest the full benefit of the Shareholder Agreement in any other party to the agreement; (iii) when required to comply with certain legal or regulatory obligations; or (iv) when necessary to disclose information to their professional advisers. </p>
<p style="text-align: justify;"><strong>Events giving rise to the alleged breach of confidence</strong></p>
<p style="text-align: justify;">In 2009, Chester (represented by the Levines) tried to sell its shares in Richmond, and instructed New World Corporate Finance Ltd (<strong>NWCF</strong>) to provide corporate financial assistance and advice on the matter. The Levines provided business information about Richmond to NWCF, who then used that information to market the sale of shares to potential purchasers. </p>
<p style="text-align: justify;">Richmond complained that in marketing the shares to third parties (who could have included potential clients and competitors), confidential information was disclosed, and the impression was erroneously given to the market that all issued shares in Richmond were for sale, and that therefore the founding members of the company were leaving. </p>
<p style="text-align: justify;">It was argued that this gave the false impression that the business was in trouble which in turn caused a reduction in Richmond's business, turnover and profits. Damages or equitable compensation was estimated by the Claimant to amount to over £4 million. </p>
<p style="text-align: justify;">There was an agreed list of issues for the deputy High Court judge (Stephen Jourdan QC) to decide upon, which included: (i) what duties were owed by Chester/the Levines to Richmond; (ii) whether Chester/the Levines were entitled to disclose information for the purpose of selling their shares; (iii) what information was passed to NWCT and to third parties, and whether those actions were permitted under the Shareholder Agreement; and (iv) whether the disclosure of information caused a reduction in Richmond's business and therefore a resulting loss. </p>
<p style="text-align: justify;"><strong>The obligation of confidence</strong></p>
<p style="text-align: justify;">There was an obligation under the Shareholders Agreement to "<em>keep information confidential</em>". Chester argued that this could not be intended to impose a complete restriction on the sharing of information, because to do so would in practice prevent it from selling its shares without the consent of the Founders. Chester's position was that the Shareholder Agreement should be interpreted to mean that the information could be shared provided it was communicated so as to impose an obligation of confidence upon the recipient. </p>
<p style="text-align: justify;">The Judge did not accept this argument. He found that the ordinary meaning of an obligation to treat information as confidential should simply be that it may not be disclosed to anyone else. </p>
<p style="text-align: justify;">Accordingly, Chester owed a contractual duty to Richmond not to disclose to third parties any commercially sensitive information relating to the affairs of Richmond received or obtained as a result of its position as shareholder or the Levines' position as directors, unless that disclosure fell within one of the narrow exceptions listed in the Shareholders Agreement. </p>
<p style="text-align: justify;">The Judge also examined the equitable obligations of confidence owed by the Levines. He held that equity would not impose a wider obligation of confidence than that imposed upon Chester by the Shareholders Agreement, but nor would it impose a narrower obligation. It therefore followed that if the Levines had caused Chester to disclose confidential information in breach of the Shareholders Agreement, the Levines themselves would also be in breach of an equitable obligation of confidence. </p>
<p style="text-align: justify;">Further, the Levines were also under statutory and common law duties as directors to promote the success of the company for the benefit of its members as a whole and to act with reasonable care, skill and diligence. </p>
<p style="text-align: justify;"><strong>Alleged breach of confidence</strong></p>
<p style="text-align: justify;">So far as the disclosure of confidential business information was concerned, the Judge considered both the disclosure of information to NWCF, and to third party potential purchasers of the shares. </p>
<p style="text-align: justify;">The disclosure of information to NWCF was found to fall within the permitted disclosures listed in the Shareholder Agreement; that is, the Levines were entitled to share information with NWCF as their professional advisors. </p>
<p style="text-align: justify;">There were found to be several different levels of disclosure to third party potential purchasers. Initial enquiries to ascertain interest were found to have been made on a "<em>no-names</em>" basis, so Richmond's identify was not disclosed. This level of disclosure of information did not amount to a breach of confidence. </p>
<p style="text-align: justify;">However, once specifics about the Richmond business were disclosed in order to try and entice a sale, or the impression was given by NWCF that all the shares in the company were potentially for sale if the price was right, this did amount to a breach of confidence (in contract) by Chester, and an equitable breach of confidence by the Levines. </p>
<p style="text-align: justify;">Chester and the Levines were found to be liable to Richmond for any reasonably foreseeable loss suffered as a result. </p>
<p style="text-align: justify;"><strong>Loss sustained by Richmond</strong></p>
<p style="text-align: justify;">Richmond presented evidence to the Court that showed that over the years following the alleged breach of confidence, Richmond's business had declined. Richmond's case was that it should be inferred (by virtue of a lack of other reasonable explanation) that this decline had been caused by the leaking of confidential information to competitors and potential customers caused by Chester and the Levines. </p>
<p style="text-align: justify;">However, despite the finding that Chester and the Levines had acted in breach of confidence, Richmond did not present any convincing evidence that existing customers had raised any concerns about Richmond's financial stability at the time. In fact, to the contrary, sales team information suggested that Richmond was not chosen for certain pieces of work because the prices they set were too high, or the timescales were wrong, and the Judge also listed a number of other market related factors which, in his view, had contributed to the fall in business. </p>
<p style="text-align: justify;">Crucially, Richmond failed to show that there was a causal link between the disclosure of confidential information by NWCF and the reduction in Richmond's business – the inference approach taken by Richmond was not sufficient. </p>
<p style="text-align: justify;">Further, Richmond could not point to any aspect of the disclosed confidential information which would have given competitors an advantage when received. </p>
<p style="text-align: justify;">Nominal damages of £1 were awarded against Chester for breach of contract, and the claims against the Levines were dismissed. </p>
<p style="text-align: justify;"><strong>Comment</strong></p>
<p style="text-align: justify;">This case highlights the importance for claimants (with whom the burden of proof lies) of proving causation to recover losses suffered in a breach of confidence case. It is not sufficient to simply show a breach of confidence and that loss has occurred without establishing a causal link. </p>
<p style="text-align: justify;">Historically the question of whether "detriment" was required for a breach of confidence case to be brought was left open (see for example Megarry J in <em>Coco v AN Clark</em> and Lord Goff in <em>Att Gen v Guardian Newspapers (No 2</em>)). The pertinent question for claimants is in practice not only whether there is any detriment, but crucially whether detriment can be shown to have been caused by the alleged breach of confidence. </p>
<p style="text-align: justify;">Claimants also need to beware being unrealistic in the manner in which they value and then pursue their claim, or they could face sanctions in costs. In this regard, see Arnold J's judgment in <em>Primary Group v RBS and Direct Line</em>, following which the claims against the Second Defendant were dismissed and indemnity costs were awarded against the Claimants (the authors of this article represented the Second Defendant).</p>]]></content:encoded></item><item><guid isPermaLink="false">{6E48B0E7-5AEB-48BA-8116-9F2ADDCCAC43}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/brand-and-khan-obtain-continuing-anti-harassment-order-against-masseuse/</link><title>Brand &amp; Khan obtain continuing "anti-harassment" order against masseuse</title><description><![CDATA[The High Court has recently granted an extension to an anti-harassment injunction taken out by Russell Brand and Jemima Goldsmith, otherwise known as Jemima Khan (the Claimants), against a masseuse (the Defendant). ]]></description><pubDate>Mon, 29 Sep 2014 12:52:00 +0100</pubDate><category>Data and privacy</category><authors:names></authors:names><content:encoded><![CDATA[<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>In <span style="color: #c25552;"><a href="http://www.bailii.org/ew/cases/EWHC/QB/2014/2979.html"><span style="color: #c25552; text-decoration: underline;">Brand & Anor v Szilvia (aka Sylvie) Berki [2014] EWHC 2979 (QB) (11 September 2014)</span></a> </span>Mrs Justice Carr outlined the thresholds necessary for a successful application for an "anti-harassment" injunction.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><strong><span>The Facts</span></strong></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The Defendant was hired by Jemima Khan as a birthday present for Russell Brand, whom she was at the time in a relationship with. On the Defendant's arrival at Mrs Khan's home Mr Brand was uncomfortable with the situation and declined her services. The Defendant was driven home and paid her full fee. The Claimants and the Defendant disagree as to what took place at Mrs Khan's home. The Defendant alleges an altercation took place, which the Claimants deny.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Following the visit the Defendant embarked upon a course of conduct in which she contacted various media outlets making a multitude of allegations of serious criminal conduct (including assault) against Mr Brand. Upon requesting an apology from the Defendant, the Claimant's solicitors were accused, by the Defendant, of interfering with her telephone and emails and perpetrating some form of "cyber-attack" on her.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Although Thames Valley Police confirmed that Russell Brand had no case to answer, and Mr Brand and Mrs Khan denied any such conduct, the Defendant continued to make allegations against Mr Brand. Some of the Defendant's allegations were published in the national press and, through a series of Tweets she was able to publicise a petition on her website "<em>To serve justice and to prosecute Jemima Khan and Russell Brand</em>".</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Following this series of events the Claimants were successful in obtaining an emergency anti-harassment injunction against the Defendant. This prevented the Defendant from communicating with the Claimants, making any approach or responding to any journalists or publicising any information about her visit to Mrs Khan's home or any allegations connected to it.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><strong><span>The Injunction</span></strong></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The application before Mrs Justice Carr was for a continuation of this injunction under <span style="color: #c25552;"><a href="http://www.legislation.gov.uk/ukpga/1981/54/section/37"><span style="color: #c25552; text-decoration: underline;">s37(1)</span></a></span> of the Senior Courts Act 1981 and <span style="color: #c25552;"><a href="https://www.justice.gov.uk/courts/procedure-rules/civil/rules/part25"><span style="color: #c25552; text-decoration: underline;">CPR 25.1(1)(a)</span></a></span>.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Mrs Justice Carr set out that for the application to be successful the Claimants had to show:</span></p>
<ol style="margin-top: 0cm;">
    <li style="margin: 0cm 0cm 10pt; text-align: justify; color: #000000;"><span>that on the balance of probabilities they would succeed in a harassment action at trial which involved consideration of the cause of action as set out under the <span style="color: #c25552;"><a href="http://www.legislation.gov.uk/ukpga/1997/40/contents"><span style="color: #c25552; text-decoration: underline;">Protection from Harassment Act 1997</span></a></span> (PHA); and</span></li>
    <li style="margin: 0cm 0cm 10pt; text-align: justify; color: #000000;"><span>that the balance of convenience lay in favour of an injunction.</span></li>
</ol>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><strong><span>The First Test</span></strong></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Under the PHA a person must not pursue a course of conduct which amounts to harassment of another; and which he knows or ought to know amounts to harassment of the other (<em>section 1(1), PHA</em>).</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>To succeed in an action for harassment it is necessary for the court to ask:</span></p>
<ol style="margin-top: 0cm;">
    <li style="margin: 0cm 0cm 10pt; text-align: justify; color: #000000;"><span>would a reasonable person think that the course of conduct amounted to harassment of the other?; and</span></li>
    <li style="margin: 0cm 0cm 10pt; text-align: justify; color: #000000;"><span>if so, was the Defendant in possession of the information which would lead a reasonable person to think that her course of conduct amounted to harassment?</span></li>
</ol>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>On the current facts Mrs Justice Carr was satisfied that both questions were answered in the affirmative. The Defendant's conduct could fairly be termed oppressive, causing the Claimants alarm and distress and was beyond the level of everyday annoyance that one would be expected to tolerate. Additionally the Defendant was the sole instigator of all the relevant activities and on their face value the allegations were inconsistent and had been embellished over time. </span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>As the Defendant was not able to advance any credible defences it was found on the balance of probabilities that the Claimants would succeed in an action for harassment at trial.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><strong><span>The Second Test</span></strong></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>In dealing with the balance of convenience test the Court held that the balance undoubtedly lay in favour of the Claimants.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Mrs Justice Carr was of the opinion that without a continuation of the injunction the Defendant would continue to harass the Claimants; this opinion was informed by the fact that the previous injunction had not prevented the Defendant from continuing to make allegations about the Claimants via social media channels. Further it was clear that damages would not be an adequate remedy for the Defendant's conduct as the allegations were of a very serious nature and had the potential to irreparably damage Mr Brand's reputation.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The injunction will continue indefinitely pending any trial or further order.</span></p>]]></content:encoded></item><item><guid isPermaLink="false">{A6908B59-4577-47D2-BEEE-B91715C3C0E5}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/supreme-court-clarifies-continuing-police-disclosure-obligations/</link><title>Supreme Court clarifies continuing police disclosure obligations</title><description><![CDATA[The recent Supreme Court judgment in the case of R (on the application of Nunn) v Chief Constable of Suffolk Constabulary and another sheds further light on the continuing duty of the police and the Crown Prosecution Service to disclose information in criminal cases post-conviction.]]></description><pubDate>Fri, 19 Sep 2014 13:03:00 +0100</pubDate><category>Data and privacy</category><authors:names></authors:names><content:encoded><![CDATA[<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span style="text-decoration: underline;">Background</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The underlying criminal case revolves around the violent and sexually obscene murder of Dawn Walker in February 2005 and the subsequent conviction of her boyfriend, Kevin Nunn, in November 2006. Mr Nunn has always maintained his innocence and has unsuccessfully attempted to appeal against his conviction.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span style="text-decoration: underline;">The Application for Judicial Review</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Four months after his conviction, in January 2008, Mr Nunn (the "Applicant") made the first of a series of applications to the police requesting all records of their investigation, including officers' notebooks, computer files, incident logs, CID journals, all photographs and forensic science records. These initial applications were made under either the Freedom of Information Act 2000 ("FOIA") or the Data Protection Act 1998 ("DPA"). The police rejected the applications on the basis that anything relevant had been disclosed to the Applicant before the trial.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Various other written applications were made to the police on behalf of the Applicant by newly instructed solicitors in February 2010. The solicitors made clear that they were undertaking a full review of the underlying case and raised questions that required a detailed review of the investigation documents by the police. Again the police rejected the requests explaining that whilst they accepted it was incumbent upon them to disclose any material to a defendant which came to light after conviction which might cast doubt on the safety of it, they were under no duty to facilitate a general review of a finished case.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>As a result the Applicant issued an application for judicial review on the grounds that the refusal of the police to disclose this material was unlawful under domestic common law, the provisions of Articles 5 (right to liberty and security) and 6 (right to a fair trial) of the European Convention of Human Rights ("ECHR") and/or under section 7 of the DPA. The application was refused by the Divisional Court and that decision was appealed to the Supreme Court.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The key question before the Supreme Court was whether the disclosure obligations of the Crown and the police, following conviction and exhaustion of appeal, extend beyond a duty to disclose material beyond that which may cast doubt upon the safety of a conviction.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span style="text-decoration: underline;">The test for disclosure in criminal cases</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>There is a general duty on the Crown to disclose to a defendant anything that has become known to it and which might reasonably be considered capable either of undermining the prosecution case or assisting the defendant's, as set out in sections 3 and 7A of the Criminal Procedure and Investigations Act 1996 (the "Act").</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The duties laid down by the Act are only relevant whilst the criminal justice process remains live. It is silent as to the position post-conviction. However the Attorney General's guidelines do deal with the post-conviction position stating at paragraph 72 of the 2013 edition that "where, after the conclusion of proceedings material comes to light that might cast doubt upon the safety of the conviction, the prosecutor must consider disclosure of such material".</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Yet the Applicant argued that the duty of disclosure remains the same before and after conviction. This was based upon a view that in order for the Criminal Cases Review Commission to decide whether or not to review a conviction, the Applicant should have a right to re-investigate matters which have already been identified during the trial process. The Applicant suggested that there is an indefinitely binding common law duty upon the Crown to disclose anything which might reasonably be considered capable either of undermining the prosecution case or assisting a defendant's.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span style="text-decoration: underline;">The Judgment</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The Supreme Court rejected the Applicant's position and dismissed the appeal. It accepted that there are some continuing common law disclosure duties recognised pending sentence and/or appeal, but only in relation to material relevant to those live stages and not once those stages have passed. It could not identify any common law precedent which recognised a duty of disclosure/inspection after conviction which was identical to that prevailing prior to and during trial.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The Court held that after conviction there is no indefinitely continuing duty on the police or prosecutor, either in the same form as existed pre-trial, or to respond to whatever enquiries a defendant may make for access to the case materials to allow re-investigation. Instead the duty is limited to that set out in the Attorney General's guidelines.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Considerations of public policy were clearly at the forefront of the Court's conclusions. The Court emphasised the importance of the finality of proceedings, except in circumstances where there has been a flaw in the conviction that renders it unsafe. It focused upon the logistical issues at play in explaining why police resources are better spent on current investigations, rather than the re-investigation of concluded cases, unless good reason is established.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span style="text-decoration: underline;">Does ECHR/DPA/FOIA assist in this context?</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The Court did not focus upon the fact that the application for judicial review was founded upon an alleged breach of Articles 5 and 6 of the ECHR and section 7 of the DPA (as well as the domestic common law). Almost in passing the Court confirmed that any application of this nature under FOIA or DPA would be misconceived in light of section 30 of FOIA and section 29 of the DPA, which carve out specific exceptions in relation to criminal investigations and proceedings. The relevance (if any) of Articles 5 and 6 of ECHR was not considered and does not appear to have been advanced any further by the Applicant. It seems clear therefore that the Supreme Court does not consider that these statutes assist a convicted criminal attempting to expand the Crown's duties of disclosure beyond material that might cast doubt upon the safety of the conviction.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span style="color: #c25552;"><a href="http://www.bailii.org/cgi-bin/markup.cgi?doc=/uk/cases/UKSC/2014/37.html&query=title+(+R+)+and+title+(+(Nunn)+)+and+title+(+v+)+and+title+(+Chief+)+and+title+(+Constable+)+and+title+(+of+)+and+title+(+Suffolk+)&method=boolean"><span style="text-decoration: underline;"><em><span style="color: #c25552;">R (on the application of Nunn) v Chief Constable of Suffolk Constabulary and another</span></em><span style="color: #c25552;"> </span></span></a></span></p>]]></content:encoded></item><item><guid isPermaLink="false">{EE461346-88E1-4C1C-95FA-7264DA90342A}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/how-to-get-google-to-remove-outdated-links-to-your-personal-data/</link><title>How to get Google to remove outdated links to your personal data</title><description><![CDATA[Google has today announced how it intends to deal with the European Court's judgment in the Google Spain case[1].]]></description><pubDate>Fri, 30 May 2014 13:12:00 +0100</pubDate><category>Data and privacy</category><authors:names>Keith Mathieson</authors:names><content:encoded><![CDATA[<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>In <span style="color: #c25552;"><a href="http://www.ft.com/cms/s/2/b827b658-e708-11e3-88be-00144feabdc0.html#axzz33BRog2Ac" target="_blank"><span style="color: #c25552; text-decoration: underline;">today's Financial Times </span></a></span>Google's CEO, Larry Page, has confirmed that Google will take steps to recognise individuals' "right to be forgotten" in appropriate cases. It will do so by introducing an online mechanism for users to request the removal from search results of links to data that are outdated.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The online form can be found here: <span style="color: #c25552;"><a href="https://support.google.com/legal/contact/lr_eudpa?product=websearch&hl=en"><span style="color: #c25552; text-decoration: underline;">https://support.google.com/legal/contact/lr_eudpa?product=websearch&hl=en</span></a></span>. The form is an expansion of the service Google already offers users to assist in the removal of content for legal reasons. The principal landing page for assistance in the removal of content under applicable laws is here: <span style="color: #c25552;"><a href="https://support.google.com/legal/troubleshooter/1114905?hl=en"><span style="color: #c25552; text-decoration: underline;">https://support.google.com/legal/troubleshooter/1114905?hl=en</span></a></span>. By accessing that page, users are directed to the most appropriate place for reporting allegedly unlawful content. That destination will depend on the nature of the Google service (Web Search, Blogger, YouTube etc) and also the nature of the request (trade mark infringement, phishing, defamatory content etc). Requests for removal of web search results on the ground that those results allegedly infringe European privacy law will generate the new online form.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Google has pledged that it "will assess each individual request and attempt to balance the privacy rights of the individual with the public’s right to know and distribute information." In evaluating takedown requests, it "will look at whether the results include outdated information about you, as well as whether there’s a public interest in the information". This is the balancing exercise envisaged by the European Court in its judgment.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Following the judgment, Google has already received many requests for removal of material alleged to infringe individuals' data protection rights. Mr Page has made it clear that Google will subject such requests to proper scrutiny. He has warned that public figures cannot expect automatic compliance with takedown requests and that there are risks from putting any kind of limitations on publication: “Certainly, I worry about the effect that might have on democracy over time if we don’t do that perfectly.” But he has acknowledged that "everyday people" have a more legitimate right to suppress search links.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>It is important that individuals seeking removal, and any lawyers who may be representing them, should themselves consider the appropriateness of their requests. As a practical matter, it is also vital if the mechanism is to operate smoothly that users employ the online form and follow the instructions carefully. In particular, users will be required to:</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>(a) Provide the URL for each link appearing in a Google search for their name that they request to be removed. (The form explains that the URL can be taken from the user's browser bar after clicking on the search result in question.)</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>(b) Explain, if not clear, why the linked page is about the user (or, if the user is submitting the form on behalf of someone else, why it is about that person).</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>(c) Explain how the URL in the search results is "irrelevant, outdated, or otherwise inappropriate" (being the words used in the judgment).</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Google has made it clear that its new online form is an "initial effort" and it will look forward to working with users and data protection authorities to make the system work.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><em><span>RPC is an external legal adviser to Google, Inc. and has represented the company in a number of defamation and other cases, including <span style="text-decoration: underline;">Metropolitan Schools</span> and <span style="text-decoration: underline;">Tamiz</span>.</span></em></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span> </span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><a href="http://joomla.rpc.co.uk/#_ftnref1"><span style="color: #c25552; text-decoration: underline;">[1]</span></a><span> Case C-131/12 <em>Google Spain SL, Google Inc. v. Agencia Española de Protección de Datos and Mario Costeja González</em></span></p>]]></content:encoded></item><item><guid isPermaLink="false">{40B31CCE-7C58-4DAF-B333-510602D56229}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/no-damages-for-the-solicitor-whose-private-information-was-misused/</link><title>No damages for the solicitor whose private information was misused by a prostitute whom he'd short-changed</title><description><![CDATA[In an unusual privacy claim decided last week, the High Court dismissed the majority of a solicitor's claims against a prostitute for misuse of private information, harassment, breach of confidence and breach of contract.]]></description><pubDate>Wed, 21 May 2014 13:25:00 +0100</pubDate><category>Data and privacy</category><authors:names></authors:names><content:encoded><![CDATA[<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The Court found for the Claimant in respect of one element of his privacy head of claim, it declined to award any damages but did grant him an injunction.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The judgment can be found <span style="color: #c25552;"><a href="http://www.bailii.org/ew/cases/EWHC/QB/2014/1442.html" target="_blank"><span style="color: #c25552; text-decoration: underline;">here</span></a></span>.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span style="text-decoration: underline;">Background</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The Claimant, referred to in the judgment as AVB, is a divorced solicitor in his late sixties with three children.  The Defendant is a young woman in her early twenties referred to as TDD. She was born in China to an educated, well-to-do family and came to England to study when she was 18. She turned to prostitution to make a living and support her studies after her parents withdrew their financial support. Her decision to become a sex worker was not known to her parents. AVB procured TDD's services as a prostitute through an advertisement she had placed with an escort agency.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The parties' first encounter in March 2012 developed into a tumultuous relationship which lasted just over a year, which was not exclusively sexual and featured protracted, heated rows. The judge summed up their relationship succinctly: "he was deceiving her with false assurances about the help she could expect from him with her studies and her career, in order to get her sexual services for less money. She was deceiving him with false assurances of her affection with a view to getting his help with her studies and her career, and more money". The judge rejected the Claimant's evidence that the pair had been emotionally involved and held that theirs was a business relationship.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span style="text-decoration: underline;">Conduct complained of</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Shortly after the relationship began, TDD began to complain that AVB was not paying her what he had agreed to. To enforce her claims in relation to AVB's non-payment, TDD sent several emails and facebook messages to AVB's work colleagues and daughters, containing information she had obtained from AVB directly, memory sticks belonging to AVB and his laptop in relation to AVB's ex-wife and children and about other women with whom he had been in sexual relationships, including his office receptionist. She also disclosed information relating to his relationship with her and her claims that he was not paying her or keeping his promises to her.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>AVB eventually brought proceedings against TDD, claiming that her conduct in sending the emails and messages constituted misuse of private information, breach of confidence (including the contractual breach of a confidentiality agreement the parties had signed in June 2012). He also complained that the sending of those messages and obtaining the memory sticks and laptop constituted harassment. He claimed for damages and an injunction to prevent further dissemination of the information.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>TDD brought a counter-claim against AVB for harassment, claiming that he had behaved threateningly towards her, stalked her and threatened to kill her. She claimed damages and injunction restraining AVB from further harassing her or disclosing information about her sex work.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span style="text-decoration: underline;">Court's decision</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The judge held that TDD did not misuse AVB's private information or breach his confidence by sending the messages relating to the fact of their relationship and her claims that he was not paying her or keeping his other promises to her. The judge held that the relationship between the parties was not conducted entirely in private as the parties went out to public events together and AVB introduced TDD to a number of his friends and relatives and gave her a professional reference. The judge noted that just because a prostitute cannot sue for remuneration does not prevent her from complaining to third parties.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>However, the judge held that AVB did have an expectation of privacy in relation to the information TDD disclosed about his ex-wife and children and other women with whom he had been involved, and that this information had been disclosed to TDD in confidence. As such, there was a misuse of private information/breach of confidence in relation to those disclosures. However, the judge declined to award AVB any damages in this regard. He held that although AVB experienced some embarrassment he suffered no, or no significant, distress and took pleasure in provoking TDD's anger.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The judge held that the confidentiality agreement entered into by the parties was unenforceable on grounds of public policy as it purported to give up TDD's right to complain of exploitation. It could not be construed as applying to communications about the terms on which they were agreeing or negotiating her provision of sexual services, at a time after a dispute had arisen between them.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The judge dismissed AVB's claims of harassment and found that TDD's conduct was entirely a reaction to AVB's abuse. He upheld TDD's counter-claims of harassment but declined to award her any damages as she chose to continue to retain AVB as a client knowing how he behaved.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Mr Justice Tugendhat granted AVB an order injuncting TDD from further disclosing the confidential or private information she had already disclosed about AVB's family and sexual or financial information about third parties with whom he had a sexual, personal or professional relationship. AVB was not entitled to an order restraining publication of any of the other information on which TDD based her complaints against him.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span style="text-decoration: underline;">Comment</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The judgment highlights the weight the Court attaches to distress suffered in making any award of damages. Notably, the judge decided that there was no reasonable expectation of privacy in relation to the fact of a relationship with a prostitute, in circumstances where the prostitute was legitimately complaining to third parties about non-payment. It is also worth noting that parts of the parties' relationship were conducted in public. It remains to be seen whether there would be a reasonable expectation of privacy in similar circumstances but where the relationship was entirely secret.</span></p>]]></content:encoded></item><item><guid isPermaLink="false">{75BC04E1-9E4A-4787-A9FF-4496A88237DB}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/searching-for-answers-google-v-gonzalez/</link><title>Searching for answers – Google v Gonzalez</title><description><![CDATA[Data protection unusually made headline news yesterday when the Grand Chamber of the European Court of Justice (the ECJ) handed down its landmark judgment on Google Inc. v. Mario Costeja González.[1] ]]></description><pubDate>Fri, 16 May 2014 13:34:00 +0100</pubDate><category>Data and privacy</category><authors:names></authors:names><content:encoded><![CDATA[<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Google must remove certain links relating to Spanish newspaper articles on the repossession of Mr González's property from its search results, potentially opening the floodgates for similar actions by individuals to remove links – not only against Google and other search engines, but possibly social media websites and similar companies.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Against last year's recommendation of Advocate General Jääskine, the ECJ held that Google was a "data controller” in accordance with Article 2(d) of Data Protection Directive 95/46/EC.  This finding seems to be on the basis that “the purposes and means of that processing are determined by the operator of the search engine” and the search engine plays "a decisive role in the overall dissemination".  Such a finding may not be entirely consistent with related case law on search engines, whose automatic collection processes mean that they are generally regarded as mere facilitators under EU law.  </span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>As data controllers, Google and other search engines now have to carry out a balancing act to decide whether to keep or remove disputed links, weighing up the data subject's right to privacy with the publication rights and economic interests of the website (as well as their own).  In this instance, the ECJ ruled that Google should remove the disputed links to respect Mr González’s right to data privacy and his "right to be forgotten".</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Whether the ECJ has opened the floodgates to similar actions against Google and other companies will become apparent in the coming days and weeks.  For now, the judgment raises more questions than it answers.  How the balancing act should be carried out properly in practice is not yet clear, but the actual procedure could potentially resemble existing copyright takedown procedures.  It also remains to be seen whether the process is limited to search engines and whether jurisdiction disputes will arise.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>It could be that this judgment will be clarified or even overturned by the draft Data Protection Regulations.  But, as there is no appeal, now it only remains to be seen how Silicon Valley responds. </span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><a href="http://joomla.rpc.co.uk/#_ftnref1"><span style="color: #c25552; text-decoration: underline;">[1]</span></a><span> Case C-131/12 <em>Google Spain SL, Google Inc. v. Agencia Española de Protección de Datos and Mario Costeja González</em></span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span> </span></p>]]></content:encoded></item><item><guid isPermaLink="false">{9C034D47-DE22-4442-94E6-7430A9C0E805}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/will-prince-charles-musings-see-the-light-of-day/</link><title>Will Prince Charles's musings see the light of day?</title><description><![CDATA[R (Evans) v Attorney General 2014 EWCA 254]]></description><pubDate>Wed, 07 May 2014 13:37:00 +0100</pubDate><category>Data and privacy</category><authors:names></authors:names><content:encoded><![CDATA[<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Prince Charles as heir to the British throne is an assiduous letter-writer and has sent a number of letters to ministers regarding government policy on matters such as environmental issues in which he has a strong interest rather than, it would appear, the more lower level political issues of the day. </span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>A Guardian journalist, Rob Evans, sought to obtain copies of these letters under the Freedom of Information Act. His application had been resisted by the government departments. However, the Upper Tribunal had after a hearing lasting six days, ruled in favour of Rob Evans and ordered their disclosure. Rather than the departments seeking permission to appeal this ruling, the Attorney General had - to the surprise of many – exercised his powers under section 53 Freedom of Information Act and vetoed the release of these documents. </span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>A Divisional Court had reluctantly upheld the Attorney General's action expressing surprise that the Attorney General could act in this way. However, the Court of Appeal ruled that the Attorney General had not acted reasonably in making a section 53 order and had used a flawed approach in the exercise of his power. The Court of Appeal was also of the view that there was a breach of article 6 of the European Convention of Human Rights in that Mr Evans had been denied his right of access to a Court. The Court of Appeal also felt that the exercise of the powers under section 53 was incompatible with EU Regulations relating to access to environmental information. The Attorney General's approach was held to be defective by the Court of Appeal. The fact that he would have reached a different decision in weighing the competing interests of press access to the information and the confidentiality of the communications on governmental issues with which the Prince of Wales would be ultimately dealing in his role as constitutional monarch was insufficient to issue an order under Section 53. The Attorney General could point to no error of law or fact made by the Upper Tribunal in its <span style="color: #c25552;"><a href="http://www.bailii.org/cgi-bin/markup.cgi?doc=/ew/cases/EWCA/Civ/2014/254.html&query=2014+and+EWCA+and+254&method=boolean" target="_blank"><span style="color: #c25552; text-decoration: underline;">judgment</span></a> </span>after the six day hearing nor had the government department sought to appeal. The Court of Appeal therefore quashed the order made by the Attorney General. The Attorney General has obtained permission to appeal to the Supreme Court – so more anon ...</span></p>]]></content:encoded></item><item><guid isPermaLink="false">{C5A96EE7-616D-46A6-93F6-71AA6443D0A4}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/has-the-weller-case-created-an-image-right-in-relation-to-the-facial-expressions-of-children/</link><title>Has the Weller case created an image right in relation to the facial expressions of children?</title><description><![CDATA[The singer Paul Weller, acting on behalf of three of his children, was successful in his privacy action against Associated Newspapers Limited (ANL) in relation to seven unpixellated photographs of the children and their father out shopping on a public street and relaxing in a café in Los Angeles. ]]></description><pubDate>Thu, 17 Apr 2014 13:40:00 +0100</pubDate><category>Data and privacy</category><authors:names></authors:names><content:encoded><![CDATA[<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The photographs, in particular, showed the faces of all three children. They were published on Mail Online on 21 October 2012. </span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>In support of the action the Wellers gave evidence that they had deliberately tried to keep photographs of their children's faces out of the public domain and would have refused to give consent for publication of the photographs had they been asked. They relied upon their concerns for the safety and security of their children and stated that their main purpose for bringing the action was to ensure that the children were left alone as they grew up. </span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>In defence ANL argued that the photographs were obviously taken in a public place and merely showed innocuous every day activity. ANL relied upon the fact that the Wellers had themselves put information about and photographs of their children into the public domain and that one of children had once modelled in a well-known magazine called Teen Vogue. In particular, Mrs Weller had tweeted various pieces of private information relating to the twin boys, including photographs of them (albeit never including their faces).  ANL also relied upon the fact that it was lawful to take and publish the photographs under the laws of California (where the photographs were indeed taken) which was relevant to the question of whether there could be a reasonable expectation of privacy in the photographs. </span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Mr Justice Dingemans held that the children had a reasonable expectation of privacy because the photographs showed their faces, which was considered to be one of the chief attributes of their respective personalities. Although it was lawful to take the photographs of the children and would have been lawful to publish them in California, this did not prevent the children from having a reasonable expectation of privacy in relation to their publication in this jurisdiction. Further, it was held that publication of the photographs in this jurisdiction was unlawful because the children's Article 8 rights outweighed the Article 10 rights of the newspaper. Mr Justice Dingemans found that the balance came down in favour of the children because the photographs showed their facial expressions (and the "range of emotions" that were displayed). In addition he found that the claims for breach of the Data Protection Act were also established. </span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>In total he awarded the children £10,000 – this was split so that the eldest child (16 at the time) was awarded £5,000 damages and the twin boys awarded £2,500 each. This split was based upon the fact that the twins were not found to have suffered any immediate embarrassment from the publication, whereas the eldest child did suffer real embarrassment. </span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>This decision highlights the risks of publishing otherwise innocuous photos of children engaged in day to day activities in public places and appears to create, for the first time, an image right in relation to the facial features of children. The photographs were held to be particularly intrusive because they showed a range of emotions shown by the children on a family outing with their father. </span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Mail Online have said that they intend to appeal and described this decision as "a worrying development in our law" which seems to have "conferred unfettered image rights for children" even in circumstances where the parents have themselves put and/or consented to private information about their children being published in the public domain. </span></p>]]></content:encoded></item><item><guid isPermaLink="false">{78CE9C88-B1E3-43EC-AEF2-C7B2EBE3EAE0}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/ico-urges-app-developers-to-respect-users-privacy/</link><title>ICO urges app developers to respect users' privacy</title><description><![CDATA[The Information Commissioner's Office (ICO) has published guidance[1] aimed at helping mobile app developers comply with the Data Protection Act 1998 (DPA) and ensure that the privacy of app users is protected.]]></description><pubDate>Fri, 11 Apr 2014 06:34:00 +0100</pubDate><category>Data and privacy</category><authors:names>Mark Crichard</authors:names><content:encoded><![CDATA[<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The guidance follows an ICO press release issued in December, warning consumers about the need for caution when downloading mobile apps.<a href="http://joomla.rpc.co.uk/#_ftn2"><span style="color: #c35855; text-decoration: underline;">[2]</span></a> The press release highlighted a YouGov survey, which found that 49% of app users have decided not to download an app as a result of privacy concerns. The guidance is therefore a timely reminder to developers to consider privacy implications when creating apps.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The guidance is intended to help developers understand their data protection responsibilities, including making it clear what information is collected by the app, and what it will be used for. One of the particularly useful benefits for developers is that the guidance contains examples which communicate the ICO's recommendations in a highly accessible way.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><strong><span>Key questions for developers to understand and address</span></strong><span> <strong>include:</strong></span></p>
<ul style="margin-top: 0cm; list-style-type: disc;">
    <li style="margin: 0cm 0cm 10pt; text-align: justify; color: #000000;"><span style="text-decoration: underline;">Will the app deal with personal data? </span></li>
</ul>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Developers should bear in mind that 'personal data' is not limited to traditional identifiers such as names and addresses. Personal data also includes information such as an IMEI number, the MAC address of a device's wireless network interface and the mobile phone number used by a device.</span></p>
<ul style="margin-top: 0cm; list-style-type: disc;">
    <li style="margin: 0cm 0cm 10pt; text-align: justify; color: #000000;"><span style="text-decoration: underline;">Who will control the personal data collected?</span></li>
</ul>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Developers must understand how data will flow when the app is used and who will be in control of the data throughout the app's lifecycle. The guidance sets out examples to help show who would be the 'data controller' in various scenarios and thus who would be subject to the data controller obligations under the DPA.</span></p>
<ul style="margin-top: 0cm; list-style-type: disc;">
    <li style="margin: 0cm 0cm 10pt; text-align: justify; color: #000000;"><span style="text-decoration: underline;">What data will be collected?</span></li>
</ul>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Developers should only collect and process the minimum data necessary for the tasks that they want the app to perform and personal data must not be stored for longer than is necessary for the task in hand. The ICO also recommends that developers define retention periods for the personal data that they hold.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Users should be allowed to permanently delete their personal data and any account they may have set up (unless the developer is legally obliged to retain the data). Should developers wish to collect usage or bug report data, this must be done either with the informed consent of the user or by using anonymised data.</span></p>
<ul style="margin-top: 0cm; list-style-type: disc;">
    <li style="margin: 0cm 0cm 10pt; text-align: justify; color: #000000;"><span style="text-decoration: underline;">How will users be informed and consent gained?</span></li>
</ul>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Users must be properly informed about what will happen to their personal data if they install and use the app. Significantly, the ICO believes that relying on operating system (OS) permissions on their own is unlikely to be sufficient (although this may change as operating systems develop).</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The ICO recommends that privacy information and notices use plain English and language appropriate for the audience, and use colours and symbols to help improve users' understanding. The ICO also supports using a 'layered' approach, where the salient points are summarised, with more detail easily available should the user wish to view it.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>If apps process personal data in an unexpected way or the data is of a more sensitive nature, developers should use additional 'just-in-time' notifications where the necessary information is provided to the user just before data processing occurs. This would be particularly useful when collecting more intrusive data such as GPS location.</span></p>
<ul style="margin-top: 0cm; list-style-type: disc;">
    <li style="margin: 0cm 0cm 10pt; text-align: justify; color: #000000;"><span style="text-decoration: underline;">How will users be given feedback and control?</span></li>
</ul>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Developers should make it easy for users to review and change their decisions once the app has been installed. Users should be able to navigate to a single and obvious place to allow them to configure the various settings within the app. Put simply, users should be able to disable any privacy setting as quickly as they enabled it.</span></p>
<ul style="margin-top: 0cm; list-style-type: disc;">
    <li style="margin: 0cm 0cm 10pt; text-align: justify; color: #000000;"><span style="text-decoration: underline;">How will data be secured?</span></li>
</ul>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Developers should ensure that passwords are appropriately 'salted' and 'hashed' (basic encryption techniques) on any central server (where possible), and should take advantage of encrypted connections (such as SSL and TLS) to ensure security of data in transit. If an app stores data for later use, developers should consider encryption to do this, with the level of encryption reflecting the sensitivity of the data. The ICO also recommends security testing the app and any central servers before roll-out.</span></p>
<ul style="margin-top: 0cm; list-style-type: disc;">
    <li style="margin: 0cm 0cm 10pt; text-align: justify; color: #000000;"><span style="text-decoration: underline;">How will the app be tested and maintained?</span></li>
</ul>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Key testing areas include the install process and the requesting of device permissions. Developers should test all platforms the app is being developed for and perform additional tests after any changes to the app's code during the development stage.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Once the app has been made available to users, developers should conduct regular checks to ensure security mechanisms are up to date and that data is not being held beyond the stated retention period. Users should be informed of any changes to the purpose or scope of data collection, which is likely to mean getting a user's consent to such changes.</span></p>
<ul style="margin-top: 0cm; list-style-type: disc;">
    <li style="margin: 0cm 0cm 10pt; text-align: justify; color: #000000;"><span style="text-decoration: underline;">Additional legal considerations</span></li>
</ul>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>For apps designed to send emails, SMS text messages, voicemails or to make phone calls, developers should also comply with the relevant rules on consent to direct marketing (under the Privacy and Electronic Communications Regulations).</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>For apps intended to use a premium rate service, developers should consider the guidance provided by PhonepayPlus, the UK regulator for premium rate numbers and services.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><strong><span>Comment</span></strong></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The ICO guidance does not mark any major shift in policy but it does consolidate relevant advice on in-app communication and will act as a useful reference for app developers. Above all, the ICO champions the concept of 'privacy by design', suggesting that developers should consider data protection compliance from the outset of a project and systematically evaluate privacy issues both during the development process and after roll-out.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span> </span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The ICO acknowledges that traditional privacy policies are not necessarily the best way to present information on the small screen and touch-based interface of a typical mobile device, which (coupled with users' expectations of convenience and general reluctance to review large amounts of text) makes it difficult for app developers to present privacy information in an accessible way. Developers must therefore strike a balance between providing sufficient privacy information to allow users to make an informed choice, and not overloading them with so much information that they are put off from using the app.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>In this regard, the guidance does provide some useful recommendations and illustrations. The ICO's endorsement of a 'layered' approach for setting out privacy information is welcome and should allow developers to be more confident in presenting information to users in more innovative ways. The use of screenshots to show how information could be presented is particularly useful. Other examples, such as the appendix setting out good and poor practices, also help to flesh out the ICO's messages.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>As the YouGov poll suggested, privacy is an important consideration for app users and building trust is essential in an increasingly competitive app market. The guidance will help developers to understand their responsibilities and build trust with app users. If the guidance is followed, both users and developers should see the benefit.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span> </span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><a href="http://joomla.rpc.co.uk/#_ftnref1"><span style="color: #c35855; text-decoration: underline;">[1]</span></a><span> The ICO guidance, published in December 2013, can be accessed <span style="color: #c35855;"><a href="http://www.ico.org.uk/news/latest_news/2013/~/media/documents/library/Data_Protection/Detailed_specialist_guides/privacy-in-mobile-apps-dp-guidance.pdf"><span style="color: #c35855; text-decoration: underline;">here</span></a></span>.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><a href="http://joomla.rpc.co.uk/#_ftnref2"><span style="color: #c35855; text-decoration: underline;">[2]</span></a><span> The press release is accessible <span style="color: #c35855;"><a href="http://www.ico.org.uk/news/latest_news/2013/ICO-warns-consumers-about-the-need-for-caution-when-downloading-mobile-apps-this-Christmas-19122013"><span style="color: #c35855; text-decoration: underline;">here</span></a></span>.</span></p>]]></content:encoded></item><item><guid isPermaLink="false">{289172B0-89F0-4F60-BC79-800A8D1B8700}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/last-gasp-of-the-super-injunction/</link><title>Last gasp of the super-injunction </title><description><![CDATA[Super-injunctions are almost an extinct species. 'Non-super' privacy injunctions however remain alive and kicking with according to recent figures a 100% success rate on interim applications.]]></description><pubDate>Mon, 21 Oct 2013 06:55:00 +0100</pubDate><category>Data and privacy</category><authors:names></authors:names><content:encoded><![CDATA[<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The Ministry of Justice has recently published its latest bulletin with statistics on privacy injunction hearings at the High Court and Court of Appeal at the Royal Courts of Justice in London.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The bulletin covers the period January to June 2013 and statistics are now available from August 2011.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><strong><span>Background</span></strong></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>From April 2010, a committee chaired by the Master of the Rolls examined legal and procedural issues relating to privacy injunctions (or non-disclosure orders), in the light of concerns about several high-profile cases. The concerns centred around the growth in the use of "super-injunctions" - prohibiting disclosure of the fact of the proceedings or the injunction - and the increasing frequency with which High Court proceedings concerning the misuse of private information were being anonymised.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The Committee published in May 2011 its report "Super-Injunctions, Anonymised Injunctions and Open Justice".</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>It noted that at that time no statistics on anonymised injunctions and super-injunctions were being collected. One of its recommendations therefore was that the MOJ, with the assistance of HM Courts and Tribunals Service, should collect data about applications for injunctions containing reporting restrictions, including super-injunctions.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The injunctions covered by these statistics are those dealt with in any civil proceedings in the High Court or Court of Appeal at the RCJ in London where the court considers either:</span></p>
<ul style="margin-top: 0cm; list-style-type: disc;">
    <li style="margin: 0cm 0cm 10pt; text-align: justify; color: #000000;"><span>an application for an injunction prohibiting the publication of what is contended to be private or confidential information; or</span></li>
    <li style="margin: 0cm 0cm 10pt; text-align: justify; color: #000000;"><span>the continuation of such an injunction; or</span></li>
    <li style="margin: 0cm 0cm 10pt; text-align: justify; color: #000000;"><span>an appeal against the grant or refusal of such an injunction.</span></li>
</ul>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Specifically, the statistics relate to applications concerned with data protection and rights to respect for private and family life protected by Article 8 of the European Convention on Human Rights (ECHR). Section 12 of the Human Rights Act 1998 is engaged on such an application, meaning that the injunction might, if granted, affect the exercise of the right to freedom of expression contained in Article 10 of the ECHR.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The statistics do not cover injunctions arising from proceedings dealing with family, immigration or asylum issues, those which raise issues of national security or most proceedings dealing with intellectual property and employment issues.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The statistics relate only to those injunctions dealt with at the RCJ in London. The judge in each case determines whether an injunction application has met the criteria for inclusion in these statistics.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The bulletin acknowledges that the statistics are, by necessity, based on the completed forms returned to the MOJ by judges or their clerks and accordingly may constitute an undercount.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The statistics reveal that all 22 applications for new interim privacy injunctions since data has been collected have resulted in an injunction being granted. It appears therefore that the data does not necessarily reflect all of the applications that have been made in the period. The data does not include, for example, the unsuccessful attempt by former England football manager, Steve Mclaren to obtain a non-disclosure order in August 2012 against News Group Newspapers in respect of an article that was to be published the following day.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>There is no general exception to the fundamental principle of open justice in respect of hearings and reporting where privacy or confidentiality is in issue. Some form of derogation in respect of the hearing and/or reporting is almost always imposed in applications of this type but the burden of obtaining such measures rests with the applicant and it must be established by clear and cogent evidence. Any derogation from open justice principles must be no more than the minimum that is strictly necessary to ensure that justice is done. </span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><strong><span>Key statistics for the period August 2011 to June 2013</span></strong></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><em><span>Applications for new privacy injunctions</span></em></p>
<ul style="margin-top: 0cm; list-style-type: disc;">
    <li style="margin: 0cm 0cm 10pt; text-align: justify; color: #000000;"><span>there have been 22 applications for new interim privacy injunctions;</span></li>
    <li style="margin: 0cm 0cm 10pt; text-align: justify; color: #000000;"><span>an injunction has been granted in each case;</span></li>
    <li style="margin: 0cm 0cm 10pt; text-align: justify; color: #000000;"><span>4 of the injunctions were granted by consent. In other cases parties may have consented to the injunction in principle but may have resisted particular terms of the order sought, e.g. the derogations from open justice sought by the applicant.</span></li>
    <li style="margin: 0cm 0cm 10pt; text-align: justify; color: #000000;"><span>Of the 22 applications all but 2 involved one or more derogations from open justice in respect of the hearing and/or the proceedings.</span></li>
    <li style="margin: 0cm 0cm 10pt; text-align: justify; color: #000000;"><span>14 were heard in private, 11 involved party anonymity, 14 restricted access to statements of case by non-parties.</span></li>
    <li style="margin: 0cm 0cm 10pt; text-align: justify; color: #000000;"><span>1 application resulted in a super-injunction clause being included in an interim injunction (granted in the period Aug-Dec 2011). </span></li>
</ul>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><em><span>Applications to continue or vary injunctions</span></em></p>
<ul style="margin-top: 0cm; list-style-type: disc;">
    <li style="margin: 0cm 0cm 10pt; text-align: justify; color: #000000;"><span>There were 17 hearings concerning the continuation or variation of interim injunctions. In 15 cases the injunction was continued and/or varied. It was discharged in 2.</span></li>
</ul>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><em><span>Applications for final privacy injunctions</span></em></p>
<ul style="margin-top: 0cm; list-style-type: disc;">
    <li style="margin: 0cm 0cm 10pt; text-align: justify; color: #000000;"><span>There have been 9 hearings in respect of final privacy injunctions. Final injunctions were granted in all but 1 of the cases.</span></li>
    <li style="margin: 0cm 0cm 10pt; text-align: justify; color: #000000;"><span>Each hearing involved one or more elements of derogation from open justice; all but 1 involved hearings in private, 6 involved anonymity. A super-injunction was granted on a final basis in 1 case (granted in the period Jan to June 2013).</span></li>
    <li style="margin: 0cm 0cm 10pt; text-align: justify; color: #000000;"><span>There was no super-injunction granted on an interim basis in either 2012 or 2013.</span></li>
</ul>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><strong><span>Most recent period - January to June 2013</span></strong></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><em><span>Applications for new privacy injunctions</span></em></p>
<ul style="margin-top: 0cm; list-style-type: disc;">
    <li style="margin: 0cm 0cm 10pt; text-align: justify; color: #000000;"><span>There were 6 applications for new interim injunctions.</span></li>
    <li style="margin: 0cm 0cm 10pt; text-align: justify; color: #000000;"><span>4 were applications on notice, 2 without. Of those that were made on notice, all were resisted – either completely or to some of the terms sought. All 6 applications were granted.</span></li>
    <li style="margin: 0cm 0cm 10pt; text-align: justify; color: #000000;"><span>All 6 new interim injunctions granted during the period January to June 2013 involved derogations from open justice.</span></li>
    <li style="margin: 0cm 0cm 10pt; text-align: justify; color: #000000;"><span>3 provided for a hearing in private, 3 granted anonymity to one or more of the parties, all placed restrictions on access to the statements of case by non-parties, 5 placed restrictions on the provision of documents to third parties served with the injunction.</span></li>
    <li style="margin: 0cm 0cm 10pt; text-align: justify; color: #000000;"><span>None involved a super-injunction.</span></li>
</ul>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><em><span>Applications to continue or vary injunctions</span></em></p>
<ul style="margin-top: 0cm; list-style-type: disc;">
    <li style="margin: 0cm 0cm 10pt; text-align: justify; color: #000000;"><span>There were 2 hearings in which the High Court considered whether to continue or vary an interim injunction. In both cases the injunctions were continued/varied.</span></li>
</ul>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><em><span>Applications for final privacy injunctions</span></em></p>
<ul style="margin-top: 0cm; list-style-type: disc;">
    <li style="margin: 0cm 0cm 10pt; text-align: justify; color: #000000;"><span>1 case in which the High Court considered whether to issue a final permanent injunction. The final injunction was granted and included a super-injunction.</span></li>
    <li style="margin: 0cm 0cm 10pt; text-align: justify; color: #000000;"><span>No proceedings in which the Court of Appeal heard an appeal against a grant or refusal of an interim or final injunction.</span></li>
</ul>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><strong><span>Overview</span></strong></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The data covers a period of only 22 months and so it would be unwise to draw too many conclusions about overall trends.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The MOD recognises that the statistics are not complete and do not cover every application which falls within the subject.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>It is nonetheless surprising that the figures reveal that every application for a new interim privacy injunction since August 2011 has resulted in an injunction being granted.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>That said, it does seem clear that super-injunctions are almost extinct. The last interim super-injunction that was granted was in 2011.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Other derogations from open justice, or combinations of them, are being deployed frequently by the courts. 64% of applications for new interim privacy injunctions were heard in private, party anonymity was ordered in 50% and access to statements of case by non-parties restricted in 86% of cases.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>It should be remembered that only the minimum degree of restriction which is necessary to ensure that justice is done should be imposed. This will or should be a matter of argument and challenge on most applications.</span></p>]]></content:encoded></item><item><guid isPermaLink="false">{D00A68C4-BDF5-4281-A68D-FB16E4E8D474}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/costs-protection-reform-privacy-and-defamation-cases/</link><title>Costs protection reform - privacy and defamation cases</title><description><![CDATA[The government has unveiled its latest attempt to resolve the tension between its plans to abolish success fees in CFAs and ATE premiums (to reduce costs in privacy and defamation cases) while still making proceedings accessible to less wealthy parties.]]></description><pubDate>Thu, 19 Sep 2013 07:19:00 +0100</pubDate><category>Data and privacy</category><authors:names></authors:names><content:encoded><![CDATA[<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The government has published a consultation paper on proposals to introduce costs protection in privacy and defamation cases which aims to make it easier for people of "modest means" to bring and defend such proceedings.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The less wealthy party will be able to sue or defend without being liable for the other side's costs if they are unsuccessful. This protection takes the form of qualified one-way costs shifting ("QOCS"). </span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The proposals follow Lord Justice Leveson's recommendation that costs protection should be extended to media related litigation (Recommendation 74, Executive Summary, page 44 – accessed <span style="color: #c35855;"><a href="http://www.official-documents.gov.uk/document/hc1213/hc07/0779/0779.pdf" target="_blank"><span style="color: #c35855; text-decoration: underline;">here</span></a></span>). </span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Under the proposals, a judge will be able to impose a "one-way" costs order in a case where it is clear that one side would not otherwise be able to participate in proceedings because of the potential legal costs. The poorer party would only be liable for its own legal costs, while the richer party would be liable for both sides' costs if it lost the case. </span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Although likely to afford protection predominantly to claimants, such an order can be made in favour of a defendant also. This could provide comfort to smaller, less wealthy publications, at risk of claims from wealthy serial litigants, such as the late Sir James Goldsmith and Robert Maxwell. </span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The proposals set out costs rules for three groups of claimants/defendants, based on their means: </span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>• Group 1: those of <em>modest means</em> – would be entitled to costs protection in full.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>• Group 2: those of <em>some means</em> – who could pay something but not the costs in full – would be entitled to costs protection in part ('capped liability').</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>• Group 3: those of <em>substantial means</em> – would not be entitled to any costs protection because they would not face 'severe financial hardship' if they were ordered to pay the other side's costs. </span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The proposed new rules would apply to proceedings for defamation, malicious falsehood, breach of confidence involving publication to the general public, misuse of private information or harassment where the defendant is a person who publishes a newspaper, magazine or website containing news or information about or comment on current affairs. </span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The consultation period closes on 8 November 2013 and the proposed changes are intended to come into effect from April 2014, at which time the Defamation Act 2013 is likely to be in force. April 2014 will also see certain provisions of the LASPO Act 2012 being extended to media-related cases, which will mean that success fees and ATE premiums can no longer be recovered by claimants from defendants. </span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>By that time, it should be clearer to see how and when Leveson's other proposals to reduce the costs of media-related litigation – namely the low-cost arbitration scheme – will be implemented and how they will interact with the government's proposals. If these changes are implemented, we will be facing a fundamentally different costs landscape. </span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Click <span style="color: #c35855;"><a href="https://consult.justice.gov.uk/digital-communications/costs-protection-in-defamation-and-privacy-claims/supporting_documents/Costsprotectionindefamationandprivacyclaimsconsultationpaper.pdf" target="_blank"><span style="color: #c35855; text-decoration: underline;">here</span></a> </span>to access the consultation paper and <span style="color: #c35855;"><a href="https://consult.justice.gov.uk/digital-communications/costs-protection-in-defamation-and-privacy-claims/supporting_documents/annexBthedraftrules.pdf" target="_blank"><span style="color: #c35855; text-decoration: underline;">here </span></a></span>for the draft rules.</span></p>]]></content:encoded></item><item><guid isPermaLink="false">{2E870283-C47D-40F2-BFEC-D14AC4CA28EF}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/greater-transparency-in-the-family-courts-new-draft-guidance/</link><title>Greater transparency in the family courts - New Draft Guidance</title><description><![CDATA[Proposed new guidance recommends that decisions of the family courts should always be published, unless there are compelling reasons against publication.]]></description><pubDate>Wed, 04 Sep 2013 07:23:00 +0100</pubDate><category>Data and privacy</category><authors:names></authors:names><content:encoded><![CDATA[<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Sir James Munby, President of the Family Division of the High Court, has issued the proposed judiciary guidance to facilitate the "need for greater transparency" in the family courts.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>At present, it is a contempt of court to publish a judgment in a family court case involving children or a judgment in a Court of Protection case unless the judgment has been delivered in public or the judge has authorised publication. The Draft Practice Guidance, which has been issued for consultation and comment, creates a presumption that all judgments should be published, unless there are compelling reasons for keeping them private. The Draft Guidance states that the presumption of publication applies to a wide range of family court and Court of Protection cases including those brought by local authorities and cases relating to the making or refusal of emergency protection orders, supervision orders and orders involving a deprivation of liberty.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>In all other cases not specifically referred to in the Draft Guidance, Sir James recommends that there should be a presumption that a judgment may be published whenever (i) a party or member of the media applies for an order permitting publication and (ii) the judge concludes that the judgment may be published taking account of rights arising under any relevant provision of the ECHR. The Draft Guidance goes on to state that "a judgment should in any event be published whenever the court considers that publication is in the public interest whether or not a request is made by the party or the media".</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The Draft Guidance recommends that the extent of anonymisation in published judgments and the degree to which reporting should be permitted must be considered by a judge on a case by case basis. Before making a decision, a judge should invite representations from the parties and the media.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The Draft Guidance also states that restrictions on reporting and publication should be limited: public authorities and expert witnesses should be named unless there are compelling reasons not to do so and anonymity should not extend beyond protecting the privacy of the families involved unless there are good reasons not to do so.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Sir James states that he proposes to adopt an incremental approach: further guidance will follow the Draft Guidance and eventually more formal Practice Directions and changes to the Court of Procedure Rules 2007 and the Family Procedure Rules 2010 will be issued. However, changes to primary legislation are unlikely in the near future.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The Draft Guidance will be welcomed by media campaigners who have pressed for greater transparency in the Family Court and the Court of Protection, which have been criticised for creating "a system of secret and unaccountable justice". But it is unlikely that parties to family proceedings will be identified in most cases. While anonymity will be determined on a case by case basis, the article 8 rights of families will usually be considered more important than the public interest in identifying them (unless they wish to be identified). The Draft Guidance can be accessed <span style="color: #c35855;"><a href="http://joomla.rpc.co.uk/images/easyblog_images/33303/annex-b-draft-transparency-in-family-courts.pdf" target="_blank"><span style="color: #c35855; text-decoration: underline;">here</span></a></span>.</span></p>]]></content:encoded></item><item><guid isPermaLink="false">{D2FBE9CD-65E0-4C53-8CE8-514C7EB15193}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/cloud-confidentiality-or-not/</link><title>Cloud confidentiality – or not …</title><description><![CDATA[Anyone using a number of devices to access their information will be tempted to share files between those devices using a service such as Dropbox. ]]></description><pubDate>Mon, 02 Sep 2013 07:28:00 +0100</pubDate><category>Data and privacy</category><authors:names></authors:names><content:encoded><![CDATA[<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>In the course of considering the feasibility of such services for use by lawyers at this firm, we've been looking at the confidentiality and privacy issues they raise.  While we're still exploring the matter, we thought it might be useful to share the attached posting on <span style="color: #c35855;"><a href="http://www.officeforlawyers.com/lawtech/hosting.html" target="_blank"><span style="color: #c35855; text-decoration: underline;">officeforlawyers.com</span></a></span>, which contains some practical tips and a brief analysis of the relevant terms of service of Dropbox and similar services. </span></p>]]></content:encoded></item><item><guid isPermaLink="false">{329B7463-C5CC-45A2-97CF-A6C312D57706}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/a-chinese-lesson-for-private-investigators/</link><title>A Chinese lesson for private investigators</title><description><![CDATA[Those engaged in the investigation business – whether sniffing out personal or corporate intelligence – are well aware of the need to comply with laws that protect personal information. ]]></description><pubDate>Fri, 30 Aug 2013 07:31:00 +0100</pubDate><category>Data and privacy</category><authors:names>Keith Mathieson</authors:names><content:encoded><![CDATA[<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>But it's not always easy knowing what those laws are. A well-established forensic investigator with almost 40 years' experience of operating in China found himself not only arrested, but paraded on national television admitting he had illegally obtained Chinese citizens' personal information and expressing regret for what he had done. The case, reported in the <span style="color: #c35855;"><a href="http://www.ft.com/cms/s/0/ea96e13e-105a-11e3-99e0-00144feabdc0.html#axzz2dRxpJX5y" target="_blank"><span style="color: #c35855; text-decoration: underline;">Financial Times</span></a></span>, illustrates China's recent tightening of its laws governing personal privacy.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>What it may also illustrate is changing cultural values about personal information. Just as China previously neglected rights of personal information, so too did we. But even now that we do have extensive legal protection and a broad understanding that certain kinds of information gathering are wrong, there will still be disagreement about whether certain kinds of intelligence retrieval are culturally objectionable, particularly if there exists a good reason for accessing the information, e.g. to prevent possible fraud. The boundaries of information and privacy law are changing all the time. In many cases, investigators may be surprised to discover, as Peter Humphrey in China apparently did, that activities they think are acceptable are actually against the law. An example might be personal information freely provided by officials (but without proper authority) to a private investigator who passes the information to a corporate client engaged in an otherwise legitimate due diligence exercise. Such activity may seem legal, but it has the potential to be quite the opposite.</span></p>]]></content:encoded></item><item><guid isPermaLink="false">{1ACF33CD-E482-48DC-8873-33719E27F042}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/no-basis-for-murderers-anonymity-and-an-alert-from-the-bench/</link><title>No basis for murderer's anonymity and an alert from the bench</title><description><![CDATA[Four media groups[1] have successfully challenged an anonymity order and related reporting restrictions made in the course of judicial review proceedings brought by the notorious murderer, David McGreavy.]]></description><pubDate>Wed, 22 May 2013 07:35:00 +0100</pubDate><category>Data and privacy</category><authors:names>Keith Mathieson</authors:names><content:encoded><![CDATA[<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>In its decision setting aside the restriction, the Court warned of the dangers inherent in applications in the Administrative Court made at the last moment and "by consent".</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>A copy of the decision is available <span style="color: #c35855;"><a href="http://joomla.rpc.co.uk/images/easyblog_images/17440/m%20and%20the%20parole%20board%2022%205%2013.pdf" target="_blank"><span style="color: #c35855; text-decoration: underline;">here</span></a></span>.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Mr McGreavy is serving a life sentence for the brutal murder and mutilation of three young children in April 1973. In late 2011 he commenced judicial review proceedings challenging the Parole Board's decision not to recommend his transfer to open conditions. At the substantive hearing of that application in January 2013 Mr McGreavy made an oral application for an order under CPR 39.2(4) that no report of the proceedings should name him. The hearing was in public. The media was not notified of the application in advance, no claim form was issued and no witness evidence was put before the court outlining the evidence justifying the interference with Article 10.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The media challenged the order, as did the Secretary of State for Justice, an interested party to the proceedings. Mr McGreavy's position, as developed in evidence in response to the challenge, was that the order was necessary to protect his rights under Articles 2 (right to life), 3 (prohibition of torture), 5 (right to liberty and security) and 8 (right to privacy) of the European Convention. His core submission was that reports of his crimes trigger attacks or threats of attacks on him.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The challenge was heard by Mr Justice Pitchford and Mr Justice Simon in April 2013.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>In a decision handed down today the Court found:</span></p>
<ul style="margin-top: 0cm; list-style-type: disc;">
    <li style="margin: 0cm 0cm 10pt; text-align: justify; color: #000000;"><span>The common law and the European Court of Human Rights "walk in step" on the question of the principle of open justice and the freedom to report proceedings of public interest.</span></li>
</ul>
<ul style="margin-top: 0cm; list-style-type: disc;">
    <li style="margin: 0cm 0cm 10pt; text-align: justify; color: #000000;"><span>It is a cornerstone of the rule of law that public justice should be publicly reported unless the interest of justice requires otherwise. It is for the party contending that derogation from this principle is necessary to produce clear and cogent evidence.</span></li>
</ul>
<ul style="margin-top: 0cm; list-style-type: disc;">
    <li style="margin: 0cm 0cm 10pt; text-align: justify; color: #000000;"><span>There is a weighty presumption that public proceedings will be publicly reported. The embarrassment, anxiety or distress generated by the prospect of exposure to public scrutiny of private matters will rarely be a sufficient reason for displacing the need for public justice.</span></li>
</ul>
<ul style="margin-top: 0cm; list-style-type: disc;">
    <li style="margin: 0cm 0cm 10pt; text-align: justify; color: #000000;"><span>The public has a legitimate interest in being informed of the Parole Board's decision not to transfer Mr McGreavy to open conditions. The exceptional nature of his crimes and his identity justifies the public interest.</span></li>
</ul>
<ul style="margin-top: 0cm; list-style-type: disc;">
    <li style="margin: 0cm 0cm 10pt; text-align: justify; color: #000000;"><span>Although there may well come a time when Mr McGreavy's identity and whereabouts will need to be protected from public knowledge, there is no cogent case for anonymity currently. There is no real and immediate risk to Mr McGreavy's life and safety because he remains in custody in conditions in which his safety can be closely monitored and effectively managed. Renewed hostility following reports of the judicial review proceedings is not enough to justify an order under Articles 2 or 3. Mr McGreavy's psychological health is not at significant risk and there is no other evidence to justify an order for anonymity under Article 8 or on any other ground.</span></li>
</ul>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><strong><span>Procedural Difficulties</span></strong></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>In an Addendum to its decision the Court addressed the media's concern that guidance is required on the procedure appropriate to anonymity orders in the Administrative Court.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>By the time of the hearing it was common ground that the course adopted by Mr McGreavy's legal advisers was wrong. Any order for anonymity should have been applied for at the permission stage and any subsequent application should have been in the form of a written application issue in good time before the hearing. The application should have been supported by evidence on which it was proposed to rely.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Although the Court declined to issue general guidance, it recognised the need for clarity and the application of principle when considering an order for reporting restrictions. To that end the judgment in the case is intended "to provide an alert to judges in the Administrative Court to the problems which can arise if applications are made at the last moment and "by consent".</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The Court concluded that attention is required to the issue of what, if any, notice should be given to media organisations of an application either at permission stage or in advance of a substantive hearing for judicial review. It suggests that this is a matter suitable for consideration by the Administrative Court Users Group and the senior judiciary.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><em><span>RPC acted for Associated Newspapers Limited, Times Newspapers Limited, Newsgroup Newspapers Limited and MGN Limited</span></em></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><em><span>(Originally blogged by Bríd Jordan)</span></em></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span> </span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><a href="http://joomla.rpc.co.uk/#_ftnref1"><span style="color: #c35855; text-decoration: underline;">[1]</span></a><span> Associated Newspapers Limited, Times Newspapers Limited, Newsgroup Newspapers Limited and MGN Limited</span></p>]]></content:encoded></item><item><guid isPermaLink="false">{684D184C-51E5-4F50-A9AA-93BA10C87AB3}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/no-breach-of-privacy-in-publication-of-information/</link><title>No breach of privacy in publication of information that child's father is a prominent politician</title><description><![CDATA[The Court of Appeal has upheld a High Court judgment that disclosures in the Daily Mail about a child's paternity did not infringe the child's rights of privacy.]]></description><pubDate>Mon, 20 May 2013 07:46:00 +0100</pubDate><category>Data and privacy</category><authors:names>Keith Mathieson</authors:names><content:encoded><![CDATA[<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The claimant in <em>AAA v Associated Newspapers</em> is a three-year-old girl. Her mother is an unmarried professional art consultant. Her father is a prominent elected politician. Through her maternal step-grandfather she sued Associated Newspapers, publisher of the Daily Mail, over a series of articles which disclosed the identity of her father.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Three of the articles included photographs of the claimant. Nicola Davies J awarded £15,000 damages for breach of the claimant's right of privacy by the repeated publication of the photographs: link to judgment <span style="color: #c35855;"><a href="http://www.bailii.org/ew/cases/EWHC/QB/2012/2103.html" target="_blank"><span style="color: #c35855; text-decoration: underline;">here</span></a></span>. But the judge declined to award the claimant any damages for publication of the allegedly private information concerning her paternity. And she also refused to grant any injunction against the defendant, though she accepted an undertaking from it concerning future publication of photographs of the claimant.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The claimant appealed against (a) the refusal to award damages for publication of the private information and (b) the refusal to grant an injunction. The Court of Appeal has dismissed both appeals.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><strong><span>The grounds of appeal</span></strong></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>There were four grounds of appeal:</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>1. The judge failed to make any or any proper assessment of the claimant’s best interests.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>2. The judge was wrong to hold that two factors weakened the claimant’s expectation of privacy in this case. These factors were (i) the events at a house party attended by the mother at which she discussed the child's paternity; and (ii) a magazine article based on an interview with the mother which referred to the child's similarity to her father and the fact that he was alleged to be her father.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>3. The judge wrongly held that the claimant’s expectation of privacy (weakened as she held it to be) was outweighed by the public interest in the recklessness of the father.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>4. The judge was wrong to hold that there was a public domain defence for publication of the defendant’s subsequent articles and that an injunction to prevent any further publication of information about the claimant’s paternity would serve no real purpose.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><strong><span>The Court of Appeal's findings</span></strong></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The Court of Appeal was wholly unimpressed by AAA's grounds of appeal, repeatedly holding that the judge's assessment was beyond challenge.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The case is factually quite involved, but in short, the key points from the judgment are as follows:</span></p>
<ul style="margin-top: 0cm; list-style-type: disc;">
    <li style="margin: 0cm 0cm 10pt; text-align: justify; color: #000000;"><span>A balancing exercise between articles 8 and 10 is analogous to an exercise of discretion and an appellate court should not intervene unless the judge has erred in principle or reached a conclusion which is plainly wrong or outside the ambit of conclusions a judge could reasonably reach.</span></li>
</ul>
<ul style="margin-top: 0cm; list-style-type: disc;">
    <li style="margin: 0cm 0cm 10pt; text-align: justify; color: #000000;"><span>The judge was right to attach considerable weight to the child's interests, but having regard to the way the case was put on her behalf, which focussed on the mother's right to decide when the time was right to tell the child who her father was, the judge was entitled to have regard to other factors, including the mother's own conduct and attitudes towards protecting her child from media publicity.</span></li>
</ul>
<ul style="margin-top: 0cm; list-style-type: disc;">
    <li style="margin: 0cm 0cm 10pt; text-align: justify; color: #000000;"><span>The judge was right to conclude that the events at the country house weekend and the mother's participation in a magazine interview were indicative of an ambivalent approach to the confidentiality of the claimant's paternity.</span></li>
</ul>
<ul style="margin-top: 0cm; list-style-type: disc;">
    <li style="margin: 0cm 0cm 10pt; text-align: justify; color: #000000;"><span>The judge was entitled on the evidence before her to find that the claimant's expectation of privacy in her paternity was outweighed by the public interest in the father's reckless behaviour. The claimant was inviting the court to take too narrow a view of "recklessness": it was clear that the judge had in mind that the claimant was alleged to have been the second child conceived as a result of the father's extramarital affairs.</span></li>
</ul>
<ul style="margin-top: 0cm; list-style-type: disc;">
    <li style="margin: 0cm 0cm 10pt; text-align: justify; color: #000000;"><span>There was evidential support for the judge's finding that the information was in the public domain not just because of the Daily Mail's own publications but because it was becoming more widely known. Much remained online and in print irrespective of the Daily Mail's articles; it would be wrong to enjoin Associated when many other media organisations had published the same thing; and it was "fanciful to expect the public to forget the fact that the man who is said to be the claimant's father, and who is a major public figure, has fathered a child after a brief adulterous affair (not for the first time)".</span></li>
</ul>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The Court of Appeal was unanimous in concluding that "The core information in this story, namely that the father had an adulterous affair with the mother, deceiving both his wife and the mother’s partner and that the claimant, born about 9 months later, was likely to be the father’s child, was a public interest matter which the electorate was entitled to know when considering his fitness for high public office."</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><em><span>RPC acted for Associated Newspapers in the High Court and in the Court of Appeal.</span></em></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span style="color: #c35855;"><a href="http://www.bailii.org/ew/cases/EWCA/Civ/2013/554.html" target="_blank"><span style="color: #c35855; text-decoration: underline;">The Court of Appeal has upheld</span></a></span></p>]]></content:encoded></item><item><guid isPermaLink="false">{CE19BF28-64DE-45E5-B7CA-3FDC85B47EA1}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/financier-granted-permanent-anonymity-in-defamation-proceedings/</link><title>Financier granted permanent anonymity in defamation proceedings</title><description><![CDATA[Proceedings have finally drawn to a close in the case of ZAM v CFW & TFW, which involved a financier who claimed to have been libelled by his sister-in-law (the first defendant) and her husband (the second defendant).]]></description><pubDate>Thu, 11 Apr 2013 07:53:00 +0100</pubDate><category>Data and privacy</category><authors:names></authors:names><content:encoded><![CDATA[<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The claim centred on the second defendant who had threatened to tell and then did tell various people connected to the claimant (including his employer and a school's board of governors which he chaired) that the claimant had stolen money from a family trust and was a paedophile. The second defendant has at no stage sought to justify these allegations, which were made with the sole aim of blackmailing and extorting money from the claimant.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The history of the case is somewhat convoluted:</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>• Interim injunctions were granted on 25 February 2011 and 3 March 2011, the terms of which included anonymity for the claimant (see <a href="http://www.bailii.org/ew/cases/EWHC/QB/2011/476.html" target="_blank"><span style="text-decoration: underline;"><span style="color: #c35855;">[2011] EWHC 476 (QB)</span><span style="color: windowtext;">)</span></span></a></span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>• Summary judgment on liability was granted against the second defendant on 30 July 2012</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>• Judgment on liability against the first defendant was entered by consent on 7 March 2013</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The recent final hearing dealt with a number of outstanding issues, including whether the claimant was entitled to anonymity on a permanent basis.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Continuing his reasoning from the interim injunctions decision, Mr Justice Tugendhat concluded that, as a matter of principle, there was no reason why anonymity should not be granted in defamation claims in certain circumstances. The second defendant in this case was clearly attempting to blackmail the claimant. He had also breached the interim injunctions by publishing the false allegations about the claimant on the internet and it appeared likely that he would use any judgment naming the claimant as further ammunition in his abusive campaign. In light of these factors, the judge felt that permanent anonymity was justified, concluding that:</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>"The court must adapt its procedures to ensure it does not provide encouragement or assistance to blackmailers, and does not deter victims of blackmail from seeking justice from the court"</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>While this decision is certainly interesting, the judge recognised that anonymity orders in defamation proceedings will be rare. For a start, it is generally the case that a successful claimant will want their name to be published so that they can obtain proper vindication. Furthermore, the order in this case was mainly justified by the blackmail element – generally speaking, blackmailers look to put pressure on their victims by threatening to reveal true but embarrassing/incriminating information. As such information is usually true, no protection will be afforded to the claimant in defamation (instead they might well pursue a breach of confidence/privacy claim).</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The judge also assessed damages against the second defendant, awarding £100,000 for the injury to the claimant's reputation and a further £20,000 for the distress and harassment suffered.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The judgment, which can be found here <span style="color: #c35855;"><a href="http://www.bailii.org/ew/cases/EWHC/QB/2013/662.html" target="_blank"><span style="color: #c35855; text-decoration: underline;">[2013] EWHC 662 (QB</span></a>)</span>, also contains some interesting discussion of whether and how a claimant can rely on publications not originally pleaded in the particulars of claim (in this case, the internet publications made in breach of the interim injunctions).</span></p>]]></content:encoded></item><item><guid isPermaLink="false">{487C3319-A045-4648-8736-9A36051B1E51}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/defence-to-harassment-actions-reformulated/</link><title>Defence to Harassment actions reformulated</title><description><![CDATA[The Supreme Court has handed down a judgment in Hayes v Willoughby1 that redefines the scope of the most commonly used defence to claims of harassment.]]></description><pubDate>Wed, 10 Apr 2013 08:01:00 +0100</pubDate><category>Data and privacy</category><authors:names></authors:names><content:encoded><![CDATA[<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The Claimant was the owner of several companies, one of which the Defendant had previously worked for. On termination of his employment the Defendant launched into a smear campaign against the Claimant, part of which involved allegations that the Claimant had stolen large sums of money from his companies. The Defendant sought to rely on the fact that he was pursuing a course of harassment in order to prevent or detect crime under section 1(3)(a) of the Protection from Harassment Act 1997 (the Act).</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The Act prohibits conduct which amounts to harassment or which the perpetrator knows or ought to know amounts to harassment. However an allegation of harassment may be refuted if the conduct complained of was for the purpose of preventing or detecting crime.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>In assessing the purpose of a perpetrator's activity the Supreme Court held that the test to be applied was not whether the person engaged in the activity reasonably believed their activity was for the purpose of preventing and detecting crime but whether this belief was held rationally. The reasonableness test was rejected on the basis that where the Act envisaged a reasonableness test to be appropriate it was stated expressly (see section 1 (1)(b) and 1 (3)(c)). The appeal was therefore dismissed because even though the Defendant honestly believed that the Claimant had stolen money from his companies this belief had been formulated through an irrational thought process. </span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The concept of rationality imports a minimum objective standard into the Act, meaning that a decision must not be judged to be illogical, arbitrary, capricious or outrageous. The move away from a subjective to an objective test should be heeded by those engaged in investigatory occupations, especially journalists, who in the course of their work might engage in conduct that could satisfy the definition of harassment under the Act.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><em><sup><span style="color: #c35855;">1. [2013] UKSC 17, 20 March 2013</span></sup></em></p>]]></content:encoded></item><item><guid isPermaLink="false">{7B408FB1-D94C-4A12-A857-27D14BE0B22F}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/can-schools-take-pupils-fingerprints/</link><title>Can schools take pupils' fingerprints?</title><description><![CDATA[The Times reported last week that parents at an independent school in north London had protested when fingerprints were allegedly taken from pupils without consent with a view to the fingerprints being used for the automated lunch payment system. ]]></description><pubDate>Tue, 09 Apr 2013 08:10:00 +0100</pubDate><category>Data and privacy</category><authors:names>Keith Mathieson</authors:names><content:encoded><![CDATA[<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>One of those pupils subsequently <span style="color: #c35855;"><a href="http://www.thetimes.co.uk/tto/opinion/letters/article3732288.ece" target="_blank"><span style="color: #c35855; text-decoration: underline;">wrote to the Times</span></a></span> saying he wasn't bothered: "Most of the pupils were excited about this new system, and any who were unconvinced were allowed to decline having their fingerprints taken. It was no inconvenience to anybody, and we were in fact pleased that we were allowed to miss half of our maths lesson."  (For those without access to the Times online, the story was also covered by Mail Online <span style="color: #c35855;"><a href="http://www.dailymail.co.uk/news/article-2303876/Haberdashers-Askes-Boys-School--15-000-year-prep-school-took-fingerprints-young-pupils-parents-consent.html" target="_blank"><span style="color: #c35855; text-decoration: underline;">here</span></a></span>.)</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The use of fingerprints and other biometric data does of course engage a person's Article 8 rights.  Being "personal data", it is also subject to the provisions of the Data Protection Act 1998.  A useful review of the legal issues is <span style="color: #c35855;"><a href="http://www.computerweekly.com/news/2240080045/Know-the-legalities-of-biometrics" target="_blank"><span style="color: #c35855; text-decoration: underline;">here</span></a></span>.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>So far as the use of biometric data in schools is concerned, this will be subject to additional statutory control from 1 September 2013 pursuant to the Protection of Freedoms Act 2012.  See the recently issued guidance from the Department for Education <span style="color: #c35855;"><a href="https://www.education.gov.uk/aboutdfe/advice/f00218617" target="_blank"><span style="color: #c35855; text-decoration: underline;">here</span></a></span>, which explains the need for prior parental consent.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span style="color: #c35855;"><a href="http://www.thetimes.co.uk/tto/education/article3730219.ece" target="_blank"><span style="color: #c35855; text-decoration: underline;">Times report</span></a></span></p>]]></content:encoded></item><item><guid isPermaLink="false">{27868A45-9B13-4EFE-8810-27341D56B564}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/uk-eu-conflict-over-the-right-to-be-forgotten/</link><title>UK/EU conflict over the 'right to be forgotten'</title><description><![CDATA[The Guardian is reporting today that Britain wants to opt out of the 'right to be forgotten', the term applied to article 17 of the Data Protection Regulation which is intended to facilitate the deletion of personal data on request whether or not the data is incomplete or incorrect.<br/>]]></description><pubDate>Fri, 05 Apr 2013 08:19:00 +0100</pubDate><category>Data and privacy</category><authors:names>Keith Mathieson</authors:names><content:encoded><![CDATA[<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The EU justice Commissioner, Viviane Reding, appears to be irritated.  She has described her correspondence with Chris Grayling, the Justice Secretary, as Kafkaesque, suggesting Grayling is "crazy" to insist on one law for Britain and one for other people.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The UK's objections nonetheless seem perfectly respectable.  The MoJ has said the so-called right to be forgotten "raises unrealistic and unfair expectations".  That is surely right.  While responsible data controllers such as Facebook should be expected to respond to reasonable requests from users to delete their own material, the requirements for data controllers to manage third party erasure would seem to pose serious practical difficulties.  The Guardian quotes Facebook's director of policy for Europe saying he has "concerns about the workability and consequences of a mechanism where organisations start sending each other instructions about data that needs to be removed".</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Ms Reding seems unmoved, declaring that this is an internal market regulation from which there is no opt-out and a decision will be taken by majority rule.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span style="color: #c35855;"><a href="http://www.guardian.co.uk/technology/2013/apr/04/britain-opt-out-right-to-be-forgotten-law" target="_blank"><span style="color: #c35855; text-decoration: underline;">The Guardian's report</span></a></span></p>]]></content:encoded></item><item><guid isPermaLink="false">{44EC4885-7583-497D-BFEE-B52C1B3A4ABD}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/do-we-really-value-our-privacy/</link><title>Do we really value our privacy?</title><description><![CDATA[How much do we really care about our personal privacy?  Research suggests less than we might like to think.<br/>]]></description><pubDate>Wed, 03 Apr 2013 08:27:00 +0100</pubDate><category>Data and privacy</category><authors:names>Keith Mathieson</authors:names><content:encoded><![CDATA[<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The New York Times has published a <span style="color: #c35855;"><a href="http://www.nytimes.com/2013/03/31/technology/web-privacy-and-how-consumers-let-down-their-guard.html?pagewanted=1&_r=0&smid=pl-share&adxnnlx=1364909214-I98Kj8tyJpjDEMOCIP5bpw"><span style="color: #c35855; text-decoration: underline;">profile</span></a> </span>of Alessandro Acquisti, a behavioural economist at Carnegie Mellon University in Pittsburgh.  Mr Acquisti and his colleagues <span style="color: #c35855;"><a href="http://click.reference.com/click/bhkk2l?clksite=rlsrch&clkquery=0FC4154DABBC76128E1D8A28524D1244&clkpage=related-serp&clkimpr=UVvyYkLreVMqRGlc&clkld=0&clkorgn=101995&clken=te&clkord=0&clkblk=&clktemp=&clkmod=refdelta&clkitem=Privacy%20and%20Rationality%20in%20Individual%20Decision%20Making%20-%20Seidenberg%20...&clkdest=http://csis.pace.edu/%7Ectappert/dps/d861-09/team2-3.pdf"><span style="color: #c35855; text-decoration: underline;">have observed</span></a> </span>that while individuals say they value their privacy highly, they can nonetheless be persuaded to relinquish long-term privacy for short-term rewards and are seldom willing to adopt privacy protective technologies<a href="http://click.reference.com/click/bhkk2l?clksite=rlsrch&clkquery=0FC4154DABBC76128E1D8A28524D1244&clkpage=related-serp&clkimpr=UVvyYkLreVMqRGlc&clkld=0&clkorgn=101995&clken=te&clkord=0&clkblk=&clktemp=&clkmod=refdelta&clkitem=Privacy%20and%20Rationality%20in%20Individual%20Decision%20Making%20-%20Seidenberg%20...&clkdest=http://csis.pace.edu/%7Ectappert/dps/d861-09/team2-3.pdf"><em><span style="color: windowtext; text-decoration: underline;">.</span></em></a> Mr Alessandri's research <span style="color: #c35855;"><a href="http://www.heinz.cmu.edu/~acquisti/papers/acquisti-SPPS.pdf"><span style="color: #c35855; text-decoration: underline;">has also noted</span></a></span> how people can be manipulated into disclosing more personal information to third parties if they think those third parties will limit the further disclosure of that information, i.e. the perception of control over one's personal information will, paradoxically, encourage greater disclosure.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>As the New York Times notes, such research has important policy implications as legislators work out how to protect privacy rights when marketable personal data has never been more widely available.  But the research should also remind us that personal conceptions of privacy will often be underdeveloped, irrational and inconsistent.  In the UK at least, it's only in recent years that people have had legally protectable rights of privacy.  It's not surprising, then, that many people will have conflicting ideas about what bits of their private lives they want to protect and how valuable they consider them to be.  Judges, legislators and regulators need to bear this in mind when assessing competing claims in the privacy arena.</span></p>]]></content:encoded></item><item><guid isPermaLink="false">{A5BDCD0C-4524-4D5B-97E5-91B350C336E6}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/did-the-australian-radio-hosts-breach-their-industry-code/</link><title>Did the Australian radio hosts breach their industry code?</title><description><![CDATA[Will the Australian Communications and Media Authority (ACMA) take tough action not only in respect of the broadcast without permission of the secretly recorded telephone call, but also for breaching the Duchess of Cambridge’s privacy?]]></description><pubDate>Tue, 11 Dec 2012 09:08:00 Z</pubDate><category>Data and privacy</category><authors:names></authors:names><content:encoded><![CDATA[<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Notwithstanding the appalling and utterly shocking consequences of the prank which so tragically cost the life of the nurse, Jacintha Saldanha, it seems that the blame for this disaster has been rather conveniently unloaded on to the youthful Australian broadcasters Mel Greig and Michael Christian rather than focusing on the essential question of how on earth the radio station <em>2DayFM</em> and its owners <em>Southern Cross Austereo </em>could possibly justify not only heaping worldwide humiliation on the nurse by means of a secretly recorded telephone interview, but also broadcasting without any possible justification the private medical details of the condition of the Duchess of Cambridge.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>More people than would now care to admit it were – before they knew the full details and, of course, the tragic consequences – amused by the idea of presenters on a radio station posing as members of the Royal Family in a mildly mocking fashion.  Initially, even the Prince of Wales treated the matter with a degree of levity- but presumably before he had heard the actual broadcast. Mel and Michael in their chastened broadcast apology made the point that their role was just to “<em>get the audio and wait to be told whether it was ok or not ok”.</em></span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Absent a cynical desire for ratings – which initially trumpeted the so-called worldwide exclusive and which was evident in the initial attempts at justification seemingly put forward by an out of touch spokesperson to the effect that this was a harmless prank which did not require an apology, that the nurse had killed herself as a result of a depressive condition and that the hospital itself was in some measure to blame – it is difficult to see how those in charge of the decision to broadcast could possibly have thought that the broadcast was permissible.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Much of the attention hitherto has focused on the fact that the words of the nurse when she gives details of the condition of the Duchess were recorded without her knowledge, still less her consent. It is abundantly clear that this was a flagrant breach of Article 6 of the <em>Commercial Radio Australia Code of Practice and Guidelines</em>. The Code of Practice helpfully says in language that is couched in terms which should be moderately unambiguous for editors and owners of a commercial radio station:</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>“<strong><em>the purpose of this Code is to prevent the unauthorised broadcast statements by individual persons</em></strong>“.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The Code then goes on to state in paragraph 6.1:</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>“<em>A licensee <strong>must not </strong>broadcast the words of an identifiable person unless:</em></span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><em><span>(a)        that person has been informed in advance or a reasonable person would be aware that the words may be broadcast; or</span></em></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><em><span>(b)        in case of words which have been recorded without the knowledge of the person, that person has subsequently, but prior to the broadcast, expressed consent to the broadcast of the words.”</span></em></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The attempt by the owners of the radio station to try to justify their conduct on the basis that five attempts were made to contact the nurse, which one trusts will be suitably documented, simply does not wash. The interview appears to have taken place in the early hours of the morning and it is certainly open to question what attempts would have been made to track down the nurse who may by then have gone off duty and to break the news to her that she had been secretly recorded and ask her consent. It might be thought that the more straightforward way for the radio station to behave would have been to ask the nurse at the end of the interview whether she would consent to what she had said being broadcast. The question was not asked, presumably because it was blindingly obvious that she would have refused to give any such consent. In any event, the words of the Code do not say that the radio station simply has to try its best to find someone to give the consent on her behalf.  The words could not be more clear. Such words <strong>must not </strong>be broadcast unless prior to the broadcast the person in question has given consent to the broadcast of words. No one, of course, could have foreseen the appalling tragic consequences of the prank, but if the Code had been complied with, it is difficult to imagine that there could have been this outcome.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>There is a further obligation under Article 9.1 of the Code of Practice which requires that a commercial radio licensee “<em>must not broadcast a program which, in all of the circumstances:</em></span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><em><span>(a) treats participants in live hosted entertainment programs in a highly demeaning or highly exploitative manner; “</span></em></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>A live hosted entertainment programme is defined as “<em>a program …. a substantial part of which includes the following components:</em></span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><em><span>(a) a live host and</span></em></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><em><span>(b) one or more of the following:… pranks”</span></em></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>What has also been overlooked hitherto – and one hopes will be properly investigated by the ACMA – is the privacy of the Duchess. She was not at all well and in the early stages of her pregnancy. Information had, however, been given on her behalf to the media about her condition.  There were recognised channels of communication for the media to make enquiries about her ongoing condition, in so far as it was felt appropriate to give out any such details.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>ACMA has laid down privacy guidelines for broadcasters which recognise the need to balance respect for individual privacy with the media’s role of informing the public. The first question which arises in relation to complaints about intrusions into privacy is</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><em><span>Did the material related to a person’s private affairs?</span></em></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The answer to that question is unquestionably yes, as the material in question related to material dealing with the health of the Duchess. The further tests required under the guidelines that its broadcast was “<em>likely to cause harm or distress to a reasonable person in the position of the individual concerned</em>” (the Duchess of Cambridge) and the further criteria that the individual was “<em>identifiable from the material broadcast</em>” were clearly met.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The second and counterbalancing question is whether “<em>the broadcast of the material relating to a person’s private affairs was warranted in the public interest</em>“. This, ACMA has indicated, cannot merely be that the public are interested in a story which intrudes into the privacy of an individual, but rather that the broadcast of such material must “<em>contribute to the public’s knowledge and understanding of the issues involved in the overall subject</em>“. There can be no question that a wind-up telephone call with spoof Sydney-based yapping corgis in the background could not meet that test.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>While we may, in other circumstances, be very happy to laugh at such wind-ups, the regulations and Code are there for a reason. While there is no general right to privacy under Australian law, there are a number of laws which protect an individual’s right to privacy. These include in New South Wales where the radio station is based, the Privacy and Personal Information Protection Act 1998, the Health Records and Information Privacy Act 2002 and the Surveillance Devices Act 2007.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The management of Southern Cross Austereo need to produce a convincing explanation of how they considered it lawful not only to broadcast the nurse’s secretly recorded words without her consent, but how they felt it right to infringe so flagrantly the privacy rights of the Duchess. Until they do so, it may be difficult to escape the conclusion that they paid little or any regard to the Privacy Code. In any event, it is much to be hoped that the ACMA fully investigates what happened and takes this opportunity to lay down clear guidelines which will require proper observance of the Code and respect for the privacy rights of innocent third parties, while permitting – with appropriate safeguards – legitimate entertainment.</span></p>]]></content:encoded></item><item><guid isPermaLink="false">{6501F04E-432C-42E6-B61B-BA46BFDE02F7}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/levesons-vision-of-a-regulated-press/</link><title>Leveson's vision of a regulated press</title><description><![CDATA[The question of what changes result is essentially a political matter.  ]]></description><pubDate>Mon, 10 Dec 2012 09:15:00 Z</pubDate><category>Data and privacy</category><authors:names></authors:names><content:encoded><![CDATA[<p style="margin: 0cm 0cm 10pt; text-align: justify;"><strong><span>Introduction</span></strong></p>
<ul style="margin-top: 0cm; list-style-type: disc;">
    <li style="margin: 0cm 0cm 10pt; text-align: justify; color: #000000;"><span>Lord Justice Leveson has now reported following his 16 month Inquiry into the press.  His report runs to some 2000 pages.  The question of what changes result is essentially a political matter.  First indications are that there will be a parliamentary majority for statutory underpinning of a new regulatory system. Despite his reservations, the Prime Minister has ordered that a Bill be prepared to implement the Leveson proposals.  A lot of political skirmishing lies ahead.</span></li>
    <li style="margin: 0cm 0cm 10pt; text-align: justify; color: #000000;"><span>A new form of press regulation is inevitable. The consensus of the witnesses to appear before Leveson was that the PCC was completely washed up.  But is Leveson really in tune with the workings of the press? How much power is he willing to give to legislators over the press? Do his proposals threaten to undermine investigative journalism? Is he imposing excessive burdens on the press? Can there be a level playing field between a regulated press and unregulated social media and will there be only one winner?</span></li>
</ul>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><strong><span>Background to the Leveson Inquiry</span></strong></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Investigations by the Guardian of 9 July 2009 followed by a similar article in the New York Times of 1 September 2010 revealed that phone hacking at the News of the World was on an almost industrial scale, notwithstanding the half-hearted and – in view of what followed involving small matter of a £40 million police inquiry- a remarkably cursory original police investigation.  Following the revelation that the telephone of a missing murder victim, Milly Dowler, had been hacked in to by the newspaper, the Prime Minister, David Cameron, in July 2011 announced that there would be a Judicial Inquiry into the Culture, Practice and Ethics of the Press.  It is the seventh time in seventy years that there has been an enquiry into the practices of the Press in the United Kingdom.  Pressure has now built up to produce an effective result which was not the consequence of the six previous efforts.  The Inquiry was divided into two parts.  Leveson has reported on the first part.  However Part Two of the Inquiry has been consigned to the long grass until the conclusion of criminal proceedings.  It is open to question whether part two will ever take place, although there was some suggestion by Leveson that it would.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The evidence started on 24 November 2011 and formally ended on 24 July 2012 by which time evidence had been taken from some 337 witnesses in person or by written submissions from 300 individuals or organisations.  The Inquiry is reckoned to have cost somewhere in the region of £5.6m, a relatively modest cost compared to the Police Inquiries into hacking-related criminality and to the Bloody Sunday Inquiry which cost £155,628,791 of which the legal profession received no less than £67,603,621.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Throughout the Inquiry, many have felt that Leveson was harboured a general distaste for the tabloid press: a view that was supported by the hundred page excoriation of the popular press contained in the notices of potential criticisms sent to the press prior to the publication of his report, the remarks made in his report that the press had ‘wreaked havoc with the lives of innocent people; there was outrageous behaviour by newspapers, newspapers behaved as if the code of conduct did not exist’, and ‘significant and reckless disregard for accuracy’, plus the fact that the police and politicians emerged from his report comparatively (and surprisingly) unscathed.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><strong><span>Leveson’s primary recommendations were:</span></strong></p>
<ul style="margin-top: 0cm; list-style-type: disc;">
    <li style="margin: 0cm 0cm 10pt; text-align: justify; color: #000000;"><span>a new and independent regulatory body which should have no serving editor or member of the House of Commons or Government on the board, but should contain people with experience of the industry;</span></li>
    <li style="margin: 0cm 0cm 10pt; text-align: justify; color: #000000;"><span>this would be a self-regulating regime which would set a Standards Code which would recognise freedom of speech and the importance of issues of public interest which he perceived to include such matters as the exposing of crime or serious impropriety or the public being seriously misled.  However, the other side of the coin was that the Standards Code must relate to the way that the press treated people particularly in relation to an appropriate respect for their privacy where there was no public interest justification for breaching that privacy and equally for accuracy and avoiding of any misrepresentation of the facts.</span></li>
    <li style="margin: 0cm 0cm 10pt; text-align: justify; color: #000000;"><span>Leveson envisages legislation to underpin the system of independent self-regulation.  His thinking is that such legislation is necessary to establish the parameters of the self-regulating body and to facilitate the recognition of that body in the legal process so that exemplary damages and costs could be awarded against the press if they fail to comply with the requirements of the regulatory board.  He envisaged that the self-regulatory body would be benchmarked by the Office of Communications (the body that regulates various forms of media such as television (Ofcom) in a sense of its composition and criteria being verified so that its procedures could be recognised by the courts.  The problems with handing out unnecessary powers is that sooner or later someone abuses them.  Many still remember the 81 year old arrested at the Labour party conference under the Terrorism Act for shouting “Bollocks” at Tony Blair.</span></li>
    <li style="margin: 0cm 0cm 10pt; text-align: justify; color: #000000;"><span>Leveson does also envisage a failsafe option that whereby if this regulatory system failed, legislation would be brought in to bring the regulatory body under the general umbrella of Ofcom.</span></li>
    <li style="margin: 0cm 0cm 10pt; text-align: justify; color: #000000;"><span>The regulatory body should have power to direct appropriate remedial action for breach of the press standards it had established and powers to direct the nature and placement of apologies and corrections.</span></li>
    <li style="margin: 0cm 0cm 10pt; text-align: justify; color: #000000;"><span>The regulatory body should also have powers to impose appropriate sanctions which could include powers to impose financial penalties of up to 1% of turnover with a maximum penalty of £1m for serious of systemic breaches.</span></li>
    <li style="margin: 0cm 0cm 10pt; text-align: justify; color: #000000;"><span>The body would provide arbitration services for disputes where the costs would be borne by the parties subscribing to the regulatory board. It should be fair, quick and inexpensive.  It should be inquisitorial and free for complainants to use.  Clearly, it would be important to ensure that there was an appropriate filtering process for complaints and that complainants focus on their actual complaint rather than being able to raise issues of corporate governance that the Leveson report seems to bring into play, which would make the process more costly and slow.  There will doubtless be a widespread welcome for swift and cheap resolution of complaints.</span></li>
    <li style="margin: 0cm 0cm 10pt; text-align: justify; color: #000000;"><span>Among other things, Leveson recommends that the body should provide guidance on the interpretation of the public interest justifying publication (including potentially requiring journalists to keep a record of the factors weighed up in relation to publication). He also recommended “an advisory service to editors in relation to considerations of the public interest in taking particular actions”.  This latter recommendation in particular may result in a significant change in press regulation as it is likely that running stories past such an advisory service would quickly become a requirement via the backdoor (on the basis that publishers that failed to do so would likely face criticism in subsequent litigation), limiting editors’ ability to assess the public interest in a story for themselves.</span></li>
    <li style="margin: 0cm 0cm 10pt; text-align: justify; color: #000000;"><span>Leveson proposed that the protections that the media enjoy under Section 32 Data Protection Act in regard to data which is held for journalistic purposes should only apply where the processing of data is actually necessary for publication and not simply where it was undertaken with a view to publication.  Putting to one side the point that it is difficult to know whether data is “necessary for publication” until one has seen it (hence the justification for the previous wording of “view to publication”), this proposal again appears to show that Leveson wants external supervision of editorial decisions.  In doing so he is in the opposite direction of travel from UK and European courts. He would also want Section 32 to be amended to that there must be a reasonable belief on the part of the journalist who was processing the information that the material would be in the public interest with their being no weighting in favour of freedom of speech. He appears to favour that it should be objectively established that the likely interference with privacy would be outweighed by the public interest in publication.  This proposal does seem to call into question the judge’s understanding of how papers work. Investigative journalists need background material to be able to carry out their investigations effectively and they may need it on a moment’s notice to deal with unexpected world events.  The Leveson proposals suggest they may be spending increasing amounts of time with compliance  officers. As the PM noted, this could have implications for investigative journalism. It could also produce a significant raft of litigation where the media would face a considerable burden of proof.</span></li>
    <li style="margin: 0cm 0cm 10pt; text-align: justify; color: #000000;"><span>Leveson envisages newspapers having compliance officers and readers being able to find information in newspapers as to the compliance procedures.  That is a development which could notably add to the burdens of press organisations and lead to ever tighter regulation.</span></li>
    <li style="margin: 0cm 0cm 10pt; text-align: justify; color: #000000;"><span>Leveson wants the Civil Justice Council to consider the level of damages in libel and privacy claims. Leveson envisages widening the criteria for the aware of exemplary damages which would take account of the extent of internal good governance and compliance with the code of standards by the press.  One’s concern here would be the underlying cost attached to such requirements and obligations and the scope for litigation.  Damages have, from time to time, been reviewed by the courts under a system that appears to work reasonably well.  There are parts of the Leveson Report which do appear to seek to fix everything and may suffer from the fact that Leveson’s background is not in media law.</span></li>
    <li style="margin: 0cm 0cm 10pt; text-align: justify; color: #000000;"><span>Leveson makes criticism of the over-close relationship between the police and the press.  He makes a number of practical recommendations to what is termed “revolving doors” suggesting that police officers should not take up positions in the press within 12 months of their leaving the police force and that there should be regulations and transparency as to dealings between the press and the police, including matters such as entertainment.</span></li>
    <li style="margin: 0cm 0cm 10pt; text-align: justify; color: #000000;"><span>There are a number of detailed recommendations and criticisms relating to the relationship between the press and politicians.  Here, Leveson’s ecommendations are less specific, he would wish political figures to reflect constructively on such relationships and for there to be greater transparency.</span></li>
    <li style="margin: 0cm 0cm 10pt; text-align: justify; color: #000000;"><span>Leveson proposes that the Information Commissioner should issue practical guidance in relation to data protection which would support the press in improving its standards and practice in handling personal information.</span></li>
    <li style="margin: 0cm 0cm 10pt; text-align: justify; color: #000000;"><span>Leveson is highly critical of the News of the World, for example, criticising the favourable treatment their staff received when they were imprisoned or dismissed as a result of their misbehaviour.  He also criticised the failure of management to deal appropriately with compliance issues at the News of the World.</span></li>
    <li style="margin: 0cm 0cm 10pt; text-align: justify; color: #000000;"><span>Leveson was highly critical of the Press Complaints Commission (PCC).  He noted that Cameron had described it as “ineffective and lacking in rigour” and that the leader of the opposition had called it “toothless poodle”.  Leveson noted that it was not a regulator at all but a complaints handling body, which was under-utilised and had insufficient resources.  He also criticised the fact that it had not monitored compliance with the PCC Code, instead he advocated the need for a genuinely independent and effective system of self-regulation.  He rejected an entirely voluntary scheme which had been advocated by former executives of the PCC based on a five-year binding contract.  He simply did not believe that would work.</span></li>
</ul>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><strong><span>The reaction of the Prime Minister to Leveson’s report</span></strong></p>
<ul style="margin-top: 0cm; list-style-type: disc;">
    <li style="margin: 0cm 0cm 10pt; text-align: justify; color: #000000;"><span>Any change in the legal framework under which the press operates is a distinctly political matter. Initial reactions have shown that there are deep political divisions as to the extent to which and the manner in which the press should be regulated.  The Prime Minister (PM) proposes to hold cross-party talks to seek agreement as to how the Leveson proposals are to be agreed.</span></li>
    <li style="margin: 0cm 0cm 10pt; text-align: justify; color: #000000;"><span>The PM agrees with the concept of a new independent regulatory body, to be appointed so as to be independent of Parliament and the press, as proposed by Leveson.  A difference arises as to whether legislation is required to establish it.</span></li>
    <li style="margin: 0cm 0cm 10pt; text-align: justify; color: #000000;"><span>Broadly speaking, the PM accepts Leveson’s proposal that the new regulatory body should lay down a code of standards for the press, that it should run an arbitration service with a swift complaints handling procedure and that it should have power to demand suitably worded apologies and how they should be published and that the powers should in the last analysis be backed with the ability to levy fines of up to £1m.  Leveson also envisages an arbitration service which would be administered by the regulatory body which would be part of the legal system and would be a factor to be taken into account in litigation but that the cost of such arbitration would be borne by the press.</span></li>
    <li style="margin: 0cm 0cm 10pt; text-align: justify; color: #000000;"><span>Where the PM has his main disagreement with Leveson is the idea that press regulation should be made part of the law of the land.  That, he feels, is crossing the Rubicon.</span></li>
    <li style="margin: 0cm 0cm 10pt; text-align: justify; color: #000000;"><span>The PM’s concern is that talk of legislation to “provide the mechanism to recognise and certify a new regulatory body” would be in effect to give a vehicle for politicians to impose regulations and obligations on the press.</span></li>
    <li style="margin: 0cm 0cm 10pt; text-align: justify; color: #000000;"><span>The PM also differs over Leveson’s contention that legislation is necessary to implement his proposals over such matters as the award of costs or exemplary damages against the press, although he does not disagree in principle with the idea of such orders for costs or exemplary damages.  A Bill will nevertheless be prepared.  Initial government briefing suggests this will highlight the difficulties of what Leveson proposes.  The contrary view is that parliamentary mathematics suggest that there is a majority which will compel legislation to implement the Leveson proposals.</span></li>
    <li style="margin: 0cm 0cm 10pt; text-align: justify; color: #000000;"><span>The PM also is concerned about Leveson’s proposed changes to the protection of journalistic material which exists under Section 32 Data Protection Act and its effect on investigative journalism, particularly when one bears in mind how wide the definition of such data is.  The PM says that he is “instinctively concerned” about that proposal.</span></li>
</ul>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><strong><span>Conclusion</span></strong></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The report is impressive in its thoroughness, but its conclusions and indeed some of its findings are debatable.  The debate will now move into the political arena.  So far as one can judge, there appears to be a strong majority for a new and effective system of regulation.  There may be a majority for some sort of legislative framework for the regulatory body, but that will be a matter for negotiation and discussion with no political party wishing to be seen to be defending the press too strongly in the current climate in the United Kingdom.  The concept of the importance of freedom of speech and the dangers of starting to regulate the press seem, at the very least, to be counterbalanced by the general distaste for the misbehaviour on the part of a section of the tabloid press. The elephant-in-the-room, which Leveson has largely ignored, is how one equates a greater regulation of the press with an inability to provide any such comparable regulation for the social media.  An unequal playing field looks as if it is about to be created and the traditional press will be thereby weakened at the expense of the unregulated media. Leveson’s comments on the social media and internet account for only one of the 2000 pages.  He views the growth of the internet as irrelevant to most of the inquiry.</span></p>]]></content:encoded></item><item><guid isPermaLink="false">{476C9521-96CD-4F38-9021-F59AEFECBCB2}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/unmeritorious-privacy-claim-dismissed-as-attempted-extortion/</link><title>Unmeritorious privacy claim dismissed as attempted extortion.</title><description><![CDATA[A privacy claim brought by an ex-business associate of Lord Sebastian Coe in relation to an Evening Standard article which published leaked business emails was dismissed on Tuesday by the High Court.]]></description><pubDate>Wed, 28 Nov 2012 09:19:00 Z</pubDate><category>Data and privacy</category><authors:names></authors:names><content:encoded><![CDATA[<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Mr Justice Tugendhat’s judgment rejected the claim in the most clear and scathing of terms. He found that the business associate in question, a Mr Peter Abbey: 1) had no reasonable expectation of privacy in relation to the information complained of; 2) that, in any event, the article was published in the public interest and 3) that the claim was an abuse of the court process and an attempt at extortion.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The Claimant has not asked the court for permission to appeal. The judgment can be accessed here: <span style="color: #c35855;"><a href="http://www.bailii.org/cgi-bin/markup.cgi?doc=/ew/cases/EWHC/QB/2012/3217.html&query=abbey+and+v+and+ANL&method=boolean"><span style="color: #c35855; text-decoration: underline;">Peter Abbey v (1) Andrew Gilligan and (2) Associated Newspapers Ltd.</span></a></span></span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><strong><span>Background</span></strong></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The Claimant is a business consultant with a chequered business history. He helps companies attract investors and raise finance and has, over the years, been linked as either a director or a consultant to various different business initiatives. He has had mixed success and has, as a result, featured frequently in Private Eye as being an individual connected to a number of failed and bankrupt businesses. He is currently subject to an Individual Voluntary Arrangement. Yet despite his controversial commercial record, the Claimant was someone who Lord Coe chose to go into business with in March 2005 when he allowed him to assist in the formation of a company called Sebastian Coe Limited. This company was set up for the provision of speakers, product endorsements and consultancy advice on sports related activities. As the judgment states, Lord Coe is well known: a winner of Olympic Gold medals, a former member of Parliament and a very well-known figure in public life.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>On 6 July 2005 London was selected as the host for the 2012 Olympic Games. Three weeks later, on 22 July 2005, Lord Coe and the Claimant set up a company which later became the Complete Leisure Group or “CLG”. On 3 October 2005 Lord Coe was appointed Chairman of LOCOG (the organising committee set up to stage the 2012 London Olympic and Paralympic Games). In November 2005 CLG agreed to acquire Sebastian Coe Limited and with it the services, image and intellectual property rights of Lord Coe for a period of 40 years or until his death.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>On 8 November 2005 CLG announced its proposal to raise up to £1m by the sale of up to 1 million Ordinary Shares at £1 each. Various individuals took up this subscription and invested in CLG. These investors were no doubt attracted to a company whose objective was to profit from the heightened image and popularity of Lord Coe. The investors had been led to believe that the company was due to float on the Alternative Investment Market and hoped that this would increase the value of their shareholding significantly. Many of the investors were introduced to CLG by the Claimant in his capacity as consultant to CLG. On 31 May 2006 CLG re-registered as a Public Limited Company. A second subscription to raise a further £500,000 was announced in August 2006. At this time Sebastian Coe Limited had a projected annual turnover of £850,000.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The Claimant was not only heavily involved in raising investments for CLG, he also helped with the practicalities of setting up both CLG and Sebastian Coe Limited. Their registered offices were listed as Mr Abbey’s place of business and he introduced both solicitors and accountants to the companies. He was also a shareholder in CLG (through one of his companies, Berkeley Consultants Limited).</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><strong><span>The Dispatches Programme</span></strong></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>On 10 September 2007 Channel 4 broadcast a Dispatches programme which focused upon the likely cost of the 2012 Olympics to the taxpayer and considered whether any individuals connected to the Olympics stood to personally profit. A section of the programme focused upon Lord Coe’s earning capacity in the context of his Olympic role. The programme considered whether Lord Coe sought to profit from the Olympics via CLG and touched upon the Claimant’s involvement.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Prior to the broadcast, journalists from Dispatches had contacted both Mr Abbey and Lord Coe for comment. Carter Ruck on behalf of Lord Coe denied that Lord Coe was seeking to profit from his Olympic position, explained that CLG was created to ring-fence his private business interests from his public responsibilities and sought to distance Lord Coe from the Claimant by explaining that the Claimant did not play any part in the management of CLG.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Shortly before broadcast a journalist working on the Dispatches programme came into possession of copies of emails about CLG which he had been given by a confidential source. The emails were neither hacked nor stolen. The emails suggested that CLG was experiencing some financial difficulties and that certain investors were demanding their money back. It was too late to incorporate the emails into the Dispatches programme, yet the journalists on the programme felt that the content of the emails clearly merited legitimate journalistic enquiry and decided that there was a clear public interest in giving another journalist the chance to pursue the story. They passed the emails to the journalist Andrew Gilligan (the First Defendant) who in turn decided that it was in the public interest to publish quotes from them in the article complained of.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><strong><span>The Article</span></strong></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The article entitled “Email from Coe investors: We want our money back” was published in the Evening Standard on 14 September 2007. It referred to a number of the leaked emails to show that CLG was suffering financial difficulties and also that Lord Coe appeared not to have achieved the complete separation of his business interests from his public Olympic role as he had claimed. The article also mentioned the Claimant’s involvement with CLG together with a reference to his controversial career.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The First Defendant had made attempts to contact the Claimant prior to publication of the article but the Claimant declined to comment and in fact denied in evidence that he had been aware of the story before its publication.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><strong><span>The Claim</span></strong></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The Claimant did not complain about the article at the time of publication. Instead he waited for nearly four years to bring a complaint against the Defendants, which included, amongst other things, various criminal allegations including an allegation of email hacking. The Claimant admitted that he was prompted to do so when he read about payments being made to individuals by the News of the World in relation to the phone hacking scandal.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>When the Claimant’s claim was finally formulated, most of the allegations of criminality had been dropped and instead the claim was for breach of confidence and/or misuse of private information. The particulars of claim did include a speculative allegation of email hacking but accepted that the emails could have been obtained by other means. In any event the Claimant later withdrew the hacking allegation entirely.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The Claimant’s claim fell into two parts:</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>1. The fact that the Defendants obtained the emails with a view to publication was claimed to be in itself an actionable breach of confidence and/or unjustified infringement of his privacy; and</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>2. There was a further actionable breach of confidence and/or misuse of private information in respect of the publication of parts of some of the emails obtained in the article.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><strong><span>The Defence</span></strong></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The Defendants contended that the Claimant’s stale claim was an abuse of process and further denied that the emails contained information that was confidential to the Claimant and asserted that the Claimant could have no reasonable expectation of privacy over such information. If the Defendants were held to be wrong on that, they argued that there were a number of different public interest grounds which justified both the obtaining of the relevant emails and their subsequent publication. </span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><strong><span>The Decision</span></strong></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>1. Title to sue – Mr Justice Tugendhat held that the claim failed at the first hurdle because the information complained of related to the affairs of CLG and was not information that was personal to the Claimant. As such the Defendants did not owe a duty of confidentiality to the Claimant and the Claimant had no reasonable expectation in relation to any information which was not personal to him.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>2. The case on obtaining – there was one email which did contain information that was personal to the Claimant. This email was not referred to in the article. Mr Justice Tugendhat held that the information was not so clearly private or confidential that it could be said that it was a breach of confidence or misuse of private information for Mr Gilligan to obtain and read it.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>3. Public interest – the Court went on to decide that in any event the article was published in the public interest. A number of public interest arguments were accepted by the Court. Namely:</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>a. In correcting the false impression that had been given by representatives for Lord Coe that the Claimant did not play a part in the management of CLG. The emails showed that the Claimant did have an active role in the management of CLG and held that it was therefore in the public interest to correct that false picture.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>b. In contributing to a debate of public importance in exploring whether Lord Coe had been able to achieve a clear separation between his public and private duties and interests. There was no adverse finding against Lord Coe and no suggestion that he had breached his duty to prevent any conflict between his duty to LOCOG and his interests in CLG. However the Court accepted that Lord Coe’s LOCOG PA also had a CLG email address and that there was public interest in raising this issue as a topic of public debate.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>c. In exposing the inability of CLG to pay its professional advisers and other debts as they fell due, and the inability or the unwillingness of CLG’s directors to file accounts when they were due, which were both matters which could have seriously put into question Lord Coe’s ability to properly carry out his Olympic role.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>d. In also exposing the business relationship between Lord Coe and the Claimant, which, given the Claimant’s professional history, called into question Lord Coe’s private and professional judgment. Due to Lord Coe’s role of national importance, the public had an interest in knowing to whom he had decided to entrust his private business interests to.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>4. Abuse of Process – the Court found that the Claimant’s repeated allegations of serious criminality against the Defendants, in circumstances where there was no evidence to support such allegations, were made solely for the purpose of obtaining a settlement on terms which did not reflect the merits of his claim. This conduct was held to be an attempt at extortion and an abuse of the process of the Court. In addition the Court found that the claim is a “Jameel” type of abuse of process in that the costs of the litigation are out of all reasonable proportion to the possible benefit the Claimant could have achieved were he to have succeeded.</span></p>]]></content:encoded></item><item><guid isPermaLink="false">{C5E2DA08-B6A3-4760-8767-175DC2A1998D}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/uk-referred-to-ecj-over-internet-privacy/</link><title>UK referred to ECJ over internet privacy</title><description><![CDATA[On 30 September 2010 the European Commission announced that it referred the UK to the European Court of Justice for its alleged failure to implement EU laws on the confidentiality of electronic communications such as emails or internet browsing.]]></description><pubDate>Fri, 21 Sep 2012 13:04:00 +0100</pubDate><category>Data and privacy</category><authors:names>Keith Mathieson</authors:names><content:encoded><![CDATA[<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The referral follows legal action against the UK by the European Commission commenced in April 2009.  That case was prompted by complaints from UK internet users about the UK authorities’ treatment of their concerns over the use of Phorm technology by Internet Service Providers (targeted advertising based on prior analysis of users’ internet traffic).</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>In October 2009 the European Commission requested that the UK authorities amend UK law to ensure it complied with the EU law.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The referral of the UK to the European Court of Justice a year later reflects the Commission’s view that the UK is still breaching its obligations under the Directive 2002/58/EC on Privacy and Electronic Communications (the E-Privacy Directive) and Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data (the Data Protection Directive) which were implemented in the UK through the Privacy and Electronic Communications (EC Directive) Regulations 2003 and the Data Protection Act 1998 respectively, in three main areas:</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>1) There is no independent national authority to supervise the interception of some electronic communications, which is a requirement under the E-Privacy Directive and Data Protection Directive;</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>2) Existing UK law allowed the interception of communications not only where the relevant internet users have consented to this but also where the person intercepting the communications has “<em>reasonable grounds for believing</em>” the consent to intercept has freely been given under the UK’s Regulation of Investigatory Powers Act 2000 (RIPA). This is contrary to the EU laws which define consent as being “<em>freely given, specific and informed indication of a person’s wishes</em>“;</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>3) Current UK laws prohibiting and providing sanctions in the case of unlawful interception are limited to intentional interception only, whereas EU law is wider, requiring member states to impose penalties for any unlawful interception irrespective of whether it was committed intentionally or not.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The European Commission will now take the UK to Court to try and force it to change its laws.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>See further sections 4.3.4 and 4.4 of the <span style="color: #c0504d;"><a href="http://www.lawsocietyshop.org.uk/ecom_lawsoc/public/saleproduct.jsf?catalogueCode=9781853288432" target="_blank"><span style="color: #c0504d; text-decoration: underline;">Privacy Law Handbook</span></a></span>.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>(Originally blogged by Tamar Shafran)</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span style="color: #c0504d;"><a href="http://europa.eu/rapid/pressReleasesAction.do?reference=IP/10/1215&format=HTML&aged=0&language=EN&guiLanguage=fr" target="_blank"><span style="color: #c0504d; text-decoration: underline;">European Commission announcement</span></a></span></p>]]></content:encoded></item><item><guid isPermaLink="false">{A70F212A-9B6A-4A0D-8F6E-C8302B67FBF4}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/irish-court-dismisses-privacy-claim/</link><title>Irish court dismisses privacy claim</title><description><![CDATA[Ruth Hickey (who is the former partner of David Agnew (according to recent Irish press reports), who in turn is the former husband of Adele King (also known as “Twink”), an Irish entertainer) brought a claim against The Sunday World newspaper in the Irish High Court for (1) breach of her (and her son’s) rights of privacy and (2) libel .]]></description><pubDate>Fri, 21 Sep 2012 12:32:00 +0100</pubDate><category>Data and privacy</category><authors:names></authors:names><content:encoded><![CDATA[<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The full judgment can be accessed at <span style="color: #c0504d;"><a href="http://www.bailii.org/ie/cases/IEHC/2010/H349.html" target="_blank"><span style="color: #c0504d; text-decoration: underline;">Hickey & Anor v Sunday Newspapers Limited</span></a></span> [2010] 1EHC 349.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The claim related to two separate articles that both contained photographs of Ms Hickey, Mr Agnew and their young son leaving a registry office in Dublin after having registered the baby’s birth.  Ms Hickey claimed that these photographs constituted a breach of her and her son’s rights of privacy.  The articles also referred to a voicemail message left by Ms King for Mr Agnew, which had somehow made its way onto the internet and had, as a result, become notorious in Ireland.  In particular, the first of the two articles repeated the reference made in the voicemail to Ms Hickey as a “whore” and it was this reference which formed the basis of the libel action.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Mr Justice Kearns dismissed the claim on the basis that he was not satisfied that the publication of the offending photographs amounted to a breach of privacy.   In relation to the defamation claim, Mr Justice Kearns considered that the words complained of amounted to “vulgar abuse” and, as such, were not actionable in defamation.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The decision relating to the libel action is fairly uncontroversial but Mr Justice Kearns’ decision as regards the privacy claim merits closer inspection.  It seems that there were a number of facts specific to this particular case that were critical to the judge’s determination:</span></p>
<ol style="margin-top: 0cm;">
    <li style="margin: 0cm 0cm 10pt; text-align: justify; color: #000000;"><span>The fact that the plaintiffs were leaving a registry office persuaded Mr Justice Kearns to conclude that the plaintiffs were “performing a public function”.  This point distinguished the case from <em><span style="color: #c0504d;"><a href="http://www.bailii.org/uk/cases/UKHL/2004/22.html" target="_blank"><span style="color: #c0504d; text-decoration: underline;">Campbell v MGN Ltd</span></a></span></em> [2004] 2 A.C. 457, where the plaintiff was leaving a meeting of Narcotics Anonymous, which meant there was an assurance of privacy, confidentiality and anonymity essential to the type of treatment that the plaintiff was undergoing.</span></li>
    <li style="margin: 0cm 0cm 10pt; text-align: justify; color: #000000;"><span>The fact that nothing in the publication exposed the plaintiffs to any risk of physical harm from any person with ill-intent.  This point echoes the sentiment of the New Zealand Court of Appeal in <em><span style="color: #c0504d;"><a href="http://www.nzlii.org/cgi-bin/sinodisp/nz/cases/NZCA/2004/34.html?query=title%28Hosking%20and%20Runting%20%29" target="_blank"><span style="color: #c0504d; text-decoration: underline;">Hosking v Runting</span></a></span></em> [2004] NZCA 34.</span></li>
    <li style="margin: 0cm 0cm 10pt; text-align: justify; color: #000000;"><span>The fact that there was no evidence of a campaign of surveillance against the plaintiffs.  This distinguished the case from <em><span style="color: #c0504d;"><a href="http://www.bailii.org/eu/cases/ECHR/2004/294.html" target="_blank"><span style="color: #c0504d; text-decoration: underline;">Von Hannover v Germany</span></a></span></em> [2004] E.C.H.R 294, where the court was “particularly impressed by the fact that the photographs in question were part of a campaign of harassment of a public figure”.</span></li>
    <li style="margin: 0cm 0cm 10pt; text-align: justify; color: #000000;"><span>The fact that much of the information contained in the photographs and the articles were already matters of public record and, of even greater persuasion, the fact that the first plaintiff had herself sought and contributed to publicity concerning the matters complained of.  Here Mr Justice Kearns relied upon <em>Woodward v Hutchins</em> [1977] 1 W.L.R. 760.</span></li>
</ol>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Mr Justice Kearns went so far as to say that he would have taken a different view of the case had the plaintiff not herself courted publicity and had the disclosure of the voicemail referred to in the articles emanated in the first instance from the defendant newspaper.  He accepted that a right to privacy exists in Irish law but could not see anything on the facts of this case which tipped the scales in favour of the plaintiffs’ right to privacy over the defendant’s right to freedom of expression.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>In his judgment, Mr Justice Kearns repeatedly emphasised that the right of freedom of expression applies irrespective of whether the particular publication is desirable in the public interest and commented that, in his opinion, the publications in this case “represented the lowest standards of journalism imaginable”.  However he believed that finding in favour of the plaintiffs, on the specific facts of this case, would “represent a radical ratcheting up of the right to privacy at the expense of the right of freedom of expression to a degree which….should more properly be the subject matter of legislation” and was therefore minded to find in favour of the defendant.</span></p>]]></content:encoded></item><item><guid isPermaLink="false">{CDA53EFE-6746-4DF6-BB05-5E3064C0D2A2}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/prince-harry-has-the-sun-got-it-right/</link><title>Prince Harry – has the Sun got it right?</title><description><![CDATA[This blog noted a couple of days ago that clause 3 of the PCC Code requires editors to justify intrusions into an individual’s private life without consent.  ]]></description><pubDate>Fri, 24 Aug 2012 09:32:00 +0100</pubDate><category>Data and privacy</category><authors:names>Keith Mathieson</authors:names><content:encoded><![CDATA[<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The Sun has now sought to justify its publication of the photos of Prince Harry naked on various grounds, one of which is a previous decision of the PCC itself.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The decision in question is <span style="color: #c35855;"><a href="http://www.pcc.org.uk/cases/adjudicated.html?article=NjM5OA==" target="_blank"><span style="color: #c35855; text-decoration: underline;">here</span></a></span>.  It concerned a complaint against <em>Loaded</em> magazine by a young woman whose pictures were included in an article headed “Wanted! The Epic Boobs Girl!”.  Pictures of the woman were readily accessible on the internet.  Her picture was the third most popular result of a Google image search of “boobs”.  There were over 200,000 matching images of her as the “epic boobs girl” and some 1.76m matches relating to her generally.  She had had an internet presence for some four years prior to the use of the images by<em> Loaded. </em>The article in <em>Loaded </em>was not just a random article about her: it was a ‘contextualised’ article which concerned the very fact that she had a massive internet presence.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The fact that the images had been circulating for four years marks an obvious distinction between the Loaded case and Prince Harry’s case.  Nonetheless, the Sun will say (and has said), among ther things, that its article too must be seen in context, that context being the unavailability of the images in UK print media compared with their instant accessibility online.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The PCC’s adjudication contains the following pronouncement:</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The Commission did not think that it was possible for it to censure the magazine for commenting on material already given a wide circulation, and which had already been contextualised in the same specific way, by many others.  Although the Code imposes higher standards on the press than exist for material on unregulated sites, the Commission felt that the images were so widely established for it to be untenable for the Commission to rule that it was wrong for the magazine to use them.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Might it not by now be said that the images of Prince Harry were “so widely established” that it was no longer sensible to regard them as truly private?  In <span style="color: #c35855;"><a href="http://www.bailii.org/ew/cases/EWHC/QB/2008/687.html" target="_blank"><span style="color: #c35855; text-decoration: underline;">Max Mosley’s case against the News of the World</span></a></span>, Mr Justice Eady said the court needed to “guard against slipping into the role of King Canute”.  His remark arose in the context of Max Mosley’s (unsuccessful) attempt to get an injunction stopping the News of the World from continuing to publish video footage of a sex party.  Is Prince Harry’s case really so different?</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The Inforrm blog says this is all nonsense.  Its rubbishing of the Sun’s defence is <span style="color: #c35855;"><a href="http://inforrm.wordpress.com/2012/08/24/public-interest-and-the-prince-the-sun-fails-the-responsibility-test/#more-16729" target="_blank"><span style="color: #c35855; text-decoration: underline;">here</span></a></span>.</span></p>]]></content:encoded></item><item><guid isPermaLink="false">{AE33E663-FA74-4FF1-A985-CFB9AE0A36B4}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/a-former-editors-view-on-the-naked-royal/</link><title>A former editor’s view on the naked Royal</title><description><![CDATA[There’s an interesting view on the naked pictures of Prince Harry from a former tabloid editor.]]></description><pubDate>Wed, 22 Aug 2012 09:47:00 +0100</pubDate><category>Data and privacy</category><authors:names>Keith Mathieson</authors:names><content:encoded><![CDATA[<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span style="color: #c35855;"><a href="http://www.huffingtonpost.co.uk/neil-wallis/prince-harry-naked-photos_b_1821020.html?utm_hp_ref=uk" target="_blank"><span style="color: #c35855; text-decoration: underline;">In a blog on the Huffington Post site</span></a></span><span>, Neil Wallis, described as “media commentator, former tabloid editor and currently under arrest as part of Operation Weeting”, says he would publish them:</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>He is third in line to throne, he has been a very major part of the monarchy’s presence at the Olympics, romping with a gang of girls he almost certainly doesn’t know from Adam, in pretty dubious circumstances … And anyway, it’s fun!</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Mr Wallis suggests that UK editors will not publish because if they did, they would incur the wrath of Lord Justice Leveson.  A more likely reason, perhaps, is <span style="color: #c35855;"><a href="http://www.pcc.org.uk/cop/practice.html" target="_blank"><span style="color: #c35855; text-decoration: underline;">clause 3 of the Editors’ Code of Practice</span></a></span>: “Editors will be expected to justify intrusions into any individual’s private life without consent”.  The fact that the pictures are circulating on a few US celebrity sites doesn’t really change matters.  Clause 3 says editors can take account of the individual’s own public disclosures of information.  It does not say they can take account of unauthorised disclosures by other media, but there may come a point when pictures have become so public it would make no sense to consider them any longer private.</span></p>]]></content:encoded></item><item><guid isPermaLink="false">{D6208322-1BED-461D-8680-A11DCF62119E}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/mps-partner-loses-privacy-and-harassment-case-against-newspaper-publisher/</link><title>MP’s partner loses privacy and harassment case against newspaper publisher</title><description><![CDATA[Carina Trimingham has lost her privacy and harassment case against the publishers of the Daily Mail. ]]></description><pubDate>Thu, 24 May 2012 10:07:00 +0100</pubDate><category>Data and privacy</category><authors:names>Keith Mathieson</authors:names><content:encoded><![CDATA[<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Ms Trimingham, who is the partner of the former cabinet minister Chris Huhne MP, sued Associated Newspapers for infringement of her rights under three separate statutes: (a) misuse of private information pursuant to the Human Rights Act 1998 and ECHR Art 8; (b) the Protection from Harassment Act 1997; and (c) the Copyright, Designs and Patents Act, s.97.  Her claims originally related to eight articles in the Daily Mail but were later extended to over 60 articles. </span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Following a five day trial in April, Mr Justice Tugendhat dismissed all of Ms Trimingham’s claims.  His judgment was handed down today and is available <span style="color: #c35855;"><a href="http://www.judiciary.gov.uk/Resources/JCO/Documents/Judgments/trimingham-v-assoc-news-ltd.pdf" target="_blank"><span style="color: #c35855; text-decoration: underline;">here</span></a></span>.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><strong><span>The articles complained of</span></strong></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The eight articles originally complained of concerned Ms Trimingham’s affair with Mr Huhne.  She later complained about more than 50 further articles, most of which mentioned her sexuality.  Before she had begun her relationship with Mr Huhne, Ms Trimingham had been married and following the break-up of that marriage she had undergone a civil partnership ceremony with a woman. </span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><strong><span>The photographs complained of</span></strong></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Ms Trimingham complained of the publication of two photographs.  One was of her prior to her civil partnership ceremony.  The other was of her and her family at the ceremony.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><strong><span>The claims</span></strong></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>There was no claim for libel – Ms Trimingham did not dispute that the stories were true.  Her complaint was that the articles and photographs individually infringed her privacy and when taken together amounted to harassment.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><strong><span>The judge’s findings</span></strong></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The judgment is over 80 pages in length and will be the subject of more detailed analysis on this blog in due course.  In short:</span></p>
<ul style="margin-top: 0cm; list-style-type: disc;">
    <li style="margin: 0cm 0cm 10pt; text-align: justify; color: #000000;"><span>The judge disagreed with Ms Trimingham’s description of herself as a private individual: she “was not the purely private figure she claims to be.  Her reasonable expectation of privacy has become limited.  This is mainly by reason of her involvement with Mr Huhne, both professionally, as his press agent, and personally, as his secret mistress, in circumstances where he campaigned with a leaflet to the electorate of Eastleigh about how much he valued his family.”  The judge also noted that Ms Trimingham herself disclsoed information to newspapers about other people and so “was a person who ought not reasonably to be expected to be distressed when such information was published about herself”.</span></li>
    <li style="margin: 0cm 0cm 10pt; text-align: justify; color: #000000;"><span>The references to Ms Trimingham’s sexuality were published in the context of public interest stories about Mr Huhne and were within the range of what an editor could in good faith regard as relevant.</span></li>
    <li style="margin: 0cm 0cm 10pt; text-align: justify; color: #000000;"><span>Ms Trimingham’s distress was the result of the publication by Associated, and also other publishers, of true information about her which was also defamatory but in respect of which she had made no claim of libel.</span></li>
    <li style="margin: 0cm 0cm 10pt; text-align: justify; color: #000000;"><span>The allegedly insulting and offensive material of which Ms Trimingham complained was not so unreasonable that it was necessary or proportionate to sanction or prohibit it in order to protect Ms Trimingham’s rights.  Ms Trimingham could not show that a reasonable person in the position of the defendant ought to have known that its articles amounted to harassment of her.</span></li>
    <li style="margin: 0cm 0cm 10pt; text-align: justify; color: #000000;"><span>Ms Trimingham had no reasonable expectation of privacy in the photographs.  There was no claim under s 85 of the CPDA as the photographs were not “commissioned”.</span></li>
</ul>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><strong><span>Possible appeal</span></strong></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Ms Tringham’s application for permission to appeal has been refused by Tugendhat J.  However, she has said she will seek permission from the Court of Appeal. </span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><em><span>RPC acted for Associated Newspapers in the Carina Trimingham case.</span></em></p>]]></content:encoded></item><item><guid isPermaLink="false">{26EE9F6B-BC58-4CE0-8C42-347A091BA2DC}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/whats-really-wrong-with-pictures-of-the-duchess-of-cambridge-shopping/</link><title>What’s really wrong with pictures of the Duchess of Cambridge shopping?</title><description><![CDATA[The celebrity magazine Heat has published the following apology:]]></description><pubDate>Tue, 22 May 2012 10:11:00 +0100</pubDate><category>Data and privacy</category><authors:names>Keith Mathieson</authors:names><content:encoded><![CDATA[<p style="margin: 0cm 0cm 10pt 36pt; text-align: justify;"><span>In our issue cover-dated 3-9 December 2011, we published a photograph of the Duchess of Cambridge, taken while she was shopping in a store. We now accept that we should not have done so, and apologise to her for our actions.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span style="color: #c35855;"><a href="http://www.guardian.co.uk/media/greenslade/2012/may/22/duchess-of-cambridge-heat" target="_blank"><span style="color: #c35855; text-decoration: underline;">It is said</span></a></span><span> that the PCC negotiated the apology after a complaint from the Duchess’s lawyers alleging harassment and intrusion. There has been no adjudication by the PCC, but the negotiation of an apology implies that Heat considered (or was persuaded) it was in the wrong.  But what’s wrong with publishing a picture of the Duchess of Cambridge shopping? It would not necessarily have been actionable as a misuse of private information. Inoffensive pictures taken in public places are low-level intrusions and do not necessarily merit legal protection. If the Duchess had been pestered or followed, she might have had a case of harassment. But in the absence of harassment, and accepting the danger of commenting on a case without full knowledge of the facts, her case may suggest that the PCC now expects more of publishers than do the courts.</span></p>]]></content:encoded></item><item><guid isPermaLink="false">{DA1C0CD3-6A36-40E2-BC3C-FEC316D2F4D5}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/when-can-you-sue-under-a-disguised-name/</link><title>When can you sue under a disguised name?</title><description><![CDATA[In what circumstances can a claimant in civil litigation commence proceedings under a pseudonym? ]]></description><pubDate>Thu, 03 May 2012 10:18:00 +0100</pubDate><category>Data and privacy</category><authors:names>Keith Mathieson</authors:names><content:encoded><![CDATA[<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>We are familiar with alphabetised claimants in injunction cases who seek anonymity on grounds that the purpose of their proceedings would otherwise be defeated:  if the cheating footballer/actor/TV presenter has to put his name on the claim form, we'll know what he's been up to, so there's no longer any point in suing to keep it private.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>But what about cases that do not involve injunctions?  Claimants seek anonymity for all kinds of reasons, most usually to protect their article 8 rights in cases such as family and clinical negligence proceedings, where medical or other personal information is in issue.  Even if a claimant is not seeking an injunction to prevent people knowing about, or reporting, the proceedings, he can apply before the proceedings are commenced for permission to dispense with the requirement to state his name imposed by CPR 16PD 2.6.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>What principles and procedures apply to cases where claimants apply to disguise their identities before issuing proceedings?  The judgment of Tugendhat J in <em><span style="color: #c35855;"><a href="http://www.bailii.org/cgi-bin/markup.cgi?doc=/ew/cases/EWHC/QB/2012/1148.html" target="_blank"><span style="color: #c35855; text-decoration: underline;">CVB v MGN Ltd</span></a></span></em> handed down today provides some answers.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><em><span>The case of CVB</span></em></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The claimant in <em>CVB </em>is a widow with children whose husband died some years ago in a well-known incident.  A number of other people also died.  She attended a service to commemorate those who died.  A photograph of her taken at the event was published in the Daily Mirror.  When her solicitors complained that her privacy had been infringed as the picture allegedly showed her in a distressed state, the newspaper agreed not to publish the picture again but it did not admit liability and did not agree to her other requirements.  She therefore issued proceedings, having first obtained permission to do so under the initials CVB.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Although CVB's solicitors were already in contact with MGN's legal department, MGN was not served with notice of the application, which was made to the Master without notice.  When MGN was later served with the evidence that was put before the Master, it considered it was insufficient to support the grant of the anonymity order.  It therefore applied for the order to be varied or discharged.  The application was heard last month by Tugendhat J.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>There was evidence before the judge that it was common practice for pre-action anonymity orders to be sought and obtained without notice by means of a short application to the Master.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><em><span>The issue of principle</span></em></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>It was not in dispute that (a) an order permitting a party to issue proceedings anonymously is a derogation from the principle of open justice which might affect the right to freedom of expression and (b) derogations from open justice should be ordered only where necessary.  The issue of principle was whether the practice of getting permission to issue proceedings anonymously without giving notice to the defendant or third parties was compatible with s 12(2) of the Human Rights Act 1998 and the guidance of the Master of the Rolls in <em><span style="color: #c35855;"><a href="http://www.bailii.org/ew/cases/EWCA/Civ/2011/42.html" target="_blank"><span style="color: #c35855; text-decoration: underline;">JIH v News Group Newspapers</span></a></span> </em>(which involved an injunction to prevent publication of private information).</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>A number of in house newspaper lawyers wrote to the court before the hearing to point out that they would expect to receive notice of applications for anonymity orders in cases against them and as experienced lawyers in the field they could be trusted to distinguish between information provided for editorial purposes and information provided for legal reasons.  They also pointed out that anonymity orders affect the wider public by denying to them information to which they would otherwise have access.  Tugendhat J said that the letters from the in house lawyers were of great assistance to the court.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>MGN argued that since s 12(2) required notice to be given to a person against whom any relief is to be granted which might affect the right to freedom of expression, that section applied to this case.  It also argued that the well-known principles in <em>JIH</em> should apply - applications for anonymity to be carefully scrutinised etc.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>CVB argued that the order made by the Master was not an injunction but was a permissive order.  It was not made "against" MGN or anyone else in the sense that word is used in s 12(2).  On her behalf it was argued that the course of action proposed by MGN was disproportionate and impractical. </span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Tugendhat J decided that a pre-action anonymity order made pursuant to CPR Part 16 is not an injunction or an interim remedy, being permissive only.  It is therefore not an order made "against" a party and no notice of an application for such an order is therefore required.  Paragraphs (1) to (9) of the guidance in <em>JIH</em> could, however, be readily applied to what he termed r.16 orders.  He observed that he had reached that conclusion "without regret": to have decided otherwise would have been to impose too heavy a burden on claimants of modest means and would in his opinion confer little benefit on news publishers.  He noted that any person affected by a r.16 order could apply for it to be discharged at any time.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><em><span>Whether the anonymity order in CVB's case should continue</span></em></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>On the facts of CVB's case, Tugendhat J decided that the proceedings should remain anonymised so far as the claimant is concerned.  He considered a witness statement from CVB (the application had previously been supported only by a witness statement from her solicitor).  CVB's evidence was that her family had suffered a tragedy that continued to be subject of press coverage from time to time; she had as a result been treated differently by (well-intentioned) friends and acquaintances; she and her family found questions about the event upsetting; she had moved home to start her life again among people who did not know she was a victim; and she was now employed in an activity which, if people knew about the tragedy she had suffered, would in her belief make her job more difficult.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>MGN made it clear that it was not unsympathetic to the claimant or her situation.  It nonetheless considered the evidence before the court insufficient to demonstrate the necessity required to derogate from the principles of open justice.  It later served a defence in which it contended that the photographs were taken at a public event.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Tugendhat J noted that CVB was not suing in respect of the information that she was a widow.  She was suing in respect of photographs of herself.  He therefore accepted that this was not a case in which disclosure of the information sought to be protected would defeat the very purpose of the proceedings.  In his judgment the claimant had nonetheless demonstrated a real interest in her children and herself keeping knowledge of their involvement in the tragedy private.  There was no sufficient general public interest in publishing a report of proceedings which identified the claimant and her children such as to justify the curtailment of their right to respect for their private and family life which he considered likely to arise if CVB were to be identified.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The judge did, however, vary the Master's order.  The order had provided that "There be substituted for all purposes in these proceedings in the place of references to the Applicant by name and whether orally or in writing, references to the letters CVB".  The judge noted that such a provision appeared to be wider than envisaged by CPR 5.4C and 16 and varied the order accordingly.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The judge also suggested that the procedure for applying for dispensation from the requirements of CPR PD16 and for orders under CPR 5.4C might be set out in the CPR or a Practice Direction.  He has drawn his judgment to the attention of those responsible for considering such matters.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><em><span>Comment</span></em></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>There may be many cases where claimants have good reason to seek anonymity and should not be obliged before doing so to notify the proposed defendant or third parties.  The judge was therefore right to observe at [26] that the facts specific to any particular claim are of limited assistance in formulating the principles which should govern an application for a r.16 order.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>It may nonetheless seem a surprising result that on the facts of this case, it should have been adjudged that the claimant was not even required to notify the defendant that she was seeking to issue the proceedings under a disguised name.  The claimant's solicitors were, after all, already in communication with the legal department of the defendant newspaper and it might have been reasonably anticipated that the newspaper might have had something to say about a claim for anonymity in a case where, as the judge found, identification of the claimant would not have undermined the confidentiality of the information sought to be protected.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The judge noted that the r.16 order was not an injunction.  It was a "permissive" order.  The judge did not go so far as to endorse the submission by the claimant's counsel that "the order does not prohibit the publication of anything" but he did say the following:</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>"The practical effect of a r.16 order is that the defendant, or anyone else who happens to know the identity of the claimant, if they do disclose to the public the identity of the party who is referred to in the title to the action, is unlikely by that fact alone to be committing a contempt of court or interfering with the administration of justice. But if the disclosure of that identity does amount to an interference with the administration of justice, or if it amounts to a tort such as defamation or misuse of private information, the person making the disclosure will not be able to rely by way of defence on the fact that the identity of the claimant is available as a matter of public record, as he otherwise would be."</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The judge suggests, in other words, that the effect of a r.16 order is different from that of an injunction.  But is that really the case in practice?  The effect of a r.16 order, even if not technically made "against" MGN, will inevitably inhibit MGN (or any party in a similar position) from revealing the claimant's identity.  It would certainly be a confident step to name someone such as CVB once a court has already decided, rightly or wrongly, that she should be permitted to sue under a protective name.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>CVB's anonymity is of course a matter that will be kept under review, as Tugendhat J makes clear at [66] of his judgment: "all derogations from open justice must be kept under review by the court, and varied or discharged if they cease to be necessary".</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><em><span>RPC acted for MGN in the CVB case.</span></em></p>
<br>]]></content:encoded></item><item><guid isPermaLink="false">{580DB6F0-3BF5-4936-8249-AA88A70C43D3}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/judgment-awaited-in-trimingham-harassment-case/</link><title>Judgment awaited in Trimingham harassment case</title><description><![CDATA[Carina Trimingham's privacy and harassment case against Associated Newspapers was heard by Mr Justice Tugendhat in the High Court last week.  Judgment has been reserved.]]></description><pubDate>Sun, 29 Apr 2012 10:27:00 +0100</pubDate><category>Data and privacy</category><authors:names>Keith Mathieson</authors:names><content:encoded><![CDATA[<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Ms Trimingham is the partner of the former cabinet minister Chris Huhne.  The two began a relationship in 2008 at a time when Mr Huhne was still married to his wife of some 25 years and Ms Trimingham was in a civil partnership with a woman.  Ms Trimingham had previously been married to a man. </span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Ms Trimingham was and is herself involved in politics.  She was Chris Huhne's press officer in the 2007 LibDem leadership campaign and in the 2010 general election campaign; Brian Paddick's press manager in the 2008 campaign for London mayor; campaigns director of the Electoral Reform Society in 2010; and has held various other political posts.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Ms Trimingham's relationship with Mr Huhne has been the subject of extensive media coverage.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Ms Trimingham gave evidence last week that she had been greatly offended by references to her, and in particular to her sexuality and physical appearance, in the Daily Mail and Mail on Sunday.  She alleged that her privacy had been infringed and that the newspaper group's conduct towards her amounted to harassment contrary to the Protection from Harassment Act 1997.  She also alleged that certain photographs infringed her statutory right to privacy in respect of commissioned photographs under s 85 of the Copyright, Designs and Patents Act 1988.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Associated Newspapers contested the case and called a number of witnesses, including two of its best-known columnists and its deputy editor. </span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Contested privacy claims are still uncommon, so Tugendhat J's judgment is awaited with interest for that reason (and also because of the rarity of claims under s 85 of the CDPA).  But the most interesting aspect of the judgment is likely to be the judge's findings on the claim for harassment, which, in the words of Ms Trimingham's counsel, became "the principal focus of the evidence at trial".</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Ms Trimingham's case is the first case to reach trial at which allegations of harassment by a newspaper have been pursued.  Her claim covers not just publication of material by the newspapers' reporters and commentators, but also readers' comments published online.  The judgment therefore concerns the boundaries of journalistic freedom and has potentially significant implications beyond the comparatively narrow interests of the parties in question.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>RPC is representing Associatd Newspapers in the Trimingham case.</span></p>]]></content:encoded></item><item><guid isPermaLink="false">{1605A3D2-7847-4B07-AD80-9ED5ADA9B454}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/parliamentary-committee-reports-on-privacy/</link><title>Parliamentary committee reports on privacy</title><description><![CDATA[The Joint Committee on Privacy and Injunctions has reported. ]]></description><pubDate>Mon, 09 Apr 2012 10:31:00 +0100</pubDate><category>Data and privacy</category><authors:names>Keith Mathieson</authors:names><content:encoded><![CDATA[<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span style="color: #c35855;"><a href="http://www.publications.parliament.uk/pa/jt201012/jtselect/jtprivinj/273/27302.htm" target="_blank"><span style="color: #c35855; text-decoration: underline;">Click here for a link to the full report</span></a></span><span>.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The most important recommendations of the committee, which was set up last year and has taken evidence from a wide variety of sources, are (a) that there should be no new privacy statute and (b) there should be a new regulatory regime for the press, but not one backed by statutory powers.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>In relation to (a), the committee says the balance between articles 8 and 10 is best achieved by the courts on a case-by-case basis.  In relation to (b), it recommends a system that is independent of both the media industry and government.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Other points from the report:</span></p>
<ul style="margin-top: 0cm; list-style-type: disc;">
    <ul style="margin-top: 0cm; list-style-type: circle;">
        <li style="margin: 0cm 0cm 10pt; text-align: justify; color: #000000;"><span>privacy injunctions should not be too freely available: departures from the principle of open justice should be exceptional.</span></li>
    </ul>
</ul>
<ul style="margin-top: 0cm; list-style-type: disc;">
    <ul style="margin-top: 0cm; list-style-type: circle;">
        <li style="margin: 0cm 0cm 10pt; text-align: justify; color: #000000;"><span>injunctions obtained in any UK legal jurisdiction should be enforceable in the other two.</span></li>
    </ul>
</ul>
<ul style="margin-top: 0cm; list-style-type: disc;">
    <ul style="margin-top: 0cm; list-style-type: circle;">
        <li style="margin: 0cm 0cm 10pt; text-align: justify; color: #000000;"><span>courts should direct claimants to serve notice of injunctions on social networking platforms and companies such as Google should take "practical steps" to limit the potential for breaches of court orders to arise through use of their services.</span></li>
    </ul>
</ul>
<ul style="margin-top: 0cm; list-style-type: disc;">
    <ul style="margin-top: 0cm; list-style-type: circle;">
        <li style="margin: 0cm 0cm 10pt; text-align: justify; color: #000000;"><span>there should be no statutory requirement for pre-notification, but it should be a regulatory requirement save where there are compelling reasons not to pre-notify.  An inexcusable failure to pre-notify should entitle a privacy claimant to extra damages.</span></li>
    </ul>
</ul>
<ul style="margin-top: 0cm; list-style-type: disc;">
    <ul style="margin-top: 0cm; list-style-type: circle;">
        <li style="margin: 0cm 0cm 10pt; text-align: justify; color: #000000;"><span>legal costs in privacy cases should be better controlled by the courts</span></li>
    </ul>
</ul>
<ul style="margin-top: 0cm; list-style-type: disc;">
    <ul style="margin-top: 0cm; list-style-type: circle;">
        <li style="margin: 0cm 0cm 10pt; text-align: justify; color: #000000;"><span>Parliamentarians should not reveal information covered by injunctions "unless there is good reason to do so".</span></li>
    </ul>
</ul>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>A fuller summary of the report appears on the Inforrm blog <span style="color: #c35855;"><a href="http://inforrm.wordpress.com/2012/03/27/news-joint-committee-on-privacy-and-injunctions-reports-steady-as-she-goes-on-privacy-last-chance-for-non-statutory-media-regulation/" target="_blank"><span style="color: #c35855; text-decoration: underline;">here</span></a></span>.</span></p>]]></content:encoded></item><item><guid isPermaLink="false">{0D2F36A3-2368-4E93-83D0-648FBD20D6A2}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/access-to-documents-in-criminal-proceedings-guardian-challenge-secures-change/</link><title>Access to Documents in Criminal Proceedings – Guardian Challenge Secures Change</title><description><![CDATA[The Court of Appeal has ruled that where documents have been placed before a judge and referred to in the course of open proceedings, the default position should be that access should be permitted on the open justice principle.<br/>]]></description><pubDate>Tue, 03 Apr 2012 10:43:00 +0100</pubDate><category>Data and privacy</category><authors:names>Keith Mathieson</authors:names><content:encoded><![CDATA[<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Where access is sought for a proper journalistic purpose the case for allowing it will be particularly strong.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>According to Lord Justice Toulson, the decision "<em>breaks</em> <em>new ground in the application of the principle of open justice". </em></span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The Court recognised that there may be persuasive countervailing arguments against providing access to some documents.  For this reason the Court did not think it sensible or practical to look for a standard formula for determining how strong the grounds of opposition need to be in order to outweigh the merits of the application.  In each case a fact-specific proportionality exercise will have to be conducted. </span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Central to the evaluation will be the purpose of the open justice principle, the potential value of the material in advancing that purpose and conversely any risk of harm which access to the documents may have to the legitimate interest of others, for example vulnerable children, where there seems no obvious public-interest reason in publicity.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The decision, handed down this morning, concerned an application by Guardian News and Media Limited for access to documents referred to in extradition proceedings brought by the Government of the United States.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The question to be determined by the Court of Appeal was whether the District Judge, who made two extradition orders on the application of the US Government in early 2010, had power to allow the Guardian access to documents which were supplied to the judge, referred to during the course of the hearings but not read out in open court. The documents include affidavits or witness statements, written arguments, and correspondence between the Department of Justice and the Serious Fraud Office. The application was initially made by the Guardian in the course of the extradition hearings. The District Judge refused the application on the grounds that she had no power to allow it and her decision was upheld on appeal by the Administrative Court.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>In an unanimous decision the Court of Appeal ruled that public access to documents referred to in open court is necessary in some cases in order to satisfy the constitutional principle of open justice.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>According to the decision the principle of open justice is not necessarily satisfied by the holding of proceedings in public. It is wider. It is to enable the public to understand and to scrutinise the justice system of which the courts are its administrators.  The fact that the issues were ventilated fully in open court does not preclude access to the documents.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>On the merits of the Guardian's application the Court of Appeal found that the Guardian had a serious journalistic purpose in seeking access to documents. Its evidence was that it wants to be able to refer to the documents for the purpose of stimulating informed debate about the way in which the justice system deals with suspected international corruption and the system of extradition of British subjects to the USA. As a matter of public interest the courts should assist and not impede such an exercise. The public should be informed and is more likely to be engaged by an article which focuses on the facts of a particular case than by a more general discussion.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The evidence before the Court was that the Guardian was hampered in its ability to report as fully as it would have wished. That being the case Lord Justice Toulson considered that courts should be cautious about making an editorial judgment about the adequacy of material already available to a paper for its journalistic purpose.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The decision is based on the common law principle of open justice, and not on Article 10 jurisprudence. As the application was decided as a matter of constitutional principle this important development will not be constrained by the limitations of Article 10. In any event Lord Justice Toulson was of the view that it was not entirely clear that the application, on its facts, would have benefitted from developments in Article 10 jurisprudence on access to information.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The Court of Appeal was persuaded by the decisions of other common law countries where the principle of access to documents referred to in legal proceedings has been established previously.  In a helpful intervention from Article 19 the Court was referred to developments in Canada, New Zealand, South Africa and the United States. In the United States the Federal Courts have recognised a presumption favouring access to "judicial documents" at common law.  Had this matter been before a US court that presumption would have applied in favour of disclosure of the documentary evidence admitted at the extradition hearing.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The application by the Guardian pre-dates the 2011 amendment to the Criminal Procedure Rules. These Rules introduced at Rule 5.8 a procedure for the supply of information about a case to the public.  As such the 2011 Rules were not directly relevant to the application and were not argued before the Court. However the two concurring judges, Lord Justice Hooper and The Master of the Rolls, took the opportunity to clarify the scope of Rule 5.8 of the 2011 Criminal Procedure Rules which is headed <em>"Supply to the Public including reporters of information about a case".</em> </span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Lord Justice Hooper concluded that rules as now drafted give the court the necessary power to make an order of the kind ought by the Guardian (this question was left open by the Master of the Rolls). Both Lord Justice Hooper and the Master of the Rolls agreed that the words "<em>a document … containing information about the case</em>" in Rule 5.8(7)(b) should not be interpreted narrowly. It includes written statements made by witnesses and any exhibits.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>A copy of the decision is accessible here: <em><span style="color: #c35855;"><a href="http://http/www.bailii.org/ew/cases/EWCA/Civ/2012/420.html"><span style="color: #c35855; text-decoration: underline;">The Queen on the Application of Guardian News and Media Limited v City of Westminster Magistrates' Court and the Government of the United States of America</span></a></span></em></span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Brid Jordan of RPC acted for Guardian News and Media Limited.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><em><span>(Originally blogged by Bríd Jordan)</span></em></p>]]></content:encoded></item><item><guid isPermaLink="false">{121F559A-49CA-4C9A-94AD-F6322293859C}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/moj-publishes-first-statistics-on-privacy-injunctions/</link><title>MoJ publishes first statistics on privacy injunctions</title><description><![CDATA[Yesterday the Ministry of Justice published the first set of statistics on privacy injunctions, following the recommendations in the report by Lord Neuberger's Committee on Super Injunctions published in May last year. ]]></description><pubDate>Fri, 16 Mar 2012 10:49:00 Z</pubDate><category>Data and privacy</category><authors:names></authors:names><content:encoded><![CDATA[<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The injunctions included within these statistics were those dealt with in any civil proceedings between August and December 2011 in the RCJ where the court considered:</span></p>
<ul style="margin-top: 0cm; list-style-type: disc;">
    <ul style="margin-top: 0cm; list-style-type: circle;">
        <li style="margin: 0cm 0cm 10pt; text-align: justify; color: #000000;"><span>an application for a privacy injunction (i.e. an order prohibiting the publication of private or confidential information);</span></li>
    </ul>
</ul>
<ul style="margin-top: 0cm; list-style-type: disc;">
    <ul style="margin-top: 0cm; list-style-type: circle;">
        <li style="margin: 0cm 0cm 10pt; text-align: justify; color: #000000;"><span>the continuation of such an injunction; or</span></li>
    </ul>
</ul>
<ul style="margin-top: 0cm; list-style-type: disc;">
    <ul style="margin-top: 0cm; list-style-type: circle;">
        <li style="margin: 0cm 0cm 10pt; text-align: justify; color: #000000;"><span>an appeal against the grant or refusal of such an injunction.</span></li>
    </ul>
</ul>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Hearing judges were responsible for determining whether the cases they heard met any of these criteria and, if so, they were responsible for forwarding the case details on to the MoJ's statistics team.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The statistics show that between August and December 2011:</span></p>
<ul style="margin-top: 0cm; list-style-type: disc;">
    <ul style="margin-top: 0cm; list-style-type: circle;">
        <li style="margin: 0cm 0cm 10pt; text-align: justify; color: #000000;"><span>The High Court in London received four applications for new interim privacy injunctions, all of which were granted. Of these, only one had a 'super-injunction' clause (i.e. preventing the reporting of the fact that proceedings had taken place or that an injunction was in existence) and this provision was discharged shortly after having been made.</span></li>
    </ul>
</ul>
<ul style="margin-top: 0cm; list-style-type: disc;">
    <ul style="margin-top: 0cm; list-style-type: circle;">
        <li style="margin: 0cm 0cm 10pt; text-align: justify; color: #000000;"><span>There were three cases where the High Court considered whether to continue or vary an existing interim privacy injunction (i.e. one that was initially granted prior to August 2011). Again, all of these were granted.</span></li>
    </ul>
</ul>
<ul style="margin-top: 0cm; list-style-type: disc;">
    <ul style="margin-top: 0cm; list-style-type: circle;">
        <li style="margin: 0cm 0cm 10pt; text-align: justify; color: #000000;"><span>There were two cases where the court considered an application for a final privacy injunction, both of which were granted.</span></li>
    </ul>
</ul>
<ul style="margin-top: 0cm; list-style-type: disc;">
    <ul style="margin-top: 0cm; list-style-type: circle;">
        <li style="margin: 0cm 0cm 10pt; text-align: justify; color: #000000;"><span>There was one appeal against a grant or refusal of an interim or final injunction heard at the Court of Appeal, which resulted in the injunction being discharged.</span></li>
    </ul>
</ul>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>This is the first time figures have been provided on the number of privacy injunctions, so it is hard to draw hard and fast conclusions about what they mean. However, it would seem that, whilst it may have been the case that privacy injunctions were previously being granted too readily, the sea change marked by the John Terry case in 2010 (<em>Terry v Persons Unknown </em>[2010] 1 FCR 659) and those that followed has led to a decline which these figures indicate is continuing.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The next round of statistics, for the period for January to June 2012, will be published at the end of September.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span style="color: #c35855;"><a href="http://www.justice.gov.uk/downloads/statistics/civiljustice/privacy-injunctions-bulletin-aug-dec-2011.pdf"><span style="color: #c35855; text-decoration: underline;">Statistics</span></a></span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span style="color: #c35855;"><a href="http://www.judiciary.gov.uk/Resources/JCO/Documents/Reports/super-injunction-report-20052011.pdf"><span style="color: #c35855; text-decoration: underline;">Recommendations</span></a></span></p>]]></content:encoded></item><item><guid isPermaLink="false">{AFBF9FF7-1B1C-4026-9D3B-C28021DD9D5F}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/giggs-claim-for-privacy-damages-is-struck-out/</link><title>Giggs' claim for privacy damages is struck out</title><description><![CDATA[Ryan Giggs has lost his claim for damages against News Group Newspapers ("NGN").]]></description><pubDate>Thu, 08 Mar 2012 10:58:00 Z</pubDate><category>Data and privacy</category><authors:names>Keith Mathieson</authors:names><content:encoded><![CDATA[<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>In a <span style="color: #c35855;"><a href="http://www.bailii.org/ew/cases/EWHC/QB/2012/431.html"><span style="color: #c35855; text-decoration: underline;">judgment</span></a> </span>published last week Mr Justice Tugendhat refused to reinstate the footballer's claim for damages against NGN on the grounds that Giggs had been party to two serious breaches, one of the rules of court, the other of an Order of Mr Justice Eady of 20 April 2011.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The proceedings famously concerned an article published on 14 April 2011 by The Sun under the headline "Footie Star's Affair with Big Bro Imogen".  On the day after publication of the article, which did not name him, Giggs applied and obtained an order against NGN, publisher of The Sun, and Imogen Thomas.  As is now very well known, the Order anonymised Giggs, who was referred to as CTB, and prohibited the publication of further details of his purported relationship with Thomas.  Giggs then issued proceedings against Thomas and NGN for a permanent injunction and damages for breach of confidence and misuse of private information.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>There followed tangled legal proceedings between Giggs, NGN and Thomas. As readers of this blog will know, it was not long before everyone knew CTB's identity.  Questions were raised in parliament about super-injunctions and anonymity orders; Giggs was controversially named by John Hemming MP in the House of Commons as the footballer in question (ending weeks of online speculation); an allegation of blackmail by Thomas was made and withdrawn; and repeated efforts by NGN to lift the anonymity order failed.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The claim against NGN came back before the courts for the final time on 21 February 2012 (Giggs' claim against Thomas for an injunction, damages and aggravated damages settled by agreement).</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The circumstances are unusual as Mr Justice Tugendhat was concerned not with the trial of the claim but with an application for relief from sanction under CPR Part 3.9, Giggs' claim having been automatically struck out in November 2011 for failure to comply with a Court Direction. The evidence in support of the application explained that his lawyers had mistakenly failed to make an appointment with the Clerk of the Lists to fix a trial date. It was submitted that Giggs always wanted to continue the proceedings and should not be penalised for the delay by his solicitor.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The procedural background in brief is this. The original trial date was vacated on 2 November, following an application by Mr Giggs on 1 November. At the time of the application no defence had been served by NGN. This was further to an agreement between the parties agreeing a general stay of service of the Defence. The agreement was reached in May 2011 but neither party had notified the court.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The general stay and the failure to notify the Court of the stay were found by Mr Justice Tugendhat to be a breach by both parties of CPR Part 15.5. The trial was vacated and directions were given which included an order that Giggs' case be struck out in the event he failed to comply with any of the directions and an order that Giggs have liberty to apply to enter judgment against NGN in the event it failed to comply with the directions.  </span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>NGN served its defence on 30 November. On 4 January NGN discovered that Giggs had failed to make a listing appointment as required and that as a consequence the claim had been struck out. NGN notified Giggs and Giggs applied for relief from sanction.  </span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>There was a further development in February. Giggs settled his claim with Thomas and on 1 February the matter came before the court for approval. Mr Justice Eady declined to approve the draft settlement agreement in the terms proposed by Giggs as it provided that Giggs would continue to enjoy anonymity.  Mr Justice Eady ordered that Giggs' name appear in the title of the action. This was not however brought to the attention of NGN, or any other party.  NGN argued that this was a breach of an earlier undertaking by Giggs to the Court recorded in the order of Mr Justice Eady on 20 April 2011.  </span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Mr Justice Tugendhat declined to grant the relief sought on the grounds that Giggs had been party to two serious and intentional breaches, one of the rules of court, the other of the order of 20 April 2011.  The claim therefore remains struck out.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Mr Justice Tugendhat was satisfied that there would be no material interference with either party's rights in the event he ruled against them. Giggs could start a new action against NGN if relief was not granted. He was also satisfied that granting relief would not be a serious interference with NGN's Article 10 rights given its position in the proceedings that it did not have the means or the intention of publishing more information about the Giggs/Thomas relationship.  </span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>But non-disclosure orders affect the Article 10 rights of others who may wish to publish or receive information.  Referring to section 6 of the Human Rights Act and the practice guidance on Interim Non-Disclosure Orders (<span style="color: #c35855;"><a href="http://blog.rpc.co.uk/privacy-law/strasbourg-rulings-on-two-personal-privacy-claims"><span style="color: #c35855; text-decoration: underline;">reviewed here</span></a></span>), Mr Justice Tugendhat stressed the obligation on the Court and on parties to actively manage claims where there is such an order in place.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Mr Justice Tugendhat was very critical of both parties for failing to actively manage the litigation and in particular the agreement to extend generally the time for service of the Defence and as a consequence extending the anonymity order.  This was in his words an "intentional" and a "serious breach of the rules of court".  It meant that a trial date could not be met. The application to vacate the trial date disregarded the rights of a substantial section of the public.  At the time the application was made the parties had wanted the matter dealt with on paper (in private) and no explanation was given as to why the ongoing interference with Article 10 was necessary and proportionate and no timetable was proposed by the parties for the future conduct of the trial.  </span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>NGN was criticised for "secretly" agreeing to defer service of its defence at a time when it was prominent amongst those complaining about the injunction, as well as the Goodwin injunction.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Giggs was criticised for failing to comply with his earlier undertaking. As of 1 February Mr Justice Tugendhat was satisfied that the anonymity order "no longer persisted".  Giggs should have informed NGN and others that the order ceased to have effect but he failed to do so. </span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Mr Justice Tugendhat took the opportunity to make "further observations on the case".  In his view the way that the case was conducted by the parties undermined the public's confidence in the administration of justice.  The failure of claimants and defendants generally, for whatever strategic or commercial reasons, to pursue claims of this nature expeditiously to trial is not acceptable.  Only where a court is satisfied that it is necessary and proportionate should an extension of time for any procedural step be granted in cases involving non-disclosure orders.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>He explains in his decision that section 12 of the HRA and other rules on injunctions assume that there will be a trial and the time between the hearing of the injunction and the expected trial date is relevant to the court's consideration of the application. It was for that reason a trial timetable was laid down by Mr Justice Eady in April 2011. The agreement of the parties to depart from that timetable was serious not only because it breached CPR Part 15.5. It was "an abuse of the process of the court to interfere with the Article 10 rights of third parties" and it had not been approved by any judge. </span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>For similar reasons Particulars of Claim should normally be served within 14 days in cases where there is a non-disclosure order. If an extension is sought for the service of a statement of case, or any other step in the action, applicants should explain why it is necessary and proportionate given the ongoing interference with the Article 10 rights of third parties.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><em><span>(Originally blogged by Bríd Jordan)</span></em></p>]]></content:encoded></item><item><guid isPermaLink="false">{A1EF67F0-C04A-49D2-BBE0-FD13355EDA92}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/ico-fines-midlothian-council-140000-icos-highest-ever-fine-for-data-breaches/</link><title>ICO fines Midlothian Council £140,000 - ICO's highest ever fine for data breaches</title><description><![CDATA[The Information Commissioner's Office (the "ICO") has fined Midlothian Council £140,000 for five separate security breaches, which involved accidental disclosure of confidential and sensitive personal data about children and carers to the wrong recipients. ]]></description><pubDate>Thu, 01 Mar 2012 11:08:00 Z</pubDate><category>Data and privacy</category><authors:names></authors:names><content:encoded><![CDATA[<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The breaches, which took place between March and June last year, all involved sensitive information relating to the Council's Children and Families Service (the "C&F Service") being inadvertently sent out to unintended third parties. In each case the ICO determined that the contravention was of a kind likely to cause substantial distress. In one of the breaches the matter was aggravated by the fact that the information concerned (which was minutes of a child protection conference) may have been further disclosed to individuals who live in the same locality as the relevant mother and child involved.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The ICO said that staff at the C&F Service dealt with confidential and sensitive personal data on a daily basis but did not have any role-specific guidance or working procedures that promoted good practice in data handling. The ICO found that training in the C&F Service was inadequate and staff were largely unaware of their responsibilities under the Data Protection Act (the "Act").</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The Council has now taken remedial action which includes recovering the information from the unintended recipients, providing all staff in the C&F Service with relevant training sessions, putting into place procedures intended to avoid similar mistakes occurring in the future and to ensure that the relevant databases contain accurate and up-to-date information at all times.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The £140,000 fine was not only the highest fine imposed by the ICO to date, but was also the first levied against a Scottish organisation. The fine will be reduced to £112,000 if it is paid by 23 February 2012, which is also the date the Council has until to appeal the fine.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>A spokesperson for the Council said: "<em>The Council immediately took steps to retrieve the information, or have it destroyed, and voluntarily reported ourselves to the Information Commissioner. I must emphasise that there is no evidence that anyone was put at risk</em>". It seems unlikely the Council will appeal given it has accepted that there were mistakes caused by human error. However any appeal could be based on the size of the fine, as opposed to the fact it was imposed.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Under the Act the ICO has the power to issue fines of up to £500,000 for serious breaches of personal data. It is clear the ICO wanted to send out a strong warning to "data controllers" (as defined under the Act) in order to remind organisations of their obligations and avoid similar mistakes. It seems that the ICO has approximately 20 similar Civil Monetary Penalty cases in the pipeline, with at least six organisations having been issued with a Notice of Intent (total value £875,000) and a further three awaiting signature (total value £300,000). Meanwhile, Brighton and Sussex University Hospitals NHS Trust may yet trump Midlothian Council in the highest fine stakes if it is unsuccessful in its challenge of the ICO's proposed £375,000 fine relating to stolen computer hard drives, containing sensitive patient data, sold on Ebay.</span></p>]]></content:encoded></item><item><guid isPermaLink="false">{6A155DE8-69A2-4033-BF9A-CEE42146A2C8}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/chief-executive-of-ann-summers-gets-privacy-injunction/</link><title>Chief Executive of Ann Summers gets privacy injunction</title><description><![CDATA[Mr Justice Tugendhat has today handed down a short judgment explaining why he made an interlocutory order to prevent the publication of private and confidential information about Jacqueline Gold, the high-profile Chief Executive of Ann Summers.<br/>]]></description><pubDate>Fri, 17 Feb 2012 12:23:00 Z</pubDate><category>Data and privacy</category><authors:names></authors:names><content:encoded><![CDATA[<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The first defendant in the application was Allison Cox, Gold's former nanny who was convicted in March 2011 of attempting to poison her (she was released from prison in June 2011). The second defendant was Leanne Bingham, a friend of Ms Cox who had also worked for Ms Gold and Ann Summers. The application was made following Ms Gold's discovery that Ms Bingham was seeking to publish a book "based on her time working for Ann Summers and the events surrounding the very public court case" which resulted in Ms Cox's conviction.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Ms Cox consented to the order and told the court that the book being prepared by Ms Bingham had nothing to do with her. Ms Bingham however refused to give her consent to the order on the basis that "she feels entitled to express her views and observations over the events of the last two years".</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>While Ms Bingham had not signed a written confidentiality agreement with either Ms Gold or Ann Summers during her employment, the judge decided that "there is a strongly arguable case that she is mistaken in her view that she is not legally bound by any confidentiality agreement... an obligation of confidentiality may exist independently of an express or implied agreement". The judge concluded that, on the basis of what Ms Bingham had stated in a letter to the Court, "there is a real risk that she will breach a duty of confidentiality owed to the claimants unless restrained by an order of the court".</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The order has been granted on an interlocutory basis at this stage as Ms Bingham is currently in Thailand and requested an adjournment until her return. A further hearing is expected on 22 February.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>One notable point from the case is the steps taken by the Judge to ensure proceedings were as open as possible: "The proceedings before me were heard in public. I made only the most limited derogation from open justice in the form of provisions protecting those parts of the evidence which relate specifically to the private information of the first claimant." In other words, he made sure he followed his own guidelines in JIH.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Full text of the judgment is available <span style="color: #c35855;"><a href="http://www.bailii.org/ew/cases/EWHC/QB/2012/272.html"><span style="color: #c35855; text-decoration: underline;">here</span></a></span>.</span></p>]]></content:encoded></item><item><guid isPermaLink="false">{81C6ADB9-FE8B-4B7D-AE3E-427491A54E17}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/cabinet-ministers-17-year-old-son-gets-privacy-injunction-but-not-anonymity/</link><title>Cabinet minister's 17-year-old son gets privacy injunction but not anonymity</title><description><![CDATA[The son of Caroline Spelman, the Environment Secretary, has obtained an injunction against the publishers of the Daily Star Sunday.]]></description><pubDate>Wed, 15 Feb 2012 12:43:00 Z</pubDate><category>Data and privacy</category><authors:names>Keith Mathieson</authors:names><content:encoded><![CDATA[<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The judgment is reported <span style="color: #c35855;"><a href="http://www.bailii.org/ew/cases/EWHC/QB/2012/239.html" target="_blank"><span style="color: #c35855; text-decoration: underline;">here</span></a></span>.  The injunction was granted to restrain publication of a story which it is alleged would have breached his right to privacy.  The application was made last Saturday 11 February to Mr Justice Lindblom.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The judgment does not of course contain any details of the allegedly private information.  The judge was satisfied Jonathan Spelman had a reasonable expectation of privacy and he rejected the newspaper's submission that this was a libel claim masquerading as a privacy claim such that injunctive relief would be inappropriate.  It is difficult to make much of the judge's analysis of the public interest considerations since the judgment is understandably opaque, but he expressed himself satisfied that "the defendant's publication of its story at this stage would not of itself advance the public interest claimed for it to a material degree".</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Mr Spelman, through his parents as litigation friends, sought an order that his identity should be kept secret.  That application was rejected by reference to the <span style="color: #c35855;"><a href="http://www.judiciary.gov.uk/Resources/JCO/Documents/Guidance/practice-guidance-civil-non-disclosure-orders-july2011.pdf" target="_blank"><span style="color: #c35855; text-decoration: underline;">Master of the Rolls Practice Guidance: Interim Non-Disclosure Orders</span></a></span>.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The matter is scheduled to return to court tomorrow, 16 February.  The Daily Star's report of the "gagging order" is <span style="color: #c35855;"><a href="http://www.dailystar.co.uk/news/view/234953/We-are-gagged-by-Cabinet-MP/" target="_blank"><span style="color: #c35855; text-decoration: underline;">here</span></a></span>.</span></p>]]></content:encoded></item><item><guid isPermaLink="false">{FC5F346D-133C-49FE-8353-ED75DC326528}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/strasbourg-rulings-on-two-personal-privacy-claims/</link><title>Strasbourg Rulings on Two Personal Privacy Claims</title><description><![CDATA[The Grand Chamber of the European Court of Human Rights yesterday handed down its much anticipated decisions in the important privacy cases Axel Springer and von Hannover.]]></description><pubDate>Wed, 08 Feb 2012 12:48:00 Z</pubDate><category>Data and privacy</category><authors:names>Keith Mathieson</authors:names><content:encoded><![CDATA[<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The decisions are important wins for the media. They confirm that reports of the private lives of public figures will be acceptable where they contribute to a matter of general interest and there is no evidence of other wrongdoing.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The <em>von Hannover</em> decision is the culmination of years of litigation by Princess Caroline of Monaco to prevent publication of photographs of her private life.  The <em>Axel Springer</em> case marks the end of the German publisher's fight against a ban on the publication of photos and articles about the arrest of a well-known German TV personality for allegedly using cocaine. The Grand Chamber was satisfied that the two publications contributed to a debate of general interest.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>In the former case, the German Courts refused Princess Caroline's request for an injunction banning the further publication of a picture of the Princess with her husband on a skiing holiday in St Moritz in 2002. The picture had appeared alongside an article which included information on Prince Rainier's deteriorating health.  The Strasbourg court agreed with the national courts' decisions that the accompanying report contributed to a debate of general interest and that the photographs had not been taken in unfavourable circumstances and were not offensive.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>In <em>Axel Springer</em> the court found that the report of the public arrest of the individual - in a tent at a beer festival - was a matter of public interest and determined that the sanctions imposed on the publisher by the national court, although lenient, were capable of having a chilling effect.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>In both cases the fact the individuals involved were not private individuals but could properly be regarded as "public figures" was important.  In <em>Axel Springer</em> the court found that the TV personality had himself revealed details about his private life in a number of interviews and in the court's view had actively sought the limelight and was well known to the public. As a consequence, his "legitimate expectation that his private life would be effectively protected was henceforth reduced".  In <em>von Hannover </em>the court was satisfied that Princess Caroline and her husband were "undeniably very well known", irrespective of the question of the extent to which the Princess assumes official functions on behalf of the Principality of Monaco.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Another important factor common to both cases was the means or method of obtaining the information that was the subject of the complaint. In <em>Axel Springer</em> the information had been disclosed by the German prosecutor and the photograph was taken in a public place. In <em>von Hannover</em> there was "nothing to indicate that the photos had been taken surreptitiously or by equivalent secret means".</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The cases are recommended reading. They contain an informative review of the law of privacy and a careful analysis of how the balancing exercise between Article 8 and Article 10 should be conducted. A more detailed analysis will follow shortly.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><em><span>(Originally blogged by Bríd Jordan)</span></em></p>]]></content:encoded></item><item><guid isPermaLink="false">{D17A038A-63A2-49B6-BB08-E5A7FE960D4B}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/should-demi-moores-emergency-call-have-been-kept-private/</link><title>Should Demi Moore's emergency call have been kept private?</title><description><![CDATA[When the actress Demi Moore needed emergency medical care at her home in Los Angeles last week, her friend called 911. ]]></description><pubDate>Mon, 30 Jan 2012 12:52:00 Z</pubDate><category>Data and privacy</category><authors:names>Keith Mathieson</authors:names><content:encoded><![CDATA[<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>A partially redacted recording of the call was later released by state officials, prompting media reports around the world.  <span style="color: #c35855;"><a href="http://www.nypost.com/p/news/national/demi_moore_was_shaking_and_having_kYQkHaL8wti8mvnBMOscaN" target="_blank"><span style="color: #c35855; text-decoration: underline;">The New York Post reported</span></a></span> that Demi Moore was having convulsions after smoking something (the "something" had been redacted from the tape of the call released to the public).  The tape was actually reproduced on news websites such as <span style="color: #c35855;"><a href="http://www.cbsnews.com/video/watch/?id=7396625n" target="_blank"><span style="color: #c35855; text-decoration: underline;">CBS News</span></a></span>.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Emergency calls are not generally released to the public in the UK.  In the United States the practice is apparently more common.  <span style="color: #c35855;"><a href="http://www.concurringopinions.com/archives/2010/03/is-disclosing-a-911-call-to-the-public-a-privacy-violation.html" target="_blank"><span style="color: #c35855; text-decoration: underline;">According to Professor Daniel Solove</span></a></span> of George Washington University Law School "... generally, most states consider emergency calls public records available on request, with exceptions sometimes made for privacy reasons or to protect a police investigation".  Solove nonetheless believes that releasing 911 calls to the public violates the constitutional right to information privacy.  He discusses the Demi Moore case <span style="color: #c35855;"><a href="http://www.concurringopinions.com/archives/2012/01/demi-moores-911-call-a-breach-of-medical-confidentiality.html" target="_blank"><span style="color: #c35855; text-decoration: underline;">here</span></a></span>.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The recording of the 911 call in Demi Moore's case revealed (even in its redacted form) information about her medical condition at the time - that was information any UK court would consider private.  The UK approach to the lawfulness of such a disclosure would depend on whether there was a sufficient public interest in the disclosure and/or the extent to which the information was already in the public domain.  As a matter of general observation, it seems unlikely that a UK court would in ordinary circumstances approve the release or publication of medical information disclosed in the course of an emergency call.  In the well-known case of <em><span style="color: #c35855;"><a href="http://portal.nasstar.com/75/files/Peck-v-UK%20ECHR%2028%20Jan%2003.pdf" target="_blank"><span style="color: #c35855; text-decoration: underline;">Peck v United Kingdom</span></a></span></em> the European Court of Human Rights held that a local council had violated Article 8 by releasing CCTV footage of a man moments after he had attempted to kill himself in a public street.  The parallels with 999 calls are obvious.</span></p>]]></content:encoded></item><item><guid isPermaLink="false">{A87490BA-83BF-44A3-A89E-614C1EAFB898}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/damages-for-unauthorised-access-to-medical-records/</link><title>Damages for unauthorised access to medical records</title><description><![CDATA[A judge has awarded £12,500 to a man whose pre-existing personality disorder was exacerbated after his partner accessed his medical records and challenged him about his mental illness.]]></description><pubDate>Sun, 29 Jan 2012 13:07:00 Z</pubDate><category>Data and privacy</category><authors:names>Keith Mathieson</authors:names><content:encoded><![CDATA[<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The woman obtained unauthorised access while employed as a nurse by Plymouth Hospital NHS Trust and it was against that organisation that the action was brought.  It appears that the woman discussed the man's private medical condition in front of his father and children.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The claim was for damages for breach of the Data Protection Act 1998 and was heard in the Plymouth County Court.  Section 13 of the Act permits recovery of compensation for damage or distress caused by a breach of the Act.  In addition to £12,500 damages for injury and distress, the man was awarded damages for loss of earnings - that claim was apparently based on medical evidence that he would at the time have been unable to hold down employment for a sustained period.  It does not appear that the claimant sued for misuse of private information or breach of confidence.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Having regard to the sensitivity of private medical information and in comparison with some of <span style="color: #c35855;"><a href="http://www.guardian.co.uk/media/2012/jan/20/phone-hacking-settlement-statements" target="_blank"><span style="color: #c35855; text-decoration: underline;">the settlements agreed in the phone hacking cases</span></a></span>, the damages might be considered modest.  While many of the phone hacking cases involved sustained invasions of personal privacy, they do not generally seem to have involved unauthorised access to medical records.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The case is not reported, but brief details are in <span style="color: #c35855;"><a href="http://www.unitystreetchambers.com/blog/?p=131" target="_blank"><span style="color: #c35855; text-decoration: underline;">a blog on the claimant's counsel's website</span></a></span> and the case has <span style="color: #c35855;"><a href="http://www.thisisplymouth.co.uk/Man-s-pound-18k-payout-ex-girlfriend-viewed/story-15061425-detail/story.html" target="_blank"><span style="color: #c35855; text-decoration: underline;">also been reported in the local press</span></a></span>.</span></p>]]></content:encoded></item><item><guid isPermaLink="false">{86C55E43-968E-49E7-8731-518A08EF33D7}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/online-privacy-rights-strengthened-by-eu-data-protection-reform/</link><title>Online privacy rights strengthened by EU data protection reform</title><description><![CDATA[The EU has proposed important reforms to data protection laws.  The reforms have two aims: increased online privacy rights and boosting the digital economy by removing or easing some unnecessary administrative burdens.]]></description><pubDate>Sat, 28 Jan 2012 13:14:00 Z</pubDate><category>Data and privacy</category><authors:names>Keith Mathieson</authors:names><content:encoded><![CDATA[<p style="margin: 0cm 0cm 10pt;"><span>The most eye-catching change in privacy rights is the proposed creation of a ‘right to be forgotten’.  To help people manage data protection risks online, they will be able to delete their data if there are no legitimate grounds for retaining it.  People will also have easier access to their own data and will also have a right to data portability - intended to make it easier to transfer personal data from one service provider to another.</span></p>
<p style="margin: 0cm 0cm 10pt;"><span>The proposals emanate from the European Commission.  <span style="color: #c35855;"><a href="http://europa.eu/rapid/pressReleasesAction.do?reference=IP/12/46&format=HTML&aged=0&language=EN&guiLanguage=en" target="_blank"><span style="color: #c35855; text-decoration: underline;">The Commission's press release</span></a></span> explains that the proposals will now be passed to the European Parliament and EU Member States (meeting in the Council of Ministers) for discussion.  The proposals will take effect two years after they have been adopted.</span></p>
<p style="margin: 0cm 0cm 10pt;"><span style="color: #c35855;"><a href="http://www.ico.gov.uk/news/latest_news/2012/statement-initial-response-new-data-protection-regulation-proposals-25012012.aspx" target="_blank"><span style="color: #c35855; text-decoration: underline;">The Information Commissioner has welcomed the proposal</span></a></span><span>, including in particular the Commission's recognition that for the right to object to be meaningful, there needs to be a shift in the requirement from "one where the individual has to demonstrate compelling legitimate grounds for deletion to one where the controller has to demonstrate compelling legitimate grounds for retention".</span></p>
<p style="margin: 0cm 0cm 10pt;"><span>Those wishing to know more may wish to consult the fuller summary of the proposals <span style="color: #c35855;"><a href="http://inforrm.wordpress.com/2012/01/27/european-data-protection-reforms-the-main-innovations-gervase-de-wilde/" target="_blank"><span style="color: #c35855; text-decoration: underline;">on the Inforrm blog</span></a> </span>and on <span style="color: #c35855;"><a href="http://www.out-law.com/en/articles/2012/january-/tougher-requirements-for-obtaining-consent-unveiled-in-data-protection-proposals/" target="_blank"><span style="color: #c35855; text-decoration: underline;">Out-Law.com</span></a></span>.</span></p>]]></content:encoded></item><item><guid isPermaLink="false">{FDAFA2DB-E37F-4F47-B829-3D959C4675CA}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/new-injunction-guidance/</link><title>New Injunction Guidance</title><description><![CDATA[We have previously reported on the controversy surrounding the number and effect of privacy injunctions ]]></description><pubDate>Thu, 29 Sep 2011 09:54:00 +0100</pubDate><category>Data and privacy</category><authors:names>Keith Mathieson</authors:names><content:encoded><![CDATA[<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>(See links <span style="color: #c45b58;"><a href="http://blog.rpc.co.uk/privacy-law/are-privacy-injunctions-too-restrictive"><span style="color: #c45b58; text-decoration: underline;">here </span></a></span>and <span style="color: #c45b58;"><a href="http://blog.rpc.co.uk/privacy-law/super-injunctions-an-update"><span style="color: #c45b58; text-decoration: underline;">here</span></a></span>). This controversy led in part to the formation in April 2010 of the Super-Injunction Committee, chaired by the Master of The Rolls, Lord Neuberger. It was tasked with reviewing the legal position and coming up with recommendations to try and resolve the concerns that had arisen as a result of recent cases and the coverage and reaction that has followed.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>It reported in May 2011 (a copy of its report is accessible <span style="color: #c45b58;"><a href="http://www.judiciary.gov.uk/media/media-releases/2011/committee-reports-findings-super-injunctions-20052011"><span style="color: #c45b58; text-decoration: underline;">here</span></a></span>). Following its recommendations, the Master of the Rolls has issued a new Practice Direction for a pilot scheme to record statistical data in relation to certain non-disclosure injunctions and new Practice Guidance on best practice in interim non-disclosure orders (commonly known as privacy injunctions and gagging orders).</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><strong><span>Best Practice in Applications for Interim Injunctive Relief</span></strong></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The new Guidance Note for Interim Non-Disclosure Orders came into effect on 1 August 2011. It sets out recommended practice to be followed in any application for interim injunctive relief in civil proceedings to restrain the publication of information and restrict the exercise of Article 10. Although it is issued as guidance and not as a Practice Direction is it expected to followed by all parties and that the courts will refer to it in its determination of future applications for relief. It can be accessed <span style="color: #c45b58;"><a href="http://www.judiciary.gov.uk/Resources/JCO/Documents/Guidance/practice-guidance-civil-non-disclosure-orders-july2011.pdf"><span style="color: #c45b58; text-decoration: underline;">here</span></a></span>.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The Guidance applies to all applications that seek to restrain publication whatever their genesis (i.e.) it is not confined to applications founded on Article 8 of the European Convention (ECtHR) but will also apply to applications in respect of threatened contempt of court, libel or malicious falsehood, harassment, or a Norwich Pharmacol Application.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><strong><span>The general principles</span></strong></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The Guidance stresses the importance of open justice; it is a "fundamental principle" and one that should only be derogated from in exceptional circumstances. Restrictions on the principle must not only be exceptional, they must also be strictly necessary to achieve their purpose. Given that any derogation from the principle of open justice impacts on the rights of the public at large, the Guidance stresses that they cannot be agreed by consent. This addresses the concern that a practice had developed of parties putting agreed terms before a court for approval. Not only did this practice limit the scrutiny of such orders, it put an unduly onerous burden on any third party wishing to challenge the position.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>To clear up any confusion that might exist following the frenzied debate surrounding injunctions, we are reminded in the Guidance that there "is no general exception to open justice where privacy or confidentiality is in issue". That said the courts, when considering any derogation to open justice, are required to have regard to the Convention rights of those involved. Where Article 8 is engaged the courts are required to ensure that the process of protecting that right does not undermine any ultimate vindication.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Super-injunctions are not confined to history. The power to grant a super-injunction, that is an injunction which contains a prohibition on reporting the fact of the proceedings, remains but such an order will only be granted in the rarest of cases and only where strictly necessary. The example given is the classic case of the anti-tipping-off scenario, where a further restriction is required to ensure that the order of the court is not subverted. Orders of this nature will be granted for short periods only and should only be extended in truly exceptional cases.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The notes to the Model Order that accompanies the Guidance explain that if proceedings are anonymised, and an injunction is granted restraining disclosure or publication of private information, there is generally no reason in principle to prohibit in addition any report of the fact that an order has been made.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Going forward, applications will only be heard in private if and to the extent the court is satisfied that "by nothing short of the exclusion of the public can justice be done". The burden of persuading the court that a restriction should be imposed lies with the person seeking it who must provide cogent and clear evidence in support.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><strong><span>Notice</span></strong></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Following the decision of Mr Justice Tugendhat in the <span style="color: #c45b58;"><a href="http://ttp/www.bailii.org/ew/cases/EWHC/QB/2010/119.html"><span style="color: #c45b58; text-decoration: underline;">John Terry case </span></a></span>any party seeking an interim non-disclosure order should be in no doubt of its duties to notify known interested parties. On this issue the Guidance is unequivocal. All applicants for an Order must comply with the provisions on notice in section12(2) of the Human Rights Act 1998 and CPR 25. This means that all applicants must notify</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>(1) all respondents to the application; and</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>(2) any non-parties who are to be served with or otherwise notified of the order ("non-parties").<br>
This should not be controversial given that it is merely repeating the requirements of section 12(2), even if its terms have not always been strictly complied with by applicants.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Respondents and non-parties are entitled to advance notice of the application hearing and should be served with a copy of the Application Notice and any supporting documents. To ensure compliance, applicants will be required to inform the court of any non-party they intend to notify of the order and to satisfy the court that all "reasonable and practical steps" have been taken to provide advance notice. Details of all non-parties are to be listed in a schedule to any non-disclosure order granted. Failure to provide notice will only be excused in exceptional circumstances, such as the tipping-off scenario or blackmail (consistent with the decision in <span style="color: #c45b58;"><a href="http://blog.rpc.co.uk/privacy-law/applications-for-privacy-injunctions-%e2%80%93-when-notice-need-not-be-given"><span style="color: #c45b58; text-decoration: underline;">DFT v TFD</span></a>).</span></span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The Guidance distinguishes between media organisations and internet based organisations, tweeters and bloggers. Applicants must provide advance notice of an application to media organisations and any failure to do so will only be excused in cases where there is or was compelling evidence that it was not possible to do so for reasons of urgency or secrecy.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Where notice is to be given to a media organisation it should be effected on the organisation's legal adviser, assuming it has one.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The Guidance anticipates that different considerations may however arise where a respondent or non-party is an internet based organisation, tweeter or blogger but it does not elaborate further. The suggestion is that there may be situations where there are valid concerns that the provision of advance notice to such a party would defeat the purpose of the order, concerns which would be truly exceptional in the case of a known media organisation.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><strong><span>Explanatory Notes</span></strong></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>In future applications and orders should be accompanied by an Explanatory Note. An Explanatory Note is intended to enable those served with the documents to understand the nature of the case, ascertain whether they wish to attend the application hearing, or whether they wish to challenge the order (if the application was heard without notice). The Explanatory Note is also required to explain any restrictions on access to documents.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>A model Explanatory Note accompanies the Guidance. It is a short document which sets out, in very brief terms what the application is, when it will be (or was heard) and, in very general terms, the basis of the application (eg threats to publish details of a private relationship). As such it will not be difficult or time consuming to prepare, although it is unlikely to be of significant value to experienced media organisations.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><strong><span>Non-Parties and the requirement to give undertakings</span></strong></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>To protect the interests of an applicant in maintaining the confidentiality of information contained in documents, non-parties will be required to provide an irrevocable written undertaking to the court that the material and information contained within documents provided to them will only be used for the purpose of the proceedings. Any undertaking is to be provided by a legal adviser where the non-party has one.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>An applicant providing advance notice of an application is required to provide the non-party with an Explanatory Note, which can be anonymised if it is strictly necessary to do so, to enable the non-party to consider its position. It the non-party is unwilling to give an undertaking no further information need be supplied.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Where an applicant is notifying a non-party of an order, it should first determine if the non-party will require copies of the material read by the judge and the hearing papers, including witness statements and exhibits in support of the application and/or notes of the hearing. If it does an undertaking should be given and the applicant should then provide the documents when it serves the order.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>A draft form undertaking is at page 10 of the Guidance.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><strong><span>The Duty of Disclosure</span></strong></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Applicants for an interim non-disclosure order are required to make "full, fair and accurate disclosure of all material information to the court and to draw the court's attention to significant factual, legal and procedural aspects of the case". This is particular the case where the application is made without-notice. This duty is continuous and applicants are required to keep any respondent and non-party subject to the order informed of any developments that affect the order.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><strong><span>Case Management and Procedure</span></strong></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The Guidance places the responsibility on an applicant's advocate to see that the correct legal procedures are followed and appropriate forms used and the advocate is required to draw the court's attention to any unusual features of the evidence and to explain how the proposed order differs from the Model Order appended to the Guidance.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>It is the duty of the advocate and a party's solicitors to ensure that a full and accurate note of any hearing is made, but especially where the hearing is without notice. The note should be drafted so that anyone supplied with it is informed of: what documents were put before the court; which legal authorities were relied on by the applicant; and what the court was told in the course of the hearing.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><em><span>Active Case Management</span></em></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Any court seized with an application must ensure that the matter is actively managed and that the matter is pursued with expedition. Although there may be considerable problems in locating a respondent, a long-stop date must be specified for the service of the claim form. It is not permissible to give an indefinite extension of time.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><em><span>Return Date</span></em></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>A return date must be specified by the court and the court is required to ensure that, as a general rule, the return date is kept, particularly where the order contains derogations from the principle of open justice. This is the means of ensuring that an interim order does not become a substitute for a full hearing of the matter.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>A return date can be adjourned for valid reasons, but the court should ensure that there is a provision for periodical review of a claim to ensure it progresses. In circumstances where a return date is repeatedly adjourned and it is apparent that a trial is unlikely to take place between the parties, the court is required to either dismiss the substantive action, proceed to summary judgment, enter judgment by consent, substitute or add an alternative defendant, or direct that the claim and trial proceed in the absence of a third party.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>It will not always be necessary for the parties to return to court on the return date. A hearing can be dealt with on paper provided that court has sufficient material to enable it to properly scrutinise and adjudicate upon the matter. Any resulting order should be given in public and be publicly available.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Where possible a reasoned judgment should be given in all cases. If it is not proportionate to do so, a short note of judgment containing the points of general interest should be supplied.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><strong><span>Model Order</span></strong></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>A Model Order is appended to the Guidance at page 13.  Any deviations from its terms must be drawn to the court's attention and explained by the applicant's advocate.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><strong><span>The Practice Direction</span></strong></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Responding to concerns expressed in Parliament and the media about the lack of available data concerning the number of super-injunctions and anonymised injunctions applied for and granted in privacy proceedings, the Super-injunctions Committee recommended the introduction of a process to enable the necessary data to be captured and published. The new <span style="color: #c45b58;"><a href="http://www.judiciary.gov.uk/Resources/JCO/Documents/Guidance/pd-51f.pdf"><span style="color: #c45b58; text-decoration: underline;">Practice Direction (51F)</span></a></span> implements this recommendation.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>PD 51F provides for a procedure to routinely notify the Ministry of Justice’s the Chief Statistician of all applications for injunctions where section 12 of the Human Rights Act 1998 is engaged. It applies in any civil proceedings in the High Court or Court of Appeal in which the court considers an application for an injunction prohibiting the publication of private or confidential information, the continuation of such an injunction, or an appeal against the grant or refusal of such an injunction.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The scheme does not apply to proceedings to which the Family Proceedings Rules 2010 apply, to immigration or asylum proceedings, to proceedings which raise issues of national security or to proceedings to which Part 21 applies.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The pilot is set to run from 1 August 2012 to 31 July 2012.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The information that will be collected includes the claim or application number, the nature of the hearing (eg interim application, extension application, appeal etc), whether the application was made with or without notice, whether the parties consented to the order and whether any derogations from open justice were sought, what they were and whether they were granted.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Derogations from the principle of open justice include, but are not limited to:</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>(a) an order that the hearing be held wholly or partly in private;</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>(b) an order that the names of one or more of the parties not be disclosed;</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>(c) an order that access to documents on the court file be restricted (under rule 5.4C or the inherent jurisdiction);</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>(d) an order that the provision of documents to third parties be restricted (under Practice Direction 25A, paragraph 9.2); and</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>(e) an order prohibiting disclosure of the existence of the proceedings or the order.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>See the Privacy Law Handbook Chapters 3, 10.1 and 10.2</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><em><span>(Originally blogged by Bríd Jordan)</span></em></p>]]></content:encoded></item><item><guid isPermaLink="false">{997ED452-E3E5-46E4-8675-3A6C078E815C}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/rios-role-model-image-unravels-landslide-media-victory-in-privacy-case/</link><title>Rio's "role model" image unravels - landslide media victory in privacy case</title><description><![CDATA[Serial tweeter Rio Ferdinand has lost his privacy battle against the Sunday Mirror. His privacy row related to a "kiss and tell" story published in the Sunday Mirror last year. ]]></description><pubDate>Thu, 29 Sep 2011 08:50:00 +0100</pubDate><category>Data and privacy</category><authors:names></authors:names><content:encoded><![CDATA[<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Today the High Court handed down its judgment which dismissed Mr Ferdinand's £50,000 claim against the newspaper.  The bottom line in Mr Justice Nicol's decision was that there was a public interest in publishing the relevant article which outweighed Mr Ferdinand's reasonable expectation of privacy. Mr Ferdinand was today refused permission to appeal by Mr Justice Nicol, although he may pursue the matter further by applying directly to the Court of Appeal. This threat of appeal has enabled Mr Ferdinand to successfully request that parts of the public judgment be removed so as not to frustrate the outcome of a possible appeal. However, for now at least, the media can revel in a rare "kiss and tell" privacy win.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The redacted judgment can be accessed <span style="color: #c45b58;"><a href="http://www.judiciary.gov.uk/Resources/JCO/Documents/Judgments/ferdinand-v-mgn-ltd.pdf"><span style="color: #c45b58; text-decoration: underline;">here</span></a></span>.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><strong><span>Background</span></strong></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>On 28th April 2010, the <em>Sunday Mirror</em> published an article under the headline "My Affair with England Captain Rio" (the "Article").</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The Claimant, a well-known footballer and recently deposed England football team captain, claimed that the Article was an unjustified infringement of his rights to privacy, a misuse of his private information, and a breach of confidence.  The Defendant, MGN Limited, publisher of the <em>Sunday Mirror</em>, defended the Article as a legitimate exercise of its right of freedom of expression.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>In short the Article constituted a "kiss and tell" from the perspective of a woman called Carly Storey.  The Article provided an account of the Claimant's relationship with Ms Storey.  Namely, that the pair had met when they were teenagers and had thereafter enjoyed an on/off sexual relationship until around May 2005, at which point they lost contact for a couple of years. They resumed contact in October 2007 and from that date engaged in frequent text communications until sometime in 2009. After a gap of several months the pair exchanged text messages again in December 2009 and January 2010.  On 5 February 2010 the Claimant was appointed captain of the England football team to replace John Terry.   (Extra-marital affairs are an occupational hazard for England captains - Ferdinand's appointment followed Terry's failure to gag the press in relation to an extra-marital affair he was alleged to be having.)   The Claimant and Ms Storey exchanged their last text messages on 6 February 2010 and shortly afterwards, Ms Storey decided to approach the media.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>In addition to the written text of the Article there were a number of images including five screen shots of text messages that had been exchanged between Ms Storey and the Claimant (the "Text Messages"), and a photograph of the pair together in a hotel room in 1997 (the "Photograph").</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><strong><span>The context</span></strong></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>As explained in the redacted judgment, before 2006 the Claimant had something of a "wild" reputation.  In 2000, he was involved in a sex scandal in Ayia Napa, which received widespread publicity. In 2003 the Claimant missed a drugs test and was banned from playing football for several months.  Between 2002 and 2006, numerous articles were published alleging that the Claimant had been 'cheating' on his long-term partner Rebecca Ellison.  This context helps explain the reputation of the Claimant in January 2006, when he decided to give an interview to the <em>News of the World</em> when Ms Ellison fell pregnant with the Claimant's first child.  The Claimant explained during trial that this interview had been set up by his commercial agent.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>This interview resulted in a <em>News of the World</em> article entitled "I've been a cheat before…but I'll be a great dad" published on 29th January 2006 in which the Claimant said, "I've strayed in the past – but I'm going to be a family man now."  The Claimant admitted "succumbing" to other women during his five year relationship with Ms Ellison.  The article included a statement that the Claimant "reckons he's tackled his infidelity and is ready to grow up and take on the responsibility of fatherhood." A further quote on this was included: "I think everyone has seen over the last few years how I have matured….the key when you make mistakes is to learn from them.  My priority now is Rebecca, the baby and having a stable family life".</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>In September 2006 the Claimant published his autobiography: "<em>Rio, My Story</em>".  This book touched upon a number aspects of the Claimant's private life including the Ayia Napa incident, his relationship with Ms Ellison and his understanding of his responsibilities both on and off the pitch.  Following publication of the Claimant's autobiography, the Claimant conducted a number of interviews in the media in which he discussed his reformed lifestyle.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Following the Claimant's first appointment to the England captaincy in March 2008, the <em>Mail Online</em> published a story under the headline "Good role model? Rio Ferdinand named England captain despite drug testing and roasting rows" which quoted Fabio Capello saying the team captain would be "a symbol on and off the pitch … I have to know the man, not only the player … he's a symbol of the England team ... a symbol is a good player, a good man and he has to represent the England team in every situation".</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>It was against this background that the Court had to apply the requisite test in <em>McKennitt v Ash</em> to decide whether the Claimant's Article 8 rights were engaged, specifically whether he had a reasonable expectation of privacy in the information complained of and, if so, whether in all the circumstances, the interests of the Claimant as regards that private information took precedent over the competing Article 10 rights of freedom of expression of the Defendant.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><strong><span>Did the Claimant have a reasonable expectation of privacy?</span></strong></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The Judge ruled that the Claimant did have a reasonable expectation of privacy and that the information in the Article was, in principle, protected by Article 8 of ECHR.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>In his reasoning, the Judge relied upon the following factors:</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>1. Sexual behaviour in private is one of the core aspects of individual autonomy which Article 8 is intended to protect.  The subject matter of the Article is therefore private information.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>2. The relationship between the Claimant and Ms Storey was a private one. They had not been seen in public as a couple.  On Ms Storey's evidence, knowledge of their relationship was confined to their circle of family and friends.  The Article had been billed as an "exclusive".</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>3. The Claimant had carefully considered how much of his private life he wished to expose in the media and his own public statements concerning his private life did not mean he had forsaken a reasonable expectation of privacy in connection with his relationship with Ms Storey.  The Claimant had not, before the Article, disclosed anything about this specific relationship to the media.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>4. The other "kiss and tell" stories that had been published about the Claimant were not published with his consent and so could not deprive the Claimant of a reasonable expectation of privacy.  The fact the Claimant had not brought proceedings over those other stories could not be taken as his tacit acceptance of another article, let alone another article about a different woman.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>5. The Claimant's recklessness in his behaviour was not such as to mean he had no reasonable expectation of privacy.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The Judge similarly concluded that the Photograph and the Text Messages constituted information which in principle was capable of protection and whose publication would, subject to the balancing test, infringe the Claimant's rights under Article 8. The Text Messages being examples of "correspondence" under Article 8 and the Photograph, although characterised as "borderline", showing the Claimant and Ms Storey in a private hotel room.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><strong><span>The Balancing Exercise</span></strong></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The Court used the intense focus test as per Lord Steyn in <em>Re S (a child)</em> to consider the competing Article 8 and Article 10 rights at issue.  The Judge referred to section 12(4) of the HRA 1998, but acknowledged the fact that case law has made clear that neither Article has automatic precedence over the other.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The following public interest defence arguments were significant on the facts:</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>1. The public interest in correcting a false image.  Interestingly the Judge held that whilst the truth of a publication is not usually relevant in a privacy claim, in the specific context of a defence of public interest based on correcting a false image, truth is important.  Here the Claimant had, by his interview with the <em>News of the World</em> and subsequent media dealings, portrayed himself as a reformed character. This included an image of himself as a family man and someone who had given up the ways of his past – and specifically "cheating" on Ms Ellison.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>2. The Claimant's appointment as captain of England and his perceived status as a role model to a certain section of the public.  The Judge said that the phrase "role model" is somewhat ubiquitous but that it was clear from the relevant case law and statements that have been made in the media that there are many who believe footballers in general and the captain of the England football team at least are role models.  The Judge did not have to decide whether the Claimant was fit to be England captain but held that the Article reasonably contributed to the debate as to his suitability for that role.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>3. The fact that the Claimant's relationship with Ms Storey impacted upon his professional life. By the Claimant's own admission, on occasions, he either did or tried to, sneak Ms Storey into a hotel where he and the other members of his team were staying, against the rules set by the team's management. This unprofessional conduct could legitimately be used to call into question his suitability for the role of England captain.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>4. As distinguished from <em>Campbell v MGN</em>, the Defendant was entitled to place the relationship between Ms Storey and the Claimant in context and, as such, the Judge held that the detail of the relationship contained in the Article was not an excessive intrusion into the Claimant's private life.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>5. In relation to the Photograph, the Judge held that the Claimant did have a reasonable expectation that such a photograph would remain private but its unexceptionable character meant that the right was of relatively low importance. Overall the circumstances in which the Photograph was taken (openly by one of the other people in the hotel room with the Claimant and Ms Storey) and the anodyne nature of the photograph itself (it showed the Claimant and Ms Storey fully clothed, not even engaging with each other as the Claimant is pictured speaking on a mobile phone) together justified the Defendant's use of the Photograph and provided an element of credibility to the story. Distinguishing from <em>Campbell</em>, the Judge held that the Photograph did not cause the Claimant unjustifiable additional distress.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Finally, the Judge ruled that overall "the balancing exercise favours the Defendant's right of freedom of expression over the Claimant's right of privacy" and he dismissed the action.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>RPC acted for the Defendant in this case.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><em><span>See further chapter 3 of <span style="color: #c45b58;"><a href="http://www.lawsocietyshop.org.uk/ecom_lawsoc/public/saleproduct.jsf?catalogueCode=9781853288432" target="_blank"><span style="color: #c45b58; text-decoration: underline;">The Privacy Law Handbook</span></a></span></span></em></p>]]></content:encoded></item><item><guid isPermaLink="false">{508CB089-506B-4609-AE80-8DE23D7DCB3F}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/guardian-beefs-up-its-privacy-code/</link><title>Guardian beefs up its privacy code</title><description><![CDATA[Guardian News & Media, owner of the Guardian and Observer, has revised its internal editorial guidelines and beefed up the sections that protect privacy.]]></description><pubDate>Tue, 09 Aug 2011 10:04:00 +0100</pubDate><category>Data and privacy</category><authors:names>Keith Mathieson</authors:names><content:encoded><![CDATA[<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The new guidelines supplement <span style="color: #c45b58;"><a href="http://www.pcc.org.uk/cop/practice.html" target="_blank"><span style="color: #c45b58; text-decoration: underline;">the provisions of the PCC Code</span></a></span>, which provide that "Everyone is entitled to respect for his or her private and family life, home, health and correspondence, including digital communications.  Editors will be expected to justify intrusions into any individual's private life without consent. Account will be taken of the complainant's own public disclosures of information. It is unacceptable to photograph individuals in private places without their consent."</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The Guardian acknowledges in its guidelines that much journalism "may be intrinsically intrusive" but that a person's privacy must not be invaded unless there is a clear public interest.  To help journalists decide whether material is intrusive, the Guardian has developed five core principles, which it has based on the work of Sir David Omand, a former intelligence officer:</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>1. There must be sufficient cause – the intrusion needs to be justified by the scale of potential harm that might result from it.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>2. There must be integrity of motive - the intrusion must be justified in terms of the public good that would follow from publication</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>3. The methods used must be in proportion to the seriousness of story and its public interest, using the minimum possible intrusion.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>4. There must be proper authority – any intrusion must be authorised at a sufficiently senior level and with appropriate oversight.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>5. There must be a reasonable prospect of success; fishing expeditions are not justified"</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Key to these changes is the express recognition of the need for proportionality, a concept taken from human rights law.  The Guardian has also accepted the need to use principles-based regulation, rather than having detailed rules prescribing how things must be done.  This is in contrast to the approach of <span style="color: #c45b58;"><a href="http://stakeholders.ofcom.org.uk/broadcasting/broadcast-codes/broadcast-code/privacy/" target="_blank"><span style="color: #c45b58; text-decoration: underline;">Ofcom</span></a> </span>and <span style="color: #c45b58;"><a href="http://www.bbc.co.uk/editorialguidelines/page/guidelines-privacy-introduction/" target="_blank"><span style="color: #c45b58; text-decoration: underline;">the BBC</span></a></span>, which both use a mixture of overarching principles and detailed rules.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Other changes to the Guardian's guidelines include:</span></p>
<ul style="margin-top: 0cm; list-style-type: disc;">
    <ul style="margin-top: 0cm; list-style-type: circle;">
        <li style="margin: 0cm 0cm 10pt; text-align: justify; color: #000000;"><span>A requirement that articles that include significant intrusions into children's private lives without their understanding and consent need a strong public interest justification.</span></li>
    </ul>
</ul>
<ul style="margin-top: 0cm; list-style-type: disc;">
    <ul style="margin-top: 0cm; list-style-type: circle;">
        <li style="margin: 0cm 0cm 10pt; text-align: justify; color: #000000;"><span>The need for consideration to be given to obscuring children's identities with online copy to protect them from embarrassment in years to come.</span></li>
    </ul>
</ul>
<ul style="margin-top: 0cm; list-style-type: disc;">
    <ul style="margin-top: 0cm; list-style-type: circle;">
        <li style="margin: 0cm 0cm 10pt; text-align: justify; color: #000000;"><span>A restriction on publishing anonymous contributions only in exceptional circumstances, for example where the author's safety, privacy or livelihood may be compromised.</span></li>
    </ul>
</ul>
<ul style="margin-top: 0cm; list-style-type: disc;">
    <ul style="margin-top: 0cm; list-style-type: circle;">
        <li style="margin: 0cm 0cm 10pt; text-align: justify; color: #000000;"><span>The renaming of the requirement to attribute sources from "plagiarism" to "credits".</span></li>
    </ul>
</ul>
<ul style="margin-top: 0cm; list-style-type: disc;">
    <ul style="margin-top: 0cm; list-style-type: circle;">
        <li style="margin: 0cm 0cm 10pt; text-align: justify; color: #000000;"><span>New guidance on bribery and facilitation payments</span></li>
    </ul>
</ul>
<ul style="margin-top: 0cm; list-style-type: disc;">
    <li style="margin: 0cm 0cm 10pt; text-align: justify; color: #000000;"><span>Restrictions on endorsements</span></li>
</ul>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><em><span>See further chapter 11 of <span style="color: #c45b58;"><a href="http://www.lawsocietyshop.org.uk/ecom_lawsoc/public/saleproduct.jsf?catalogueCode=9781853288432" target="_blank"><span style="color: #c45b58; text-decoration: underline;">The Privacy Law Handbook</span></a></span></span></em></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>(Originally blogged by Jaron Lewis)</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span style="color: #c45b58;"><a href="http://www.guardian.co.uk/info/guardian-editorial-code" target="_blank"><span style="color: #c45b58; text-decoration: underline;">Internal editorial guidelines</span></a></span></p>]]></content:encoded></item><item><guid isPermaLink="false">{922258CB-3E10-4298-8310-B49035BE2FD1}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/automatic-numberplate-recognition-is-it-legal/</link><title>Automatic numberplate recognition: is it legal?</title><description><![CDATA[A report in the Guardian last week reminds readers of the strong likelihood that local police forces have tracked their movements with the use of automatic numberplate recognition (ANPR). ]]></description><pubDate>Tue, 02 Aug 2011 10:22:00 +0100</pubDate><category>Data and privacy</category><authors:names>Keith Mathieson</authors:names><content:encoded><![CDATA[<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>According to the article, around 14.5 million numberplate reads (yes, 14.5 million!) are generated every day in the United Kingdom.  They are then stored on servers adjoining the police national computer in Hendon, north London.  Each record of a car's movements will be stored for two years - or five years if connected to a crime. The movements are detected by a combination of 5,000 unmarked roadside cameras (not to be confused with the marked yellow boxes containing speed cameras) and mobile cameras inside patrol vehicles.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>ANPR helps police forces to tackle crime by enabling it, among other things, to track down uninsured and disqualified drivers and those whose cars may have been used for crime.  But the system has the potential to cause unwarranted infringements of personal privacy where, for example, the movements of innocent car owners are retained for no good reason or, through laxity or error, car owners are wrongly 'hotlisted' as deserving police attention.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The <em>Guardian</em> article describes the ANPR system in operation in Royston, Hertfordshire, a relatively crime-free spot where ANPR has nonetheless been installed on every road in and out of the town.  The article notes that the Royston scheme <span style="color: #c45b58;"><a href="http://www.guardian.co.uk/government-computing-network/2011/jun/10/royston-hertfordshire-constabulary-anpr-cctv" target="_blank"><span style="color: #c45b58; text-decoration: underline;">has been the subject of complaints to the Information Commissioner's Office</span></a> </span>by the campaign groups No CCTV, Privacy International and Big Brother Watch.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span style="color: #c45b58;"><a href="http://www.official-documents.gov.uk/document/hc0506/hc12/1298/1298.asp" target="_blank"><span style="color: #c45b58; text-decoration: underline;">In its 2005-2006 report</span></a></span><span> the Chief Surveillance Commissioner expressed concerns that existing legislation did not adequately cater for ANPR, which, he suggested, might in some cases amount to covert surveillance under the Regulation of Investigatory Powers Act 2000.  The Government is intending to regulate CCTV and ANPR as part of the reforms to be introduced by the Protection of Freedoms Bill.  <span style="color: #c45b58;"><a href="http://blog.rpc.co.uk/privacy-law/privacy-and-the-protection-of-freedoms-bill" target="_blank"><span style="color: #c45b58; text-decoration: underline;">A previous post on this blog</span></a></span> described the provisions of that bill.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><em><span>See further chapter 7 of <span style="color: #c45b58;"><a href="http://www.lawsocietyshop.org.uk/ecom_lawsoc/public/saleproduct.jsf?catalogueCode=9781853288432" target="_blank"><span style="color: #c45b58; text-decoration: underline;">The Privacy Law Handbook</span></a></span></span></em></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span style="color: #c45b58;"><a href="http://www.guardian.co.uk/uk/2011/jul/28/royston-under-surveillance-police-cameras?INTCMP=SRCH" target="_blank"><span style="color: #c45b58; text-decoration: underline;">A report in the <em>Guardian</em> last week</span></a></span></p>]]></content:encoded></item><item><guid isPermaLink="false">{F00A1CC3-9798-4CC4-957C-57B97BD420F9}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/reporting-the-family-courts-new-guide-published/</link><title>Reporting the family courts - new guide published</title><description><![CDATA[A valuable guide has just been published which sets out the law governing access to, and reporting of, the family courts.  ]]></description><pubDate>Mon, 01 Aug 2011 10:27:00 +0100</pubDate><category>Data and privacy</category><authors:names>Keith Mathieson</authors:names><content:encoded><![CDATA[<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>It has been written by the media law barristers Adam Wolanski and Kate Wilson.  The document, available free of charge on the link just given, is entitled "The Family Courts: Media Access & Reporting".  It has been commended in a preface to the document by the President of the Family Division and by the Director of the Society of Editors.  This blog also recommends it as a thorough and up-to-date review of this convoluted area of the law.  It is in the area of family proceedings that perhaps the greatest tension arises between open justice and parties' legitimate expectations of personal privacy.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><em><span>See further chapter 10 of <span style="color: #c45b58;"><a href="http://www.lawsocietyshop.org.uk/ecom_lawsoc/public/saleproduct.jsf?catalogueCode=9781853288432" target="_blank"><span style="color: #c45b58; text-decoration: underline;">The Privacy Law Handbook</span></a></span></span></em></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span style="color: #c45b58;"><a href="http://www.judiciary.gov.uk/Resources/JCO/Documents/Guidance/family-courts-media-july2011.pdf" target="_blank"><span style="color: #c45b58; text-decoration: underline;">A valuable guide </span></a></span></p>]]></content:encoded></item><item><guid isPermaLink="false">{B906A5BD-4BB7-42BD-AF4B-9AF72D7F783C}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/a-tenuous-claim-to-privacy-hutcheson-v-news-group/</link><title>A "tenuous claim to privacy": Hutcheson v News Group</title><description><![CDATA[Can you expect to keep a second family private?  That was the ambitious hope of celebrity chef Gordon Ramsay's father-in-law, Chris Hutcheson.]]></description><pubDate>Sat, 23 Jul 2011 10:34:00 +0100</pubDate><category>Data and privacy</category><authors:names>Keith Mathieson</authors:names><content:encoded><![CDATA[<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Mr Hutcheson got married in 1968.  He and his wife had four children, all now grown up.   He remains married to his wife, but in the meantime, since about 1976, he had been conducting a relationship with another woman by whom he had two children, born in 1979 and 1981.  For many years he managed to keep the existence of his second family secret from his first family, but by the time he went to court against the press last year they had become aware of his other family, though he had managed to keep the secret from at least one of the children of his first marriage for over 30 years.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><strong><span>The story</span></strong></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The Sun got hold of the story, which was interesting to it not just because of Mr Hutcheson's connection to Gordon Ramsay, but because Mr Hutcheson had also been chief executive of the company that ran Mr Ramsay's restaurants and other business interests.  Mr Hutcheson had recently been sacked as chief executive and it appeared that this might have had something to do with the cost of running his second family (Mr Hutcheson has denied any impropriety).  A public slanging match ensued between Mr Hutcheson and Mr Ramsay, but although the existence of Mr Hutcheson's second family was hinted at, it was not expressly deployed by Mr Ramsay in statements to the media.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><strong><span>The application for an injunction</span></strong></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Mr Hutcheson applied for an injunction to prevent the Sun from publishing the fact that he had a second family.  He argued that the existence of his second family was not public knowledge and he had a reasonable expectation of privacy in that information despite it now being known to his first family.  The Sun argued that he had no such expectation and in any event he had put a large quantity of private family matters into the public domain and it would be unfair to allow his version of events to stand without permitting a full account of those family matters to be published.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The evidence before the court was that Mr Hutcheson had 'played a full part' in the upbringing of his children of the second family; they had taken his name (as indeed had their mother); but the relationship had otherwise been conducted in private such that people generally did not know that Mr Hutcheson had two families.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Mr Hutcheson gave evidence that publicity would have an adverse impact on the members of his two families, but they did not themselves provide any evidence.  Hutcheson said he was not unduly concerned about the effect of publicity on himself personally.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Eady J was not persuaded that Mr Hutcheson had a reasonable expectation of keeping his second family secret:</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>I would accept that Article 8 is certainly engaged so far as concerns the Claimant and the members of both his families.  Yet there is no question of intruding, by any proposed publication, into intimate matters internal to the “second” family or to the Claimant’s extra-marital relationship.  It is a “bare fact” case; that is to say, the court is concerned only with the bare fact of the familial relationship (as was the case, for example, in <em>Donald v Ntuli</em>).  Factual information of that kind may sometimes involve a relatively low degree of intrusion.  It may be reasonable to treat it discreetly, but that is not the same as enforcing a right to keep it secret <em>vis-à-vis</em> the right of another to exercise freedom of speech by referring to it.  In the circumstances of this particular case, I would hold that there is, at this stage, no reasonable expectation of privacy as to the fact of the “second family”.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>In case he was wrong about that, however, Eady J proceeded to the second stage test by examining the public interest considerations.  First, he noted that Mr Hutcheson was not, in his view, a public figure: he was an "ordinary private citizen".  There was no inherent public interest in the fact that such a person had a second family.  Nor could it be said that because he had talked publicly about certain aspects of his family life, he had thereby exposed his whole private life: the "zonal" argument had been discredited in <em><span style="color: #c45b58;"><a href="http://www.bailii.org/ew/cases/EWCA/Civ/2006/1714.html" target="_blank"><span style="color: #c45b58; text-decoration: underline;">McKennit v Ash</span></a></span></em><span style="color: #c45b58;"> </span>and subsequently.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>On the other hand, Eady J held that there was a potential public interest in exposing wrongdoing, including possible misappropriation of corporate funds, and there was also a public interest in ensuring that the public was not misled by the statements of someone involved in a matter that has come to the public's attention.  It would also be wrong for Mr Hutcheson to use the law of privacy to prevent a party to a dispute from bringing to the attention of the public certain details of the dispute because they might be unflattering to him.  If Mr Hutcheson were to be defamed, he would have the right to sue for libel.  Having regard to those considerations, the judge declined to grant an injunction.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><strong><span>The appeal</span></strong></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Mr Hutcheson appealed to the Court of Appeal.  On 25 May 2011 the Court of Appeal dismissed the appeal and said its reasons would follow later.   A number of papers published stories about the case: see here for coverage in the <span style="color: #c45b58;"><a href="http://www.telegraph.co.uk/news/celebritynews/8534944/Gordon-Ramsays-father-in-law-fathered-two-children-by-a-mistress.html" target="_blank"><span style="color: #c45b58; text-decoration: underline;">Daily Telegraph</span></a></span>, <span style="color: #c45b58;"><a href="http://www.dailymail.co.uk/news/article-1390927/How-Gordon-Ramsay-covered-father-law-Chriss-philandering.html" target="_blank"><span style="color: #c45b58; text-decoration: underline;">Daily Mail</span></a></span> and <span style="color: #c45b58;"><a href="http://www.thesun.co.uk/sol/homepage/news/3598956/Gordon-Ramsays-fired-father-in-law-raised-a-secret-family-during-a-double-life.html" target="_blank"><span style="color: #c45b58; text-decoration: underline;">Sun</span></a></span>.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Last week the Court of Appeal <span style="color: #c45b58;"><a href="http://www.bailii.org/ew/cases/EWCA/Civ/2011/808.html" target="_blank"><span style="color: #c45b58; text-decoration: underline;">provided its reasons for dismissing the appeal and upholding Eady J's refusal of an injunction</span></a></span>.  The court declined to decide whether Mr Hutcheson had a reasonable expectation of privacy in the fact of his second family's existence.  It was instead content to proceed to the second stage on the <em>assumption</em> that the information was protected.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>On the second stage test, the court held that the balance was against granting an injunction.  First, there was a very real risk of a distorted and partial picture of the dispute between Mr Hutcheson and Mr Ramsay being presented to the public if the fact of Mr Hutcheson's second family could not be mentioned.  Second, and subject to the law of defamation, there was a clear public interest in the Sun being free to publish the fact of Mr Hutcheson's second family in order to authenticate the allegation of diversion of corporate funds for private purposes.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Without actually deciding that Mr Hutcheson had a reasonable expectation of privacy (it being unnecessary to do so because of its decision on the balancing exercise), the Court of Appeal expressed the view that Mr Hutcheson's claim was "borderline".  In that regard:</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>(a) Mr Hutcheson had effectively discounted his own claim to privacy: the claim essentially turned on the impact of publication on his two families.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>(b) It was noteworthy that there was no evidence from those family members and if they had claims to protection, they should have spoken for themselves.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>(c) It was no longer open to Mr Hutcheson to claim privacy on the ground that his first family did not know about the second family.  (Implicitly, his claim would have been stronger if his first family had remained in ignorance.)</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>(d) There was a 'public dimension' to Mr Hutcheson's second family and that was a factor to be weighed in the balance.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>In summary, Gross LJ considered that the case involved "a strong claim to freedom of expression of expression in the public interest, against which there was, in the balance and, at best, a tenuous claim to privacy".</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><strong><span>Comment</span></strong></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The Court of Appeal's analysis of the "legal framework" of privacy protection, which covers paras [17] to [35] of the judgment, is required reading.  The following points are worth highlighting:</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>(i) In considering the notion of 'personal autonomy' protected by Article 8, the court adopted the statement of principle by Laws LJ in <span style="color: #c45b58;"><a href="http://www.bailii.org/ew/cases/EWCA/Civ/2009/414.html" target="_blank"><em><span style="color: #c45b58; text-decoration: underline;">Wood v Metropolitan Police</span></em></a></span> (at [22]):</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>This cluster of values, summarised as the personal autonomy of every individual and taking concrete form as a presumption against interference with the individual's liberty, is a defining characteristic of a free society. We therefore need to preserve it even in little cases. At the same time it is important that this core right protected by article 8, however protean, should not be read so widely that its claims become unreal and unreasonable. For this purpose I think there are three safeguards, or qualifications. First, the alleged threat or assault to the individual's personal autonomy must (if article 8 is to be engaged) attain 'a certain level of seriousness'. Secondly, the touchstone for article 8(1)'s engagement is whether the claimant enjoys on the facts a 'reasonable expectation of privacy' …….Absent such an expectation, there is no relevant interference with personal autonomy. Thirdly, the breadth of article 8(1) may in many instances be greatly curtailed by the scope of the justifications available to the state pursuant to article 8(2)…… "</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span><br>
The court placed particular emphasis on Laws LJ's statement that the Article 8 right "should not be read so widely that its claims become unreal and unreasonable" and noted that "there is no question of Art. 8 furnishing an <em>absolute </em>right to privacy".</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>(ii) The fact that private information has become known to some people or even a section of the public does not of itself preclude a claim for an injunction to prevent it becoming known to the public at large.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>(iii) A complaint of misuse of private information is necessarily fact sensitive.  The fact that Article 8 is "engaged" (i.e. it applies to the situation in question) does not mean without more that there has been a breach of Article 8.  In other words, there is a two stage process - first, is Art 8 engaged? If so, you move to the second question of whether it has been breached.  The issue of reasonable expectation of privacy is not therefore answered simply by asking the question of whether the claimant's Art 8 right is engaged.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>(iv) In assessing reasonable expectation, the nature of the information is crucial.  There may be privacy in the details of a sexual relationship but not necessarily in the fact that it exists.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>(v) Evidence as to the Article 8 rights of those said to be affected will be required.  The court noted Tugendhat J's statement in <span style="color: #c45b58;"><a href="http://www.bailii.org/ew/cases/EWHC/QB/2010/119.html" target="_blank"><em><span style="color: #c45b58; text-decoration: underline;">Terry</span></em></a> </span>that "respect for the dignity and autonomy of the individuals concerned requires that, if practicable, they should speak for themselves."</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>(vi) The court also noted with apparent approval Tugendhat J's rejection in <em>Terry</em> of Terry's counsel's submission that a newspaper should not be permitted to criticise a person's private conduct unless it happens to be unlawful.  Tugendhat J had noted that "the freedom to criticise (within the limits of the law) the conduct of other members of society as being harmful or wrong" is a valuable freedom (just as personal autonomy is) and it was "as a result of public discussion and debate that public opinion develops".</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>(vii) Significantly, the court noted the importance of the general principle of press freedom (including the press's ability to conduct its business commercially) to the way in which the law of privacy is applied:</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>To some, applicants in privacy cases may seem unattractive.  However, to others, intrusive media coverage of matters of sexual conduct, particularly if it includes salacious detail, may be equally unattractive. That said, for sections of the media, developments in privacy law impinging on their ability to publish such matters, may not only give rise to issues of principle as to freedom of expression in the individual case but also to real commercial concerns - which, at least to the extent of the general public interest in having a thriving and vigorous newspaper industry, representing all legitimate opinions, may also be argued to give rise to a relevant factor for the court to take into account.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>There is a <span style="color: #c45b58;"><a href="http://ukhumanrightsblog.com/2011/07/19/the-scoop-the-chef-his-wife-and-her-father/#more-9775" target="_blank"><span style="color: #c45b58; text-decoration: underline;">case summary and comment</span></a></span> by Rosalind English on the UK Human Rights Blog.  Ms English notes, among other things, that the case suggests that "a claim to privacy is weakened, not only by the celebrity status of the person seeking privacy, <span style="text-decoration: underline;">but by any action they may take which involves publicity of some sort or another</span>" (emphasis added).</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><em><span>See further chapter 3 of <span style="color: #c45b58;"><a href="http://www.lawsocietyshop.org.uk/ecom_lawsoc/public/saleproduct.jsf?catalogueCode=9781853288432" target="_blank"><span style="color: #c45b58; text-decoration: underline;">The Privacy Law Handbook</span></a></span></span></em></p>]]></content:encoded></item><item><guid isPermaLink="false">{CDAE4D6F-678E-41D6-B87A-6B0AAF7BF54B}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/reporting-the-courts-a-view-on-postponement-orders/</link><title>Reporting the Courts: a view on postponement orders</title><description><![CDATA[The principle of open justice has been ardently promoted in our society for many years, as was confirmed by Lord Hewart in R v Sussex Justices, ex parte McCarthy who said that “it is not merely of some importance but it is of fundamental importance that justice should not only be done, but should manifestly and undoubtedly be seen to be done”.]]></description><pubDate>Tue, 19 Jul 2011 12:12:00 +0100</pubDate><category>Data and privacy</category><authors:names></authors:names><content:encoded><![CDATA[<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The default position in the UK is that the administration of justice should take place in the public arena and be subject to public scrutiny.  As is fully acknowledged in the jurisprudence of the ECHR the media has a positive duty to act as the public’s “watchdog” and, in particular, the media’s ability to report upon what takes place in our courts is considered highly important. However it is recognised that there are certain exceptional occasions where the media’s freedom to report has to be restricted and it is this delicate balancing exercise of determining the scope of such necessary reporting restrictions which remains a thorny issue of debate.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The reality is that the law in this area is becoming increasingly complex, as the reporting of court cases is regulated by a myriad of reporting restrictions which, if breached, are punishable as contempt and can therefore have severe consequences (imprisonment and/or an unlimited fine) for the editor, publisher or media owner concerned.  It is therefore important that journalists and media organisations understand the scope of the possible restrictions and that, in making orders restricting the freedom of the press, the judiciary stay within that recognised and intended scope. </span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Since its implementation, s.4(2) of the Contempt of Court Act 1981 (the “Act”) has been frequently used to prevent journalists from reporting events that take place in court during a trial.  Such orders are a blanket ban on the reporting of a trial contemporaneously, as reporting is postponed to a later date. Recently, however, questions have arisen as to whether the orders made pursuant to this section have gone beyond its intended scope.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><strong><span>Postponement orders</span></strong></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>S.4(2) of the Act allows any court to postpone publication of the reporting of all or any part of proceedings if it appears necessary to do so to avoid a substantial risk of prejudice to the administration of justice in those or any other pending or imminent proceedings. The postponement can be for such period as the court thinks necessary for this purpose.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>These orders must not be made where it is reasonably possible to achieve the court’s objectives by alternative means (for example, by giving the jury suitable directions, by postponing or transferring a subsequent trial or by using another, less arbitrary, type of reporting restriction). In addition a s.4(2) order cannot be indefinite and must state what the trigger is which enables the proceedings to be reported.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>These orders are commonly used where a defendant faces a series of consecutive trials, where a defendant has pleaded guilty to one charge but there is to be a trial of the remaining charges, where one accused has been found guilty but there is still to be a trial of a co-accused, where matters are raised in court in the absence of the jury or where there is a hearing of an interim matter before trial.  For example, this legislation was used in the case of <span style="color: #c0504d; text-decoration: underline;"><a href="http://www.bailii.org/ew/cases/EWHC/QB/2010/2710.html" target="_blank"><span style="color: #c0504d;">Cristiano Ronaldo v Telegraph Media Group Limited</span></a></span>. Here Mrs Justice Sharp made and continued an order pursuant to s.4(2) of the Act that there could be no reporting of any hearing relating to an interim application by TMG that the action be stayed as an abuse of process of the court, until after the trial of the action or after the litigation had otherwise come to an end.  Mrs Justice Sharp was concerned that certain matters might be mentioned during the hearings of the interim application that it might not be appropriate for a jury to know about. Another example is the case of <span style="color: #c0504d; text-decoration: underline;"><a href="http://www.bailii.org/ew/cases/EWCA/Crim/2009/1207.html"><span style="color: #c0504d;">R v G(G), B(S)</span></a></span> where Lord Justice Hughes permitted only a summary of his main judgment to be reported and made a s.4(2) order in relation to his main judgment until further order of the court.  His reasoning for making such a postponement order was that it was necessary because there were some people still due to face trial for related allegations and that any publication of the more detailed judgment would cause a substantial risk of prejudice to the administration of justice in those trials.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><strong><span>Interpreting the scope of s.4(2) of the Act</span></strong></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>In considering the application of s.4(2) of the Act, courts are faced with the dilemma of balancing the need for the freedom of press and the public’s right to have access to accurate reports of court proceedings with the need to preserve the administration of justice and, in turn, a defendant’s right to a fair trial. </span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>A number of orders have been made which were beyond the intended scope of s.4(2). For example in the recent case of <span style="color: #c0504d; text-decoration: underline;"><a href="http://www.bailii.org/ew/cases/EWCA/Crim/2011/100.html" target="_blank"><span style="color: #c0504d;">Re MGN Ltd & Ors</span></a></span> the Court of Appeal discharged a s.4(2) order imposing reporting restrictions in relation to a high profile murder trial on the basis of the possibility of prejudice to young witnesses in subsequent trials.  The court held that the trial judge had erred in imposing the blanket restriction and stated that such an order was rarely appropriate in trying to alleviate the various problems associated with giving evidence.   </span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><strong><span>Appealing s.4(2) orders</span></strong></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>A s.4(2) order may be appealed under s.159 of the Criminal Justice Act 1988 (“CJA”) which states that a person aggrieved may appeal to the Court of Appeal, if that court grants leave, against an order under section 4 [or 11] of the Act made in relation to a trial on indictment if they feel either that the reasoning given for the order went beyond the scope of the legislation or the court was wrong in its reasoning.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>However the media is not always successful in appealing s.4(2) orders. In the case of <span style="color: #c0504d; text-decoration: underline;"><a href="http://www.bailii.org/ew/cases/EWCA/Crim/2001/1075.html" target="_blank"><span style="color: #c0504d;">R v Sherwood</span></a></span> s.159 CJA was used by Telegraph Group Plc to appeal a s.4(2) order postponing any reporting of a murder trial until after the conclusion of another trial arising out of the same or closely related facts.  On the specific facts of the case, the severance of the trials had been necessary in the public interest and any media reports would have undermined the aim of such severance.  As such it was held that a s.4(2) order was unavoidable in order to ensure that the defendants in the second trial had a fair hearing. </span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>In Sherwood, the Court of Appeal, whilst dismissing the appeal, brought together a number of authorities and considered the impact of the Human Rights Act 1998 in order to set out a three stage test that any judge contemplating the imposition of reporting restrictions is required to consider:</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><em><span>“22…</span></em></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><em><span>(1) The first question is whether reporting would give rise to a ‘not insubstantial’ risk of prejudice to the administration of justice in the relevant proceedings. If not, that will be the end of the matter.</span></em></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><em><span>(2) If such a risk is perceived to exist, then the second question arises: would a section 4(2) order eliminate it? If not, obviously there could be no necessity to impose such a ban. Again, that would be the end of the matter. On the other hand, even if the judge is satisfied that an order would achieve the objective, he or she would still have to consider whether the risk could satisfactorily be overcome by some less restrictive means. If so, it could not be said to be ‘necessary’ to take the more drastic approach: See <span style="text-decoration: underline;">Ex parte Central Television plc</span> [1991] 1 WLR 4, 8 D-G per Lord Lane CJ.</span></em></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><em><span>(3) Suppose that the judge concludes that there is indeed no other way of eliminating the perceived risk of prejudice: it still does not follow necessarily that an order has to be made. The judge may still have to ask whether the degree of risk contemplated should be regarded as tolerable in the sense of being ‘the lesser of two evils’. It is at this stage that value judgments may have to be made as to the priority between ‘competing public interests’: see <span style="text-decoration: underline;">Ex parte Telegraph Group plc</span> [1993] 1 WLR 980, 986 B-C.”</span></em></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Thus since Sherwood, courts have been obliged to consider this three stage test and to give clear reasons for its determination at each stage.  Furthermore when assessing the impact of reporting the court must assume that reporting will be fair, accurate and impartial (<span style="color: #c0504d; text-decoration: underline;"><a href="http://www.bailii.org/ew/cases/EWCA/Crim/2006/2692.html" target="_blank"><span style="color: #c0504d;">in the matter of B</span></a></span>).</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><strong><span>Alternatives to the use of s.4(2) orders</span></strong></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>As part of the second stage in the Sherwood test, the court must consider whether the perceived risk could be satisfactorily overcome by some lesser means.  This is a crucial consideration, as there are a number of other options open to the court which may well achieve the objective of overcoming the risk of prejudice.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Alternative solutions often exist. For example, in Re MGN Ltd it was held that the s.4(2) order was unnecessary and that the problem of providing protection to vulnerable young witnesses could be more appropriately resolved by other orders. The matter was therefore remitted to the trial judge for further consideration of what lesser orders may be necessary. In the case of <span style="color: #c0504d; text-decoration: underline;"><a href="http://www.bailii.org/ew/cases/EWCA/Crim/2007/1925.html" target="_blank"><span style="color: #c0504d;">Re Times Newspapers Ltd and others</span></a></span> it was held that the original order should not have been made under s.4(2) but instead under s.11 of the Act as, on its natural meaning, s4(2) was designed to enable the court to prevent publication of the report of proceedings where the publication would prejudice the conduct of those proceedings, or specific pending proceedings.  The section only permitted postponement and the need for postponement could not subsist beyond the end of the proceedings in question. </span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>In addition to s. 11 of the Act, which provides for anonymity orders, courts have a number of other solutions at their disposal.  For example, defendants or witnesses under 18 years of age can be protected by s.39 of the Children and Young Persons Act 1939.  Adult witnesses can be afforded special protection under s.46 of the Youth Justice and Criminal Evidence Act 1999 and witness anonymity orders can be made under part 3 of the Coroners and Justice Act 2009.  Additionally there are a number of specific restrictions that apply in relation to sexual offences.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Finally, as a general solution, the court should trust editors to fulfil their responsibilities and exercise their careful judgment. Editors know that if they publish information during a trial which might prejudice a jury, such as inflammatory information that may change a juror’s mind, then they will be in contempt of court.  This should be deterrent enough.</span></p>]]></content:encoded></item><item><guid isPermaLink="false">{00A778A0-ECA9-4195-A25F-76864F936663}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/details-of-the-new-inquiry-into-press-regulation-and-phone-hacking/</link><title>Details of the new inquiry into press regulation and phone-hacking</title><description><![CDATA[It had been thought that the Prime Minister had pledged to set up two separate inquiries: one into phone-hacking and one into press regulation more generally.]]></description><pubDate>Wed, 13 Jul 2011 12:26:00 +0100</pubDate><category>Data and privacy</category><authors:names>Keith Mathieson</authors:names><content:encoded><![CDATA[<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span style="color: #c0504d;"><a href="http://www.number10.gov.uk/news/pm-announces-hacking-inquiry-details/" target="_blank"><span style="color: #c0504d; text-decoration: underline;">It now emerges</span></a></span><span> that there is to be one inquiry split into two parts.  The inquiry will be chaired by a Court of Appeal judge, Lord Justice Leveson.  The first part of the inquiry will be "a full review of the regulation of the press".   The second part will be "an investigation into the wrongdoing of the press and police, including the failure of the first police inquiry".</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The inquiry will be established under the 2005 Inquiries Act and have the power to summon witnesses to give evidence under oath and in public.  Lord Justice Leveson "will be assisted by a panel of senior independent figures with “relevant expertise” in media, broadcasting, regulation and government".  The members of this panel have not been identified (and probably haven't been selected yet).</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The first part of the inquiry will report within 12 months to the Home and Culture Secretaries.  The second part of the inquiry will be "considered in light of the ongoing criminal proceedings".</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span style="color: #c0504d;"><a href="http://www.number10.gov.uk/news/phone-hacking-inquiry-draft-terms-of-reference/" target="_blank"><span style="color: #c0504d; text-decoration: underline;">The terms of reference of the inquiry</span></a></span><span> nowhere mention the word "privacy" and there is a strong emphasis on investigating the relationships between the press, police and politicians.  It is nonetheless obvious that the inquiry will touch on issues of press intrusion.  The terms of reference of the first part of the inquiry cover "the culture, practices, and ethics of the press, including ... the extent to which there was a failure to act on previous warnings about media misconduct".  The terms of reference of the second part demand an inquiry into "the extent of unlawful or improper conduct within News International and other newspaper organisations".</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>It is not entirely clear if the process envisages that the inquiry should make findings or recommendations as to the substantive law governing the protection of personal privacy from press intrusion.  The terms call for recommendations for "how future concerns about press behaviour ... should be dealt with by all the relevant authorities, including Parliament, Government, the prosecuting authorities and the police" and for "a new more effective policy and regulatory regime which supports the integrity and freedom of the press, the  plurality of the media and its independence from Government, while encouraging the highest ethical and professional standards."  This certainly seems to envisage regulatory change in the media industry (the Press Complaints Commission is officially moribund), but it does not suggest that legislative change is necessarily called for.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><em><span>See further chapter 11 of <span style="color: #c0504d;"><a href="http://www.lawsocietyshop.org.uk/ecom_lawsoc/public/saleproduct.jsf?catalogueCode=9781853288432" target="_blank"><span style="color: #c0504d; text-decoration: underline;">The Privacy Law Handbook</span></a></span></span></em></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span style="color: #c0504d;"><a href="http://blog.rpc.co.uk/privacy-law/public-inquiries-into-privacy-and-press-regulation" target="_blank"><span style="color: #c0504d; text-decoration: underline;">Thought - Prime Minister's pledge</span></a></span></p>]]></content:encoded></item><item><guid isPermaLink="false">{C36A7352-B487-4732-B0BF-C2F0F00E53B8}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/public-inquiries-into-privacy-and-press-regulation/</link><title>Public inquiries into privacy and press regulation</title><description><![CDATA[BBC Radio 4's PM programme's 'Privacy Commission' has finished hearing evidence and will presumably be publishing its report shortly.]]></description><pubDate>Sun, 10 Jul 2011 12:38:00 +0100</pubDate><category>Data and privacy</category><authors:names>Keith Mathieson</authors:names><content:encoded><![CDATA[<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Its terms of reference include "the recommendation of measures which may increase public confidence in media reporting in the UK and the protection of individuals' privacy".</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The report of the <em>PM</em> Privacy Commission - <span style="color: #c0504d;"><a href="http://www.bbc.co.uk/blogs/pm/2011/06/the_privacy_commission.shtml" target="_blank"><span style="color: #c0504d; text-decoration: underline;">further details here</span></a></span> - will of course have no legal status and if Parliament and the media wish to ignore it, they will be free to do so.  The 'Commission' can hardly claim (and does not claim) to have conducted a comprehensive review of the subject and it has taken 'evidence' from only 17 people.  Nonetheless, it has heard from people with interesting perspectives based on differing experiences and its report should provide a useful contribution to the current debate about whether the protection of people's privacy requires greater regulation of the media.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span style="color: #c0504d;"><a href="http://www.bbc.co.uk/blogs/pm/2011/06/the_privacy_commission.shtml" target="_blank"><span style="color: #c0504d; text-decoration: underline;">The <em>PM </em>website</span></a></span><span> contains links to transcripts of the evidence provided by its 17 witnesses, who include editors, lawyers, regulators and individuals who have been affected by media intrusion.  The members of the Commission are Sir Michael Lyons, former chairman of the BBC Trust, Baroness Liddell, a former Labour minister, and Lord Faulks, a Conservative peer who is also a practising QC.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><strong><span>Two new official inquiries </span></strong></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>In deciding to investigate and produce a report on privacy, the <em>PM </em>programme has been ahead of the game.  This week, <span style="color: #c0504d;"><a href="http://www.guardian.co.uk/politics/2011/jul/08/david-cameron-speech-phone-hacking" target="_blank"><span style="color: #c0504d; text-decoration: underline;">the Prime Minister was prompted by the phone-hacking scandal to announce that he would be setting up two inquiries</span></a></span>.  The first will look into the phone-hacking scandal itself, including "why the first police investigation failed so abysmally", but it will also examine "what was going on at other newspapers".  This inquiry will be led by a judge empowered to take evidence under oath.  The "bulk" of the work of this inquiry will be done only after the conclusion of the police investigations.  (There are two current investigations: Operation Weeting into phone-hacking based on documents seized in 2006 and Operation Elveden into alleged corruption of police officers based on documents just handed over by News International which show that "inappropriate" payments may have been made to a "small number" of police officers.)</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The second inquiry will "look at the culture, practices and ethics of the British press", in particular "how our newspapers are regulated".  The Prime Minister has said this inquiry should begin as soon as possible and should be conducted by a "credible and independent panel of figures who command the full support, respect and above all confidence of the public" whose only motive is to "seek the truth and clean up the press".  It will be intriguing to see which individuals are considered to possess these special attributes - presumably the sort of people who serve as "public" (i.e. non-press) members of the Press Complaints Commission.  Such individuals may be looking for new positions now that the Prime Minister has in effect abolished the PCC by declaring it "ineffective", "a failure" and "completely absent" in the phone-hacking case.  Or perhaps, as the PCC's public statement suggests, they still consider the PCC has a healthy future.  In this, they are likely to prove mistaken, whatever the past successes of the PCC may have been.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><em><span>See further chapter 11 of <span style="color: #c0504d;"><a href="http://www.lawsocietyshop.org.uk/ecom_lawsoc/public/saleproduct.jsf?catalogueCode=9781853288432" target="_blank"><span style="color: #c0504d; text-decoration: underline;">The Privacy Law Handbook</span></a></span></span></em></p>]]></content:encoded></item><item><guid isPermaLink="false">{800F8143-E57C-403B-B27F-82EB4AE910DD}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/phone-hacking-scandal-reaches-a-new-plane/</link><title>Phone hacking scandal reaches a new plane</title><description><![CDATA[If, as seems likely, it proves true that the News of the World did indeed hack into the voicemail messages of the abducted teenager Milly Dowler, the phone hacking saga moves onto an entirely new plane. ]]></description><pubDate>Wed, 06 Jul 2011 12:55:00 +0100</pubDate><category>Data and privacy</category><authors:names>Keith Mathieson</authors:names><content:encoded><![CDATA[<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span style="color: #c0504d;"><a href="http://blog.rpc.co.uk/privacy-law/phone-hacking-is-not-a-hanging-offence" target="_blank"><span style="color: #c0504d; text-decoration: underline;">This blog has previously argued</span></a></span><span> that the fuss about phone-hacking has been overblown - it is plainly wrong to intercept people's voicemails, but in many of the celebrity cases featured so far, no great or lasting harm appears to have been done and if damages are appropriate in the cases in which legal claims have been brought, they ought to be confined to reasonable levels.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Where the consequences of phone hacking affect the progress of a criminal investigation into the disappearance of a young girl and may have given her parents false hope that she might be found alive, it is difficult to maintain normal levels of academic detachment when considering what legal remedies might be appropriate.  Were there to be a civil action arising out of such activity - or similar activity towards the parents of the Soham schoolgirls - there is no current precedent that would seem to cater for the approach the court might take.  <span style="color: #c0504d;"><a href="http://www.telegraph.co.uk/news/uknews/crime/8618050/Milly-Dowler-hacking-News-International-statement-in-full.html" target="_blank"><span style="color: #c0504d; text-decoration: underline;">News International itself has conceded</span></a> </span>that if the accusations are true, the activity is 'unforgivable', 'appalling' and 'disgraceful'.  Nobody could disagree with that.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><em><span>See further section 3.9 of <span style="color: #c0504d;"><a href="http://www.lawsocietyshop.org.uk/ecom_lawsoc/public/saleproduct.jsf?catalogueCode=9781853288432" target="_blank"><span style="color: #c0504d; text-decoration: underline;">The Privacy Law Handbook</span></a></span></span></em></p>]]></content:encoded></item><item><guid isPermaLink="false">{649D094C-D476-4589-BAB4-0329AD51A629}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/disclosure-of-documents-in-privacy-litigation/</link><title>Disclosure of documents in privacy litigation</title><description><![CDATA[What documents is a claimant entitled to demand from a media defendant in a privacy case? ]]></description><pubDate>Wed, 06 Jul 2011 12:46:00 +0100</pubDate><category>Data and privacy</category><authors:names>Keith Mathieson</authors:names><content:encoded><![CDATA[<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Last week Eady J rejected a disclosure application against the Sunday Mirror by the footballer Rio Ferdinand, who is suing the paper for misuse of private information following publication of a kiss and tell story about his relationship with a woman.  The case is of some interest since there is little authority on the scope of disclosure in article 8 cases. </span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Ferdinand sought, among other things, documents (including but not limited to e-mails, handwritten notes, memos, agendas and tape recordings) 'relating to or concerning any views or discussions as to whether the publication of the information relating to the Claimant’s private life contained in the article was either lawful or in the public interest'.  He argued he was entitled to see such documents because it was relevant to the court's assessment of the newspaper's public interest defence to examine the newspaper's own deliberations on the matter.  (Ferdinand's lawyers were, presumably, hoping to show either that the paper hadn't actively considered the public interest or, if it had, that its consideration was in some way deficient.)</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>This was firmly rejected by the judge, who confirmed that the issue of public interest was a matter to be judged objectively.  The newspaper's own assessment of the public interest was not, therefore, a relevant factor.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The documents were also irrelevant to damages: if Ferdinand sought aggravated damages on the ground that the newspaper had caused him additional distress by publishing a story without any public interest "cover", he was free to do so without needing documentary evidence from the newspaper.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Ferdinand also sought disclosure of documents relating to the newspaper's "decision not to seek [his] consent to publication and/or warn him prior to publishing the information".  An order for disclosure was refused by the judge: the lack of notice was not in issue and if the claimant wished to say that he found it distressing not to have been given notice, he was able to do so without needing disclosure from the newspaper.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Finally, Ferdinand sought disclosure of documents concerning any payment made to the source of the story.  As it happens, the newspaper had already disclosed such documentation without admitting that it was obliged to do so.  Eady J was not therefore required to make any order.  He did, however, make some observations.  He said there was no necessary inconsistency between payment to a source and a public interest argument.  However, the question of payment might be relevant to the balancing exercise because the court "may attach less value to the exercise of free speech in a case where it is sought to be exercised, or was exercised, for financial or commercial reasons as opposed to reasons of a more lofty nature, such as the public interest."  The judge also suggested payment might be relevant in the context of aggravated damages "because a claimant may say: "I felt additional distress at the fact that a person with whom I formerly had a relationship has chosen to sell intimate details about that relationship to a media outlet for money", in other words for a kiss and tell purpose."</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>(<em>Rio Ferdinand v MGN Limited</em> [2011] EWHC 1719 (QB), 28 June 2011)</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><em><span>See further chapter 3 of <span style="color: #c0504d;"><a href="http://www.lawsocietyshop.org.uk/ecom_lawsoc/public/saleproduct.jsf?catalogueCode=9781853288432" target="_blank"><span style="color: #c0504d; text-decoration: underline;">The Privacy Law Handbook</span></a></span></span></em></p>]]></content:encoded></item><item><guid isPermaLink="false">{75DE2D4B-EEFE-4B7A-B510-F156D77022E1}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/justice-secretary-expresses-concern-over-mps-defying-injunctions/</link><title>Justice Secretary expresses concern over MPs defying injunctions</title><description><![CDATA[The Times has today reported that the Justice Secretary Ken Clarke yesterday told the Joint Committee on the Defamation Bill that he was concerned about the growing habit of using parliamentary privilege to defy court gagging orders.   ]]></description><pubDate>Thu, 16 Jun 2011 13:02:00 +0100</pubDate><category>Data and privacy</category><authors:names>Keith Mathieson</authors:names><content:encoded><![CDATA[<p style="margin: 0cm 0cm 10pt;">He told the committee that the Government was looking at the problem, which he described as "arguably" an abuse of parliamentary privilege.</p>
<p style="margin: 0cm 0cm 10pt;"><em>See further section 3.9.1 of <span style="color: #c0504d;"><a href="http://www.lawsocietyshop.org.uk/ecom_lawsoc/public/saleproduct.jsf?catalogueCode=9781853288432" target="_blank"><span style="color: #c0504d; text-decoration: underline;">The Privacy Law Handbook</span></a></span></em></p>
<p style="margin: 0cm 0cm 10pt;"><span style="color: #c0504d;"><a href="http://www.thetimes.co.uk/tto/news/politics/article3063589.ece" target="_blank"><span style="color: #c0504d; text-decoration: underline;">The Times report</span></a></span></p>]]></content:encoded></item><item><guid isPermaLink="false">{75C381D7-67D4-42D4-999C-69AB6C34EDCE}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/a-former-judge-reflects-on-privacy-injunctions/</link><title>A former judge reflects on privacy injunctions</title><description><![CDATA[Mr Justice Eady's interview last month by Joshua Rosenberg -]]></description><pubDate>Wed, 15 Jun 2011 13:09:00 +0100</pubDate><category>Data and privacy</category><authors:names>Keith Mathieson</authors:names><content:encoded><![CDATA[<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Published by <span style="color: #c0504d;"><a href="http://www.indexoncensorship.org/2011/06/mr-justice-eady-on-balancing-acts/" target="_blank"><span style="color: #c0504d; text-decoration: underline;">Index on Censorship</span></a></span> -was featured on a recent edition of Radio Four's Today programme and has also been the subject of entries on the <span style="color: #c0504d;"><a href="http://inforrm.wordpress.com/2011/06/14/news-joshua-rozenberg-interviews-mr-justice-eady/" target="_blank"><span style="color: #c0504d; text-decoration: underline;">Inforrm</span></a> </span>and <span style="color: #c0504d;"><a href="http://meejalaw.com/2011/06/13/balancing-rights-joshua-rozenberg-interviews-mr-justice-eady/" target="_blank"><span style="color: #c0504d; text-decoration: underline;">Meeja Law</span></a></span> blogs.  An interesting essay by Stephen Sedley, the recently retired Court of Appeal judge, has now appeared in the latest issue of the London Review of Books.  The essay, entitled <em>The Goodwin and Giggs Show</em>,<em> c</em>an be accessed <span style="color: #c0504d;"><a href="http://www.lrb.co.uk/v33/n12/stephen-sedley/the-goodwin-and-giggs-show" target="_blank"><span style="color: #c0504d; text-decoration: underline;">here</span></a></span>. </span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>As well as appearing in a number of privacy cases, including <em>Douglas v Hello! (No 1) </em>2000 QB 967, Stephen Sedley has written previously on privacy for the LRB.  Students of privacy law will be entertained and enlightened by his 2006essay <em>Towards A Right Of Privacy </em>part of which is available <span style="color: #c0504d;"><a href="http://www.lrb.co.uk/v28/n11/stephen-sedley/towards-a-right-to-privacy" target="_blank"><span style="color: #c0504d; text-decoration: underline;">here</span></a> </span>(the full version is available to LRB subscribers).</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>In his latest essay Sedley explains concisely and convincingly why the naming of Fred Goodwin in the House of Lords and Ryan Giggs in the Commons is a "serious breach of constitutional principle", offending the "historic compromise" whereby Parliament does not interfere with the decisions of the courts in return for the courts not impeaching or questioning proceedings in Parliament.  He implies that the Speakers of both Houses have failed in their duties by neglecting to take steps against those who named Goodwin and Giggs.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Sedley also lays into the media, not just for "exploiting" the Giggs and Goodwin cases, but for "merchandising voyeurism" and double standards.  He suggests that the tabloid press's defence of its "right" to publish details of people's private lives is bogus and dangerous:</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Observers with a sense of history have noted that the tabloids' self-justification, advanced in the name of press freedom, mirrors that of the authoritarian state.  The <em>Sun </em>columnist Jane Moore admonishes errant public figures: 'If you don't want your private life splashed all over the papers, then behave yourselves.'  Or, as it was once put, if you have nothing to hide, you have nothing to fear - for there is only one way the state or the <em>Sun </em>can know whether you are behaving yourself.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>On the issue of super-injunctions, Sedley suggests these were "forced on the courts by the repeated undermining of their orders" by the media, i.e. the media have only themselves to blame for super-injunctions.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><em><span>See further chapter 3 and section 10.3 of <span style="color: #c0504d;"><a href="http://www.lawsocietyshop.org.uk/ecom_lawsoc/public/saleproduct.jsf?catalogueCode=9781853288432" target="_blank"><span style="color: #c0504d; text-decoration: underline;">The Privacy Law Handbook</span></a></span></span></em></p>]]></content:encoded></item><item><guid isPermaLink="false">{723EA116-C240-4607-96DC-FB78C1698656}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/a-digest-of-recent-news-1-uk-judgments/</link><title>A digest of recent news (1) - UK judgments</title><description><![CDATA[For one reason and another, the blog has been unable to report on much of the recent news.  This entry is an attempt to remedy the situation.  Normal service should be resumed shortly.]]></description><pubDate>Mon, 30 May 2011 13:15:00 +0100</pubDate><category>Data and privacy</category><authors:names>Keith Mathieson</authors:names><content:encoded><![CDATA[<p style="margin: 0cm 0cm 10pt; text-align: justify;"><strong><span>UK court judgments</span></strong></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><strong><span style="color: #c0504d;"><a href="http://www.bailii.org/ew/cases/EWHC/QB/2011/1192.html" target="_blank"><span style="color: #c0504d; text-decoration: underline;">MJN v News Group</span></a></span></strong></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>A footballer case where the Sun wished to publish the account by a lingerie model of her affair with a married Premiership player.  Beatson J made an order on 5 May which was not opposed by the Sun (and the terms of which had indeed been discussed in advance between Counsel for the claimant and Counsel for the Sun).  The order permitted the model to tell her story provided she did not identify the player or include salacious details of the affair.  The resulting story in the Sun included a tabloid-speak reference to the order: "<em>The only version of this story that rat's lawyers will let us print</em>".</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>On the return date Sharp J was satisfied that (a) the claimant had a reasonable expectation of privacy in the information (the affair had been conducted in private; hardly anyone knew about it; the claimant said he and his wife would suffer distress and embarrassment if it were now to be disclosed; and the claimant had not previously courted publicity); and (b) publication would constitute an unjustifiable interference with the claimant's private and family life.  The judge considered it a material factor in her decision to continue the injunction that the Sun and its "very experienced" legal advisers were not opposing the continuation of the order (subject to the two provisos mentioned above).</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>An interesting aspect of the case is Sharp J's decision to hold the hearing in public despite the claimant's application that it should be heard in private.  As <span style="color: #c0504d;"><a href="http://inforrm.wordpress.com/2011/05/14/case-comment-mjn-v-news-group-privacy-injunction-telling-the-story-and-public-hearing-sara-mansoori/" target="_blank"><span style="color: #c0504d; text-decoration: underline;">Sara Mansoori has noted on the Inforrm blog</span></a></span>, this was a departure from the normal practice.  The current indications are, however, that the courts will now hear privacy applications in public whenever possible: see, e.g. <em>Goodwin</em> and <em>TSE</em>, discussed below.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><strong><span style="color: #c0504d;"><a href="http://www.bailii.org/ew/cases/EWHC/QB/2011/1309.html" target="_blank"><span style="color: #c0504d; text-decoration: underline;">Goodwin v News Group</span></a></span></strong></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>This case was first reported under the reference <em><span style="color: #c0504d;"><a href="http://www.bailii.org/ew/cases/EWHC/QB/2011/528.html" target="_blank"><span style="color: #c0504d; text-decoration: underline;">MNB v News Group</span></a></span>, </em>a decision by Sharp J.  The fact that MNB happened to be Sir Fred Goodwin, former chief executive of RBS, emerged later in <span style="color: #c0504d;"><a href="http://www.bailii.org/ew/cases/EWHC/QB/2011/1309.html" target="_blank"><span style="color: #c0504d; text-decoration: underline;">the judgment of Tugendhat J</span></a></span> following an application to vary the injunction granted by Sharp J, one effect of which was to prevent identification of Sir Fred as the claimant.  That application was based on <span style="color: #c0504d;"><a href="http://www.telegraph.co.uk/news/newsvideo/uk-politics-video/8523470/Lord-exposes-Sir-Fred-Goodwin-super-injunction-in-Parliament.html" target="_blank"><span style="color: #c0504d; text-decoration: underline;">a statement by Lord Stoneham in the House of Lords</span></a></span> in which he revealed that Sir Fred had obtained a "super-injunction" to hide an alleged relationship with a senior colleague.  That statement was widely reported on newspaper and other websites within minutes of being made.  Sir Fred recognised the futility of attempting to deny that he was the claimant and did not oppose the application to identify him.  He did, however, oppose any variation of the order that would permit either (a) publication of any details of the alleged relationship or (b) identification of the lady in question.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>This was not the first time Sir Fred's injunction had been mentioned in Parliament.  John Hemming MP had previously mentioned the fact that Sir Fred had obtained an injunction (allegedly a super-injunction, not in fact the case).  That statement was made in the House of Commons and <span style="color: #c0504d;"><a href="http://www.dailymail.co.uk/news/article-1365047/Former-RBS-boss-Sir-Fred-Goodwin-named-Parliament-having-taken-super-injunction.html" target="_blank"><span style="color: #c0504d; text-decoration: underline;">was widely reported</span></a></span>.  But it was not until Lord Stoneham's intervention that the subject-matter of the injunction became publicly known.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Following Lord Stoneham's statement, Tugendhat J was on the same day (19 May) invited by the defendant News Group and by Mirror Group and Associated Newspapers as third party intervenors to permit identification of the lady.  (None of the newspapers sought to publish details of the relationship.)  Tugendhat J refused the application on the ground that there was no justification for interfering with the lady's right to private and family life.  In his judgment [at paras 9 - 11] he criticised Lord Stoneham and the media for inaccuracies in their reporting of the circumstances in which Sharp J had granted the original injunction.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>A fuller report and case comment by Edward Craven are on the Inforrm blog <span style="color: #c0504d;"><a href="http://inforrm.wordpress.com/2011/05/24/case-comment-goodwin-v-news-group-newspapers-edward-craven/" target="_blank"><span style="color: #c0504d; text-decoration: underline;">here</span></a></span>.  A detailed case summary and comment by 1 Brick Court on the original <em>MNB</em> decision appears <span style="color: #c0504d;"><a href="http://www.onebrickcourt.com/cases.aspx?menu=main&pageid=42&caseid=370&archive=" target="_blank"><span style="color: #c0504d; text-decoration: underline;">here</span></a></span>.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Following Tugendhat's decision of 19 May, the lady in question complained that the Daily Mail had breached the injunction by publishing information about her that would have enabled her to be identified.  She asked Tugendhat J to refer the Mail to the Attorney General for contempt of court.  <span style="color: #c0504d;"><a href="http://www.bailii.org/ew/cases/EWHC/QB/2011/1341.html" target="_blank"><span style="color: #c0504d; text-decoration: underline;">In a judgment handed down on 27 May</span></a></span> Tugendhat J declined to refer the matter on the ground that he did not think it would assist the Attorney General to whom the lady was free to refer the matter herself.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><strong><span>CTB v News Group</span></strong></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Another footballer case.  <span style="color: #c0504d;"><a href="http://www.bailii.org/ew/cases/EWHC/QB/2011/1232.html"><span style="color: #c0504d; text-decoration: underline;">The first judgment in </span></a><em><a href="http://www.bailii.org/ew/cases/EWHC/QB/2011/1232.html"><span style="color: #c0504d; text-decoration: underline;">CTB</span></a> </em></span>was conventional: the Sun was enjoined from publishing the identity of a married footballer who had had a fling with a young woman, in this case a former <em>Big Brother</em> contestant once voted 'sexiest housemate ever'.    The judgment is nonetheless interesting because Eady J took the opportunity to address suggestions by press and politicians that the courts were "introducing a law of privacy by the back door".  The judgment concisely sets out the way in which the courts have sought to resolve tensions between article 8 and 10 rights.  In the words of Eady J at para [33] of the judgment:</span></p>
<p style="margin: 0cm 0cm 10pt 36pt; text-align: justify;"><span>It follows that one can rarely arrive at the answer in any given case merely by reference to generalities.  It must all depend upon the particular facts of the case.  It follows too that there can be no <em>automatic</em> priority accorded to freedom of speech.  The relative importance of the competing values must be weighed by reference to the individual set of circumstances confronting the court.  Of course the court will pay particular regard to freedom of expression, but that does not entail giving it automatic priority.  All will depend on the value to be attached to the exercise or proposed exercise of that freedom in the particular case.  It will rarely be the case that the privacy rights of an individual or of his family will have to yield in priority to another’s right to publish what has been described in the House of Lords as “tittle-tattle about the activities of footballers’ wives and girlfriends”:  see e.g. <em>Jameel v Wall Street Journal Europe SPRL</em> [2007] 1 AC 359 at [147].  It has recently been re-emphasised by the Court in Strasbourg that the reporting of “tawdry allegations about an individual’s private life” does not attract the robust protection under Article 10 afforded to more serious journalism.  In such cases, “freedom of expression requires a more narrow interpretation”:  <em>Mosley v UK </em>(App. No. 48009/08), 10 May 2011, at [114].</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Eady J's later judgment in <em><span style="color: #c0504d;"><a href="http://www.bailii.org/ew/cases/EWHC/QB/2011/1326.html" target="_blank"><span style="color: #c0504d; text-decoration: underline;">CTB v News Group (No 2)</span></a></span></em> is also interesting.  There were two applications before the judge.  First, News Group applied for the order to be varied so as to reveal the footballer's identity on the ground that his identity was the subject of widespread coverage on the internet such that it was now pointless to continue the anonymity order.  Second, the claimant applied for specific disclosure by News Group of emails and other documents identifying or tending to identify the claimant (the intention apparently being to show that News Group or its employees had breached the order by disclosing who the claimant was).</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>It was said on behalf of News Group that tens of thousands of people could find out who CTB was by making appropriate internet searches.  Eady J was unimpressed by this argument for a variation, seeing its logical conclusion as being that courts should never make injunctions on the basis that defendants or others might ignore them:</span></p>
<p style="margin: 0cm 0cm 10pt 36pt; text-align: justify;"><span>One has only to pose the question for the answer to become obvious.  Should the court buckle every time one of its orders meets widespread disobedience or defiance?  In a democratic society, if a law is deemed to be unenforceable or unpopular, it is for the legislature to make such changes as it decides are appropriate.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Eady J's attention was drawn to his own ruling in <span style="color: #c0504d;"><a href="http://www.bailii.org/ew/cases/EWHC/QB/2008/687.html" target="_blank"><span style="color: #c0504d; text-decoration: underline;">Mosley</span></a> </span>where he decided that the extent to which the private information had been accessed meant there was no longer any purpose in granting an injunction.  In that case, the publicity had occurred prior to the injunction being granted, whereas here:</span></p>
<p style="margin: 0cm 0cm 10pt 36pt; text-align: justify;"><span>... the Internet allegations prayed in aid by Mr Spearman took place after the order was made.  Different policy considerations come into play when the court is invited to abandon the protection it has given a litigant on the basis of widespread attempts to render it ineffective.  Furthermore, unlike the <em>Mosley</em> case, there is no doubt other information that Ms Thomas could yet publish, quite apart from this Claimant’s identity, which is not yet in the public domain.  The injunction thus continues to serve a useful purpose, from the Claimant’s point of view, for that reason alone, since she is amenable to the jurisdiction of the court.  Otherwise, he would not seek to maintain it.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Eady J considered that the law had to protect information in respect of which there was a <em>reasonable </em>expectation of privacy and "what is “reasonable” depends on the circumstances.  It is a concept that is not susceptible in itself to bright line boundaries".  He continued:</span></p>
<p style="margin: 0cm 0cm 10pt 36pt; text-align: justify;"><span>It is important always to remember that the modern law of privacy is not concerned solely with information or “secrets”:  it is also concerned importantly with <em>intrusion</em>.  That is one reason why it can be important to distinguish between the way the law approaches public domain arguments in relation to commercial or state secrets, for example, and that which is appropriate to personal information.  It also largely explains why it is the case that the truth or falsity of the allegations in question can often be irrelevant:  see e.g. <em>McKennitt v Ash</em> [2008] QB 73 at [80] and [87].</span></p>
<p style="margin: 0cm 0cm 10pt 36pt; text-align: justify;"><span>It is fairly obvious that wall-to-wall excoriation in national newspapers, whether tabloid or “broadsheet”, is likely to be significantly more intrusive and distressing for those concerned than the availability of information on the Internet or in foreign journals to those, however many, who take the trouble to look it up.  Moreover, with each exposure of personal information or allegations, whether by way of visual images or verbally, there is a new intrusion and occasion for distress or embarrassment.  Mr Tomlinson argues accordingly that “the dam has not burst”.  For so long as the court is in a position to prevent <em>some </em>of that intrusion and distress, depending upon the individual circumstances, it may be appropriate to maintain that degree of protection.  The analogy with King Canute to some extent, therefore, breaks down.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>So that is the judicial answer to the question many people are currently asking: what future do privacy injunctions have in the days of social networking and the internet?  As Eady J further explained:</span></p>
<p style="margin: 0cm 0cm 10pt 36pt; text-align: justify;"><span>... it seems to me that the right question for me to ask, in the light of <em>JIH v News Group Newspapers Ltd</em> [2011] 2 All ER 324 and <em>Re Guardian News and Media Ltd</em> [2010] UKSC 1, is whether there is a solid reason why the Claimant’s identity should be generally revealed in the national media, such as to outweigh the legitimate interests of himself and his family in maintaining anonymity.  The answer is as yet in the negative.  They would be engulfed in a cruel and destructive media frenzy.  Sadly, that may become unavoidable in the society in which we now live but, for the moment, in so far as I am being asked to sanction it, I decline to do so.  On the other side, as I recorded in my judgment on 16 May, it has not been suggested that there is <em>any</em> legitimate public interest in publishing the story.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>In relation to CTB's application for disclosure, this was refused by Eady J on the grounds that it was unnecessary and disproportionate and might well expose the defendant to the risk of self-incrimination.  (The newspaper had argued that the application was entirely speculative, there being no evidence of any breach by it or its employees.)  In any event, if the claimant considered that a contempt of court had been committed, Eady J said it was open to him to report the matter to the Attorney General for further action.  (Compare the similar approach by Tugendhat J in <em>Goodwin</em>, discussed above.)</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span style="text-decoration: underline;">Note</span><span>: On the same day as Eady J declined to vary the injunction, <span style="color: #c0504d;"><a href="http://www.telegraph.co.uk/technology/twitter/8532001/Ryan-Giggs-unmasked-as-gagging-order-footballer.html" target="_blank"><span style="color: #c0504d; text-decoration: underline;">CTB was named in the House of Commons</span></a></span>.  The decision to identify him has been welcomed by <span style="color: #c0504d;"><a href="http://www.dailymail.co.uk/debate/article-1390215/Ryan-Giggs-super-injunction-John-Hemming-brought-end-farce.html" target="_blank"><span style="color: #c0504d; text-decoration: underline;">some</span></a> </span>but not by <span style="color: #c0504d;"><a href="http://www.guardian.co.uk/commentisfree/2011/may/24/rightwing-media-makes-political-personal" target="_blank"><span style="color: #c0504d; text-decoration: underline;">others</span></a></span>.  Following the naming of CTB in the House of Commons, News Group attempted once more to persuade the court to remove the anonymity order.  In what may seem to many people a curious decision, <span style="color: #c0504d;"><a href="http://www.bailii.org/ew/cases/EWHC/QB/2011/1334.html" target="_blank"><span style="color: #c0504d; text-decoration: underline;">the application was refused</span></a></span>.  Tugendhat J explained his decision as follows:</span></p>
<p style="margin: 0cm 0cm 10pt 36pt; text-align: justify;"><span>It is obvious that if the purpose of this injunction were to preserve a secret, it would have failed in its purpose. But in so far as its purpose is to prevent intrusion or harassment, it has not failed. The fact that tens of thousands of people have named the claimant on the internet confirms that the claimant and his family need protection from intrusion into their private and family life. The fact that a question has been asked in Parliament seems to me to increase, and not to diminish the strength of his case that he and his family need that protection. The order has not protected the claimant and his family from taunting on the internet. It is still effective to protect them from taunting and other intrusion and harassment in the print media. </span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><strong><span style="color: #c0504d;"><a href="http://www.bailii.org/ew/cases/EWHC/QB/2011/1308.html" target="_blank"><span style="color: #c0504d; text-decoration: underline;">TSE v News Group</span></a></span></strong></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Yet another footballer case.  The facts are similar to <em>MJN</em>, discussed above: married footballer with children, sexual relationship with woman not his wife, etc etc, except that in this case the woman in question also wished to keep the thing private and was a claimant in the proceedings jointly with the footballer.  An injunction was of course granted with anonymity to both claimants despite there apparently having been a certain amount of publicity about the matter on the internet, including Twitter: see para 28 of the judgment of Tugendhat J.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>In what is becoming something of a pattern, the judge took the opportunity to address what he saw as certain misconceptions about the developing law of privacy, in this case that injunctions granted by the courts are disproportionately beneficial to professional footballers.  The judge noted that there is no stereotypical privacy claimant; that many claimants are women and children; and many cases do not involve information of a sexual nature.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Another interesting aspect of the case was the judge's criticism of News Group for its practice of neither opposing nor consenting to applications for injunctions, apparently because this enabled it to tell its readers it had been "gagged" without having to go to the trouble and expense of going to court to contest the application.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><em><span>See further sections 3.9 and 10.3 of <span style="color: #c0504d;"><a href="http://www.lawsocietyshop.org.uk/ecom_lawsoc/public/saleproduct.jsf?catalogueCode=9781853288432" target="_blank"><span style="color: #c0504d; text-decoration: underline;">The Privacy Law Handbook</span></a></span></span></em></p>]]></content:encoded></item><item><guid isPermaLink="false">{87D3EAB2-4477-4361-964E-C9C06F2E5E44}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/are-privacy-injunctions-too-restrictive/</link><title>Are privacy injunctions too restrictive?</title><description><![CDATA[Has privacy law gone too far?  It’s not just the editor of the Daily Mail who thinks so.]]></description><pubDate>Fri, 13 May 2011 13:30:00 +0100</pubDate><category>Data and privacy</category><authors:names>Keith Mathieson</authors:names><content:encoded><![CDATA[<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span style="color: #c0504d;"><a href="http://www.mirror.co.uk/news/latest/2011/04/21/cameron-uneasy-about-privacy-law-115875-23077623/" target="_blank"><span style="color: #c0504d; text-decoration: underline;">The Prime Minister has said</span></a></span><span> he is “uneasy” about judges “creating a sort of privacy law” and Andrew Marr is perhaps the first (and probably the last) privacy claimant <span style="color: #c0504d;"><a href="http://www.bbc.co.uk/news/uk-13190424" target="_blank"><span style="color: #c0504d; text-decoration: underline;">to express embarrassment</span></a></span> over his own injunction.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>It is at best a half-truth for David Cameron to suggest that it is judges, not Parliament, that are making the law.  The principal driver of the cause of action now known as misuse of private information is the Human Rights Act 1998.  That statute incorporated into UK law Article 8 of the European Convention on Human Rights, which enshrines a person’s right to “private and family life”.  While it is true that judges have made the decisions that now govern use and misuse of private information at common law, they could not have done so had Parliament itself not first introduced the Human Rights Act.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Another area where mythology has taken hold is super-injunctions.  A super-injunction is not just another name for an anonymity order.  It is an injunction the terms of which prevent disclosure even of the fact that the proceedings in question exist.  For all the fuss that is made about them, and before Lord Neuberger's super-injunction committee has even reported, super-injunctions are for all practical purposes already dead.  There is not a single recorded instance of a super-injunction having been made in 2011.  The only circumstances in which the courts are in the future likely to make super-injunctions are cases where the defendant cannot be trusted with the information that proceedings are being taken against him.  If the court believes a defendant, particularly a blackmailer, will frustrate an injunction if he realises a court application is pending, it may well consider it appropriate to conceal the existence of the proceedings until the order can be served on him.  To most people, that would seem to be a reasonable and practical solution where there is reason a defendant will do whatever he can to defy the court's authority or avoid its jurisdiction.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>While super-injunctions are rare, anonymity orders are all around us.  The prevalence of anonymity orders in privacy cases is not just creating an alphabet soup for lawyers; it is itself feeding speculation, often hilariously wrong, about who is involved and encouraging notions that the courts are developing a new form of secret justice.  Following the decision in <em><span style="color: #c0504d;"><a href="http://www.bailii.org/ew/cases/EWCA/Civ/2011/42.html" target="_blank"><span style="color: #c0504d; text-decoration: underline;">JIH v News Group</span></a></span></em>, the procedure of choice in cases involving interim injunctions now appears to be anonymisation of the person seeking privacy but disclosure of the nature of the information that person is seeking to protect.   It has long been part of our system of open justice that the public should know who is suing whom. This unsatisfactory expedient – unique to privacy cases - represents a significant derogation from that principle.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>This derogation from open justice is of course justified on the basis that if you permit the public to know that the star of a TV soap is trying to stop someone publishing photographs of him visiting a Thai massage parlour, that is tantamount to revealing the very information he is seeking to protect. But is the ring of steel cast round so many privacy cases really necessary and proportionate?  It is not as if the courts are giving much away about the allegedly private information these anonymous claimants are seeking to protect.  In an effort to prevent the public putting two and two together, and even to dampen speculation on the internet, the courts now use a form of order known as a "<em>DFT</em>" order to prevent the publication of any material not contained in the court's judgment or order.  So far, the judges have taken a highly restrictive approach, possibly reflecting their distrust of the media and users of the internet.  That distrust is not always justified.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Are the courts sometimes too willing to accept privacy claims at face value?  Mr Justice Tugendhat saw through John Terry's attempt to stop the press revealing his alleged affair, finding he was more concerned about his sponsorship deals than any distress a breach of his privacy might cause.  Other celebrities have had an easier ride.  In some cases there is no doubt that men behaving badly are effectively using privacy law to manage their reputations and very probably to keep their affairs quiet from their partners.  Following the decision in <em><span style="color: #c0504d;"><a href="http://www.bailii.org/ew/cases/EWCA/Civ/2011/439.html" target="_blank"><span style="color: #c0504d; text-decoration: underline;">ETK</span></a></span></em>, your privacy rights are enhanced if you happen to have children who might be distressed by revelation of your misconduct. </span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>There have so far been few cases in which the courts have had to give real consideration to the public interest in publishing private information.  The "intense focus" the law requires is a process not best suited to the determination of cases dealt with on an interim or emergency basis.  It is unfortunate that the scope of important new privacy rights is being determined mainly in cases involving emergency applications prepared at short notice where not all parties are even represented, but that is a feature of privacy that is unlikely to change.  Even if a statutory tort of privacy existed, it would still be the courts' job to apply that law to individual cases and we can be certain that some of their decisions would be no less controversial than they already are.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><em><span>This article first appeared in the 12 May 2011 of <span style="color: #c0504d;"><a href="http://www.legalweek.com/" target="_blank"><span style="color: #c0504d; text-decoration: underline;">Legal Week</span></a></span></span></em></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><em><span>See further sections 3.9 and 10.3 of <span style="color: #c0504d;"><a href="http://www.lawsocietyshop.org.uk/ecom_lawsoc/public/saleproduct.jsf?catalogueCode=9781853288432" target="_blank"><span style="color: #c0504d; text-decoration: underline;">The Privacy Law Handbook</span></a></span></span></em></p>]]></content:encoded></item><item><guid isPermaLink="false">{C76F5FFE-8A27-4D91-BE51-8131BD38BB42}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/the-effect-of-privacy-injunctions-on-third-parties/</link><title>The effect of privacy injunctions on third parties</title><description><![CDATA[In general, an injunction made against a defendant does not affect a third party.  ]]></description><pubDate>Thu, 21 Apr 2011 06:12:00 +0100</pubDate><category>Data and privacy</category><authors:names>Keith Mathieson</authors:names><content:encoded><![CDATA[<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>That proposition is, however, subject to the well-known <em>Spycatcher </em>principle, which is that an interlocutory injunction preventing a person from disclosing private and/or confidential information also prevents third parties from disclosing the information provided they have been given notice of the injunction.  The principle is based on the need to 'hold the ring' pending trial: if other people publish the information the claimant is seeking to protect, that will frustrate the purpose of the claimant's proceedings.  This is of course the reason why lawyers representing claimants in privacy cases normally circulate to media organisations the details of any injunction they have obtained as soon as possible after it has been made.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Since the <em>Spycatcher </em>principle is based on the imperative of preserving the status quo until the conclusion of the trial, it follows that it no longer applies once the trial is over and judgment has been given: <span style="color: #c0504d;"><a href="http://www.bailii.org/ew/cases/EWHC/QB/2002/1866.html" target="_blank"><span style="text-decoration: underline;"><em><span style="color: #c0504d;">Jockey Club v Buffham </span></em><span style="color: #c0504d;">[2002] EWHC 1866</span></span></a></span>.  This has the odd, but logically sound, consequence that a privacy claimant in possession of an interlocutory injunction is in a sense better off than one with a final order.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Following this week's decision of Eady J in <span style="color: #c0504d;"><a href="http://www.bailii.org/ew/cases/EWHC/QB/2011/1059.html" target="_blank"><span style="text-decoration: underline;"><em><span style="color: #c0504d;">OPQ v BJM and CJM</span></em><span style="color: #c0504d;"> [2011] EWHC 1059</span></span></a></span>, the position may be less straightforward than it seemed.   An anonymous claimant had obtained an injunction banning the defendant and her partner from publishing information about his private life.  The case was described as "a straightforward and blatant blackmail case" involving the proposed sale of intimate photographs.  Copies of the injunction were served on the media; nothing was published; and within a short time the defendants had agreed to provide the claimant with a permanent undertaking not to publish the information in question.  As Eady J put it:</span></p>
<p style="margin: 0cm 0cm 10pt 36pt; text-align: justify;"><span>In due course, since there was no answer to the claim, agreement was reached between the parties. This included provision for an undertaking to be given to the court not to publish any of the confidential information. Thus the Claimant's legitimate objectives were achieved and there would be no longer any need for the proceedings to be continued against the Defendants or for a trial to take place. </span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>That would generally be an end to the matter, but OPQ was concerned that once a final order was in place, the information might nonetheless be published in the media once it was thought that the Spycatcher restraints had fallen away.  He therefore sought a <em>contra mundum</em> injunction, i.e. an injunction binding everyone, not just the parties to the action.  The basis for OPQ's concern about future publication is unclear from the judgment: Eady J simply observes at [26] that there is a "clear risk of publication in the media".  But at [24] he notes that following disclosure by OPQ to various newspaper groups of medical evidence suggesting that disclosure would have serious consequences for his and his family's mental health, the newspaper groups' opposition to OPQ's application fell away.  That might be thought to suggest the media were not in fact going to publish the information.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>At all events, Eady J decided to grant a <em>contra mundum</em> injunction.  His judgment sets out the basis on which he concluded he had jurisdiction to do so despite such injunctions having been granted previously only on very rare occasions.  Previous examples are the cases of the child killers Robert Thompson, Jon Venables and Mary Bell, where it was perceived that orders to protect their new identities were required to protect their rights to life and freedom from persecution.  Such an order was also made in favour of Maxine Carr, the former girlfriend of the Soham killer Ian Huntley.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Although there was no apparent risk to the lives of OPQ or his family (or if there was, this is not stated in the judgment), Eady J was apparently persuaded that there was a risk of serious adverse consequences, including to their mental health, and on that basis he concluded that there was "unfortunately no other means open to the court of fulfilling its obligation under the Human Rights Act to protect those rights than to grant a <em>contra mundum</em> injunction". </span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>This appears to be a significant extension of the jurisdiction to grant injunctions that bind third parties.  In the most recent edition of <em>Tugendhat and Christie's The Law of Privacy and the Media</em>, published just a few weeks ago, the editor’s note:</span></p>
<p style="margin: 0cm 0cm 10pt 36pt; text-align: justify;"><em><span>Contra mundum </span></em><span>orders are at the extremity of the court's power, and would not commonly be granted in aid of a private right, except where life or limb was at risk. [13.35]</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The passage is an illustration of the pace at which privacy law is evolving.  In the meantime, the Court of Appeal, in <em><span style="color: #c0504d;"><a href="http://www.bailii.org/ew/cases/EWCA/Civ/2011/409.html" target="_blank"><span style="color: #c0504d; text-decoration: underline;">Ambrosiadou v Coward [2011] EWCA 409</span></a></span></em>, has allowed an appeal against a refusal by Eady J to order an injunction preventing the publication of information about foreign family proceedings.  The Court of Appeal's rationale was that an injunction was required to prevent media publication even though it was satisfied that the defendant had no intention of publishing:</span></p>
<p style="margin: 0cm 0cm 10pt 36pt; text-align: justify;"><span>In the absence of an injunction, it would seem that there would be nothing to prevent a person, to whom an ineptly redacted copy of the May application notice was sent, actually reading the redacted material, and then publishing any information contained therein. An interlocutory injunction restraining the defendant from publishing such information would prevent such a person from doing so, provided that person had notice of the injunction, pursuant to the so-called <em>Spycatcher </em>principle. [38]</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>In Lord Neuberger's view, it was "quite possible that some media organisations have been holding off publishing in the light of the injunction granted <em>ex parte </em>by Maddison J and continued by Eady J pending this appeal".  On the face of it, it seems extraordinary that the court should grant an injunction to prevent the publication of private information not because the defendant is otherwise likely to publish it, but because of a "possibility" that the media might do so.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><em><span>See further sections 3.9 and 10.3 of <span style="color: #c0504d;"><a href="http://www.lawsocietyshop.org.uk/ecom_lawsoc/public/saleproduct.jsf?catalogueCode=9781853288432" target="_blank"><span style="color: #c0504d; text-decoration: underline;">The Privacy Law Handbook</span></a></span></span></em></p>]]></content:encoded></item><item><guid isPermaLink="false">{2760DB40-9589-47B4-AA8A-8E6B2311BEE4}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/workplace-affairs-are-private-especially-if-one-half-of-the-couple-has-children/</link><title>Workplace affairs are private - especially if one half of the couple has children</title><description><![CDATA[The Court of Appeal's judgment in ETK v News Group [2011] EWCA Civ 439 has prompted gasps of horror from some sections of the media.]]></description><pubDate>Wed, 20 Apr 2011 06:23:00 +0100</pubDate><category>Data and privacy</category><authors:names>Keith Mathieson</authors:names><content:encoded><![CDATA[<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>That is not surprising.  What may be more surprising is that the public, often suspicious of media self-interest in these matters, may in this case think the newspapers are right and the courts have indeed gone a step too far.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><strong><span>The facts</span></strong></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The case concerns a married man, ETK, working in the entertainment industry.  He and his wife have two teenage children.  In about November 2009 he began an affair with a work colleague, X, who is herself married. </span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Towards the end of April 2010 ETK's wife found out about the affair and confronted her husband. He agreed to end the affair and they resolved to stick together.  Although it was awkward for him to continue working with X, he did so, but in December 2010 their employer decided that X's services were no longer required.  X was upset and angry and appears to have threatened proceedings against the employer.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>In the meantime, the affair between X and ETK had become known to those with whom they worked and its existence had reached the ears of senior management (possibly as a result of ETK's and/or X's own disclosures). </span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Shortly after this, the News of the World found out about the affair.  This became known to ETK, who applied ror an injunction to prevent publication of the fact of the affair.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Collins J refused to grant an injunction.  He decided that although ETK had a reasonable expectation of privacy, there was a public interest in the effect of the affair on X's continued employment and it was therefore permissible for the newspaper to report the fact of the affair and X's resultant dismissal.  Although the interests of ETK's children were urged upon the judge, he decided that any adverse effect on them did not tip the balance.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><strong><span>Did ETK have a reasonable expectation of privacy?</span></strong></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Yes, said the Court of Appeal.  In perhaps the single most striking passage of the judgment, Lord Justice Ward said this:</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Here the sexual relationship was essentially a private matter.  One way or another it became known to work colleagues but their knowledge does not put the information into the public domain – see <em>Browne v Associated Newspapers Ltd </em>cited at [10(3)] above.  In my judgment the appellant was reasonably entitled to expect that his colleagues would treat as confidential the information they had acquired whether from their own observation of the behaviour of the appellant and X or from tittle-tattle and gossip which larded the office conversation or from a confidential confession to a colleague.  A reasonable person of ordinary sensibilities would certainly find the disclosure offensive. [11]</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>This is surely a questionable judgment.  If a workplace affair becomes known to colleagues, why should the "disclosure" of such an affair necessarily be regarded as offensive?  If the affair has become widely known, one might argue it becomes equally offensive for those with the most vital interests in the matter - the couple's families - <em>not </em>to know.  There are all kinds of reasons why people might reasonably expect workplace affairs not to remain under wraps.  In some circumstances, such affairs cause obvious conflicts of interest and encourage suspicions of favouritism.  Sometimes, they may have a direct and harmful effect on job performance. </span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Does the knowledge of work colleagues never put a workplace affair into the public domain?  Even if everyone in the company knows?  And what if only the most important people in the company know?  Is the affair to be judged not in the public domain because the "less important" workers haven't got to know about it?  And how many "confidential" disclosures does it take before the information ceases to be truly confidential?  Can someone in the position of ETK tell as many people as he wants about the affair as long as he tells them he's speaking off the record?  Is it fair to describe the disclosure of workplace affairs as "tittle-tattle and gossip"?  The disclosure of an affair between the chief executive of a public authority and its head of human resources is surely more than just tittle-tattle.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><strong><span>The public interest</span></strong></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The judge who refused ETK's application for an injunction was operating as the weekend duty judge and had to deal with the matter quickly and at short notice.  He nonetheless considered on the evidence before him that there was a legitimate public interest in publishing the fact of the affair because it appears to have resulted in X losing her job. </span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Regrettably, the judgment of the Court of Appeal is unhelpful in explaining why the court disagreed with the judge on this point.  On the face of things, there would appear to be a public interest in knowing that a female employee, apparently in the public eye, had lost her job because of an affair with a colleague.  Ward LJ, with whose judgment Laws LJ and Moore-Bick LJ agreed, saw no public interest in the story:</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Here there is no political edge to the publication.  The organisation of the economic, social and political life of the country, so crucial to democracy, is not enhanced by publication.  The intellectual, artistic or personal development of members of society is not stunted by ignorance of the sexual frolics of figures known to the public. ...</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The decisive factor is the contribution the published information will make to a debate of general interest.  Is a debate about the reasons why X’s employment terminated a matter of such public interest?  Both the appellant and X will be known to a sector of the public though it is impossible to measure how large – or how small – that sector is.  Certainly some members of the public will have noticed the end of her employment: a proportion of them will even have speculated why she left.  But the reasons for her leaving give rise to no debate of general interest.  The reasons for her leaving may interest some members of the public but the matters are not of public interest.  Publication may satisfy public prurience but that is not a sufficient justification for interfering with the private rights of those involved. [21, 23]</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>This appears to take a rather narrow view of the public interest and it seems extreme to suggest that a report restricted to the fact of an affair and the consequential dismissal of the woman involved would do no more than "satisfy public prurience".  Perhaps if the couple in question had been engaged in positions of public trust, the position might have been different, but the judgment is unilluminating.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><strong><span>The interests of the children</span></strong></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The crux of the Court of Appeal's decision was as follows:</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>In my judgment the benefits to be achieved by publication in the interests of free speech are wholly outweighed by the harm that would be done through the interference with the rights to privacy of all those affected, especially where the rights of the children are in play. [22]</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>It is well-established that in conducting the necessary balancing exercise between competing rights of privacy and freedom of expression, an intense focus is required on the comparative importance of the rights in question.  It is equally well-established that the court must consider not just the rights of the claimant, but the rights of others such as the woman the claimant has had an affair with and any children who may be affected by publication.  What appears new about the decision in <em>ETK</em> is the degree of importance attached to the rights of the children.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>In refusing the injunction, Collins J said this:</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>My last concern relates to the claimant’s children.  As Mr Tomlinson rightly points out, there is likely to be an adverse effect on them if the News of the World discloses the fact of the adultery.  One recognises the concerns that this issue raises but unfortunately if one parent behaves in a way that attracts adverse publicity it will affect the children.  This is not something which can tip the balance if there is otherwise no good reason to grant an injunction.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>This seems a calm and sensible assessment.  Children may well be affected by the consequences of their parents' adulterous affairs, though one might think that press coverage would in fact be one of the less serious consequences.  Moreover, is there not something unattractive about using the effect of your own behaviour on your children as a means of bolstering your own case against a newspaper?  And is this not even more so in circumstances where the children are not even aware that their rights are being asserted?</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The Court of Appeal disagreed fundamentally with the approach of Collins J.  They criticised the judge for failing to take proper account of the fact that both X and ETK's own wife were opposed to publication, but they reserved their most serious criticism for suggesting that the interests of the children should not tip the balance against publication.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>It is unclear from the judgment whether the court was in possession of any evidence about the effect of publication on the children.  It is not even clear if the children already knew their father had been having an affair.  Whatever the position on the evidence was, Ward LJ was clear about the adverse effects:</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The purpose of the injunction is both to preserve the stability of the family while the appellant and his wife pursue a reconciliation and to save the children the ordeal of playground ridicule when that would inevitably follow publicity.  They are bound to be harmed by immediate publicity, both because it would undermine the family as a whole and because the playground is a cruel place where the bullies feed on personal discomfort and embarrassment.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Once again, these generalisations seem questionable.  Not all children behave like characters from <em>Lord of the Flies</em>.  Many of us with experience of teenage children are more struck by their solidarity and resilience in the face of ordeals such as death and divorce than their cruelty or shark-like tendencies. </span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Ward LJ then proceeded to examine recent Strasbourg and UK Supreme Court authorities which support the proposition that "in all decisions concerning children, their best interests must be paramount".  He referred to article 3(1) of the United Nations Convention on the Rights of the Child 1989:</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>In all actions concerning children, whether undertaken by public or private social welfare institutions, courts of law, administrative authorities or legislative bodies, the best interests of the child shall be a primary consideration.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>He referred also to the Supreme Court decision in <span style="color: #c0504d;"><a href="http://www.supremecourt.gov.uk/decided-cases/docs/UKSC_2009_0044_Judgment.pdf" target="_blank"><span style="text-decoration: underline;"><em><span style="color: #c0504d;">ZH (Tanzania) v Secretary of State for the Home Department </span></em><span style="color: #c0504d;">[2010] UKSC 4</span></span></a></span>, which concerned the position of children affected by the decision to deport one or both of their parents.  In that case Lord Kerr said:</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>It is a universal theme of the various international and domestic instruments to which Lady Hale has referred that, in reaching decisions that will affect a child, a primacy of importance must be accorded to his or her best interests.  This is not, it is agreed, a factor of limitless importance in the sense that it will prevail over all considerations.  It is a factor, however, that must rank higher than any other.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Ward LJ acknowledged that the issue in immigration cases was a long way removed from the issues in place in <em>ETK</em>, but said nonetheless that the "universal principles [could not] be ignored".   While he also recognised that the interests of children do not automatically take precedence over the Convention rights of others, he nonetheless also held that in deciding where the balance lies between protecting privacy rights and rights of free speech, the court "should accord particular weight to the Article 8 rights of any children likely to be affected by the publication, if that would be likely to harm their interests".</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span style="color: #c0504d;"><a href="http://inforrm.wordpress.com/2011/04/19/case-law-etk-v-news-group-newspapers-privacy-injunctions-and-children-edward-craven/#more-8845" target="_blank"><span style="color: #c0504d; text-decoration: underline;">On the Inforrm blog, Edward Craven suggests</span></a></span><span> the decision in ETK will "strengthen the hands of many claimants seeking privacy injunctions".  It would certainly appear to put the media further on the defensive (despite Ward LJ's recognition at [13] of the importance of a free press).  In cases involving children, we will no doubt be hearing a good deal more in the future about the harmful effects that press freedom may have on those children.  We must hope that judges hearing injunction applications take a critical look at such arguments and do not simply accept them at face value.  As Ward LJ recognised at [19], "the interests of children cannot be treated as a trump card". </span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><em><span>See further sections 3.3, 3.4 and 3.9 of <span style="color: #c0504d;"><a href="http://www.lawsocietyshop.org.uk/ecom_lawsoc/public/saleproduct.jsf?catalogueCode=9781853288432" target="_blank"><span style="color: #c0504d; text-decoration: underline;">The Privacy Law Handbook</span></a></span></span></em></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span style="color: #c0504d;"><a href="http://www.bailii.org/ew/cases/EWCA/Civ/2011/439.html" target="_blank"><span style="text-decoration: underline;"><em><span style="color: #c0504d;">ETK v News Group </span></em><span style="color: #c0504d;">[2011] EWCA Civ 439</span></span></a></span></p>]]></content:encoded></item><item><guid isPermaLink="false">{1FD9E348-2C8E-48DA-BFAD-D430B9743822}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/phone-hacking-is-not-a-hanging-offence/</link><title>Phone-hacking is not a hanging offence</title><description><![CDATA[In February Donald Trelford, the respected former editor of the Observer, wrote in the Independent that the phone-hacking saga was a case of "dog eats dog gone barking-mad".  ]]></description><pubDate>Fri, 15 Apr 2011 06:44:00 +0100</pubDate><category>Data and privacy</category><authors:names>Keith Mathieson</authors:names><content:encoded><![CDATA[<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>In his view, the agenda was driven by a combination of MPs and celebrities bent on revenge against the tabloid press, greedy lawyers and the "anti-Rupert Murdoch faction".  The fuss about phone-hacking was "obsessive, hysterical and opportunistic".</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Since Trelford's article, News International has admitted certain instances of voicemail interception, which may be thought to leave Trelford with a spot of egg on his face.  But Trelford's observations retain some force: much of the recent discussion has been characterised by exaggeration, vindictiveness and self-interest.  Yes, intercepting voicemails is a crime and it's an invasion of personal privacy, but it's not the most serious crime and nor in most cases is it even at the more serious end of the scale of possible privacy infringements.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>One of the more extreme contributions has been by the Labour MP Tom Watson, a member of the House of Commons Culture, Media and Sport Committee.  <span style="color: #c0504d;"><a href="http://labour-uncut.co.uk/2011/04/12/if-rebekah-brooks-had-any-respect-for-rupert-murdoch-she-would-resign-this-week/" target="_blank"><span style="color: #c0504d; text-decoration: underline;">On the <em>Labour Uncut</em> blog he lays into the Murdoch empire</span></a> </span>- and indeed the Murdoch family - with unrestrained abandon.  The phone-hacking affair has "pulverised careers, relationships and lives"; Murdoch's operation is about to "sink in shame" and "judgment day is round the corner"; News International's approach to "a saga of mass criminality is one of dumb insolence"; people have "had their lives turned inside out", suffering "depression, sleepless nights and fear"; they've "lost friends and loved ones" and contemplated suicide.   Watson expresses the hope that "those bullies are getting a flavour of the misery they have casually meted out to people over many years".</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span style="color: #c0504d;"><a href="http://www.guardian.co.uk/uk/2011/apr/09/phone-hacking-scandal-news-world" target="_blank"><span style="color: #c0504d; text-decoration: underline;">Henry Porter has said</span></a></span><span> the phone-hacking affair is "one of the most serious post-second world war scandals to affect British public life" and expressed the view that it is "hard to imagine a more dangerous breach of trust by a public corporation".  <span style="color: #c0504d;"><a href="http://www.journalism.co.uk/news/mark-stephens--phone-hacking-was-endemic-on-fleet-street-/s2/a542448/" target="_blank"><span style="color: #c0504d; text-decoration: underline;">A prominent London media lawyer has said</span></a> </span>that phone-hacking was "endemic on Fleet Street" with "just about every news organisation" being involved "at one level or another".  Charlotte Harris, a lawyer representing a number of claimants, <span style="color: #c0504d;"><a href="http://www.independent.co.uk/news/media/press/lawyer-claims-up-to-7000-may-have-had-phones-hacked-2266048.html" target="_blank"><span style="color: #c0504d; text-decoration: underline;">has said</span></a></span> that up to 7,000 people may have had their phones hacked by the News of the World.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Lawyers are "outraged" on behalf of their clients.  One lawyer's outrage has sent him spinning into a vortex of mixed metaphors.  Rod Dadak, a solicitor said to be representing "potential claimants", <span style="color: #c0504d;"><a href="http://pub50.bravenet.com/news/4289455392/366246/2" target="_blank"><span style="color: #c0504d; text-decoration: underline;">is quoted by Reuters</span></a></span> saying:</span></p>
<p style="margin: 0cm 0cm 10pt 40px; text-align: justify;"><span>This is Murdoch's Watergate because the cat is out of the bag. Two or three people have taken the rap but the powers that be must have known or turned a blind eye to what was going on. ... It's a black hole.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Today, the lawyer who represented Max Mosley, Dominic Crossley, <span style="color: #c0504d;"><a href="http://inforrm.wordpress.com/2011/04/14/opinion-the-cost-of-phone-hacking-a-case-for-exemplary-damages-dominic-crossley/#more-8752" target="_blank"><span style="color: #c0504d; text-decoration: underline;">has called for phone-hacking claimants to be awarded exemplary damages</span></a> </span>(i.e. damages of a punitive and non-compensatory nature) to reflect News International's "shocking" behaviour and to deter them from doing it again.  He notes that News International's parent company News Corporation, has a turnover of US$33 billion.  Against that figure, he suggests only eye-watering awards of damages will have any impact on the News Corp "beast".   Mark Lewis, the lawyer who claims to have "devised" phone-hacking claims, is indeed seeking "huge" damages for his client Mary Ellen Field, a former confidante of the model Elle McPherson who says she lost her job, reputation and health in consequence of phone-hacking by the News of the World.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Steady on, chaps.  Phone-hacking's bad, but there's a lot of worse stuff going on.  Can it really be right for claimants to expect damages of hundreds of thousands of pounds for the indignity of a tabloid hack listening to their voicemail messages?</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span style="color: #c0504d;"><a href="http://inforrm.wordpress.com/2011/04/14/opinion-the-cost-of-phone-hacking-a-case-for-exemplary-damages-dominic-crossley/#more-8752" target="_blank"><span style="color: #c0504d; text-decoration: underline;">As Dominic Crossley concedes</span></a></span><span>, damages in privacy cases in the UK have been nowhere near six figures.  Until Eady J awarded Max Mosley £60,000, they hadn't even reached five figures, though a few cases had been reported in which settlements involved the payment of sums in the region of £30,000 to £40,000.  In Max Mosley's case Eady J said:</span></p>
<p style="margin: 0cm 0cm 10pt 40px; text-align: justify;"><span>It has to be recognised that no amount of damages can fully compensate the Claimant for the damage done. He is hardly exaggerating when he says that his life was ruined. What can be achieved by a monetary award in the circumstances is limited. Any award must be proportionate and avoid the appearance of arbitrariness. I have come to the conclusion that the right award, taking all these considerations into account, is £60,000.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Every case is different, but is it really likely that any of the victims of phone-hacking will be able to say their lives were ruined?  Lord Prescott, Sienna Miller and Steve Coogan, to take three not particularly random examples, might be thought to lack those features that would normally define those whose lives had been ruined.  Max Clifford, who settled his claim against the News of the World some time ago, displays cheerful resilience in the face of his ordeal.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The News of the World does appear to have valued Mr Clifford's claim (and that of Gordon Taylor, head of the Professional Footballers' Association) at a surprisingly high level.  We do not know the reasons why they decided to pay as much as they did and it seems not unreasonable to suppose that the confidentiality clauses apparently contained in the settlement agreements may have been an important factor.  Moreover, News International's own statement, in referring to a compensation fund, will have done little to dampen claimants' expectations of a big pay day.  But it nonetheless seems unlikely that if the courts have to decide what compensation should be paid to victims of phone hacking, they will award anything like the sums the News of the World seems to have agreed to pay Clifford and Taylor (this may not, of course, be a concern for some of the claimants, who apparently just want an apology).  Instead, the courts will take a close look at all the circumstances of each case and make a reasonable and proportionate award.  It is quite possible that some claimants who are able to demonstrate real harm and distress will receive payouts even greater than Max Mosley, but it is equally possible that other claimants won't get anywhere close to that sort of figure.  It may be worth remembering that if you sue for personal injury, £60,000 is roughly the figure you get for the loss of an arm.  Six figure damages are reserved for brain damage and quadriplegia.  Do we really think phone hacking is on the same scale?</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><em><span>See further section 3.9 of <span style="color: #c0504d;"><a href="http://www.lawsocietyshop.org.uk/ecom_lawsoc/public/saleproduct.jsf?catalogueCode=9781853288432" target="_blank"><span style="color: #c0504d; text-decoration: underline;">The Privacy Law Handbook</span></a></span></span></em></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span style="color: #c0504d;"><a href="http://www.independent.co.uk/news/media/opinion/donald-trelford-for-now-this-scandal-is-still-light-on-evidence-2220685.html" target="_blank"><span style="color: #c0504d; text-decoration: underline;">Donald Trelford's article in the Independent</span></a></span></p>]]></content:encoded></item><item><guid isPermaLink="false">{4F0454AB-30F5-493B-9EF4-DB02A9D3C159}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/the-half-lives-of-celebrities-a-theory-of-phone-hacking/</link><title>The "half-lives" of celebrities: a theory of phone-hacking</title><description><![CDATA[In today's Independent Dominic Lawson offers an interesting view on how phone-hacking was allowed to take hold at the News of the World. ]]></description><pubDate>Tue, 12 Apr 2011 06:54:00 +0100</pubDate><category>Data and privacy</category><authors:names></authors:names><content:encoded><![CDATA[<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>He attributes the practice to the "dehumanising process" whereby journalists cease to regard celebrities as "real" people, regarding them instead as "cut-outs" without normal feelings.  He notes that celebrities exist "in a strange half-life, apparently known to millions who in fact do not really know them at all" and suggests that this permits the public, including journalists, to behave towards them in ways they would never dream of behaving towards their own friends and associates.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>In Lawson's view, phone-hacking journalists probably figured that their activities would not necessarily attract the disapproval of their readers even if they knew what was going on: the public does not feel as strongly about celebrities' loss of privacy as it does about intrusions into the private lives of more ordinary people.  While Lawson is unhappy with the situation, he is also realistic, disclosing that his celebrity sister Nigella deals with "grotesque coverage" of herself by pretending that the person being written about is nothing to do with her.  (It has been suggested by the Guardian, <span style="color: #c0504d;"><a href="http://www.bbc.co.uk/news/uk-11195407" target="_blank"><span style="color: #c0504d; text-decoration: underline;">as reported on the BBC website</span></a></span>, that Nigella may herself have been a victim of phone-hacking.)</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Whether or not the public thinks those in the public eye have weaker claims to privacy than the rest of us, the courts have little patience with such a notion.  In <span style="color: #c0504d;"><a href="http://www.bailii.org/uk/cases/UKHL/2004/22.html" target="_blank"><span style="color: #c0504d; text-decoration: underline;">Campbell</span></a></span>, Lord Hoffmann said the fact that Naomi Campbell had "a long and symbiotic relationship with the media" would not "in itself" justify publication of private information about her: "A person may attract or even seek publicity about some aspects of his or her life without creating any public interest in the publication of personal information about other matters."</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>In relation to such a direct intrusion as the unauthorised interception of voicemail messages, it is unthinkable that the law would distinguish between individuals on account of their public profile.  If such activity were ever to be justifiable, it would have to be for some reason other than the victim's celebrity.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><em><span>See further section 3.3 of <span style="color: #c0504d;"><a href="http://www.lawsocietyshop.org.uk/ecom_lawsoc/public/saleproduct.jsf?catalogueCode=9781853288432" target="_blank"><span style="color: #c0504d; text-decoration: underline;">The Privacy Law Handbook</span></a></span></span></em></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span style="color: #c0504d;"><a href="http://www.independent.co.uk/opinion/commentators/dominic-lawson/dominic-lawson-public-figures-dont-stop-being-human-2266502.html" target="_blank"><span style="color: #c0504d; text-decoration: underline;">Dominic Lawson's interesting view in today's Independent </span></a></span></p>]]></content:encoded></item><item><guid isPermaLink="false">{5DCC27CE-DCDF-4F37-BE3D-EB67EE047FCD}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/super-injunctions-committee-reporting-soon/</link><title>Super Injunctions: committee reporting soon</title><description><![CDATA[By the end of this month we expect the committee investigating super injunctions to publish its report.]]></description><pubDate>Fri, 08 Apr 2011 07:18:00 +0100</pubDate><category>Data and privacy</category><authors:names>Keith Mathieson</authors:names><content:encoded><![CDATA[<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The committee is chaired by the Master of Rolls, Lord Neuberger, who <span style="color: #c0504d;"><a href="http://www.judiciary.gov.uk/Resources/JCO/Documents/Speeches/mr-speech-jsb-lecture-march-2011.pdf" target="_blank"><span style="color: #c0504d; text-decoration: underline;">has said in a recent speech</span></a> </span>that he expects his report to appear before the end of April.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>In view of recent press coverage of super injunctions (and even hyper injunctions - see below), it is worth reminding readers that a super injunction is not just an injunction that doesn't tell you who the claimant is.  It is an injunction that prevents any mention of the injunction at all.  It is this element of secrecy that puts super injunctions into a class of their own.  As Lord Neuberger said in his speech last month:</span></p>
<p style="margin: 0cm 0cm 10pt 36pt; text-align: justify;"><span>The concern over super injunctions is that they have, as Professor Zuckerman has put it, developed into a form of extremely secret form of procedure. ... English law has not known of such a form of procedure - of secret justice - since 5 July 1641, when the Long Parliament abolished the Court of Star Chamber.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>As we noted <span style="color: #c0504d;"><a href="http://blog.rpc.co.uk/privacy-law/super-injunctions-an-update" target="_blank"><span style="color: #c0504d; text-decoration: underline;">in a previous blog post</span></a></span>, super injunctions are now granted only in the rarest of circumstances, being to all intents and purposes confined to situations where there is evidence to suggest that the defendant, were he to become aware of the injunction before it could be served upon him, would take steps either to avoid service or to frustrate the injunction by publishing the information the claimant is seeking to protect.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Some newspapers have nonetheless suggested that super injunctions are raining down on the British people, thereby eroding the very fabric of free speech.  <span style="color: #c0504d;"><a href="http://www.guardian.co.uk/law/2011/mar/29/superinjunction-financier-libel-legal-case" target="_blank"><span style="color: #c0504d; text-decoration: underline;">David Leigh in the Guardian has even suggested</span></a> </span>that super injunctions are being "controversially extended", referring in support of his claim to the recent decision of Tugendhat J in <em>ZAM v CFW</em> [2011] EWHC 476.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span style="color: #c0504d;"><a href="http://inforrm.wordpress.com/2011/03/31/libel-blackmail-and-anonymity-zam-the-super-injunction-that-never-was/#more-8473" target="_blank"><span style="color: #c0504d; text-decoration: underline;">As the Inforrm blog has already pointed out</span></a></span><span>, this is just wrong.  The injunction granted to the claimant in <em>ZAM</em> was not a super injunction at all and there is no evidence that the courts are extending the scope of super injunctions.  The evidence is in fact quite the opposite: the courts are placing restrictions on the use of super injunctions and it seems quite likely that the report of Lord Neuberger's committee will confirm and continue that trend.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Even the usually reliable Financial Times has fallen into error.  Reporting on the revelation by the Lib Dem MP John Hemming that Sir Fred Goodwin, former chief executive of the Royal Bank of Scotland, had obtained an injunction that allegedly stops people describing him as a banker, <span style="color: #c0504d;"><a href="http://www.ft.com/cms/s/0/4dc6c250-4b4c-11e0-b2c2-00144feab49a.html#axzz1IrmZ3INX" target="_blank"><span style="color: #c0504d; text-decoration: underline;">the FT described</span></a></span> super injunctions as "barring newspapers from identifying the applicant".  Yes, super injunctions ban identification of the applicant, but their essential characteristic is that they ban everything else as well.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Mr Hemming has now coined the term "hyper injunction" for an injunction that specifically prevents someone from discussing a case with third parties such as MPs, journalists and lawyers.  <span style="color: #c0504d;"><a href="http://www.publications.parliament.uk/pa/cm201011/cmhansrd/cm110317/halltext/110317h0001.htm" target="_blank"><span style="color: #c0504d; text-decoration: underline;">In a parliamentary debate on 17 March 2011</span></a></span> he referred to an unnamed case in 2006 in which the court made such an order.  On the face of it, such an order would seem hard to justify if its effect was indeed to prevent a person from telling his MP or his lawyer about a court order.  It is, however, a common feature of injunctions in privacy cases that the defendant and any third party served with the injunction should not reveal the identity of the claimant and/or the allegedly private information to any other third party, though there is invariably an exception for talking to your own lawyer (but not usually your MP).</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><em><span>See further section 10.3 of <span style="color: #c0504d;"><a href="http://www.lawsocietyshop.org.uk/ecom_lawsoc/public/saleproduct.jsf?catalogueCode=9781853288432" target="_blank"><span style="color: #c0504d; text-decoration: underline;">The Privacy Law Handbook</span></a></span></span></em></p>]]></content:encoded></item><item><guid isPermaLink="false">{1A19111C-F7CC-4EC7-A3F3-577D158F9D0B}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/the-eu-councils-conclusions-on-revising-eu-data-protection-law-why-did-they-bother/</link><title>The EU Council’s Conclusions On Revising EU Data Protection Law — Why Did They Bother?</title><description><![CDATA[The super tanker that is the European Union legislative process is currently trying to turn itself round with a view to revising data protection law.]]></description><pubDate>Mon, 04 Apr 2011 07:23:00 +0100</pubDate><category>Data and privacy</category><authors:names>Keith Mathieson</authors:names><content:encoded><![CDATA[<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The current Data Protection Directive (95/46/EC) dates back to 1995. It was, of course, prepared much earlier and reflects the state of technology in the late 1980s and the dawn of the 1990s, rather than today’s Facebook and cloud computing world. The Privacy and Electronic Communications Directive (2002/58/EC) is, of course, more recent, but its effect is that data protection legislation is becoming gradually fragmented.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The implementation of the 1995 Directive has followed very different paths in different EU Member States. Some regimes, for instance, the United Kingdom’s, are fairly relaxed, while others, such as the French and German regimes, are much more prescriptive.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The review process kicked off in November 2010 with a Communication from the European Commission to the European Parliament and the Council entitled <span style="color: #c0504d;"><a href="http://ec.europa.eu/justice/news/consulting_public/0006/com_2010_609_en.pdf" title="A comprehensive approach on personal data protection in the European Union’" target="_blank"><span style="color: #c0504d; text-decoration: underline;">‘‘A comprehensive approach on personal data protection in the European Union’’</span></a></span>. At the end of February 2011, the Justice and Home Affairs Council (meeting for the 3,071st time) adopted <span style="color: #c0504d;"><a href="http://www.consilium.europa.eu/uedocs/cms_data/docs/pressdata/en/jha/119461.pdf" title="Council conclusions on the Communication" target="_blank"><span style="color: #c0504d; text-decoration: underline;">a short six page paper</span></a> </span>(apparently a press release) setting out its ‘‘conclusions’’ in response to the Commission’s Communication. The Council paper is not an easy read, consisting of 17 paragraphs of rather disjointed preamble followed by a further 26 paragraphs of what essentially amount to the Council’s suggestions to the Commission about the next stage of the process.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><strong><span>Preliminary Observations</span></strong></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>It is interesting to note that the data protection principles enshrined in the UK Data Protection Act 1998 are now considered ‘‘time honoured’’.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>It is, however, not easy to summarise the Council’s recitals, although they serve to emphasise that processing of personal data should be undertaken only when it is necessary and reasonable.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>A lot of consideration is given to use of personal data in the area of police and judicial cooperation. The recitals specifically say there is no need to choose between being free and being safe, and indeed it appears that necessary and appropriate processing of personal data is vital to keeping the public safe. There then follows, predictably, effectively a call for a special data protection regime for areas of judicial and police cooperation.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The importance of data subjects being aware of what processing of their data takes place is highlighted and ‘‘transparency of processing’’ is to be encouraged. Two of the recitals deplore the fact that the harmonisation of the 1995 Directive was only partial and that the Directive was implemented in significantly different ways in different Member States. Better harmonisation for high level data protection is said to be good for both data subjects and data controllers. There follows a call for increased powers for data protection authorities, who are to produce a well-regulated legal framework providing the same level of protection in all Member States.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Naturally the internet gets a look in, as does cloud computing, as new technologies that need to be accounted for when considering changes to the rules.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The general level of chaos brought about by the eighth data protection principle is also recognised, and the Council puts in a bid for the understatement of 2011 when it says, ‘‘The current legal instruments have not been successful in dealing with these issues relating to transfers to third countries...."</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><strong><span>Council’s Conclusions</span></strong></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Having made all of these disjointed preliminary observations, the Council then gets to the meat and drink of its opinion, but this is equally disjointed.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Naturally enough, the Commission’s Communication is welcomed and the aim of having ‘‘appropriate protection assured for all individuals in all circumstances’’ is supported. The Council’s most bizarre statement is that ‘‘data protection is by its very nature horizontal in character’’. What this means is wholly unclear, except perhaps to Commission bureaucrats.  A series of paragraphs pluck various points from the Commission’s Communication and variously ‘‘considers’’, ‘‘invites’’, ‘‘demands’’, ‘‘expects’’, ‘‘is of the opinion that’’, ‘‘is aware that’’ and ‘‘supports’’ in relation to these points.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><strong><span>Cost</span></strong></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>There are contradictions. Paragraph five ‘‘considers’’ there should be a ‘‘concrete cost analysis for all the new measures proposed’’, suggesting a concern over the cost to the EU Member States’ economies of all these changes.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>However, in paragraph six the Council ‘‘demands’’ special attention be given to minors and ‘‘invites’’ the Commission to assess whether the categories of sensitive data should be expanded. Special rules for one particular set of data subjects and broadening the scope of the extra protection given to sensitive personal data can only increase the cost of the data protection regime.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><strong><span>Police and Judicial Cooperation</span></strong></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>As in the recitals, the use of data in police and judicial cooperation is aired, and emphasis is given to the use of biometric data. ‘‘Certain limitations’’ have to be set on the rights of individuals where data protection is being used for police and judicial cooperation. These limitations are supposed to be harmonised and balanced, necessary and proportionate. The message is that the Council supports a fairy large exclusion from the general thrust of data protection law for moving around data for the purposes of police and judicial cooperation.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><strong><span>Genetic Data</span></strong></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Genetic data also gets a special mention. Why is not clear. Apparently processing genetic data should be carried out in accordance with the principles of necessity and proportionality. Surely those are the guiding principles for the processing of any data? The paragraph in question goes on to consider that special provisions on aspects of cross-border processing should be explored for genetic data. It is not clear why genetic data should be selected for this honour. There is no difference in principle between genetic data and other biometric data or indeed data about, say, a person’s health or religion. It is just another piece of data about the data subject.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><strong><span>Privacy by Design</span></strong></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>There are a couple of mentions of the privacy by design principle much favoured by the UK Information Commissioner’s Office. This is something that the Council ‘‘invites’’ the Commission to explore, although the Commission might need little persuading, as it is already fairly enamoured of the idea of ‘‘built in’’ data protection to guard against the unreliability of default settings as indicators of the data subject’s consent.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Three paragraphs deal with globalisation. One refers to groups of companies, which apparently require special attention. Generally the globalised nature of data processing is accepted and even encouraged.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The strange thing is that the Council seems to have got the wrong end of the stick when identifying where the problem lies. It considers the difficulty which individuals may have maintaining protection for their personal data sent outside the European Union for processing. It is difficult to see this as a real problem. Where a party in the European Union sends data out of the European Union for processing, there remains a party in the European Union on whom responsibility can be fixed. The difficulty with data export to third countries has not been finding someone to be responsible, but rather that it has been difficult for a data controller who intended to process data outside the European Union to know whether or not its actions were legal. Perhaps the Council was thinking of the self-export of data characteristic of Facebook.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Something which should surely be at the core of all data protection — a data subject’s right to be informed in understandable language and in a simple form about the data processing that will be undertaken — is jammed into this data export paragraph.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><strong><span>Standard Privacy Information Notices</span></strong></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The Council supports the Commission’s proposals to draw up standard privacy information notices to be used across the European Union with the minimum information which needs to be provided to data subjects.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Of all the rather disjointed issues mentioned in this communication, there can be no doubt that this would be the single step that would most assist data controllers and most assist the transmission of data between Member States.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The inability of framers of notices given to data subjects when their data is collected to foresee accurately how those data would be processed in the future, as collecting businesses change and evolve, has led to problems.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>This is a serious inhibition on the free transmission of data between Member States and processing generally, to which there can be only two responses. The first is to go ahead, sorting out the problems later; and the second is a form of paralysis. It is rarely practical to go back to data subjects and inform them of some proposed new processing.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><strong><span>Data Breach Notification</span></strong></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Music to data controllers’ ears will also be found in paragraph 19, which states that data breach notification should not become a routine alert for all types of security breaches. The Council encourages consideration of the cost to business and EU competitiveness of extending data breach notification obligations beyond the telecommunications sector.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Bizarrely, there is an encouragement to ‘‘explore the opportunity’’ to business of such notification. It is difficult to see where the opportunity for business lies, save perhaps in the growth of data breach service providers as seen in the United States, where breach notification is a prominent feature of the data protection landscape.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><strong><span>Right to be Forgotten</span></strong></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The most innovative part of the communication comes right at the end, where the Council encourages the Commission to explore the introduction of the right to be forgotten. The Council says no more than that A minefield surely awaits here. What happens if the person who has exercised his or her right to be forgotten suddenly decides to pursue a claim against the person who has forgotten him or her? Should the data controller not at least have a right to remember enough to be able to protect himself?</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Nonetheless, as EU Justice <span style="color: #c0504d;"><a href="http://europa.eu/rapid/pressReleasesAction.do?reference=SPEECH/11/183" target="_blank"><span style="color: #c0504d; text-decoration: underline;">Commissioner Viviane Reding made clear in her speech to the EU Privacy Platform on March 16, 2011,</span></a></span> the right to be forgotten is likely to be one of the central ‘‘pillars’’ of the Commission’s new data protection framework.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><strong><span>Enhancing Responsibility</span></strong></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>More contradictions arise in the encouragement to the Commission to define more precisely the rights of data subjects and the aim of reducing the administrative burden on data controllers. The Council supports the Commission’s aim of enhancing the data controller’s responsibility, and encourages the idea that data protection officers should be appointed, while not wishing to impose any undue administrative burdens.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><strong><span>Comment</span></strong></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Contradictions abound in the Council’s conclusions, even within single paragraphs, and it is impossible to see that this communication is doing more than trying to have it all ways. This author cannot see that it advances the review of the data protection law to any significant degree.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Thoughts that one might try to group together haven’t been grouped together. This whole document resembles nothing more than one of those television contests where a contestant is required to remember items passing him or her on a conveyor belt.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>See further chapters 4 and 5 of <span style="color: #c0504d;"><a href="http://www.lawsocietyshop.org.uk/ecom_lawsoc/public/saleproduct.jsf?catalogueCode=9781853288432" target="_blank"><span style="color: #c0504d; text-decoration: underline;">The Privacy Law Handbook</span></a></span>.  A version of this article first appeared in the <span style="color: #c0504d;"><a href="http://www.bna.com/products/corplaw/wdpn.htm" target="_blank"><span style="color: #c0504d; text-decoration: underline;">World Data Protection Report</span></a></span>.</span></p>]]></content:encoded></item><item><guid isPermaLink="false">{2A017110-7CD4-49D5-BF9F-5A315555D69C}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/another-ruling-on-privacy-injunctions/</link><title>Another ruling on privacy injunctions</title><description><![CDATA[Judgment was handed down today in a case where a privacy injunction was made in 2008.  ]]></description><pubDate>Tue, 22 Mar 2011 07:37:00 Z</pubDate><category>Data and privacy</category><authors:names></authors:names><content:encoded><![CDATA[<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>That was only some two years ago, but two years is a long time in privacy law and particularly in the fast-moving area of injunctions, super injunctions and anonymity.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The case is <em><span style="color: #c0504d;"><a href="http://www.bailii.org/ew/cases/EWHC/QB/2011/674.html" target="_blank"><span style="color: #c0504d; text-decoration: underline;">Goldsmith and Khan v BCD</span></a></span></em>.  The claimants - Zac and Sheherazade Goldsmith and Jemima Khan - obtained injunctions in 2008 to prevent the publication of emails hacked from their personal email accounts. The claimants were granted anonymity at the same time, and a 'super injunction' was also granted so nobody could say that the injunctions had been obtained at all. The Court explained today that it had done this because if the unknown defendants had come to know that an injunction had been obtained, before it was served on them, there would have been a real danger that they might publish the emails on the internet or destroy evidence that might lead to their identification.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Last week, the anonymity restrictions and the 'super injunction' element were lifted by consent, following interest from the media. The judgment flags two interesting procedural problems.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Firstly, the Court was troubled that the claimants had failed to comply with undertakings that they had given to the Court. When they obtained their interim injunctions, they had undertaken that they would issue a claim form and serve it on the defendants, once their identity became known. They failed to do so. Mr Justice Tugendhat said that this was a "serious breach, even if committed with good intentions". The judge decided that on this occasion he would not take action to punish the breach - for example, striking out the claim - but made clear that the usual position should be that the court should "mark the seriousness of such breaches".</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Secondly, the court gave a rather defensive explanation for not having included a return date in the interim injunction. In late 2008 it was rare for interim privacy injunctions to include a return date, which is the date on which the case comes back to Court for a full hearing on whether the injunction should continue. The judge said one of the reasons for this was to save cost, because return dates can be expensive. However, the Court acknowledged that the inclusion of a return date would have made the breach of undertaking less likely, and would have ensured that the anonymity restrictions had not stayed in place for as long as they did.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The Court pointed out that a return date does not always involve a hearing. Where all the concerned parties are in agreement, and affected parties such as the media do not ask for a hearing, the judge thought that in most cases it should be possible for the Court to review the matter on the papers.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>See further sections 3.9.1 and 10.3 of <span style="color: #c0504d;"><a href="http://www.lawsocietyshop.org.uk/ecom_lawsoc/public/saleproduct.jsf?catalogueCode=9781853288432" target="_blank"><span style="color: #c0504d; text-decoration: underline;">The Privacy Law Handbook</span></a></span></span></p>]]></content:encoded></item><item><guid isPermaLink="false">{829E36F5-5BF5-4F86-BE84-02515C9E6C57}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/privacy-in-tweets-the-debate-continues/</link><title>Privacy in Tweets - the debate continues</title><description><![CDATA[Addressing the Westminster Media Forum on the regulation of privacy and online media earlier today Baroness Buscombe, Chairman of the PCC, referred to the PCC's decision in Baskerville]]></description><pubDate>Tue, 22 Mar 2011 07:32:00 Z</pubDate><category>Data and privacy</category><authors:names>Keith Mathieson</authors:names><content:encoded><![CDATA[<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>(See a report of that decision <span style="color: #c0504d;"><a href="http://http/blog.rpc.co.uk/privacy-law/no-privacy-in-tweets" target="_blank"><span style="color: #c0504d; text-decoration: underline;">here</span></a></span>). Faced with some criticism of the decision, described by one commentator at the event as "illiberal", Baroness Buscombe explained that in this decision the PCC had sought to "put a marker down" that "Twitter is very public".</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>She explained that the PCC's decision was not simply the position adopted by one individual but the result of a detailed consideration of the particular facts of the case by no fewer than 17 people. Baroness Buscombe continued to note that Twitter, in its current iteration, is a public medium and that users must appreciate that when they "tweet" material they are making public statements. As such "it is hard to regard tweets as private". Baroness Buscombe explained that that position may change as the technology evolves or the dissemination controls on Twitter change but it is a notable feature of Twitter today that material can be retweeted without consent and the potential audience of any one tweet is great: as she pointed out, a tweet can "be global in minutes".</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Baroness Buscombe did not go so far as to say that tweets are always fair game for the media. She stressed to the audience that each case involving Twitter will be considered by the PCC on its individual merits and that the quality of the information contained within a tweet will be relevant - "the PCC would view lifting health information very unfavourably" for example. She was satisfied that the PCC had reached the correct conclusion in the Baskerville case and that the articles that were the subject of complaint were the subject of public interest.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Running through Baroness Buscombe's explanation of the PCC's approach to the issue of Twitter, and social media, was the need for users to be aware of the potential audience and to make careful decisions about the "data" they elect to share online - and where, how and when they share it. Beyond highlighting the PCC's "good engagement" with Facebook (incidentally on how it deals with the Facebook pages of the deceased, about which a press release is imminent) she did not elaborate on how she or the PCC proposes educating the masses on the management and protection of their own data. What seems to be implicit in her approach however, and consistent with that of the PCC more broadly and the reasoning in Baskerville, is that the extent to which a contributor to Twitter or other social media can be considered to have accepted and understood the risks of sharing data is a factor to be considered before a paper decides to republish that material. Where is it clear that data was posted without consent or by a child, then there will have to be very strong public interest justifications for its republication. What is not clear however is where that leaves data shared by an adult who is ignorant of the risks, the potential consequences of his actions or his ability to restrict publication (where the tools exist)? If Twitter is public then it would seem that ignorance really is no defence. One for the PCC's Online Working Group perhaps.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><em><span>See further sections 11.3 and 5.9 of the <span style="color: #c0504d;"><a href="http://www.lawsocietyshop.org.uk/ecom_lawsoc/public/saleproduct.jsf?catalogueCode=9781853288432" target="_blank"><span style="color: #c0504d; text-decoration: underline;">Privacy Law Handbook</span></a></span></span></em></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><em><span>(Originally blogged by Bríd Jordan)</span></em></p>]]></content:encoded></item><item><guid isPermaLink="false">{3B0F2A6C-0E61-4897-880E-046264227627}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/privacy-and-the-protection-of-freedoms-bill/</link><title>Privacy and the Protection of Freedoms Bill</title><description><![CDATA[The Protection of Freedoms Bill, introduced in the House of Commons on 11 February 2011, is the second part of the UK Coalition Government's mission to 'restore freedoms and civil liberties through the abolition of unnecessary laws'. ]]></description><pubDate>Mon, 21 Mar 2011 07:47:00 Z</pubDate><category>Data and privacy</category><authors:names>Keith Mathieson</authors:names><content:encoded><![CDATA[<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The first part was the abolition of the previous government's identity card scheme, now achieved by the Identity Documents Act 2010.  The new Bill is the <span style="color: #c0504d;"><a href="http://www.homeoffice.gov.uk/publications/legislation/protection-freedoms-bill/" target="_blank"><span style="color: #c0504d; text-decoration: underline;">'next step in the government's legislative programme to safeguard civil liberties and reduce the burden of government intrusion into the lives of individuals'</span></a></span>.  The purpose of this article is briefly to explore the Bill's likely impact on privacy and information law issues.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The provisions of most relevance are as follows:</span></p>
<ul style="margin-top: 0cm; list-style-type: disc;">
    <ul style="margin-top: 0cm; list-style-type: circle;">
        <li style="margin: 0cm 0cm 10pt; text-align: justify; color: #000000;"><span>Biometric data.  The DNA and fingerprint samples of innocent people will no longer be retained indefinitely.  If a person is either not charged with, or is acquitted of, a minor offence, the samples will be destroyed on acquittal or when the decision not to charge is taken.  If a person is charged with a serious offence and later acquitted, samples may be retained for three years with a possible two year extension by court order. Biometric data may not be taken from children under 18 without parental consent.</span></li>
    </ul>
</ul>
<ul style="margin-top: 0cm; list-style-type: disc;">
    <ul style="margin-top: 0cm; list-style-type: circle;">
        <li style="margin: 0cm 0cm 10pt; text-align: justify; color: #000000;"><span>Surveillance cameras.  A statutory code is introduced for the regulation of CCTV and ANPR (Automatic number plate recognition).  A new Surveillance Camera Commissioner will be appointed.</span></li>
    </ul>
</ul>
<ul style="margin-top: 0cm; list-style-type: disc;">
    <ul style="margin-top: 0cm; list-style-type: circle;">
        <li style="margin: 0cm 0cm 10pt; text-align: justify; color: #000000;"><span>Local authorities will be required to obtain judicial approval for the use of covert investigation methods.</span></li>
    </ul>
</ul>
<ul style="margin-top: 0cm; list-style-type: disc;">
    <ul style="margin-top: 0cm; list-style-type: circle;">
        <li style="margin: 0cm 0cm 10pt; text-align: justify; color: #000000;"><span>Powers of entry.  These will be repealed or consolidated and a new code of practice created to regulate their exercise.</span></li>
    </ul>
</ul>
<ul style="margin-top: 0cm; list-style-type: disc;">
    <ul style="margin-top: 0cm; list-style-type: circle;">
        <li style="margin: 0cm 0cm 10pt; text-align: justify; color: #000000;"><span>Wheel clamping of vehicles will be prohibited or controlled.</span></li>
    </ul>
</ul>
<ul style="margin-top: 0cm; list-style-type: disc;">
    <ul style="margin-top: 0cm; list-style-type: circle;">
        <li style="margin: 0cm 0cm 10pt; text-align: justify; color: #000000;"><span>The vetting and barring scheme used to protect vulnerable groups will be 'scaled back to common sense levels' The criminal records regime will also be reformed so as to restrict the amount of data appearing on criminal record checks.</span></li>
    </ul>
</ul>
<ul style="margin-top: 0cm; list-style-type: disc;">
    <ul style="margin-top: 0cm; list-style-type: circle;">
        <li style="margin: 0cm 0cm 10pt; text-align: justify; color: #000000;"><span>Freedom of information.  The FOI regime will be extended to cover companies wholly owned by two or more public authorities.  Public authorities will be obliged to proactively release datasets in reusable format.  Changes to the appointment and accountability arrangements at the Information Commissioner's Office are designed to enhance the Commissioner's independence.</span></li>
    </ul>
</ul>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The Bill has been trumpeted by the Deputy Prime Minister, Nick Clegg, as a tangible step towards ‘restoring hard-won British liberties’.  In his words the ‘landmark’ Bill ‘contains an array of sweeping reforms that will put an end to unwarranted local authority snooping and unnecessary scrutiny of individuals’ and ‘will result in an unprecedented rolling back of the power of the state’. A breathless <span style="color: #c0504d;"><a href="http://www.libdems.org.uk/latest_news_detail.aspx?title=Protection_of_Freedoms_Bill:_Restoring_hard-won_British_liberties_&pPK=a3e43a9a-7fe4-47c8-a7cb-29805d0a4a4f" target="_blank"><span style="color: #c0504d; text-decoration: underline;">press release</span></a></span> enumerates the benefits of the measures in terms that express their expected political appeal:</span></p>
<ul style="margin-top: 0cm; list-style-type: disc;">
    <ul style="margin-top: 0cm; list-style-type: circle;">
        <li style="margin: 0cm 0cm 10pt; text-align: justify; color: #000000;"><span>an end to the routine monitoring of 9.3 million people under the radically reformed vetting and barring scheme</span></li>
    </ul>
</ul>
<ul style="margin-top: 0cm; list-style-type: disc;">
    <ul style="margin-top: 0cm; list-style-type: circle;">
        <li style="margin: 0cm 0cm 10pt; text-align: justify; color: #000000;"><span>millions of householders protected from town hall snoopers checking their bins or school catchment area</span></li>
    </ul>
</ul>
<ul style="margin-top: 0cm; list-style-type: disc;">
    <ul style="margin-top: 0cm; list-style-type: circle;">
        <li style="margin: 0cm 0cm 10pt; text-align: justify; color: #000000;"><span>the scrapping of Section 44 powers, which have been used to stop and search hundreds of thousands of innocent people</span></li>
    </ul>
</ul>
<ul style="margin-top: 0cm; list-style-type: disc;">
    <ul style="margin-top: 0cm; list-style-type: circle;">
        <li style="margin: 0cm 0cm 10pt; text-align: justify; color: #000000;"><span>the permanent reduction of the maximum period of pre-charge detention for terrorist suspects to 14 days</span></li>
    </ul>
</ul>
<ul style="margin-top: 0cm; list-style-type: disc;">
    <ul style="margin-top: 0cm; list-style-type: circle;">
        <li style="margin: 0cm 0cm 10pt; text-align: justify; color: #000000;"><span>DNA samples and fingerprints of hundreds of thousands of innocent people deleted from police databases</span></li>
    </ul>
</ul>
<ul style="margin-top: 0cm; list-style-type: disc;">
    <ul style="margin-top: 0cm; list-style-type: circle;">
        <li style="margin: 0cm 0cm 10pt; text-align: justify; color: #000000;"><span>thousands of gay men able to clear their name with the removal of out-of-date convictions for consensual acts</span></li>
    </ul>
</ul>
<ul style="margin-top: 0cm; list-style-type: disc;">
    <ul style="margin-top: 0cm; list-style-type: circle;">
        <li style="margin: 0cm 0cm 10pt; text-align: justify; color: #000000;"><span>thousands of motorists protected from rogue wheel clamping firms</span></li>
    </ul>
</ul>
<ul style="margin-top: 0cm; list-style-type: disc;">
    <ul style="margin-top: 0cm; list-style-type: circle;">
        <li style="margin: 0cm 0cm 10pt; text-align: justify; color: #000000;"><span>an end to the fingerprinting of children in schools without parental consent</span></li>
    </ul>
</ul>
<ul style="margin-top: 0cm; list-style-type: disc;">
    <ul style="margin-top: 0cm; list-style-type: circle;">
        <li style="margin: 0cm 0cm 10pt; text-align: justify; color: #000000;"><span>the introduction of a code of practice for CCTV and ANPR systems to make them more proportionate and effective</span></li>
    </ul>
</ul>
<ul style="margin-top: 0cm; list-style-type: disc;">
    <ul style="margin-top: 0cm; list-style-type: circle;">
        <li style="margin: 0cm 0cm 10pt; text-align: justify; color: #000000;"><span>restrictions on the powers of government departments, local authorities and other public bodies to enter private homes and other premises for investigations and a requirement for all to examine and slim down remaining powers</span></li>
    </ul>
</ul>
<ul style="margin-top: 0cm; list-style-type: disc;">
    <ul style="margin-top: 0cm; list-style-type: circle;">
        <li style="margin: 0cm 0cm 10pt; text-align: justify; color: #000000;"><span>the extension of the scope of the Freedom of Information Act and strengthening the public rights to data</span></li>
    </ul>
</ul>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Some commentators are unconvinced that the Bill lives up to the sweeping claims being made for it. <span style="color: #c0504d;"><a href="http://ukhumanrightsblog.com/2011/02/14/protection-of-freedoms-bill-published-magna-carta-unfazed-dr-cian-murphy/" target="_blank"><span style="color: #c0504d; text-decoration: underline;">One dryly remarks</span></a></span>: “It's no Magna Carta. Those of us who teach public law in British universities will certainly have to grapple with the Protection of Freedoms Bill. But will it, like that earlier constitutional text, echo through the centuries into the classrooms of 2311? I doubt it.”  <span style="color: #c0504d;"><a href="https://www.privacyinternational.org/blog/freedoms-bill-b-effort-and-c-content" target="_blank"><span style="color: #c0504d; text-decoration: underline;">Another gives the Bill credit for tackling some of the previous government’s ‘most outrageous measures’ but says it ‘falls well short of the promise made in the Bill’s title’</span></a></span>.  <span style="color: #c0504d;"><a href="http://www.lawgazette.co.uk/news/protection-freedoms-bill-disappointing-says-law-society" target="_blank"><span style="color: #c0504d; text-decoration: underline;">In the opinion of the Law Society of England & Wales</span></a></span>, ‘the Bill as a whole fails to measure up to the government’s grand rhetoric’.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The UK’s Information Commissioner, Christopher Graham, on the other hand, <span style="color: #c0504d;"><a href="http://www.ico.gov.uk/~/media/documents/pressreleases/2011/freedombill_statement_20110211.ashx" target="_blank"><span style="color: #c0504d; text-decoration: underline;">has said he welcomes the Bill</span></a> </span>and supports its aims of ‘strengthening privacy, delivering greater transparency and achieving improved accountability, as well as greater independence for the ICO. The Bill engages with issues that have been longstanding concerns for us: ensuring the right organisations are subject to freedom of information requirements; that the information the public need is available when they need it; increased privacy safeguards on biometric information such as DNA profiles and ensuring effective regulation of camera surveillance, including the increasing use of automatic number plate recognition’.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The Bill is indeed no Magna Carta.  But nor did it set out to be a grand declaration of citizens’ rights and freedoms.  The present UK government – or at least important sections of the government and their parliamentary supporters - remains uncomfortable with the notion of universal charters of rights.  In the last few weeks the Prime Minister himself has been getting hot under the collar about court decisions in the areas of voting rights for prisoners and the right of sex offenders to have their names removed from the sex offenders register.  In relation to voting rights, the Government has been under pressure to implement a change in the law to comply with a 2005 decision by the European Court of Human Rights that the UK (<em><span style="color: #c0504d;"><a href="http://www.bailii.org/eu/cases/ECHR/2005/681.html" target="_blank"><span style="color: #c0504d; text-decoration: underline;">Hirst v United Kingdom</span></a></span></em>) was breaching the European Convention on Human Rights by preventing prisoners from voting in public elections.  <span style="color: #c0504d;"><a href="http://www.dailymail.co.uk/news/article-1355376/Prisoners-vote-MPs-stand-UK-rights-overturn-EU-ruling.html#ixzz1EVksZNXf" target="_blank"><span style="color: #c0504d; text-decoration: underline;">Mr Cameron said</span></a></span> he had ‘every sympathy’ with those who objected to the decision, telling Parliament: ‘I don’t see any reason why prisoners should get the vote. This is not a situation I want this country to be in.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>In the case of sex offenders, <span style="color: #c0504d;"><a href="http://www.supremecourt.gov.uk/docs/UKSC_2009_0144_Judgment.pdf" target="_blank"><span style="color: #c0504d; text-decoration: underline;">the UK’s Supreme Court</span></a></span> decided that it was a breach of the Article 8 rights of convicted sex offenders to deny them any right of appeal against their continued inclusion on the register.  <span style="color: #c0504d;"><a href="http://www.telegraph.co.uk/news/uknews/crime/8328797/Sex-offender-ruling-is-appalling-says-David-Cameron.html" target="_blank"><span style="color: #c0504d; text-decoration: underline;">Mr Cameron said he was ‘appalled’ by the decision</span></a></span>.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>It should, then, come as no surprise that the Protection of Freedoms Bill lacks any broad statement of principle such as might give rise to the politically unpalatable scenarios of votes for prisoners and rights for sex offenders.  Instead, we have a pragmatic set of proposals, some of which are loosely connected and the rest hardly connected at all.  While pragmatism is always welcome, so too is coherence and it is, perhaps, a strange thing for a piece of legislation to apply the same language of rights and freedoms to retention of DNA samples, fingerprinting children and CCTV as to ‘rogue wheel-clamping firms’.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Amid the criticisms of a lack of ambition and coherence <span style="color: #c0504d;"><a href="http://ukhumanrightsblog.com/2011/02/14/protection-of-freedoms-bill-published-magna-carta-unfazed-dr-cian-murphy/" target="_blank"><span style="color: #c0504d; text-decoration: underline;">(Dr Cian Murphy has described it as ‘a list of legislative pet hates’)</span></a>, </span>most people have welcomed the Bill’s attempts to deal with recent encroachments on personal privacy, not least those by the State itself.  For some people, however, the attempts do not go far enough.  Since the purpose of most of the Bill’s reforms is to control or downsize activities thought to affect personal freedoms, it is inevitable that this will fail to satisfy those campaigners for more radical reform who wanted to see the wholesale repeal of anti-terrorism and other ‘illiberal’ legislation passed by the government following the 9/11 attacks.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The Bill does, however, recognise that a new approach is needed to deal with the privacy implications of CCTV and ANPR. Pending further consultation on the provisions of statutory codes for the regulation of CCTV, it is too early to say what the effect of those provisions will be.  It seems a pity that the proposals for better regulation of CCTV are restricted to the use of CCTV by the police and local government only when the use of CCTV is so much more widespread (<span style="color: #c0504d;"><a href="http://www.henry-porter.com/Articles/Why-we-should-believe-Nick-Clegg-when-he-promises-to-restore-liberties-stolen-by-Labour.html" target="_blank"><span style="color: #c0504d; text-decoration: underline;">Henry Porter points out</span></a></span> that the Bill does not affect the use of CCTV in schools – a development that allows Stoke Park School and Community Technology College in Coventry to install 112 cameras on its premises, at a cost of £10,000).</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The Bill also recognises that local government has not always been the best judge of how it should use its regulatory powers.  It required the intervention of the Investigatory Powers Tribunal to bring the over-zealous bureaucrats to heel in <em><span style="color: #c0504d;"><a href="http://www.ipt-uk.com/default.asp?sectionID=17" target="_blank"><span style="color: #c0504d; text-decoration: underline;">Paton v Poole Borough Council</span></a></span></em>, an extraordinary case in which a local authority spied on a family suspected of trying to slip their child into a school in the wrong catchment area.  As a result of that case, individuals have already gained some protection from ‘town hall snoopers’, so Mr Clegg’s reforms may have come a little too late.  Similarly, it seems that the reform of the vetting and barring scheme may now be a less pressing issue than it once was: ‘common sense’ has to an extent already found its way into the scheme following publicity over the absurd prevention of unvetted children’s authors from appearing at public events in schools.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The proposed improvement of the freedom of information regime has been rightly welcomed by the Information Commissioner.  This will be achieved in two main ways – an extension of the range of bodies subject to freedom of information obligations and the obligation on public authorities to release information proactively and in a format that provides real and not just notional access.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Overall, the Protection of Freedoms Bill should be welcomed.  Pending the Coalition Government’s clarification of where it stands on the possible enactment of a UK Bill of Rights (a commission to investigate this is to be set up imminently according to a statement by the Prime Minister on 16 February 2011), it is surely right that legislative attention should in the meantime be paid to some of the more pressing issues of privacy and information protection that currently face us in the UK.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>See further chapter 7 and section 6.4 of <span style="color: #c0504d;"><a href="http://www.lawsocietyshop.org.uk/ecom_lawsoc/public/saleproduct.jsf?catalogueCode=9781853288432" target="_blank"><span style="color: #c0504d; text-decoration: underline;">The Privacy Law Handbook</span></a></span>.  A version of this article first appeared in the <span style="color: #c0504d;"><a href="http://www.bna.com/products/corplaw/wdpn.htm" target="_blank"><span style="color: #c0504d; text-decoration: underline;">World Data Protection Report</span></a></span>.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The <span style="color: #c0504d;"><a href="http://www.publications.parliament.uk/pa/bills/cbill/2010-2011/0146/cbill_2010-20110146_en_1.htm" target="_blank"><span style="color: #c0504d; text-decoration: underline;">Protection of Freedoms Bill</span></a></span></span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span style="color: #c0504d;"><a href="http://www.number10.gov.uk/news/speeches-and-transcripts/2010/05/queens-speech-2010-2-50580" target="_blank"><span style="color: #c0504d; text-decoration: underline;">'Restore freedoms and civil liberties through the abolition of unnecessary laws'</span></a></span></p>]]></content:encoded></item><item><guid isPermaLink="false">{77BD9790-7B95-4856-90AD-701A2A77B0C3}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/the-legal-protection-of-online-identities/</link><title>The legal protection of online identities</title><description><![CDATA[Millions of people post comments on the web in response to articles, blogs and stories.  Many do so anonymously. ]]></description><pubDate>Mon, 21 Mar 2011 07:41:00 Z</pubDate><category>Data and privacy</category><authors:names></authors:names><content:encoded><![CDATA[<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>What should someone do if they want to take action against the person responsible for an anonymous posting?  In most cases, website owners will not be able to release details about them because of data protection laws and their contractual relationship with their users.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The alternative is for an application to be made for a Court order requiring the disclosure of the person's true name and contact details.  These orders are known as "Norwich Pharmacal Orders" (NPOs).  In <em><span style="color: #c0504d;"><a href="http://www.bailii.org/ew/cases/EWHC/Ch/2005/625.html" target="_blank"><span style="color: #c0504d; text-decoration: underline;">Mitsui Ltd v Nexen Petroleum UK Limited</span></a></span></em>, Lightman J set out three conditions which must be met for the court to exercise its NPO jurisdiction:</span></p>
<p style="margin: 0cm 0cm 10pt 36pt; text-align: justify;"><span>“21.  The three conditions to be satisfied for the court to exercise the power to order <em>Norwich Pharmacal </em>relief are:</span></p>
<p style="margin: 0cm 0cm 10pt 36pt; text-align: justify;"><span>(i) a wrong must have been carried out, or arguably carried out, by an ultimate wrongdoer;</span></p>
<p style="margin: 0cm 0cm 10pt 36pt; text-align: justify;"><span>(ii) there must be the need for an order to enable action to be brought against the ultimate wrongdoer; and</span></p>
<p style="margin: 0cm 0cm 10pt 36pt; text-align: justify;"><span>(iii) the person against whom the order is sought must: (a) be mixed up in so as to have facilitated the wrongdoing, and (b) to be able or likely to be able to provide the information necessary to enable the ultimate wrongdoer to be sued."</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><strong><span>Privacy rights</span></strong></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>NPOs usually involve an interference with web-users' Article 8 rights because they will lead to the disclosure of their identify and contact details without their consent.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>This issue was first considered by the Court of Appeal in <em><span style="color: #c0504d;"><a href="http://www.bailii.org/ew/cases/EWCA/Civ/2001/1897.html" target="_blank"><span style="color: #c0504d; text-decoration: underline;">Totalise v Motley Fool</span></a></span>. </em>Aldous LJ was particularly concerned about the Article 8 and 10 issues raised by disclosure, and suggested a procedure for notifying defendants:</span></p>
<ol style="margin-top: 0cm;">
    <ol style="margin-top: 0cm;">
        <li style="margin: 0cm 0cm 10pt; text-align: justify; color: #000000;"><span>"the court must be careful not to make an order which unjustifiably invades the right of an individual to respect for his private life, especially when that individual is in the nature of things not before the court: see the Human Rights Act 1998, s.6, and the European Convention on Human Rights, Arts. 10 and (arguably at least) 6(1)……</span></li>
    </ol>
</ol>
<ol style="margin-top: 0cm;">
    <li style="margin: 0cm 0cm 10pt; text-align: justify; color: #000000;"><span>It is difficult to see how the court can carry out this task if what it is refereeing is a contest between two parties, neither of whom is the person most concerned, the data subject; one of whom is the data subject's prospective antagonist; and the other of whom knows the data subject's identity, has undertaken to keep it confidential so far as the law permits, and would like to get out of the cross-fire as rapidly and as cheaply as possible. However the website operator can, where appropriate, tell the user what is going on and to offer to pass on in writing to the claimant and the court any worthwhile reason the user wants to put forward for not having his or her identity disclosed. Further, the Court could require that to be done before making an order. Doing so will enable the court to do what is required of it with slightly more confidence that it is respecting the law laid down in more than one statute by Parliament and doing no injustice to a third party, in particular not violating his convention rights. "</span></li>
</ol>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><strong><span>Trivial complaints </span></strong></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>A few years later, the High Court considered whether to grant a NPO in <em><span style="color: #c0504d;"><a href="http://www.bailii.org/ew/cases/EWHC/QB/2007/2375.html" target="_blank"><span style="color: #c0504d; text-decoration: underline;">Sheffield Wednesday FC Ltd v Hargreaves</span></a></span></em>, where the claimant sought disclosure of the identities of eleven users of a football fansite.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The Court found that nine of the postings bordered on the trivial and it would be disproportionate and unjustifiably intrusive to make an order for the disclosure of the identities that "which are barely defamatory or little more than abusive or understood as jokes".  The judge did, however, grant a NPO in respect of the more serious allegations complained of, holding that the claimant's entitlement to protect its reputation outweighed the right of the authors to maintain their anonymity.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><strong><span>Clift v Clarke</span></strong><span> </span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>These principles have been considered again this year by the High Court in the unreported decision in <em>Clift v Clarke</em>.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>In 2009 Clift had successfully sued Slough Borough Council who had added her name to the Violent Persons Register without good reason after she had complained about anti-social behaviour in her local park.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Now, Clift applied for a <em>NPO </em>to identify two anonymous users of Mail Online who had posted what she said were defamatory comments about her in relation to her case against Slough.  She described the newspaper's own coverage of her case as "excellent".</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Sharp J dismissed the application.  First, she said the comments were no more than "pub talk" and it was fanciful to suggest that a sensible and reasonable reader would take them any other way, particularly in the context of the newspaper's wider coverage.  Secondly, by the time of the hearing the posts had been removed, having only been discovered by Clift more than a year after posting.  Any claim Clift might have would be weak.  Thirdly, the privacy rights of the anonymous users had to be taken into account.  Overall, Sharp J found it was disproportionate to grant the application and she declined to exercise her discretion.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Where there is evidence of a campaign against a claimant, or the allegations are serious or being disseminated widely, then the Court is likely to grant a NPO.  However, in cases such as Clift, where there have been stale internet postings that are unlikely to have damaged the claimant's reputation, NPOs are likely to be refused.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>There is a good post on <em>Clift v Clarke</em> <span style="color: #c0504d;"><a href="http://www.onebrickcourt.com/cases.aspx?menu=main&pageid=42&caseid=358&archive=" target="_blank"><span style="color: #c0504d; text-decoration: underline;">here</span></a></span>.  The post is by Sarah Palin of 1 Brick Court, who appeared as Counsel for Mail Online, and contains a useful commentary on the defamation aspects of the decision.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><em><span>See further section 6.4 of the <span style="color: #c0504d;"><a href="http://www.lawsocietyshop.org.uk/ecom_lawsoc/public/saleproduct.jsf?catalogueCode=9781853288432" target="_blank"><span style="color: #c0504d; text-decoration: underline;">Privacy Law Handbook</span></a></span></span></em></p>]]></content:encoded></item><item><guid isPermaLink="false">{FE554F00-DA12-4B76-AB5B-09DF825ADA23}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/harassment-by-letter-writing/</link><title>Harassment by letter-writing</title><description><![CDATA[Are letters capable of amounting to a course of conduct amounting to harassment?]]></description><pubDate>Thu, 17 Mar 2011 08:07:00 Z</pubDate><category>Data and privacy</category><authors:names>Keith Mathieson</authors:names><content:encoded><![CDATA[<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>In certain circumstances, yes, according to the Court of Appeal in <em><span style="color: #c0504d;"><a href="http://www.bailii.org/ew/cases/EWCA/Civ/2011/123.html" target="_blank"><span style="color: #c0504d; text-decoration: underline;">Iqbal v Dean Manson</span></a><a href="http://www.bailii.org/ew/cases/EWCA/Civ/2011/123.html" target="_blank"><span style="color: #c0504d; text-decoration: underline;"> [2011] EWCA Civ 123</span></a></span></em>.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The case concerned a claim for harassment by a solicitor against the defendant, a firm of solicitors by whom the claimant was once employed.  The alleged harassment consisted of three letters sent to the claimant, two of which were copied to the Leeds county court.  The letters concerned a dispute between the parties about the claimant's representation of a client connected to previous clients of the defendant.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The first letter raised questions about the claimant's professional integrity and the circumstances in which he had ceased to be employed by the defendant.  The second letter accused him of a serious conflict of interest and alleged he had been summarily dismissed for 'insubordination and reckless conduct'.  The third letter accused the claimant of misleading the Law Society and of illegal conduct unbefitting a solicitor.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Section 1 of the <span style="color: #c0504d;"><a href="http://www.legislation.gov.uk/ukpga/1997/40/contents" target="_blank"><span style="color: #c0504d; text-decoration: underline;">Protection from Harassment Act 1997</span></a></span> provides that a person must not pursue a course of conduct which amounts to harassment of another and which he knows or ought to know amounts to harassment.  "Harassment" is not further defined, but s 7(2) says it includes "alarming the person or causing the person distress" and a "course of conduct" is described in s 7(3) as necessarily involving "in relation to a single person ... conduct on at least two occasions in relation to that person".</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The Croydon county court struck out the claim for harassment.  On appeal to the High Court, Teare J held that the first two letters could not be said to be "oppressive and unreasonable" (Lord Phillips's test in <em><span style="color: #c0504d;"><a href="http://www.bailii.org/ew/cases/EWCA/Civ/2001/1233.html" target="_blank"><span style="color: #c0504d; text-decoration: underline;">Thomas v News Group Newspapers</span></a><a href="http://www.bailii.org/ew/cases/EWCA/Civ/2001/1233.html" target="_blank"><span style="color: #c0504d; text-decoration: underline;"> [2001] EWHC 1233</span></a></span></em>).  Although the judge held that the third letter was arguably capable of being described as harassing, it "was only one instance and so does not form a course of conduct".</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The Court of Appeal allowed the claimant's appeal against the order striking out his claim.  The Court of Appeal's judgment provides a useful review of the law and is particularly helpful on the issues of what constitute harassment and a course of conduct.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>First, the court decided that each of the three letters by themselves was capable of being described as harassing.  The test of harassment as set out in <em>Thomas </em>was "conduct targeted at an individual which is calculated to produce the consequences described in section 7 and which is oppressive and unreasonable".</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>In examining the letters, the court found that the first letter could arguably be understood as an attempt to get the claimant to stand down as the client's solicitor or else face unpleasant consequences.  The second and third letters were considered even more serious.  In the judgment of the court, the three letters "particularly when viewed in the light of each other ... arguably amount to a deliberate attack on the professional and personal integrity of [the claimant], in an attempt to pressurise him, by his exposure to his client and/or the court, into declining to act for [the client] or else into advising [the client] to meet the demands of [the defendant]".  As such, they evidenced a campaign of harassment against the claimant.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The court accepted that the correspondence had arisen in the context of litigation and that it would be "rare indeed" that complaints between lawyers in such a context would go so far as to amount to harassment, but in this case, the defendant had gone too far: the letters had deliberately and wrongfully attacked a professional man's integrity, were capable of causing alarm and distress and were oppressive and unreasonable.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Second, the court gave its opinion on whether there could be a course of conduct even if two of the three letters alleged to constitute the course of conduct were not themselves capable of constituting harassment.  (This issue was not determinative of the case because the Court of Appeal found that each of the three letters was by itself capable of constituting harassment.)</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>In the Court of Appeal's judgment, it is the course of conduct, rather than the individual instances that make up the course of conduct, that must amount to harassment.   It is therefore possible that a course of conduct may amount to harassment even if the individual acts by themselves would not be considered to be harassment.  What the court must do is to assess the course of conduct as a whole with a view to determining whether that course of conduct amounts to harassment.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The court also decided that a defendant's conduct after proceedings have been commenced - including the contents of his pleadings and court documents - may be of evidential assistance in deciding whether the course of conduct complained of amounts to harassment and it expressed the view (without having to decide the point) that an oppressively pleaded defence may even of itself be part of such a course of conduct.  Finally, the court decided that civil liability for harassment could attach to a partnership or unincorporated body.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><strong><span>Comment</span></strong></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The <em>Iqbal</em> case should remind practitioners of the potential for harassment claims to arise in circumstances very different from the stalking scenarios for which the 1997 Act was originally intended.  In light of the court's finding that a deliberate attack on an individual's personal and professional integrity may amount to harassment, there is obvious potential for a harassment claim to be pursued alongside, or instead of, a defamation claim.  The case should also serve as a reminder to those engaged in litigation to conduct the proceedings in a reasonable manner and not to act oppressively, unreasonably or in such a way as to cause alarm or distress.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>See further section 8.2 of <span style="color: #c0504d;"><a href="http://www.lawsocietyshop.org.uk/ecom_lawsoc/public/saleproduct.jsf?catalogueCode=9781853288432" target="_blank"><span style="color: #c0504d; text-decoration: underline;">The Privacy Law Handbook</span></a></span>.  There is also a more detailed commentary on <em>Iqbal</em> on the Inforrm blog <span style="color: #c0504d;"><a href="http://inforrm.wordpress.com/2011/02/25/case-law-iqbal-v-dean-manson-harassment-by-letter-edward-craven/#more-7656" target="_blank"><span style="color: #c0504d; text-decoration: underline;">here</span></a></span>.</span></p>
<br>]]></content:encoded></item><item><guid isPermaLink="false">{4534CDDC-CDCD-447B-AF93-8C31BB875EA0}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/can-employers-spy-on-their-employees/</link><title>Can employers spy on their employees?</title><description><![CDATA[The US media have reported a number of instances in which companies have hired private detectives to spy on workers taking "sickies".  ]]></description><pubDate>Fri, 11 Mar 2011 08:23:00 Z</pubDate><category>Data and privacy</category><authors:names></authors:names><content:encoded><![CDATA[<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Surveillance in these circumstances will often be defensible, the US courts having decided that "reasonable suspicion" is sufficient justification.  But what is the position in the UK?</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>In the UK the covert surveillance of employees outside the workplace may engage the employee's Article 8 rights and give rise to a cause of action by the employee for misuse of private information.   If the employee is dismissed in consequence of the covert surveillance, the surveillance may render unfair a dismissal that would otherwise have been fair.   Alternatively, if an employee discovers that they have been the subject of covert surveillance, they may resign and claim constructive dismissal based on a breach of the duty of trust and confidence owed by the employer.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>While each case will depend on its facts, certain principles will be of general application.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>First, any surveillance must have a proper and reasonable justification.  This will usually mean that the employee is suspected of some serious breach of his contract or employment duties such as failing to attend work without a proper excuse or endangering public health or safety (e.g. a bus driver visiting the pub before starting his night shift).</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Second, the employer must have reasonable grounds for the suspicion.  Speculation that the employee is up to no good, or suspicion based on workplace gossip alone, is likely be insufficient justification for a breach of the employee's Article 8 rights even if the speculation or rumours later turn out to be correct. The proper investigation of any allegation, which should include giving the employee an opportunity to respond to allegations before any disciplinary action is taken, is key to a fair dismissal and to avoiding costly claims.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Third, the employer needs to satisfy itself that surveillance is necessary to achieve its legitimate aims.  If other less intrusive means are available to the employer (e.g. document reviews or workplace monitoring), those means should be adopted first.  Again, however, employers should consider whether workplace monitoring will infringe an employee's right to privacy or breach the duty of trust and confidence owed to an employee.  Guidance is set out in the <span style="color: #c0504d;"><a href="http://www.ico.gov.uk/for_organisations/data_protection/topic_guides/employment.aspx" target="_blank"><strong><em><span style="color: #c0504d; text-decoration: underline;">Information Commissioner's Office Code on Employment Practices</span></em></strong></a></span><strong><em>. </em></strong></span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Fourth, the degree of surveillance needs to be proportionate to the intended purpose of the surveillance.  It is unlikely, for example, to be proportionate to place the employee's family members under surveillance.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Fifth, it is advisable for the employer to alert employees in advance to the possibility that surveillance may be used in exceptional cases.  The potential use of surveillance may be mentioned in the employer's disciplinary policy or it may be mentioned specifically to the employee in a case where malingering or other misconduct is suspected or under investigation.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>In <span style="color: #c0504d;"><a href="http://www.employmentappeals.gov.uk/Public/Upload/EATS0007042392004.doc" target="_blank"><span style="text-decoration: underline;"><strong><em><span style="color: #c0504d;">McGowan v Scottish Water</span></em></strong><span style="color: #c0504d;"> </span></span></a></span>the Employment Appeal Tribunal (EAT) held that the filming of the home of an employee suspected of falsifying time sheets was justified, despite the fact it amounted to a breach of his privacy.  Mr McGowan lived in a tied property close to the water plant he was responsible for monitoring. Scottish Water suspected that he was not attending the plant as often as he claimed on his time sheets.  Private investigators were commissioned and secretly filmed Mr McGowan from outside his property.  This surveillance was considered to be justified and proportionate by the Tribunal (and subsequently by the ETA) despite the fact that Mr McGowan's father had died during the surveillance meaning his movements during this private bereavement time were secretly monitored.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Similarly, in the recent case of <strong><em><span style="color: #c0504d;"><a href="http://www.employmentcasesupdate.co.uk/site.aspx?i=ed5859" target="_blank"><span style="color: #c0504d; text-decoration: underline;">McCann v Clydebank College</span></a></span></em></strong> a part time employee was filmed without his knowledge as his employer suspected he was breaching his contract by working another job while receiving company sick pay. Clydebank College instructed inquiry agents who filmed both Mr McCann's home and the garage at which it was claimed he was working.  The footage from the garage confirmed their suspicions (the footage from his home was not relied upon) and the employee was dismissed.  The EAT concluded that surveillance was proportionate in that situation. However, it went on to say that it would not have been legitimate if the employer had gone further  than was necessary to prove the point.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>However, Tribunals have shown some reluctance to entertain evidence of surveillance in dismissal cases. The Tribunal in <strong><em>Barrett v London Underground</em></strong> upheld an employee's unfair dismissal claim where he had been caught on camera playing squash while on leave from work due to an ankle injury. He successfully argued that his GP had advised that he exercise to speed the recovery of his injury and was awarded £10,000. This emphasises the importance of investigating allegations made against an employee, including obtaining an employee's comments on the allegations, even if evidence against them suggests a clear cut case.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>See further section 7.3 of <span style="color: #c0504d;"><a href="http://www.lawsocietyshop.org.uk/ecom_lawsoc/public/saleproduct.jsf?catalogueCode=9781853288432" target="_blank"><span style="color: #c0504d; text-decoration: underline;">The Privacy Law Handbook</span></a></span>.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span style="color: #c0504d;"><a href="http://www.msnbc.msn.com/id/40536366/ns/business-bloomberg_businessweek/" target="_blank"><span style="color: #c0504d; text-decoration: underline;">Number of instances</span></a></span></p>
<br>]]></content:encoded></item><item><guid isPermaLink="false">{DCACBC7D-ED0B-47EC-A125-04342112A11A}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/anonymity-order-lifted-in-marital-privacy-case/</link><title>Anonymity order lifted in marital privacy case</title><description><![CDATA[A High Court judge has lifted an anonymity order protecting the identity of a formerly married couple involved in a privacy dispute.]]></description><pubDate>Mon, 28 Feb 2011 08:32:00 Z</pubDate><category>Data and privacy</category><authors:names></authors:names><content:encoded><![CDATA[<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>In <em><span style="color: #c0504d;"><a href="http://www.bailii.org/ew/cases/EWHC/QB/2011/249.html" target="_blank"><span style="color: #c0504d; text-decoration: underline;">Stephanie Hirschfeld v James McGrath</span></a><a href="http://www.bailii.org/ew/cases/EWHC/QB/2011/249.html" target="_blank"><span style="color: #c0504d; text-decoration: underline;"> [2011] EWHC 249 (QB)</span></a></span></em>, Ms Hirschfeld, the ex-wife of Mr McGrath, had obtained an interim injunction on 4 February 2011 to restrain the publication of certain confidential information after she discovered that Mr McGrath intended to publish an autobiographical book with his new wife.  When granting the interim injunction, Teare J also made an anonymity order.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The case then came before Tugendhat J on 15 February 2011 to determine what information should be made public concerning the proceedings and, in particular, whether the anonymity order should be continued.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Tugendhat J noted that Teare J had been entitled to apply a lower test (as per <span style="color: #c0504d;"><a href="http://www.bailii.org/uk/cases/UKHL/2004/44.html" target="_blank"><span style="color: #c0504d; text-decoration: underline;">Cream Holdings Ltd v Banerjee [2005] 1 AC 253</span></a></span>) on the interim application before him to enable the court, at the return date, to consider all the possible options. Any subsequent decision to lift the anonymity order would not therefore reflect upon the correctness of Teare J’s order.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The confidential information publication of which Ms Hirschfeld wished to prevent concerned the intimate relationship of the parties and their family, and information about Ms Hirschfeld’s health.  In relation to these matters Mr McGrath offered undertakings to the court, which were welcomed by the judge as according with the principles relating to marital confidences established since Argyll v Argyll [1967] 1 Ch 302.  Ms Hirschfeld accepted, however, that she could not prevent Mr McGrath from disclosing the fact that while they were married, the parties suffered a bereavement.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>In considering the position regarding anonymity of the parties, the judge repeated the principles set out by Lord Neuberger MR in <span style="color: #c0504d;"><a href="http://www.bailii.org/ew/cases/EWCA/Civ/2011/42.html" target="_blank"><span style="color: #c0504d; text-decoration: underline;">JIH v News Group Newspapers Ltd [2011] EWCA Civ 42</span></a> </span>to emphasise the general rule that the names of the parties to an action are included in orders and judgments of the court and that a court should only derogate from that general principle of open justice after closely scrutinising the application, and considering whether a degree of restraint on publication is necessary, and, if it is, whether there is any less restrictive or more acceptable alternative than that which is sought.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The judge held that Mr McGrath’s intention to publish his book meant that there was a risk of jigsaw identification of the parties, which in turn meant that the purpose of any anonymity order could be defeated.  He was also concerned that any order would lack the degree of clarity and precision that is required. Finally, as Ms Hirschfeld had not asked for an order restraining the publication of Mr McGrath’s book, the judge was also mindful that he must not unnecessarily interfere with Mr McGrath’s rights. In light of the principles set out in JIH and on the specific facts of the case, Tugendhat J decided that it would not be right to continue the order for anonymity.  He also made the now customary order that the only information about the case that may be reported is the information contained in the judgment and order.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>See further sections 3.9.1 and 10.3 of <span style="color: #c0504d;"><a href="http://www.lawsocietyshop.org.uk/ecom_lawsoc/public/saleproduct.jsf?catalogueCode=9781853288432" target="_blank"><span style="color: #c0504d; text-decoration: underline;">The Privacy Law Handbook</span></a></span>.</span></p>]]></content:encoded></item><item><guid isPermaLink="false">{F10C2071-2010-4386-AA74-A26D662B6B2B}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/the-article-8-rights-of-sex-offenders/</link><title>The Article 8 rights of sex offenders</title><description><![CDATA[A recent decision of the Supreme Court has unleashed a populist wave directed at the European Court of Human Rights and European judges generally. ]]></description><pubDate>Thu, 24 Feb 2011 08:43:00 Z</pubDate><category>Data and privacy</category><authors:names></authors:names><content:encoded><![CDATA[<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>In <em><span style="color: #c0504d;"><a href="http://www.supremecourt.gov.uk/decided-cases/docs/UKSC_2009_0144_Judgment.pdf" target="_blank"><span style="color: #c0504d; text-decoration: underline;">R (on the application of F and FC) v Secretary of State for the Home Department</span></a><a href="http://www.supremecourt.gov.uk/decided-cases/docs/UKSC_2009_0144_Judgment.pdf" target="_blank"><span style="color: #c0504d; text-decoration: underline;"> (2010) UKSC 17</span></a></span></em> the court decided that <span style="color: #c0504d;"><a href="http://www.legislation.gov.uk/ukpga/2003/42/section/82" target="_blank"><span style="color: #c0504d; text-decoration: underline;">section 82 of the Sexual Offences Act 2003</span></a></span>, which prevents any review whatsoever of the Violent and Sex Offenders Register provisions for any sex offender sentenced to more than 30 months in jail, is incompatible with Article 8 of the European Convention on Human Rights. The Prime Minister, supported by the Home Secretary, <span style="color: #c0504d;"><a href="http://www.telegraph.co.uk/news/uknews/crime/8328797/Sex-offender-ruling-is-appalling-says-David-Cameron.html" target="_blank"><span style="color: #c0504d; text-decoration: underline;">attacked the ruling as appalling</span></a></span> and sent out a message to any judges who were listening about a general need for sanity on their part and a need for them to recognise that decisions on such topics were to be made by Parliament and not by them.  Grudgingly, it seems, the Government is contemplating allowing those on the Register for life to apply after 15 years to have the terms of their registration reviewed.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>What are the obligations under the Sex Offenders Register?  The obligations arise under <span style="color: #c0504d;"><a href="http://www.legislation.gov.uk/ukpga/2003/42/section/85" target="_blank"><span style="color: #c0504d; text-decoration: underline;">ss 85-86 of the Sexual Offences Act 2003</span></a></span>.  Registrants have to give their full name, home address, date of birth, national insurance number and vehicle details and to notify the police within three days of any changes.  They also have to notify the police at least seven days in advance of any intention to leave the UK for a period of three days or more and they must confirm their registration annually.  Indefinite orders affect those sentenced to 30 months or more for a relevant sex offence.   Rather like the <span style="color: #c0504d;"><a href="http://www.legislation.gov.uk/ukpga/1974/53" target="_blank"><span style="color: #c0504d; text-decoration: underline;">Rehabilitation of Offenders Act 1974</span></a></span>, there is then a sliding scale so that those imprisoned for between six and 30 months would have their names on the Register for 10 years whereas those receiving a conditional discharge would have their names on the register for the duration of the discharge and those under 18 have their names on the Register for half the adult tariff period</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>One has to navigate in such matters between the ‘castrate the lot of them and throw away the keys’ brigade and the advocates of the supremacy of human rights of particularly repellent and often dangerous offenders who violate the rights of their vulnerable victims.  When one looks at it dispassionately, the courts have done a pretty good job of steering the course.  The decision upheld unanimously by the Supreme Court was likewise <span style="color: #c0504d;"><a href="http://www.bailii.org/ew/cases/EWHC/QB/2008/3170.html" target="_blank"><span style="color: #c0504d; text-decoration: underline;">unanimously made by the Divisional Court [2008] EWHC 3170</span></a></span> and <span style="color: #c0504d;"><a href="http://www.bailii.org/ew/cases/EWCA/Civ/2009/792.html" target="_blank"><span style="color: #c0504d; text-decoration: underline;">the Court of Appeal [2009] EWCA 792</span></a></span>.  As Lord Phillips pointed out in the Supreme Court, the importance of the legislative objective in this instance has never been in doubt.  The prevention of sexual offending is of great social value and no one in the Supreme Court suggested that insofar as notification requirements play a useful role in assisting to achieve this objective, they are not a proportionate means of doing so.  The debate, as Lord Phillips said, has been as to the necessity and utility of imposing notification requirements<em> for life without any review</em>.  When one considers the proportionality of what is undoubtedly (and necessarily) an interference with Article 8 rights, the issue is whether that degree of interference is proportionate, bearing in mind that the real issue is not the often horrific nature of the offences, but the fact that whatever the offence and whatever the altered circumstances of the individual offender there can be no review whatsoever in cases where a term of imprisonment of 30 months or more has been imposed,.  As was pointed out in the Court of Appeal, the penalties for non-observance of the Register’s requirements can be very severe: for example, the failure to give three days notice of intention to travel overseas could potentially lead to five years in prison even where there could be something approaching a reasonable excuse.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>We are all painfully aware of very serious offences extending to murder that have been committed by previously convicted sexual offenders, but sexual offences encompass a variety of sins.  The reporting restrictions could 15 years down the road have proved then to be too onerous or to need alteration.  The offender could be in a wheelchair and no longer a threat to society.  The applicant is likely to have to satisfy a distinctly sceptical senior police officer that the conditions need review.   It is a matter of common sense.  A declaration of incompatibility does not change the law.  It gives early warning of what is down the road in the European Court of Human Rights and potential compensation claims by particularly undeserving claimants.  It is up to Parliament to change the law and this surely can be done in a less hysterical manner.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>See further section 7.7 of the <span style="color: #c0504d;"><a href="http://www.lawsocietyshop.org.uk/ecom_lawsoc/public/saleproduct.jsf?catalogueCode=9781853288432" target="_blank"><span style="color: #c0504d; text-decoration: underline;">Privacy Law Handbook</span></a></span></span></p>]]></content:encoded></item><item><guid isPermaLink="false">{DAF4FB17-BE84-4974-BC55-AD03694CB29E}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/forced-sterilisation-case-heard-in-public/</link><title>Forced sterilisation case heard in public</title><description><![CDATA[On 15 February 2011 Hedley J ordered that a case proceeding in the Court of Protection which featured medical information of the highest sensitivity should be held in open court. ]]></description><pubDate>Tue, 22 Feb 2011 09:46:00 Z</pubDate><category>Data and privacy</category><authors:names></authors:names><content:encoded><![CDATA[<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The Court of Protection normally hears such cases in private.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The case concerned a young woman aged 21 with severe learning difficulties who was expecting her second child.  The application, made by her mother, was for her daughter to be sterilised to prevent her becoming pregnant again.  The case, which was adjourned, will turn on whether it is established that the daughter lacks the capacity to make decisions about contraception and, if so, whether sterilisation would be in her best interests.  <span style="color: #c0504d;"><a href="http://www.independent.co.uk/news/uk/home-news/delay-to-ruling-over-sterilisation-2215867.html" target="_blank"><span style="color: #c0504d; text-decoration: underline;">A report of the case appears in the Independent</span></a></span>, which has previously run a successfully campaign for open justice in the Court of Protection.  Earlier postings on this blog <span style="color: #c0504d;"><a href="http://blog.rpc.co.uk/privacy-law/media-access-to-court-of-protection" target="_blank"><span style="color: #c0504d; text-decoration: underline;">here</span></a> </span>and <span style="color: #c0504d;"><a href="http://blog.rpc.co.uk/privacy-law/court-of-protection-names-local-council-rebuked-for-breaching-human-rights-of-man-with-learning-disabilities" target="_blank"><span style="color: #c0504d; text-decoration: underline;">here</span></a> </span>contain details of other instances in which the Court of Protection has relaxed its normal privacy rules.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>In this instance, Hedley J determined that the case should be heard in open court because of the <em>"legitimate public interest"</em> in the case.  The Judge considered that a hearing in open Court would help people's understanding of the powers of the Court of Protection and provide <em>"a real opportunity for debate"</em> about <em>"why the Court should have these powers and if it should, how it should use them"</em>.  That was particularly so as the application was for the daughter to undergo <em>"serious medical treatment"</em>.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>His ruling however did not override the patient's right to confidentiality when it comes to medical matters.  The daughter's right to confidentiality was preserved by strict reporting restrictions which meant that no details about her identity, her family or location could be published.  No information might be released which could identify the patient, including the name of the NHS Trust, the doctors involved and the local authority concerned.  It was the Official Solicitor, acting for the daughter, which applied for the reporting restrictions, upholding the principle that the daughter was entitled to keep her medical condition and treatment confidential.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The case is currently adjourned until May 2011 for further reports.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>See further section 10.2 of the <span style="color: #c0504d;"><a href="http://www.lawsocietyshop.org.uk/ecom_lawsoc/public/saleproduct.jsf?catalogueCode=9781853288432" target="_blank"><span style="color: #c0504d; text-decoration: underline;">Privacy Law Handbook</span></a></span></span></p>]]></content:encoded></item><item><guid isPermaLink="false">{7943C074-ED6B-43C6-B145-2A5A2AD84654}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/max-mosley-and-the-public-interest-in-exposing-hypocrisy/</link><title>Max Mosley and the public interest in exposing hypocrisy</title><description><![CDATA[In an interesting interview with the Financial Times, the UK's most indomitable privacy claimant, Max Mosley, challenges the notion that there might be a public interest in exposing hypocrisy. ]]></description><pubDate>Tue, 22 Feb 2011 09:09:00 Z</pubDate><category>Data and privacy</category><authors:names>Keith Mathieson</authors:names><content:encoded><![CDATA[<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Having permitted Mr Mosley the opportunity to speculate about the sex life of the editor of the Daily Mail ("for Mr Dacre sex must consist of drawing the curtains, turning out the light and assuming the missionary position"), the interviewer asks Mr Mosley whether people in the public eye are role models and therefore have a duty to behave in a certain way.  Mr Mosley replies:</span></p>
<p style="margin: 0cm 0cm 10pt 36pt; text-align: justify;"><span>If someone is a role model and they're doing something they shouldn't do, the last thing you want to do is expose that.  You have to ask, does what this person say achieve the objective of persuading people to behave better?  Whether he's actually doing it or not is beside the point as long as it doesn't come out.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>When the interviewer suggests that's a bit hypocritical, Mr Mosley says:</span></p>
<p style="margin: 0cm 0cm 10pt 36pt; text-align: justify;"><span>In the end people are hypocritical.  What's so wrong with hypocrisy?</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The interviewer expresses herself shocked by Mr Mosley's response and most people would probably share her feeling that hypocrisy is not something to be airily dismissed as a peccadillo.  While the reported decisions suggest that judges are inclined to be wary of according role model status to people in the public eye, they are rather less insouciant about lying and hypocrisy.  Perhaps the clearest example of that is in <em><span style="color: #c0504d;"><a href="http://www.bailii.org/uk/cases/UKHL/2004/22.html" target="_blank"><span style="color: #c0504d; text-decoration: underline;">Campbell v MGN</span></a></span></em> where it was generally accepted that there was a public interest in exposing the glaring inconsistency between Ms Campbell's actual drug use and her professed abstinence. Whatever may be the outcome of Mr Mosley's attempt to persuade the European Court of Human Rights that the media has a duty to contact in advance any person whose privacy may be about to be infringed, it is somewhat less likely that the UK courts will share Mr Mosley's tolerance when it comes to cases involving hypocrisy.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The FT interview appears <span style="color: #c0504d;"><a href="http://www.ft.com/cms/s/2/8af2ef8a-2e70-11e0-8733-00144feabdc0.html#axzz1EiZXhZnW" target="_blank"><span style="color: #c0504d; text-decoration: underline;">here</span></a></span>, but readers should be aware that the FT has metered access to its website.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><em><span>See further section 3.5 of the <span style="color: #c0504d;"><a href="http://www.lawsocietyshop.org.uk/ecom_lawsoc/public/saleproduct.jsf?catalogueCode=9781853288432" target="_blank"><span style="color: #c0504d; text-decoration: underline;">Privacy Law Handbook</span></a></span></span></em></p>]]></content:encoded></item><item><guid isPermaLink="false">{20E81D48-F994-4460-AEBE-15FBC1A300E7}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/no-privacy-in-tweets/</link><title>No privacy in Tweets</title><description><![CDATA[Publicly accessible postings on Twitter and other social media are not private, according to rulings by the Press Complaints Commission. ]]></description><pubDate>Thu, 10 Feb 2011 09:57:00 Z</pubDate><category>Data and privacy</category><authors:names>Keith Mathieson</authors:names><content:encoded><![CDATA[<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The rulings were made following complaints against two national newspapers: <span style="color: #c0504d;"><a href="http://www.pcc.org.uk/cases/adjudicated.html?article=NjkzNA==" target="_blank"><span style="color: #c0504d; text-decoration: underline;">Baskerville v Daily Mail</span></a> </span>and <span style="color: #c0504d;"><a href="http://www.pcc.org.uk/cases/adjudicated.html?article=NjkzNQ==" target="_blank"><span style="color: #c0504d; text-decoration: underline;">Baskerville v Independent on Sunday</span></a></span>.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><strong><span>The complaints</span></strong></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Sarah Baskerville, a middle-ranking civil servant at the Department for Transport, complained that the publication by the <em>Daily Mail</em> of her postings on Twitter were an intrusion into her privacy. The <em>Daily Mail</em> had reproduced tweets by Ms Baskerville in which she criticised aspects of her job and her feelings towards her work, including the struggles of working with a wine-induced hangover. The article identified other tweets that were political in nature, including comments on an MP, the re-tweet of a Labour MP's attack on government spin and her personal acquaintance of a prominent MP's wife.  The full text of the article is here: <a href="http://www.dailymail.co.uk/debate/article-1329321/Civil-servants-Twitter-Oh-stop-twit-Tweeting-someone.html" target="_blank"><span style="text-decoration: underline;">"<span style="color: #c0504d;">Oh, please, stop this twit from Tweeting, someone</span>"</span></a>.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Ms Baskerville made a separate complaint about an article in <em>The Independent on Sunday, </em>published the day after the <em>Mail's</em> article, which highlighted a number of her tweets and discussed the <em>Mail's </em>criticism of her: <a href="http://www.independent.co.uk/news/uk/politics/the-hounding-of-baskerville-2133666.html" target="_blank"><span style="text-decoration: underline;">"<span style="color: #c0504d;">The Hounding of Baskerville</span>"</span></a>.  This article was accompanied by a photograph of Ms Baskerville taken from her Flickr photo-stream and included comments taken from Ms Baskerville's blog.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>At the time the article was published Ms Baskerville's Twitter stream was not locked. This meant that tweets posted by her could be viewed by anyone who used Twitter and were not limited to her followers, of which there were in any event some 700.  Similarly, neither Ms Baskerville's blog nor her Flickr page were protected with privacy settings.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Ms Baskerville argued that her activities on Twitter and other social networking sites were private. Notwithstanding that anyone could view the information she posted online, she maintained she still had a reasonable expectation that her messages would be published only to her followers. In support of her case she pointed to the fact that non-followers would only find her account by actively searching for it and even then would not see the full context of her messages. She also noted that both her Twitter stream and her blog carried clear disclaimers that the views expressed were personal opinions and were not representative of her employer.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The papers argued that the publication of Ms Baskerville's comments about many aspects of her life, including her job, which she had openly posted online and could be read by anyone, was not an unjustified interference with her privacy. Furthermore, the comments were published in the context of an ongoing debate around the use of social media. It was legitimate for the papers to consider how people in Ms Baskerville's position should control their online activities and how this could reflect on their judgement particularly as civil servants are required by the civil service code not to call into doubt the impartiality of the service through their public statements.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><strong><span>The PCC's Adjudication </span></strong></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The PCC dismissed Ms Baskerville's complaint. Although the information was originally intended for a smaller audience, its republication by the papers did not constitute an intrusion of her privacy.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>In the opinion of the PCC, the information published by the newspapers was not intimate personal detail about Ms Baskerville but related directly to her professional life as a civil servant.  A key consideration in the PCC's assessment was the publicly accessible nature of the information – for which Ms Baskerville was responsible. Although she had "only" 700 followers, the potential audience was much greater. A notable feature of Twitter is that tweets can be re-tweeted (republished) to a much larger audience. </span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The PCC was also influenced by Ms Baskerville's public position.  Although the coverage caused her regrettable distress, it did not unjustifiably intrude into her private life. Equally, the publication of what the PCC described as an innocuous picture of Ms Baskerville and comments from her blog, which were not of an intimate nature, did not constitute unjustified intrusion.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><strong><span>Comment</span></strong></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The decision is an application of the most recent guidance on the use of social media contained in the January 2011 edition of the <span style="color: #c0504d;"><a href="http://www.editorscode.org.uk/downloads/codebook/codebook.pdf" target="_blank"><span style="color: #c0504d; text-decoration: underline;">Editors' Codebook</span></a></span>. The Codebook stresses that material published without consent can raise privacy concerns, even if freely available online<em>, </em>and that republication of 'publicly available' personal information is not inherently justified. Equally, it is not prohibited and it is for the journalist or editor to consider the particular circumstances of each case. Before publication journalists are advised to consider: (1) how personal is the information in question; (2) how accessible is the material to third parties;  (3) what steps the individual had taken to restrict access to an online profile and  whether the individual knew that the material was being used more widely; (4) whether the person was responsible for uploading it; and (5) what public interest there is in publishing it.  Special caution is urged where the information could concern a child under the age of 16.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The adjudications in Ms Baskerville's complaints demonstrate that the Commission is taking a pragmatic and sensible approach to the application of this guidance. The information and pictures were not of an intimate nature, they had not been obtained covertly, and, as the papers pointed out, Ms Baskerville was not a person who was incapable of realising the consequences of making her life so public. Given Ms Baskerville's position and the content of her postings, there was a public interest in including them in the press coverage. </span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><em><span>See further sections 11.3 and 5.9 of the <span style="color: #c0504d;"><a href="http://www.lawsocietyshop.org.uk/ecom_lawsoc/public/saleproduct.jsf?catalogueCode=9781853288432" target="_blank"><span style="color: #c0504d; text-decoration: underline;">Privacy Law Handbook</span></a></span></span></em></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><em><span>(Originally blogged by Bríd Jordan)</span></em></p>]]></content:encoded></item><item><guid isPermaLink="false">{0D15DEC2-EEC6-4BB3-A014-986072DA5A84}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/ico-fines-councils-for-losing-laptops/</link><title>ICO fines councils for losing laptops</title><description><![CDATA[On 8 February 2011 the Information Commissioner’s Office (“ICO”) issued two monetary penalty notices for serious breaches of the Data Protection Act.]]></description><pubDate>Thu, 10 Feb 2011 09:51:00 Z</pubDate><category>Data and privacy</category><authors:names></authors:names><content:encoded><![CDATA[<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Ealing Council and Hounslow Council were fined £80,000 and £70,000 respectively for the loss of two unencrypted laptops containing sensitive personal information.  (This might be considered rather unfair on the poor council tax payers of Ealing and Hounslow, though like those councils' own parking fines, the ICO have applied a discount for early payment.)</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Four fines have now been imposed.  The first two fines, imposed in November 2010, were covered <span style="color: #c0504d;"><a href="http://blog.rpc.co.uk/privacy-law/information-commissioners-office-issues-first-monetary-penalty-notices" target="_blank"><span style="color: #c0504d; text-decoration: underline;">in a previous posting</span></a></span> on this blog.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><strong><span>Facts</span></strong></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Ealing Council provided an out-of-hours service on behalf of both councils, which relied on the use of laptops to record information about individuals.  Two of these laptops were lost.  There was no evidence to suggest that the data held on the computers had been accessed and no complaints from those affected was received.  However, there was still held to be a significant risk to the privacy of the affected individuals.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>As with the two previous occasions that gave rise to fines, the ground on which the fine was imposed was a failure to comply with the seventh data protection principle (the need to take "<em>appropriate technical and organisational measures</em>") to protect data.  The specific failure was the failure to encrypt the data.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The press release by the ICO is <span style="color: #c0504d;"><a href="http://www.ico.gov.uk/~/media/documents/pressreleases/2011/Monetary_penalties_ealing_and_hounslow_news_release_20110208.ashx" target="_blank"><span style="color: #c0504d; text-decoration: underline;">here</span></a></span>.  The notices are <span style="color: #c0504d;"><a href="http://www.ico.gov.uk/~/media/documents/library/data_protection/notices/ealing_council_monetary_penalty_notice.pdf" target="_blank"><span style="color: #c0504d; text-decoration: underline;">here</span></a> </span>and <span style="color: #c0504d;"><a href="http://www.ico.gov.uk/~/media/documents/library/data_protection/notices/london_borough_of_hounslow_monetary_penalty_notice.pdf" target="_blank"><span style="color: #c0504d; text-decoration: underline;">here</span></a></span>.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><strong><span>Comment</span></strong></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The following lessons emerge:</span></p>
<ul style="margin-top: 0cm; list-style-type: disc;">
    <ul style="margin-top: 0cm; list-style-type: circle;">
        <li style="margin: 0cm 0cm 10pt; text-align: justify; color: #000000;"><span>Laptops and other off-site devices should be encrypted if they contain sensitive personal information.  Password protection alone is not adequate.</span></li>
    </ul>
</ul>
<ul style="margin-top: 0cm; list-style-type: disc;">
    <ul style="margin-top: 0cm; list-style-type: circle;">
        <li style="margin: 0cm 0cm 10pt; text-align: justify; color: #000000;"><span>It is not enough to have a data security policy in place; this must also be adhered to by employees.  This requires employee training and the promotion of general awareness of data protection issues.</span></li>
    </ul>
</ul>
<ul style="margin-top: 0cm; list-style-type: disc;">
    <ul style="margin-top: 0cm; list-style-type: circle;">
        <li style="margin: 0cm 0cm 10pt; text-align: justify; color: #000000;"><span>Data processing cannot simply be outsourced without checking that the data being handed over is properly protected, and will continue to be treated in such a way.</span></li>
    </ul>
</ul>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><em><span>See further section 5.8.1 of the <span style="color: #c0504d;"><a href="http://www.lawsocietyshop.org.uk/ecom_lawsoc/public/saleproduct.jsf?catalogueCode=9781853288432" target="_blank"><span style="color: #c0504d; text-decoration: underline;">Privacy Law Handbook</span></a></span></span></em></p>]]></content:encoded></item><item><guid isPermaLink="false">{48E5F0E3-3298-4BA3-84E9-3EAFC85240BE}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/supreme-court-welcomes-twitter/</link><title>Supreme Court welcomes Twitter</title><description><![CDATA[The use of Twitter is now officially sanctioned in the Supreme Court.  ]]></description><pubDate>Tue, 08 Feb 2011 10:02:00 Z</pubDate><category>Data and privacy</category><authors:names></authors:names><content:encoded><![CDATA[<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span style="color: #c0504d;"><a href="http://blog.rpc.co.uk/privacy-law/tweeting-the-courts" target="_blank"><span style="color: #c0504d; text-decoration: underline;">In a previous posting</span></a></span><span> we discussed the Lord Chief Justice's guidance on the use of Twitter in other courts open to the public.  That guidance envisaged an application being made to the judge for permission to tweet.   In the Supreme Court, by contrast, no permission is required.  The <span style="color: #c0504d;"><a href="http://www.supremecourt.gov.uk/docs/live-text-based-comms.pdf" target="_blank"><span style="color: #c0504d; text-decoration: underline;">guidance</span></a> </span>provides that any member of a legal team or member of the public is free to use text-based communications from court, providing (i) these are silent; and (ii) there is no disruption to the proceedings in court.  This freedom to tweet is subject to three exceptions:</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>(1) where reporting restrictions are in place;</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>(2) where a case involves a child and anonymity is of the essence; and</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>(3) where the Supreme Court orders that its judgment should not be reported so as not to influence other proceedings in a lower court.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><em><span>See further section 10.2.5 of the <span style="color: #c0504d;"><a href="http://www.lawsocietyshop.org.uk/ecom_lawsoc/public/saleproduct.jsf?catalogueCode=9781853288432"><span style="color: #c0504d; text-decoration: underline;">Privacy Law Handbook</span></a></span></span></em></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>(Originally blogged by Lindsay Hodgkinson)</span></p>]]></content:encoded></item><item><guid isPermaLink="false">{DCF6DC21-ECAA-4755-A4A4-B421AD51897E}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/shock-decision-sportsman-not-unmasked/</link><title>Shock decision: sportsman not unmasked</title><description><![CDATA[The identity of the sportsman officially known as JIH remains confidential.]]></description><pubDate>Tue, 01 Feb 2011 10:04:00 Z</pubDate><category>Data and privacy</category><authors:names>Keith Mathieson</authors:names><content:encoded><![CDATA[<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Those newspapers hoping to unmask him in the event that the Court of Appeal upheld the decision of Tugendhat J have had to content themselves with short court reports accompanied by silhouettes (presumably not of the real person): <span style="color: #c0504d;"><a href="http://www.dailymail.co.uk/news/article-1352140/Sportsmans-identity-remain-secret-wins-gagging-order-appeal.html" target="_blank"><span style="color: #c0504d; text-decoration: underline;">example here</span></a></span>.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Those readers wishing to remind themselves of <span style="color: #c0504d;"><a href="http://www.bailii.org/ew/cases/EWHC/QB/2010/2818.html" target="_blank"><span style="color: #c0504d; text-decoration: underline;">the original decision by Tugendhat J</span></a></span> are referred to <span style="color: #c0504d;"><a href="http://blog.rpc.co.uk/privacy-law/should-the-parties-in-privacy-cases-be-anonymised-a-summary-of-the-recent-judgments" target="_blank"><span style="color: #c0504d; text-decoration: underline;">our earlier blog on the subject</span></a></span> which has now been amended to take account of <span style="color: #c0504d;"><a href="http://www.bailii.org/ew/cases/EWCA/Civ/2011/42.html" target="_blank"><span style="color: #c0504d; text-decoration: underline;">the Court of Appeal's decision</span></a></span>.  An excellent summary of the decision by Edward Craven of Matrix Chambers appears on the Inforrm blog <span style="color: #c0504d;"><a href="http://inforrm.wordpress.com/2011/01/31/case-law-jih-v-news-group-newspapers-anonymity-regained-edward-craven/" target="_blank"><span style="color: #c0504d; text-decoration: underline;">here</span></a></span>.    In summary, the Court of Appeal decided that if JIH's name became public, and even if the court ordered that the nature of the allegedly private information should not be disclosed, there was a real risk that the purpose of the injunction would be defeated since existing media stories would enable people to put the pieces together and deduce the nature of the very information publication of which JIH was seeking to protect.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>See further sections 3.9.1 and 10.3 of <span style="color: #c0504d;"><a href="http://www.lawsocietyshop.org.uk/ecom_lawsoc/public/saleproduct.jsf?catalogueCode=9781853288432" target="_blank"><span style="color: #c0504d; text-decoration: underline;">The Privacy Law Handbook</span></a></span></span></p>]]></content:encoded></item><item><guid isPermaLink="false">{1ADDAC6C-2859-46B9-AE15-9A81D81984D7}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/anonymity-proposed-for-teachers-accused-by-pupils/</link><title>Anonymity proposed for teachers accused by pupils</title><description><![CDATA[The controversial Education Bill was published on 26 January 2011.]]></description><pubDate>Mon, 31 Jan 2011 10:44:00 Z</pubDate><category>Data and privacy</category><authors:names></authors:names><content:encoded><![CDATA[<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>A proposed new restriction (clause 13 of the Bill) will apply where a pupil or their representative makes an allegation that their teacher has committed a criminal offence against a registered pupil at the teacher's school. It will prohibit the publication of any matter relating to the teacher which is "likely to lead members of the public to identify the person as the teacher who is the subject of the allegation". The media can apply to vary or discharge this restriction, but the Court is required to take into account on any application the welfare of the teacher. The restrictions end once criminal proceedings are brought, when the usual laws on reporting cases take over. Breaching the new reporting restriction will be a criminal offence. Charges can be brought against the proprietor, editor or publisher of a newspaper, the producer of a TV programme and anybody who publishes material online.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>This is a potentially significant extension of privacy rights.  Clearly the Government wants to stop teachers' careers being ruined by bogus allegations being made against them by their pupils. On one level it is difficult to disagree with the sentiment - nobody likes having untrue allegations made against them. But why should teachers be treated differently to any other group of workers? What about doctors, nurses, dentists, social workers, lawyers or even politicians (such as those accused of fiddling their expenses)?</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>And what about other people suspected of breaking the law, such as those accused of murder, burglary or fraud? There seems to be little justification for stopping the media reporting what can be very important allegations when they arise, subject of course to the usual protection afforded by the laws of libel and contempt. The alternative will prevent the media from properly reporting on alleged wrongdoing.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><em><span>See further section 10.3 of the <span style="color: #c0504d;"><a href="http://www.lawsocietyshop.org.uk/ecom_lawsoc/public/saleproduct.jsf?catalogueCode=9781853288432" target="_blank"><span style="color: #c0504d; text-decoration: underline;">Privacy Law Handbook</span></a></span></span></em></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span style="color: #c0504d;"><a href="http://www.publications.parliament.uk/pa/cm201011/cmbills/137/11137.i-v.html" target="_blank"><span style="color: #c0504d; text-decoration: underline;">Education Bill</span></a></span></p>]]></content:encoded></item><item><guid isPermaLink="false">{19AA4563-FD9E-49FD-A30E-D42137041DBB}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/blanket-reporting-restriction-set-aside-by-court-of-appeal/</link><title>Blanket reporting restriction set aside by Court of Appeal</title><description><![CDATA[The Court of Appeal has discharged an order the effect of which would have been to postpone the reporting of an important criminal case for several months. ]]></description><pubDate>Mon, 31 Jan 2011 10:12:00 Z</pubDate><category>Data and privacy</category><authors:names></authors:names><content:encoded><![CDATA[<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The case relates to the shocking murder of a 15-year-old boy last year in front of hundreds of commuters during the rush hour at London’s Victoria Station.  Following the lifting of reporting restrictions, the case has been widely reported, including <span style="color: #c0504d;"><a href="http://www.dailymail.co.uk/news/article-1350470/Gang-hunted-murder-victim-15-bought-knives-Argos.html" target="_blank"><span style="color: #c0504d; text-decoration: underline;">here</span></a> </span>and <span style="color: #c0504d;"><a href="http://www.bbc.co.uk/news/uk-england-london-12280889" target="_blank"><span style="color: #c0504d; text-decoration: underline;">here</span></a></span>. </span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The judge hearing the case at the Old Bailey, described by the Lord Chief Justice at the appeal hearing as a highly respected and experienced trial judge, had imposed an order under s.4(2) of the Contempt of Court Act 1981, which postponed all reporting until the final outcome of all related trials (for case management purposes the trial has been split into three separate trials).  The reason given by the judge for making such an order was that fair, accurate and contemporaneous reporting of the proceedings would create a substantial risk of prejudice to the administration of justice due to:</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>1. The risk that young witnesses due to give evidence in subsequent trials might encounter a degree of hostility, which might in turn affect their ability or willingness to give further evidence; and/or</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>2. The risk that, in reading accounts of their own evidence or that of another witness, young witnesses might be tempted to alter their own accounts.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The five publishers of the Daily Mirror, Daily Telegraph, Daily Mail, Guardian and Independent appealed the order on the following grounds:</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>(i) there was no basis for concluding that, if witnesses were to encounter hostility, this would be by reason of the publication of contemporaneous reports of the trials;</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>(ii) there was no basis for concluding that, if witnesses were to encounter hostility, this would risk prejudicing the administration of justice in the proceedings;</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>(iii) there was no basis for concluding that, if witnesses were to change their evidence, this would be by reason of the publication of contemporaneous reports of the trials;</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>(iv) there was no basis for concluding that, if witnesses were to change their evidence, this would risk prejudicing the administration of justice in the proceedings; and</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>(v) the judge had failed to give proper consideration to the questions of a) whether a postponement order would eliminate any risk to the administration of justice; b) whether any risk could satisfactorily be overcome by some less restrictve means; and c) whether the degree of risk contemplated should be regarded as tolerable in the sense of being the “lesser of two evils” as regards the rights of the media under Article 10 ECHR, and the interest of a democratic society in ensuring that the press can freely report criminal trials in progress.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The judgment of the Court of Appeal was given in open court on Tuesday 25 January 2011.  It allowed the appeal and thereby quashed the s.4(2) order.  The Lord Chief Justice made the following points in his judgment:</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>1. In terms of the learned trial judge’s concerns in respect of young witnesses being subject to hostility and possibly changing their own account of events, as a result of the reporting of their evidence: the same effect could be caused by those who attend Court and who know what is said.  Anyone present at trial would have no difficulty in identifying witnesses and their evidence.  This risk is not therefore removed by the s.4(2) order.  The risk of hostility towards witnesses is already inherent in this case. </span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>2. In considering whether there is a real risk that reporting may lead to witnesses modifying their accounts because they may be subject, consciously or not, to “memory adjustment”: this presupposes that witnesses will read all media reports and that the media will publish all evidence, both of which are doubtful. This problem is not new and the solution is not easy but to the extent that witnesses’ evidence changes they can be cross-examined about that.  In reality, these concerns would be common to the reporting of any high-profile case.  There is nothing specific about this case that makes it different, at least as far as reporting is concerned.  The use of a s.4(2) order for the purposes of alleviating the strain of giving evidence is rarely appropriate, even where there are multiple trials.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>3. The Court stated that it had no jurisdiction to make lesser orders protecting the identity of the five young witnesses in the first trial.  However the Court invited the press to exercise its discretion not to identify those witnesses until such time as the trial judge has had an opportunity to consider any relevant applications.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The Court of Appeal’s judgment has not, so far as we know, been transcribed or reported elsewhere.  We will provide a link to any transcript or report that may become available.</span></p>]]></content:encoded></item><item><guid isPermaLink="false">{0373DA84-CEA7-4863-A30C-B3243A2C147D}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/phone-hacking-claims-a-new-legal-pursuit/</link><title>Phone-hacking claims - a new legal pursuit</title><description><![CDATA[The pack of lawyers representing the alleged victims of phone hacking by the News of the World seems to grow on an almost weekly basis.]]></description><pubDate>Wed, 26 Jan 2011 10:51:00 Z</pubDate><category>Data and privacy</category><authors:names>Keith Mathieson</authors:names><content:encoded><![CDATA[<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The lawyer for Gordon Taylor, possibly the first person to get a settlement from the newspaper, <a href="http://www.thlaw.co.uk/thlaw_mark_lewis.htm" target="_blank"><span style="text-decoration: underline;"><span style="color: #c0504d;">seeks distinction as the person who “devised the ‘phone-hacking’ claims</span>”</span></a>.  He is said to be acting for several claimants.  At least three other law firms say they are either actively pursuing claims against the newspaper or advising clients on potential claims.  But what is the law on phone hacking and what do these claims actually amount to?</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The act of intercepting someone’s telephone calls is most obviously a criminal rather than a civil matter.  <span style="color: #c0504d;"><a href="http://www.legislation.gov.uk/ukpga/2000/23/section/1" target="_blank"><span style="color: #c0504d; text-decoration: underline;">Section 1 of the Regulation of Investigatory Powers Act 2000</span></a></span> makes the unauthorised interception of communications a criminal offence.  The offence covers fixed and mobile telephone lines, emails, texts and pager messages.  A person ‘intercepts’ a communication by making some or all of the content of the communication available, while being transmitted, to a person other than the sender or intended recipient of the communication.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Does s. 1 of RIPA apply to the hacking of voicemail messages?  The police have apparently taken the view that it does not unless the message has not yet been listened to by the intended recipient: see <span style="color: #c0504d;"><a href="http://www.publications.parliament.uk/pa/cm200910/cmselect/cmcumeds/362/362ii.pdf" target="_blank"><span style="color: #c0504d; text-decoration: underline;">their evidence to the House of Commons Culture, Media & Sport Select Committee in 2009</span></a></span> (at page 364).  But the CPS is now reviewing the matter and is <span style="color: #c0504d;"><a href="http://www.guardian.co.uk/media/2011/jan/14/dpp-news-of-the-world-phone-hacking" target="_blank"><span style="color: #c0504d; text-decoration: underline;">reported to be thinking</span></a></span> that s. 1 may indeed apply to the hacking of messages whether they’ve been listened to or not – a position that would strike most people as what the law must surely have intended.  This is also what <span style="color: #c0504d;"><a href="http://www.legislation.gov.uk/ukpga/2000/23/section/2" target="_blank"><span style="color: #c0504d; text-decoration: underline;">s. 2(7) of RIPA</span></a></span> seems to say.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Phone hacking may also be an offence under <span style="color: #c0504d;"><a href="http://www.legislation.gov.uk/ukpga/2006/36/section/48" target="_blank"><span style="color: #c0504d; text-decoration: underline;">s. 48 of the Wireless Telegraphy Act</span></a></span> and it may attract criminal sanctions under s. 55 of the <span style="color: #c0504d;"><a href="http://www.statutelaw.gov.uk/content.aspx?activeTextDocId=3190610" target="_blank"><span style="color: #c0504d; text-decoration: underline;">Data Protection Act 1998</span></a></span>.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Civil liability may of course also arise under the Data Protection Act – the unauthorised interception of phone messages is the antithesis of fair and lawful processing of data.  Finally, phone hacking will usually give rise to liability for misuse of private information and/or breach of confidence and/or breach of Article 8 rights.  It seems to have been quite easy for the News of the World to have accessed people's voicemail messages, but the lack of security attached to individuals' voicemail systems can hardly be interpreted as in invitation to listen in.  And it will be a rare case when such an interference will be held to have a legitimate public interest justification.  <span style="color: #c0504d;"><a href="http://www.pcc.org.uk/cop/practice.html" target="_blank"><span style="color: #c0504d; text-decoration: underline;">Clause 10 of the Press Complaints Commission's Code of Practice</span></a> </span>does, however, at least envisage the possibility of phone hacking being in the public interest.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>For all the media coverage and the hue and cry of the legal pack, it is not yet clear how many of the various alleged victims of phone hacking who are said to have claims will actually be able to pursue them.  Some, such as Nicola Phillips, the former PA to Max Clifford, and the freshly-sacked football commentator Andy Gray, are involved in applications for disclosure of documents, suggesting that their claims are not yet fully formed.  Others such as Lord Prescott and Chris Bryant MP are also seeking disclosure of information (in their case from the Metropolitan Police) and (oddly) a declaration that their Article 8 rights have been infringed by the police.  It remains unclear how many claimants are actively pursuing the News of the World or will ever be able to do so.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><em><span>See further sections 7.3, 4.3.4, 5.8.2 and 11.3 of the <span style="color: #c0504d;"><a href="http://www.lawsocietyshop.org.uk/ecom_lawsoc/public/saleproduct.jsf?catalogueCode=9781853288432" target="_blank"><span style="color: #c0504d; text-decoration: underline;">Privacy Law Handbook</span></a></span></span></em></p>]]></content:encoded></item><item><guid isPermaLink="false">{D624FDCC-CB4C-488A-8C9E-45CD42141566}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/a-mass-outbreak-of-anonymity-cde-and-fgh-v-mgn-and-lmn/</link><title>A mass outbreak of anonymity: CDE and FGH v MGN and LMN</title><description><![CDATA[It is not unusual for claimants in privacy cases to be anonymised.  It is less common for defendants and distinctly unusual for non-parties. ]]></description><pubDate>Thu, 20 Jan 2011 11:05:00 Z</pubDate><category>Data and privacy</category><authors:names>Keith Mathieson</authors:names><content:encoded><![CDATA[<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The effect of Eady J's order in <span style="color: #c0504d;"><a href="http://www.bailii.org/ew/cases/EWHC/QB/2010/3308.html" target="_blank"><em><span style="color: #c0504d; text-decoration: underline;">CDE v MGN</span></em></a> </span>[2010] EWHC 3308 is that we do not know the identity of the two claimants, the second defendant, her solicitor, her two PR advisers or the journalist with whom she had a number of meetings and conversations.  The only party identified in Eady J's lengthy judgment is the first defendant MGN Ltd, publisher of the Sunday Mirror.  Although the solicitor for the second defendant (who also represented MGN) is not identified, the solicitor representing the claimants is identified, as are Counsel for the parties.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>This was a misuse of private information claim in which the two claimants sought an interim injunction preventing the two defendants from publishing private information about them.  The first claimant is described in the judgment as someone who often appears on television.  The second claimant is his wife.  The second defendant is described as a single mother on disability benefit who had "a kind of quasi-relationship" with the first claimant which seems to have been conducted mainly by phone, text messages, emails and tweets.  The second defendant wished to sell her story to the Sunday Mirror.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Eady J granted an injunction to the claimants, being satisfied that they were likely to obtain an injunction at trial preventing "intrusions of the kind contemplated by the defendants".  On the question of whether the parties should be anonymised, he ruled that it was necessary and proportionate to withhold the identities of the parties (apart from MGN's):</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>There is no point in any longer anonymising the First Defendant, since I have identified MGN Ltd in paragraph [5] above and throughout the judgment. As to the individual parties, however, it seems to me self-evident that to identify either of them would entirely defeat the court's purpose in granting the injunction. That which it is intended should be kept private, until the trial, would to all intents and purposes become public: there would be no point in having a trial. [86]</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Eady J then had to consider whether to anonymise certain other individuals in his judgment.  In the course of his judgment, Eady J had made observations which, in his words, "might be thought not to reflect every well" on the second defendant's solicitor, her PR adviser and his assistant and the journalist concerned.  Before he made his judgment public, the judge was asked by Counsel for the defendants to consider anonymising those four individuals.  (The solicitor was, according to the judgment, introduced to the second defendant by her PR adviser with whom the PR adviser had worked before.  It seems that the same solicitor then proceeded to act for MGN as well.)</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Eady J agreed with the "very unusual" request for anonymity, but he did so "not without hesitation" [86].  He explained his reasons as follows:</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The reason for taking such an unusual course really springs from the nature of the exercise a judge is required to carry out under s.12(3) of the Human Rights Act. Although it might be thought that my conclusions do not reflect very well on those people, I have been at some pains to emphasise that I am not making findings about them at this stage. These hearings have not been part of a trial. All I am required to do is to try to decide on incomplete (and untested) evidence what is "likely" to be the outcome at trial.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Meanwhile, says Mr James Price [counsel for the defendants], it might give rise to unfairness if casual observers interpret my observations as though they <em>were</em> the ultimate findings. It is true that much of what I have said is based on recordings and facts which are incontrovertible but, even so, upon closer examination facts sometimes emerge in a different light. That is why I was prepared to go along with counsel's suggestion for the time being. I was reminded of the decision in <em>R v Legal Aid Board, ex parte Kaim Todner </em>[1999] QB 966 and I bear in mind the important policy considerations addressed in that case but, for the reasons canvassed by Mr James Price, I will grant the anonymity to the non-parties on a temporary basis. [88 and 89]</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The judge made it clear that the issue of anonymity is, on the authorities, a case-sensitive matter and it does not follow from Eady J's judgment that a person about whom adverse remarks are made in a judgment on an interim matter would necessarily have a case for anonymity in any future case.  Having regard to the fact that Eady J was at pains to make it clear in his judgment that his findings were interim findings only and the position might well be different at trial, it is not immediately clear why he found it appropriate to grant anonymity in this case, thereby departing from the normal open justice rule.  It would of course be different if disclosing the identity of non-parties might of itself lead to the identification of the parties.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><em><span>See further section 10.3 of the <span style="color: #c0504d;"><a href="http://www.lawsocietyshop.org.uk/ecom_lawsoc/public/saleproduct.jsf?catalogueCode=9781853288432" target="_blank"><span style="color: #c0504d; text-decoration: underline;">Privacy Law Handbook</span></a></span> </span></em></p>]]></content:encoded></item><item><guid isPermaLink="false">{1DB26D94-87D2-47E3-8541-77445F33E97E}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/ecthr-upholds-campbell-v-mgn/</link><title>ECtHR upholds Campbell v MGN</title><description><![CDATA[Just under seven years after the House of Lords found by 3 to 2 against the Daily Mirror in the landmark privacy case by Naomi Campbell, the European Court of Human Rights has rejected MGN's attempt to persuade it that UK law was incompatible with Article 10.   ]]></description><pubDate>Tue, 18 Jan 2011 11:13:00 Z</pubDate><category>Data and privacy</category><authors:names>Keith Mathieson</authors:names><content:encoded><![CDATA[<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The facts of Campbell are too familiar to bear repetition here.  The basis of the ECtHR's finding that the decision of the UK courts did not interfere with MGN's right to freedom of expression was as follows.  First, the court considered that the House of Lords had correctly applied the core Article 10 principles and had recognised the importance of the public interest in responsible journalism.  Second, the court noted that the difference between the five judges in the House of Lords boiled down to a difference over whether publication of the information about Campbell, including the photographs, was or was not a justifiable interference with editorial freedom and judgment.  Noting that the UK courts had considered the matter over nine days and issued a number of detailed judgments, and having regard to the margin of appreciation accorded to decisions of national courts, the ECtHR said that strong reasons would be required before it reached a conclusion that the UK courts' final decision was wrong.  Third, the court found that the reasoning of the majority in the House of Lords was, in any event, persuasive.  There was a degree of intimacy about the additional information and a degree of intrusiveness about how it had been obtained.  There was no countervailing necessity to publish the information, the credibility of the story already being assured by the rest of the content.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Although the ECtHR found there was no violation of MGN's Article 10 rights arising from the privacy finding, it did find that MGN's Article 10 rights had been violated by the costs regime in force and in particular the requirement that MGN was liable for the very high success fees charged by Naomi Campbell's solicitors and Counsel.  That aspect of the judgment is dealt with on the Inforrm blog <span style="color: #c0504d;"><a href="http://inforrm.wordpress.com/2011/01/18/case-law-mgn-v-united-kingdom-partial-victory-for-mirror-group-on-cfas-defeat-on-privacy/" target="_blank"><span style="color: #c0504d; text-decoration: underline;">here</span></a></span>.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><strong><span>Comment</span></strong></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>This is a disappointing decision for the media, which will face continuing uncertainty over how its editorial judgments may be perceived by the courts.  It should not be forgotten that in the <em>Campbell </em>case, it was accepted that the disclosure of Naomi Campbell's drug-taking was in the public interest - what was in issue was the comparatively narrow question of how to draw the balance between Articles 8 and 10 in presenting that story.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>In the House of Lords Lord Hoffmann recognised that freedom of expression would be unnecessarily inhibited unless journalists and editors were given 'reasonable latitude' as to the manner in which information is conveyed to the public.  As Judge Bjorgvinsson observed in his dissenting judgment, the majority decision of the ECtHR 'simply defers to the assessment made by the domestic courts'.   In the words of Judge Bjorgvinsson:</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>This approach is inconsistent with the 'strict scrutiny' that is usually found in this Court's case law in balancing Article 8 and Article 10 rights where the Court regularly makes its own independent assessment of the facts involved and of the application of the relevant principles to those facts and it frequently substitutes its own views for those of the domestic courts. It has been the consistent approach of this Court that it is not enough, in itself, that the domestic courts consider the relevant principles; they must also be applied correctly ...</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Judge Bjorgvinsson agreed with the views of the minority in the House of Lords - Lords Hoffmann and Nicholls - that the additional information did not reveal anything of great significance but served mostly to add 'colour and conviction' and was within the limits of journalistic discretion.  Is this not the better approach - having decided that a story is in the public interest, as in <em>Campbell</em>, should it not be left up to editors how best to present that story?</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Judge Bjorgvinsson also (rightly) took Baroness Hale to task for having insisted that it was “not necessary to publish any further information ...”, pointing out that the test implied in that opinion is incorrect:</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>From the point of view of journalistic discretion in the presentation of a legitimate story, it is the restriction on freedom of expression that must be justified by reference to 'necessity' and not the publication as such.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><em><span>See further sections 3.5 and 3.8 of the <span style="color: #c0504d;"><a href="http://www.lawsocietyshop.org.uk/ecom_lawsoc/public/saleproduct.jsf?catalogueCode=9781853288432" target="_blank"><span style="color: #c0504d; text-decoration: underline;">Privacy Law Handbook</span></a></span></span></em></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span style="color: #c0504d;"><a href="http://www.bailii.org/uk/cases/UKHL/2004/22.html" target="_blank"><span style="color: #c0504d; text-decoration: underline;">The House of Lords found by 3 to 2 against the Daily Mirror</span></a></span><span> </span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span style="color: #c0504d;"><a href="http://cmiskp.echr.coe.int/tkp197/view.asp?item=1&portal=hbkm&action=html&highlight=campbell%20%7C%20mgn&sessionid=65316498&skin=hudoc-en" target="_blank"><span style="color: #c0504d; text-decoration: underline;">The European Court of Human Rights has rejected</span></a></span></p>]]></content:encoded></item><item><guid isPermaLink="false">{C5DB6E44-24C3-440C-BFD2-5FAD5F21B44F}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/no-exclusion-of-bereaved-families-from-7-7-inquest/</link><title>No exclusion of bereaved families from 7/7 inquest</title><description><![CDATA[The Divisional Court has refused the Government's application for judicial review of the 7/7 Coroner's decision not to exclude victims' families from the court during its private sessions. ]]></description><pubDate>Fri, 14 Jan 2011 11:42:00 Z</pubDate><category>Data and privacy</category><authors:names></authors:names><content:encoded><![CDATA[<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Coroners' courts normally sit in public.  However, Rule 17 of the Coroners Rules 1984 allows an inquest to be heard in private where it is in the interests of national security to do so.   In this case, officers from MI5 requested that they should be permitted to give their evidence in private.  The Coroner agreed but decided that an order excluding "the public" from the hearing should not extend to interested parties such as the bereaved families of the victims of the terrorist attacks.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The Home Secretary has confirmed that the Divisional Court's decision will not be appealed.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><em><span>See further chapter 10 of the <span style="color: #c0504d;"><a href="http://www.lawsocietyshop.org.uk/ecom_lawsoc/public/saleproduct.jsf?catalogueCode=9781853288432" target="_blank"><span style="color: #c0504d; text-decoration: underline;">Privacy Law Handbook</span></a></span></span></em></p>]]></content:encoded></item><item><guid isPermaLink="false">{1020CDAE-BECD-4913-9CD8-52EE342BC07B}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/7-7-footage-withheld-from-public-to-protect-privacy-of-victims-and-their-families/</link><title>7/7 footage withheld from public to protect privacy of victims and their families</title><description><![CDATA[The Coroner conducting the inquest into the terror attacks in London on 7 July 2005 has ordered that certain footage shown in court of the aftermath of the 7/7 attacks should not be released to the media.]]></description><pubDate>Fri, 14 Jan 2011 11:37:00 Z</pubDate><category>Data and privacy</category><authors:names></authors:names><content:encoded><![CDATA[<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Lady Justice Hallet reached this decision despite being "acutely conscious" of the principles of open justice, and despite the footage having been shown in open court.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The footage which the Coroner refused to release consists of two films: one showing graphic images of the devastation in the aftermath of the attack (which was not shown in court and the release of which was not sought), and the other an edited version with individuals pixelated but personal effects remaining. The BBC, ITN, BSkyB and Guardian News and Media, in a joint application, asked that the second film, which was shown in court, be released to the media and placed on the Inquest <span style="color: #c0504d;"><a href="http://7julyinquests.independent.gov.uk/index.htm" target="_blank"><span style="color: #c0504d; text-decoration: underline;">website</span></a></span>.  It was argued that it was not necessary or proportionate to restrict the disclosure and as such there was no reason to curtail the media's Article 10 rights or the principles of open justice.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The Coroner stressed she was not prohibiting the reporting of the fact that the footage had been shown in court, and ordered the release of an edited version of the footage with personal effects cut out. However she considered that the principle of open justice did not extend to require the release of a copy of every document or photograph used in open court to the media. This is particularly the case where the material is graphic or would cause distress to others, in this case the victims' family.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The Coroner further concluded, contrary to the submissions of the media, that she had discretion to prevent the release of the material and it was in any event necessary and proportionate to prohibit the release to protect the interests and the privacy of the bereaved families and survivors.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><em><span>See further chapter 10 of the <span style="color: #c0504d;"><a href="http://www.lawsocietyshop.org.uk/ecom_lawsoc/public/saleproduct.jsf?catalogueCode=9781853288432" target="_blank"><span style="color: #c0504d; text-decoration: underline;">Privacy Law Handbook</span></a></span></span></em></p>]]></content:encoded></item><item><guid isPermaLink="false">{6A6169AF-A0B5-454E-8B54-EABB9806C213}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/super-injunctions-an-update/</link><title>Super-injunctions - an update</title><description><![CDATA[Super-injunctions are injunctions that prevent publication of the fact that the court has made an injunction. ]]></description><pubDate>Fri, 14 Jan 2011 11:31:00 Z</pubDate><category>Data and privacy</category><authors:names>Keith Mathieson</authors:names><content:encoded><![CDATA[<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>It is now clear that they will be granted only in those rare cases where publication of the order would frustrate the very purpose of the order or where there is some other unusual and compelling reason.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>When ordering an injunction to restrain a misuse of private information in <em><span style="color: #c0504d;"><a href="http://www.bailii.org/ew/cases/EWHC/QB/2010/2335.html" target="_blank"><span style="color: #c0504d; text-decoration: underline;">DFT v TFD</span></a></span></em>, discussed <em>here</em>, Sharp J also ordered that there should be no report of the existence of the proceedings themselves, i.e. she made a super-injunction.  As she explained at paragraph 10 of her judgment, she considered such a provision necessary – at least for a short period – because of the risk that the respondent, being a suspected blackmailer, might avoid service or try to frustrate any order if she found out or was tipped off about it.  She cited the judgment of Tugendhat J in <em><span style="color: #c0504d;"><a href="http://www.bailii.org/ew/cases/EWHC/QB/2010/119.html" target="_blank"><span style="color: #c0504d; text-decoration: underline;">Terry v Persons Unknown</span></a></span></em> and in particular paragraph 139 in which he said:</span></p>
<p style="margin: 0cm 0cm 10pt 36pt; text-align: justify;"><span>If a prohibition of the disclosure of the making of the injunction is included in an order for the purpose of preventing tipping off, and if the order provides for a return date (as the Practice Direction envisages) then the prohibition on disclosure may normally be expected to expire once the alleged wrongdoer has been served with an injunction, or at the return date (whichever is earlier).</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Sharp J's super-injunction was, however, to last only a week.  When the case came back before the judge a week later (the judge having ordered that the case should come back before her once the respondent had been given notice), the respondent had been served with the order.  Although the respondent denied that she was a blackmailer, she had consented to the continuation of the injunction until trial or further order for what were described by her Counsel as 'pragmatic reasons'.  The judge nonetheless held that despite the respondent's consent, s 12(3) of the Human Rights Act 1998 still required the court to satisfy itself that the order should be continued.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>In relation to the provision that prohibited publication of the fact of the order (Sharp J avoided the use of the term 'super-injunction'), the judge found this was no longer necessary.  It had been argued by the claimant's Counsel that if the order were to be publicised, even if disclosure of the claimant's identity was prohibited, there was a risk of "jigsaw" identification on the basis that the press would add snippets of identifying information that would, 'drip by drip', ultimately lead to the claimant being identifiable.  The court was indeed provided with evidence, which the judge accepted as 'concrete', to show this had happened in the past.  The claimant also argued that there was no substantial public interest served by the public availability of the fact of an order without any background information.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Sharp J held that when assessing whether a restriction on open justice was needed, the court had to consider the need for each restriction in the context of the protection that might be given by any other terms of the order.  In this case, having regard to the protection conferred by the order for anonymity of the parties, it was unnecessary to impose a further restriction on mentioning the proceedings.  The court had to take a realistic view and in the judge's view, the risk of jigsaw identification was minimal if the other provisions of the order remained in place and the publication of information about the case was restricted to what was contained in the judgment.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>In <em><span style="color: #c0504d;"><a href="http://www.bailii.org/ew/cases/EWCA/Civ/2010/1276.html" target="_blank"><span style="color: #c0504d; text-decoration: underline;">Ntuli v Donald</span></a></span></em> the Court of Appeal discharged a super-injunction made by Eady J.  According to the judgment at [46] the only argument advanced on the claimant’s behalf at the <em>ex parte</em> hearing before Eady J was that a super-injunction was required because the media might otherwise report that a well-known pop singer had obtained an injunction which prevented the publication of salacious material.  The Court of Appeal said such an argument was unpersuasive because protection against personal identification could be obtained by an anonymity order without the need to prevent any mention of the fact that an injunction had been obtained.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Before the Court of Appeal Mr Donald argued that the circumstances of his case were such that to insist on open justice would itself create a greater injustice.  He relied on the Supreme Court case of <em><span style="color: #c0504d;"><a href="http://www.bailii.org/uk/cases/UKSC/2010/26.html" target="_blank"><span style="color: #c0504d; text-decoration: underline;">Home Secretary v AP (No. 2)</span></a></span> </em>[2010] UKSC 26.  The Court of Appeal had no hesitation about distinguishing Mr Donald’s case from <em>AP</em>, where the public interest in open justice gave way to the need to protect AP from the risk of violence.  While Mr Donald was entitled to expect that the court would adopt procedures which ensure that his Article 8 rights are not undermined, there was no need to go so far as to prevent the case being reported: “<em>There is nothing in [the court’s] judgment that is significantly invasive of Mr Donald’s private or family life</em>” (Kay LJ at [54]).</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><em><span>See further section 10.3 of <span style="color: #c0504d;"><a href="http://www.lawsocietyshop.org.uk/ecom_lawsoc/public/saleproduct.jsf?catalogueCode=9781853288432" target="_blank"><span style="color: #c0504d; text-decoration: underline;">The Privacy Law Handbook</span></a></span></span></em></p>]]></content:encoded></item><item><guid isPermaLink="false">{8A61F13A-3C9A-4B48-B437-8874A89FDE2C}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/should-the-parties-in-privacy-cases-be-anonymised/</link><title>Should the parties in privacy cases be anonymised? - a summary of the recent judgments</title><description><![CDATA[Since the end of the summer at least eight judgments have considered whether the parties to successful applications for privacy injunctions should be anonymised. ]]></description><pubDate>Fri, 14 Jan 2011 11:21:00 Z</pubDate><category>Data and privacy</category><authors:names>Keith Mathieson</authors:names><content:encoded><![CDATA[<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The results (in chronological order) are as follows:</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><em><span style="color: #c0504d;"><a href="http://www.bailii.org/ew/cases/EWHC/QB/2010/2335.html" target="_blank"><span style="color: #c0504d; text-decoration: underline;">DFT v TFD</span></a></span></em><span>: both parties anonymised.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><em><span style="color: #c0504d;"><a href="http://www.bailii.org/ew/cases/EWHC/QB/2010/2457.html" target="_blank"><span style="color: #c0504d; text-decoration: underline;">AMM v HXW</span></a></span></em><span>: both parties anonymised.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><em><span style="color: #c0504d;"><a href="http://www.bailii.org/ew/cases/EWHC/QB/2010/2367.html" target="_blank"><span style="color: #c0504d; text-decoration: underline;">Gray v UVW</span></a></span></em><span>: defendant anonymised.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><em><span style="color: #c0504d;"><a href="http://www.bailii.org/ew/cases/EWHC/QB/2010/2818.html" target="_blank"><span style="color: #c0504d; text-decoration: underline;">JIH v News Group Newspapers</span></a></span></em><span>: neither party anonymised originally, but claimant's identity may not now be disclosed following a successful appeal to the Court of Appeal by the claimant: the Court of Appeal judgment is <span style="color: #c0504d;"><a href="http://www.bailii.org/ew/cases/EWCA/Civ/2011/42.html" target="_blank"><span style="color: #c0504d; text-decoration: underline;">here</span></a></span>.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><em><span style="color: #c0504d;"><a href="http://www.bailii.org/ew/cases/EWCA/Civ/2010/1276.html" target="_blank"><span style="color: #c0504d; text-decoration: underline;">Ntuli v Donald</span></a></span></em><span>: neither party anonymised.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><em><span style="color: #c0504d;"><a href="http://www.bailii.org/ew/cases/EWHC/QB/2010/3064.html" target="_blank"><span style="color: #c0504d; text-decoration: underline;">KJH v HGF</span></a></span></em><span>: both parties anonymised.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><em><span style="color: #c0504d;"><a href="http://www.bailii.org/ew/cases/EWHC/QB/2010/3174.html" target="_blank"><span style="color: #c0504d; text-decoration: underline;">XJA v News Group Newspapers</span></a></span></em><span>: claimant anonymised.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><em><span><a href="http://www.bailii.org/ew/cases/EWHC/QB/2011/25.html" target="_blank"><span style="text-decoration: underline;"><span style="color: #c0504d;">POI v The Person Known as "Lina</span>"</span></a></span></em><span>: claimant anonymised.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The following principles emerge from the cases:</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>1.         An order for anonymity is a derogation from the principles of open justice.  It may only be made if this is 'necessary' on the facts of the case.  The test is whether there is sufficient public interest in publishing a report of the proceedings which identifies the claimant such as to justify any resulting curtailment of his right to and his family's right to respect for their private and family life: <span style="color: #c0504d;"><a href="http://www.bailii.org/uk/cases/UKSC/2010/26.html" target="_blank"><span style="text-decoration: underline;"><em><span style="color: #c0504d;">Secretary of State for the Home Department v AP</span></em><span style="color: #c0504d;"> <em>(No. 2)</em></span></span></a></span> [2010] UKSC 26.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>2.         The court's decision whether or not to grant anonymity to a party is not the exercise of a discretion but is a matter of obligation depending on the application of the above test: see <em>AMM v HXW </em>[2010] EWHC 2457 at [30] to [36].</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>3.         If there is a serious risk that the private information which the injunction is designed to protect will emerge if the claimant (or another party) is identified, a provision for anonymity will usually be necessary: see <em>DFT v TFD</em> [2010] EWHC 2335.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>4.         The court must consider the extent to which identification of a party will interfere with that person’s Article 8 rights.  Not all threatened interferences with a person's Article 8 rights will be sufficiently serious to justify an anonymity order: see <em><span style="color: #c0504d;"><a href="http://www.bailii.org/ew/cases/EWHC/QB/2010/2979.html" target="_blank"><span style="color: #c0504d; text-decoration: underline;">JIH v News Group (No 2)</span></a></span></em> [2010] EWHC 2979 at [30] and [31].</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>5.         Naming a party will not necessarily lead to the private information being disclosed.  An alternative to anonymising the parties may be to restrict publication of the subject matter of the action: see, for example, <em>Gray v UVW </em>[2010] EWHC 2367and <em>Ntuli v Donald </em>[2010] EWCA Civ 1276at [55].  The principle of open justice requires the court to give judgment in a way that allows as much information as possible to be made publicly available so far as that is consistent with protecting the parties’ right, including their Article 8 rights.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>6.         If, on the other hand, the subject matter of the case is disclosed in the judgment, the case for anonymity will usually be overwhelming.  Even where the parties have been anonymised, the court may still, in appropriate cases, impose restrictions on what may be published to avoid the risk of "jigsaw" identification (putting various pieces of information together and thereby identifying the claimant): see, for example, <em>DFT v TFD</em>.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>7.      The public interest may often be better served if the media are permitted to publish (a) details of the type of case (e.g. a sexual liaison between a sportsman in an apparently monogamous relationship and a third party) rather than (b) the name of the individual who is seeking to protect an unspecified aspect of his or her alleged private life by means of an injunction.  The former information would normally enable the public to have a much better idea of why the court acted as it did than the latter information.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>8.         Where there are grounds for believing the claimant has been subject to blackmail threats, there is a strong case for conferring anonymity: "The fact that the applicant has been blackmailed should not be published" (Sharp J in <em>DFT v TFD</em>).</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>9.         The fact that the parties to the proceedings may consent to anonymity does not relieve the court of its obligation to consider the effect of an anonymity order on the Article 10 rights of third parties: see <em>Gray v UVW</em> at [33] and <em>JIH v News Group</em> at [3].</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>A common feature of the three cases in which both parties were anonymised was the threat of blackmail by the defendant.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>In <em>DFT v TFD</em> (more fully discussed <em>here</em>) Sharp J held that it was necessary to anonymise the claimant because if he was identified by name, there was a serious risk that the private information which the order was supposed to protect would emerge and the purpose of the order would thereby be frustrated.  (The judge did not deal specifically with the anonymity of the respondent, but it may be inferred that she thought naming the respondent would pose a similar risk of the private information emerging.)</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Sharp J also took account of the blackmail element in deciding the anonymity issue.  The claimant's counsel had argued that anonymity for the claimant was necessary as there were strong grounds for believing the respondent was a blackmailer seeking to extort money by threatening to disclose private information about the claimant.  Sharp J considered that "the blackmail element of of this case brings extremely strong public interest considerations into play.  The fact that the applicant has been blackmailed should not be published".</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Less than three weeks after Sharp J's judgment in <em>DFT v TFD</em>, Tugendhat J gave judgment in a very similar privacy case also involving an alleged blackmail attempt: <em>AMM v HXW</em>.  He too ordered that there should be no publication of any information liable to lead to the identification of the parties save for that contained in the court's own judgment.  He observed that the court's decision whether or not to grant anonymity to a party was not the exercise of a discretion but was a matter of obligation depending on the application of the test summarised by Lord Rodger in <em>Secretary of State for the Home Department v AP</em> (No. 2): the Court must ask itself whether there is sufficient public interest in publishing a report of the proceedings which identifies the claimant such as to justify any resulting curtailment of his right to and his family's right to respect for their private and family life.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>In deciding in <em>AMM v HXW</em> that anonymity was necessary, Tugendhat J was strongly influenced both by the need to protect the claimant's Article 8 rights and by the public interest in preventing and punishing blackmail, it being important not to discourage blackmail victims from coming forward for fear that by doing so, their identity will be revealed.  In relation to whether an order restricting publication of the information in question was a feasible alternative to an anonymity order, the judge said this:</span></p>
<p style="margin: 0cm 0cm 10pt 36pt; text-align: justify;"><span>… where a claimant alleges he is being blackmailed, the court may be faced with limited choices.  One choice is to refuse an anonymity order.  But in that case, if the blackmailer's threat is to be thwarted, the court will restrict publication of the information which is the subject matter of the action.  The alternative is for the court to grant the anonymity order.  The court can then permit publication of some of the facts about the action, including the allegation of blackmail.  If the court adopts that course, then the anonymity order should suffice to prevent publication of the fact that it is the applicant who has been blackmailed.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The judge decided that because an article about the case in the Daily Mail had published some important items of information about the subject matter, the only alternative now open to the court was an anonymity order.  At paragraph [41] of his judgment the judge noted that the Daily Mail article contained snippets of information that contributed to an increased risk of "jigsaw identification".  He observed that such identification "would defeat the purpose of this action and, in the process, achieve the purpose of the alleged blackmailer".</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>In <em>Gray v UVW</em>, where the proceedings for misuse of private information were stayed following undertakings by the defendant not to disclose the information, Tugendhat J declined the claimant's request for anonymity:</span></p>
<p style="margin: 0cm 0cm 10pt 36pt; text-align: justify;"><span>In the present case the reason advanced by the Claimant as to why his identity should not be disclosed is weak.  He refers to the possibility that the media may speculate as to what the information is.  But in this connection I remind myself of the approach of the Supreme Court in [In re Guardian News and Media Ltd [2010] UKSC 1] at para [72]:</span></p>
<p style="margin: 0cm 0cm 10pt 36pt; text-align: justify;"><span>… the possibility of some sectors of the press abusing their freedom to report cannot, of itself, be a sufficient reason for curtailing that freedom for all members of the press. James Madison long ago pointed out that “Some degree of abuse is inseparable from the proper use of everything, and in no instance is this more true than in that of the press”: “Report on the Virginia Resolutions” (1800), in Letters and Other Writings of James Madison (1865) Vol 4, p 544. … The possibility of abuse is therefore simply one factor to be taken into account when considering whether an anonymity order is a proportionate restriction on press freedom in this situation.”</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The judge held that it was up to the claimant to make out a case for anonymity and in this case he found there were no "extreme" circumstances – such as blackmail, fear of violence or a threatened contempt of court – such as to justify anonymity and a departure from the principle of open justice.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>On the other hand, the judge decided the defendant was entitled to anonymity.  He found that the defendant's Article 8 rights were engaged; that the allegations against the defendant were serious; that the defendant was a person of good character; and he/she had been caused distress by the proceedings.  Since the judge was not being asked to determine the merits of the claimant's case, he was unable to form a view about whether the proceedings against the defendant were properly brought (it being possible that the defendant had consented to the injunction purely in order to avoid litigation).  In the circumstances, he considered it necessary to protect the Article 8 rights of the defendant by ordering that he/she should not be identified.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>In <em>JIH v News Group</em> the claimant obtained an injunction against the defendant newspaper publisher preventing it from publishing certain private information about him and others.  The order was made by Nicol J on 13 August 2010 following an evening hearing at which both parties were represented by Counsel.  The order included a provision that the claimant’s identity should be anonymised.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Following the hearing, the claimant made an application for the order to be continued.  The defendant agreed to that application and on 20 October Nicol J made an order continuing his injunction pending a further hearing on 20 September.  In the meantime, the claimant served the order on six media organisations.  Some of those organisations requested more information from the claimant but none of them made any application to vary or discharge the order.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Before the return date (the date on which the case was to come back before the court), the parties settled their dispute and asked the court to approve a consent order continuing the injunction (including the provision for anonymity).  Tugendhat J was not prepared to approve the order just because the parties themselves had agreed to its terms since, being a derogation from open justice, it affected the rights of the public.  Not only did it provide the claimant with anonymity; it also prevented reporting of the subject matter of the proceedings.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Having considered evidence and submissions from the parties, Tugendhat J refused to permit the claimant to remain anonymous.  He held that anonymisation and the withholding of information about the subject matter of proceedings are <em>alternative</em>, not complementary, forms of protection against the disclosure of private information.  In this case:</span></p>
<p style="margin: 0cm 0cm 10pt 36pt; text-align: justify;"><span>… it would not be possible to make an order or give a judgment which disclosed any information about the subject matter of the action which did not thereby make it likely that the Claimant would be identified. To identify both the subject matter and the Claimant would defeat the purpose of the proceedings. Accordingly, the only practical question open to the Court is whether to withhold the identity of the Claimant, in addition to withholding all information about the subject matter of the action. In this case the alternatives canvassed by Mr Tomlinson [making the claimant anonymous <span style="text-decoration: underline;">or</span> restricting publication of the subject matter] are theoretical not real. The only real choice is to allow the public to know the Claimant’s identity or to allow them to know nothing at all about the action.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Having considered the likely effect of disclosing the claimant’s identity, and noting the absence of evidence from the claimant that he would not have commenced the proceedings if he had thought his name might become public, the judge decided that any interference with the claimant’s rights arising from his identification would be limited provided the subject matter of the case was not published.  In those circumstances, he decided that the identification of the claimant was justified by the general public interest in publishing a report of proceedings which identified him.  The order made by the judge provided that there should be no publication of any matters beyond what was included in his judgment, the private information in question being included in a confidential schedule to the order.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The identity of JIH was not disclosed pending an appeal against the judge’s order.  In the meantime, the case went back before Tugendhat J on the claimant’s application that publications in two different newspapers in the period since the judge’s order meant that if the claimant’s identity were to be published in the future, that disclosure, taken together with the information published by the newspapers, would mean that the private information sought to be disclosed would become public.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Tugendhat J decided that what the newspapers had published was “at a high level of generality” and, on the scale of possible interferences with the private lives of the claimant and others, the disclosures “did not rank high”.  He therefore declined to vary his previous order lifting the claimant’s anonymity: <em>JIH v News Group Newspapers</em> <em>(No. 2)</em>.  He did, however, note that it was a matter of great concern that the publications had taken place and he reminded editors of their duties and responsibilities under Article 10(2) to ensure that they comply with orders of the court.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>When the case reached the Court of Appeal, Tugendhat J's decision that the claimant's identity could be revealed was reversed.  The court acknowledged the importance of being able to name JIH but decided on the facts that naming him risked defeating the purpose of the injunction as publicly available information would enable people to piece together his identity even if the court prohibited publication of the nature of the information publication of which he was seeking to prevent.  The court was impressed by the argument that it would in most cases serve the public interest better for the media to report as much as possible about the facts of the case (such as the nature of the information sought to be protected) rather than the claimant's identity: such information would better enable the public to understand why the court had acted as it did.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><em><span>Ntuli v Donald </span></em><span>concerned an injunction to prevent a former girlfriend of Howard Donald, a member of Take That, from disclosing “any intimate, personal or sexually explicit details about the relationship”.  The injunction ordered by Eady J not only anonymised the parties; it was a “superinjunction” that restrained the defendant and others from even mentioning the fact that the order had been sought and obtained.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>On appeal by the defendant, the Court of Appeal removed the provision for anonymity.  (It also removed the superinjunction element: see the case report here).    Whatever expectation of privacy Mr Donald might have in respect of the details of his relationship with Ms Ntuli, it was perfectly possible, said the Court of Appeal, for its judgment to be given and reported in a form that did not undermine his privacy.  The court said it would have been “possible and appropriate” for Eady J to have written his judgment in a publishable form and thereby avoided the need for the parties to be anonymised.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>In <em>KJH v HGF</em> the evidence before the court “established to a high degree that of probability that KJH was the victim of blackmail involving the threat of the revelation of stolen private and confidential information”.  The judge was satisfied that there was no public interest in disclosure of the information, which did not reveal wrongdoing, sexual or otherwise, by the claimant. Having regard to the strong public policy considerations relating to blackmail set out by Tugendhat J in his judgment in <em>AMM v HXW</em>, Sharp J decided it was necessary to derogate from the principle of open justice by ordering that the parties should be referred to by initials.  To emphasise the sensitivity of the matter, the judge prefaced her judgment with the instruction: “It is ordered that publication of any information as to the subject matter of these proceedings or the identity of the parties to these proceedings, is limited to that contained in this judgment”.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Just as News Group Newspapers had consented to the claimant remaining anonymous in <em>JIH</em>, so too it was willing to consent to the claimant remaining anonymous in <em>XJA</em>.  But because an anonymity order affects the rights of third parties, the consent order required the approval of the court.  Unlike Tugendhat J in <em>JIH</em>, Sharp J in <em>XJA</em> decided that it was necessary to protect the claimant’s privacy by imposing an order that he should remain anonymous. Sharp J concluded on the facts that there was no sufficient general public interest in identifying the claimant at this stage fof the proceedings to justify and resulting curtailment of XJA’s right and his family’s right to respect for their private and family life.  In the judge’s view, identification of XJA “could seriously affect his family life and it was a relevant consideration that the central information with which the action was concerned was said to be false.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>In POI v The Person Known as "Lina" [2011] EWHC 25, there was evidence that the respondent was seeking to blackmail the claimant.  Tugendhat J made an order for anonymity on ground that it was strictly necessary in the interests of justice: if the claimant were to be identified, then it was likely that persons who knew, or learnt, both that the applicant had issued the proceedings and what was already in the public domain would be able to deduce what the private information was about.  It was likely in those circumstances that "the policy of the law to protect those alleging they are victims of a blackmailer would be defeated".  The injunction, including the anonymity order, was later continued by Supperstone J: <span style="color: #c0504d;"><a href="http://www.bailii.org/ew/cases/EWHC/QB/2011/234.html" target="_blank"><span style="color: #c0504d; text-decoration: underline;">[2011] EWHC 234</span></a></span>.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><em><span>See further sections 3.9.1 and 10.3 of <span style="color: #c0504d;"><a href="http://www.lawsocietyshop.org.uk/ecom_lawsoc/public/saleproduct.jsf?catalogueCode=9781853288432" target="_blank"><span style="color: #c0504d; text-decoration: underline;">The Privacy Law Handbook</span></a></span></span></em></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><em><span>This post was amended on February 1 and March 1, 2011</span></em></p>]]></content:encoded></item><item><guid isPermaLink="false">{7A41C7DF-E3CC-4E08-AC98-620D20ECE494}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/anonymity-of-egg-and-sperm-donors/</link><title>Anonymity of egg and sperm donors</title><description><![CDATA[A survey by Manchester Fertility Services highlights issues of privacy concerning egg and sperm donation.  ]]></description><pubDate>Thu, 13 Jan 2011 12:23:00 Z</pubDate><category>Data and privacy</category><authors:names></authors:names><content:encoded><![CDATA[<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The survey suggests that the public is divided on the issue: 59% of those surveyed believed that anonymity should be preserved, whilst 41% said that children should have the right to find their biological parent if they wished.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The right to medical confidentiality can sometimes clash with other rights and has done so in the area of egg and sperm donation.  Up until 1 April 2005, egg and sperm donors had a legal right to remain anonymous.  That was in conflict with the right of a donor-conceived individual to know about their genetic origins.  From 1 April 2005, everyone who has donated sperm or eggs is identifiable to children born as a result of their donation, once the child is 18 years of age.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The law relating to sperm and egg donation has changed over the last 10 years.  The Human Fertilisation and Embryology Authority (HFEA) has a record of all births as a result of assisted conception in licensed UK fertility clinics from 1 August 1991 onwards.  However, the level of information obtained has changed over time.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>For egg and sperm donations made between 1 August 1991 and 1 April 2005, the HFEA took the following donor information:</span></p>
<ul style="margin-top: 0cm; list-style-type: disc;">
    <ul style="margin-top: 0cm; list-style-type: circle;">
        <li style="margin: 0cm 0cm 10pt; text-align: justify; color: #000000;"><span>physical description (height, weight, eye and hair colour)</span></li>
    </ul>
</ul>
<ul style="margin-top: 0cm; list-style-type: disc;">
    <ul style="margin-top: 0cm; list-style-type: circle;">
        <li style="margin: 0cm 0cm 10pt; text-align: justify; color: #000000;"><span>year and country of birth</span></li>
    </ul>
</ul>
<ul style="margin-top: 0cm; list-style-type: disc;">
    <ul style="margin-top: 0cm; list-style-type: circle;">
        <li style="margin: 0cm 0cm 10pt; text-align: justify; color: #000000;"><span>ethnicity</span></li>
    </ul>
</ul>
<ul style="margin-top: 0cm; list-style-type: disc;">
    <ul style="margin-top: 0cm; list-style-type: circle;">
        <li style="margin: 0cm 0cm 10pt; text-align: justify; color: #000000;"><span>whether the donor had any children at the time of the donation</span></li>
    </ul>
</ul>
<ul style="margin-top: 0cm; list-style-type: disc;">
    <ul style="margin-top: 0cm; list-style-type: circle;">
        <li style="margin: 0cm 0cm 10pt; text-align: justify; color: #000000;"><span>any additional information (voluntary) such as occupation, religion, interests and a self-description</span></li>
    </ul>
</ul>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>This information will be passed on to anyone over the age of 16 years born as a result of the donation if they request it.  The donor will <span style="text-decoration: underline;">not</span> be identified unless the donor has re-registered with the HFEA as an identifiable donor.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>For egg and sperm donations after 1 April 2005, the HFEA collected the following additional information about the donor:</span></p>
<ul style="margin-top: 0cm; list-style-type: disc;">
    <ul style="margin-top: 0cm; list-style-type: circle;">
        <li style="margin: 0cm 0cm 10pt; text-align: justify; color: #000000;"><span>the number of any other children and their gender</span></li>
    </ul>
</ul>
<ul style="margin-top: 0cm; list-style-type: disc;">
    <ul style="margin-top: 0cm; list-style-type: circle;">
        <li style="margin: 0cm 0cm 10pt; text-align: justify; color: #000000;"><span>marital status</span></li>
    </ul>
</ul>
<ul style="margin-top: 0cm; list-style-type: disc;">
    <ul style="margin-top: 0cm; list-style-type: circle;">
        <li style="margin: 0cm 0cm 10pt; text-align: justify; color: #000000;"><span>medical history</span></li>
    </ul>
</ul>
<ul style="margin-top: 0cm; list-style-type: disc;">
    <ul style="margin-top: 0cm; list-style-type: circle;">
        <li style="margin: 0cm 0cm 10pt; text-align: justify; color: #000000;"><span>a goodwill message to any potential children</span></li>
    </ul>
</ul>
<ul style="margin-top: 0cm; list-style-type: disc;">
    <ul style="margin-top: 0cm; list-style-type: circle;">
        <li style="margin: 0cm 0cm 10pt; text-align: justify; color: #000000;"><span>identifying information (name, date of birth, address)</span></li>
    </ul>
</ul>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Children conceived from sperm or eggs donated after 1 April 2005 may apply to the HFEA for all the non-identifying information once they reach 16 years of age.  The identifying information will be available to those of 18 years or more.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>As a result of further legislative change in October 2009</span></p>
<ul style="margin-top: 0cm; list-style-type: disc;">
    <ul style="margin-top: 0cm; list-style-type: circle;">
        <li style="margin: 0cm 0cm 10pt; text-align: justify; color: #000000;"><span>18 year old donor conceived people can make contact with their genetically related siblings (provided both parties consent).</span></li>
    </ul>
</ul>
<ul style="margin-top: 0cm; list-style-type: disc;">
    <ul style="margin-top: 0cm; list-style-type: circle;">
        <li style="margin: 0cm 0cm 10pt; text-align: justify; color: #000000;"><span>16 year old donor conceived children can access anonymous information about the donor and find out whether they have genetically related siblings.</span></li>
    </ul>
</ul>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The HFEA has a legal obligation to contact and forewarn donors if a donor conceived offspring has made a request for identifiable information.  However, the donor has no ability to prevent the disclosure being made.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>There has also been some suggestion that the law change has resulted in a different type of donor coming forward.  In particular, in relation to sperm donation, the donors are more frequently in the 31 to 40 age group.  Opinions differ as to whether the removal of donors' anonymity has reduced the number of donors coming forward.  There remains an ongoing debate as to whether donors should receive payment for the donation.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><em><span>See further section 9.4 of the <span style="color: #c0504d;"><a href="http://www.lawsocietyshop.org.uk/ecom_lawsoc/public/saleproduct.jsf?catalogueCode=9781853288432" target="_blank"><span style="color: #c0504d; text-decoration: underline;">Privacy Law Handbook</span></a></span></span></em></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span style="color: #c0504d;"><a href="http://www.prlog.org/11153222-sperm-donors-should-be-anonymous.html" target="_blank"><span style="color: #c0504d; text-decoration: underline;">Survey by Manchester Fertility Services</span></a></span></p>]]></content:encoded></item><item><guid isPermaLink="false">{7D3D1F82-1843-4317-A0D1-2E4D6414B202}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/no-injunction-for-local-authority-that-failed-to-give-notice-to-media/</link><title>No injunction for local authority that failed to give notice to media</title><description><![CDATA[A judge has refused to make an order gagging media organisations who were not given proper notice of the application for the order.   ]]></description><pubDate>Wed, 12 Jan 2011 13:15:00 Z</pubDate><category>Data and privacy</category><authors:names>Keith Mathieson</authors:names><content:encoded><![CDATA[<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>In <span style="color: #c0504d;"><a href="http://www.bailii.org/ew/cases/EWHC/Fam/2010/3221.html" target="_blank"><span style="color: #c0504d; text-decoration: underline;">Re Jane (a fictitious name) (A Child)</span></a></span> [2010] EWHC 3221 (Fam) Holman J made an order restricting reporting about a child subject to an interim care order but the order was expressed to bind only those organisations to whom the applicant local authority had given notice.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The case concerned the small child of a woman who had been the subject of considerable media attention.  The media were also interested in publishing information about the child.  The local authority obtained an interim care order and placed the child with foster parents.  It also applied for an order preventing the media from identifying or publishing information about the child.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Section 12(2) of the Human Rights Act 1998 provides that in cases that might affect freedom of expression the court must be satisfied, before granting relief against a person not present or represented, that the applicant has taken all practicable steps to notify the respondent; or that there are compelling reasons why the respondent should not be notified.  In this case, the local authority gave notice of its application to the <span style="color: #c0504d;"><a href="http://www.medialawyer.press.net/courtapplications/" target="_blank"><span style="color: #c0504d; text-decoration: underline;">Press Association's CopyDirect division</span></a></span>, which in turn gives notice through its Injunction Alert Service to the legal departments of national news organisations.  The local authority did not, however, give notice to those organisations such as the Guardian and Daily Telegraph which do not subscribe to CopyDirect.  Nor did it notify local news organisations.   While the judge was satisfied that proper notice had been given to all those media organisations that subscribe to CopyDirect, he was not satisfied that proper notice had been given to other organisations.  He therefore declined to make any order affecting those organisations.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>According to Mike Dodd, editor of <span style="color: #c0504d;"><a href="http://www.medialawyer.press.net/" target="_blank"><span style="color: #c0504d; text-decoration: underline;">Media Lawyer</span></a></span>, the decision by Homan J is believed to be the first published Family Division judgment in which a judge has declined to issue an order binding media organisations which were not given advance notification of the application.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The judge proceeded to make an order that restricted the publication or broadcast of any picture, photograph or image of, or including, 'Jane' which was not already in the public domain prior to the making of the order.  He accepted there was nothing he could sensibly do about pictures already in the public domain:</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Even in relation to a vulnerable child such as Jane, there is a point after which, frankly, one cannot shut the door on a horse which has already escaped. Since pictures of her are already all over the press and on the internet, it does not seem to me that I can now sensibly, properly or justifiably restrain further publication of those pictures, still less attempt now to have those pictures removed from the web.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><em><span>See further section 2.5.1, 3.3.7 and 3.9.1 of the <span style="color: #c0504d;"><a href="http://www.lawsocietyshop.org.uk/ecom_lawsoc/public/saleproduct.jsf?catalogueCode=9781853288432" target="_blank"><span style="color: #c0504d; text-decoration: underline;">Privacy Law Handbook</span></a></span></span></em></p>]]></content:encoded></item><item><guid isPermaLink="false">{711082BB-3F6A-4AE8-900C-FD0F0D8930F6}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/media-access-to-court-of-protection/</link><title>Media access to Court of Protection</title><description><![CDATA[The Independent newspaper has won the right to attend and report on a case in the Court of Protection. ]]></description><pubDate>Wed, 12 Jan 2011 12:57:00 Z</pubDate><category>Data and privacy</category><authors:names>Keith Mathieson</authors:names><content:encoded><![CDATA[<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Its report of the ruling of Hedley J is <span style="color: #c0504d;"><a href="http://www.independent.co.uk/news/uk/home-news/secretive-court-opens-doors-to-journalists-2155039.html" target="_blank"><span style="color: #c0504d; text-decoration: underline;">here</span></a></span>.   The <span style="color: #c0504d;"><a href="http://www.publicguardian.gov.uk/about/court-of-protection.htm" target="_blank"><span style="color: #c0504d; text-decoration: underline;">Court of Protection</span></a></span> is empowered to make decisions about the property, affairs, healthcare and personal welfare of adults who lack capacity.  It operates with a high degree of secrecy pursuant to Rule 90 of the Court of Protection Rules, which states that hearings must be held in private but also allows the court to permit certain persons to attend.  This case concerned a 25-year-old man with severe epilepsy over whose affairs the Court of Protection had taken control following disagreements between his mother and his local authority.  <span style="color: #c0504d;"><a href="http://www.bailii.org/ew/cases/EWCA/Civ/2010/343.html" target="_blank"><span style="color: #c0504d; text-decoration: underline;">Earlier in 2010</span></a></span> The Independent had persuaded the Court of Appeal to permit access to a Court of Protection case involving an autistic and blind piano-playing prodigy called <span style="color: #c0504d;"><a href="http://en.wikipedia.org/wiki/Derek_Paravicini" target="_blank"><span style="color: #c0504d; text-decoration: underline;">Derek Paravicini</span></a></span>.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><em><span>See further section 10.2 of the <span style="color: #c0504d;"><a href="http://www.lawsocietyshop.org.uk/ecom_lawsoc/public/saleproduct.jsf?catalogueCode=9781853288432" target="_blank"><span style="color: #c0504d; text-decoration: underline;">Privacy Law Handbook</span></a></span></span></em></p>]]></content:encoded></item><item><guid isPermaLink="false">{86D285EA-5215-43EB-818B-82C05E841BC2}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/uk-referred-to-ecj-over-internet-privacy/</link><title>UK referred to ECJ over internet privacy</title><description><![CDATA[On 30 September 2010 the European Commission announced that it referred the UK to the European Court of Justice for its alleged failure to implement EU laws on the confidentiality of electronic communications such as emails or internet browsing.<br/>]]></description><pubDate>Wed, 12 Jan 2011 08:59:00 Z</pubDate><category>Data and privacy</category><authors:names>Keith Mathieson</authors:names><content:encoded><![CDATA[<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The referral follows legal action against the UK by the European Commission commenced in April 2009.  That case was prompted by complaints from UK internet users about the UK authorities' treatment of their concerns over the use of Phorm technology by Internet Service Providers (targeted advertising based on prior analysis of users' internet traffic).</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>In October 2009 the European Commission requested that the UK authorities amend UK law to ensure it complied with the EU law.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The referral of the UK to the European Court of Justice a year later reflects the Commission's view that the UK is still breaching its obligations under the Directive 2002/58/EC on Privacy and Electronic Communications (the E-Privacy Directive) and Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data (the Data Protection Directive) which were implemented in the UK through the Privacy and Electronic Communications (EC Directive) Regulations 2003 and the Data Protection Act 1998 respectively, in three main areas:</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>1) There is no independent national authority to supervise the interception of some electronic communications, which is a requirement under the E-Privacy Directive and Data Protection Directive;</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>2) Existing UK law allowed the interception of communications not only where the relevant internet users have consented to this but also where the person intercepting the communications has "<em>reasonable grounds for believing</em>" the consent to intercept has freely been given under the UK's Regulation of Investigatory Powers Act 2000 (RIPA). This is contrary to the EU laws which define consent as being "<em>freely given, specific and informed indication of a person's wishes</em>";</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>3) Current UK laws prohibiting and providing sanctions in the case of unlawful interception are limited to intentional interception only, whereas EU law is wider, requiring member states to impose penalties for any unlawful interception irrespective of whether it was committed intentionally or not.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The European Commission will now take the UK to Court to try and force it to change its laws.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>See further sections 4.3.4 and 4.4 of the <span style="color: #c0504d;"><a href="http://www.lawsocietyshop.org.uk/ecom_lawsoc/public/saleproduct.jsf?catalogueCode=9781853288432" target="_blank"><span style="color: #c0504d; text-decoration: underline;">Privacy Law Handbook</span></a></span>.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span style="color: #c0504d;"><a href="http://europa.eu/rapid/pressReleasesAction.do?reference=IP/10/1215&format=HTML&aged=0&language=EN&guiLanguage=fr" target="_blank"><span style="color: #c0504d; text-decoration: underline;">European Commission's announcement</span></a></span></p>]]></content:encoded></item><item><guid isPermaLink="false">{F148244A-5C99-4755-B5B5-21EF0BA19FE0}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/use-and-abuse-of-anti-terrorism-powers-by-police/</link><title>Use (and abuse?) of anti-terrorism powers by police</title><description><![CDATA[A Home Office report on the operation of police powers under the Terrorism Act 2000 and subsequent legislation has revealed that in 2009/10 a total of 101,248 stop-and-searches were made pursuant to s40 of the Terrorism Act 2000, but not one of the stop-and-searches resulted in an arrest being made on a terrorism charge.]]></description><pubDate>Wed, 12 Jan 2011 08:54:00 Z</pubDate><category>Data and privacy</category><authors:names>Keith Mathieson</authors:names><content:encoded><![CDATA[<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Indeed, only 506 arrests were made, representing 0.5% of the stop-and-searches.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Section 44 of the Terrorism Act 2000 provides officers with the power to stop and search people and vehicles for the purpose of searching for articles of a kind which could be used in connection with terrorism.  In July 2010 the Home Secretary announced that the use of s44 powers would be suspended.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><em><span>See further section 7.7.1 of the <span style="color: #c0504d;"><a href="http://www.lawsocietyshop.org.uk/ecom_lawsoc/public/saleproduct.jsf?catalogueCode=9781853288432" target="_blank"><span style="color: #c0504d; text-decoration: underline;">Privacy Law Handbook</span></a></span></span></em></p>]]></content:encoded></item><item><guid isPermaLink="false">{871FD8CF-88D2-4ED0-ADC1-2C308288ECE1}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/computer-hacker-fined/</link><title>Computer hacker fined £21,000</title><description><![CDATA[A computer hacker who admitted offences under the Computer Misuse Act 1990 has been fined £21,000 and given a 36-week prison sentence suspended for two years.]]></description><pubDate>Tue, 11 Jan 2011 09:36:00 Z</pubDate><category>Data and privacy</category><authors:names>Keith Mathieson</authors:names><content:encoded><![CDATA[<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Daniel Woo, a Bulgarian national of Hans Crescent, London SW1, had been caught installing password-capturing software on the campus network of the University of London's School of Oriental and African Studies.  The hacker, <span style="color: #c0504d;"><a href="http://cms.met.police.uk/news/convictions/computer_hacker_who_posed_as_student_sentenced" target="_blank"><span style="color: #c0504d; text-decoration: underline;">described by the Metropolitan Police</span></a></span> as 'ruthless', had gained unauthorised access to the network by pretending to be a student.  He had hacked into hundreds of private emails containing private identification and financial information.  It was later established that some of the compromised payment accounts had been subject to fraud.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><em><span>See further section 7.2 of the <span style="color: #c0504d;"><a href="http://www.lawsocietyshop.org.uk/ecom_lawsoc/public/saleproduct.jsf?catalogueCode=9781853288432" target="_blank"><span style="color: #c0504d; text-decoration: underline;">Privacy Law Handbook</span></a></span></span></em></p>]]></content:encoded></item><item><guid isPermaLink="false">{60731FC0-0BD2-41CF-A290-7F909272B034}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/new-report-on-the-surveillance-society/</link><title>New report on the 'Surveillance Society'</title><description><![CDATA[The Information Commissioner has expressed concern over the lack of scrutiny of new laws affecting privacy. ]]></description><pubDate>Tue, 11 Jan 2011 09:23:00 Z</pubDate><category>Data and privacy</category><authors:names>Keith Mathieson</authors:names><content:encoded><![CDATA[<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>In a <span style="color: #c0504d;"><a href="http://www.ico.gov.uk/~/media/documents/library/Corporate/Research_and_reports/surveillance_report_for_home_select_committee.ashx" target="_blank"><span style="color: #c0504d; text-decoration: underline;">report</span></a> </span>presented to Parliament the Information Commissioner called for post-legislative scrutiny by government departments to ensure "the successful delivery of the new transparency and privacy agenda".  The report was presented to the Home Affairs Committee in response to the committee's report "A Surveillance Society?" (HC 58-1) which recommended that the Information Commissioner produce a report to Parliament on the state of surveillance. </span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The report includes research findings by the Surveillance Studies Network, a group of academics, which update the same group's <span style="color: #c0504d;"><a href="http://www.ico.gov.uk/upload/documents/library/data_protection/practical_application/surveillance_society_full_report_2006.pdf" target="_blank"><span style="color: #c0504d; text-decoration: underline;">2006 Report on the Surveillance Society</span></a></span>.  In his <span style="color: #c0504d;"><a href="http://www.ico.gov.uk/~/media/documents/pressreleases/2010/surveillance_society_press_release_11112010.ashx" target="_blank"><span style="color: #c0504d; text-decoration: underline;">press release</span></a></span> announcing his report to Parliament the Information Commissioner highlighted his concern about the use of CCTV to monitor parents in school catchment area disputes, an issue dealt with by the Investigatory Powers Tribunal in its ruling in <span style="color: #c0504d;"><a href="http://www.ipt-uk.com/docs/Paton_v_Poole_Borough_Council.pdf" target="_blank"><span style="color: #c0504d; text-decoration: underline;">Paton v Poole Borough Council</span></a></span>.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>See further Chapter 7 of the <span style="color: #c0504d;"><a href="http://www.lawsocietyshop.org.uk/ecom_lawsoc/public/saleproduct.jsf?catalogueCode=9781853288432" target="_blank"><span style="color: #c0504d; text-decoration: underline;">Privacy Law Handbook</span></a></span></span></p>]]></content:encoded></item><item><guid isPermaLink="false">{CEE04A81-35CD-41A4-8903-7C4B12488582}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/undercover-reporting-cablegate/</link><title>Undercover reporting - 'Cablegate'</title><description><![CDATA[On 20 December 2010 the Daily Telegraph published a report based on secretly recorded conversations with the Business Secretary Vince Cable.]]></description><pubDate>Tue, 11 Jan 2011 09:17:00 Z</pubDate><category>Data and privacy</category><authors:names>Keith Mathieson</authors:names><content:encoded><![CDATA[<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The reporters from the Telegraph had gained access to Mr Cable's advice surgery by falsely representing themselves as Liberal Democrat supporters. During the conversations Mr Cable had said he had a 'nuclear option' of bringing the Coalition Government down if they pushed him too far.  The report was followed by further reports based on the conversations.  In one such <span style="color: #c0504d;"><a href="http://www.telegraph.co.uk/news/newstopics/politics/liberaldemocrats/8217253/Vince-Cable-I-have-declared-war-on-Rupert-Murdoch.html" target="_blank"><span style="color: #c0504d; text-decoration: underline;">report</span></a> </span>it was revealed that Mr Cable had 'declared war' on Rupert Murdoch.  In consequence of the report, Mr Cable was stripped by the Prime Minister of any further role in determining the competition aspects of Mr Murdoch's bid to augment his shareholding in BSkyB.  Vince Cable was not the only victim of the Telegraph's sting: a number of other Coalition ministers also made embarrassing disclosures to the paper.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>It has been suggested that the reporters breached Mr Cable's confidence.  In an <span style="color: #c0504d;"><a href="http://www.guardian.co.uk/media/2010/dec/22/telegraph-journalists-sting-mps" target="_blank"><span style="color: #c0504d; text-decoration: underline;">article on the Guardian website</span></a> </span>David Howarth, a Cambridge law lecturer and former Liberal Democrat MP, argues that the reporters' actions were unethical and illegal.  According to Mr Howarth, the use of subterfuge, misrepresentation and clandestine recording devices was in breach of clause 10 of the <span style="color: #c0504d;"><a href="http://www.pcc.org.uk/cop/practice.html" target="_blank"><span style="color: #c0504d; text-decoration: underline;">Press Complaints Commission's Code of Practice</span></a></span>.  Although the code permits the use of undercover methods where the publication is in the public interest, which would include preventing the public from being misled, Mr Howarth argues that there was no prior statement by Mr Cable that would have misled the public: the doctrine of collective cabinet responsibility means only that ministers agree not to contradict cabinet decisions in public, not that they always agree with those decisions.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>In Mr Howarth's opinion, Mr Cable (and other MPs caught in the Telegraph's sting) might have civil actions for breach of confidence and breach of copyright.  He points out that it might be difficult to show that any loss had arisen in consequence of the breach of confidence, but he regards a copyright case as 'more promising'.   In a final twist of the knife, he suggests that the Telegraph may have committed an offence under s2 of the Fraud Act 2006 by 'dishonestly making a false representation with the intention of putting someone at risk of pecuniary loss or with the intention of making a pecuniary gain for another'.  He points out that there is no public interest defence under the Fraud Act.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>So far as we know, there is no pending legal action against the Telegraph.  The PCC has <span style="color: #c0504d;"><a href="http://www.guardian.co.uk/politics/2010/dec/23/vince-cable-quite-angry-about-daily-telegraph-sting" target="_blank"><span style="color: #c0504d; text-decoration: underline;">confirmed to the Guardian</span></a></span> that is has received a handful of third party complaints about the affair and it remains to be seen whether any formal adjudication is ever made.  The Telegraph maintains that the use of covert recording was justified and in line with the PCC code.  A spokesman for the newspaper said: "The Daily Telegraph takes the PCC code extremely seriously and has always adhered to it. There is a clear public interest in The Daily Telegraph publishing this story."</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><em><span>See further sections 11.3.4 and 11.3.9 of the <span style="color: #c0504d;"><a href="http://www.lawsocietyshop.org.uk/ecom_lawsoc/public/saleproduct.jsf?catalogueCode=9781853288432" target="_blank"><span style="color: #c0504d; text-decoration: underline;">Privacy Law Handbook</span></a></span></span></em></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span style="color: #c0504d;"><a href="http://www.telegraph.co.uk/news/newstopics/politics/liberaldemocrats/8215462/Vince-Cable-I-could-bring-down-the-Government-if-Im-pushed.html" target="_blank"><span style="color: #c0504d; text-decoration: underline;">Daily Telegraph's report</span></a></span></p>]]></content:encoded></item><item><guid isPermaLink="false">{1D4C29FD-B42C-4B52-A0C9-F56C7D7F632C}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/google-escapes-fine-over-street-view-breach/</link><title>Google escapes fine over Street View breach</title><description><![CDATA[Google's Street View service has escaped a financial penalty despite being found to breach the Data Protection Act 1998 (DPA).<br/>]]></description><pubDate>Tue, 11 Jan 2011 09:12:00 Z</pubDate><category>Data and privacy</category><authors:names>Keith Mathieson</authors:names><content:encoded><![CDATA[<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Google Street View allows users to explore and navigate neighbourhoods through panoramic street level photographs.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>In touring the UK's roads to create a virtual visual map, the Information Commissioner has reported that antennae on Google's Street View vehicles tapped into unsecured Wi-Fi networks and collected personal data from internet users, including passwords, emails, URLs and health records.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The Information Commioneer Christopher Graham said that Google committed a significant breach of first principle of the DPA which requires that personal data is "<em>processed fairly and lawfully</em>", but declined to use new powers which came into force on 6 April 2010 which allows it to fine up to £500,000 for serious breaches of the DPA. The Information Commissioner said that "<em>The most appropriate and proportionate regulatory action in these circumstances is to get written legal assurance from Google that this will not happen again – and to follow this up with an ICO audit.</em>”</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The full press release announcing the outcome of Google Street View investigation can be found <span style="color: #c0504d;"><a href="http://www.ico.gov.uk/~/media/documents/pressreleases/2010/google_inc_street_view_press_release_03112010.ashx" target="_blank"><span style="color: #c0504d; text-decoration: underline;">here</span></a></span>.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The Information Commissioner has reported that Google has signed an undertaking to improve data handling to ensure that breaches like the collection of Wi-Fi payload data by Google Street View cars do not occur again. The undertaking commits Google to put in place improved training measures on security awareness and data protection issues for all employees. See <span style="color: #c0504d;"><a href="http://www.ico.gov.uk/~/media/documents/library/Data_Protection/Notices/google_inc_undertaking.ashx" target="_blank"><span style="color: #c0504d; text-decoration: underline;">here</span></a> </span>for the full undertaking.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Google also faces an audit by the ICO of its internal privacy structure, privacy training programmes and a system of privacy reviews of new products within nine months of the undertaking being signed.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>In taking steps to avoid the same mistakes happening again, Google announced in its official policy blog a number of changes aimed at improving privacy controls.  These include: the appointment of a director of privacy across both engineering and product management; enhancing core training for engineers and other important groups with a particular focus on the responsible collection, use and handling of data; and improving internal compliance procedure to require a privacy design document for each project an engineering project leader works on.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Senior Vice President of Engineering and Research, Alan Eustice added "<em>we’ll be constantly on the lookout for additional improvements to our procedures as Google grows</em>".</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>See <span style="color: #c0504d;"><a href="http://googleblog.blogspot.com/2010/10/creating-stronger-privacy-controls.html" target="_blank"><span style="color: #c0504d; text-decoration: underline;">here</span></a> </span>for the full statement posted to Google's official policy blog on its changes to create stronger privacy controls.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The decision not to fine Google has been criticised by privacy campaigners.  Alex Deane of Big Brother Watch said that the ICO's failure to take action was "disgraceful". He went on to say that "<em>Ruling that Google has broken the law, but then taking no action against it, shows the commissioner to be a paper tiger. The commissioner is an apologist for the worst offender in his sphere of responsibility, not a policeman of it. If Google can harvest the personal information of thousands of people and get off scot-free, then the ICO plainly has a contempt for privacy.</em>"</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Google was recently ordered to pay damages in the US, following a lawsuit filed by Aaron and Christine Boring after representatives of Google Street View photographed their property. However, the damages awarded against Google did not relate to an invasion of privacy claim, which had been dismissed by the Court, but a trespass claim.  Google settled the trespass claim but this was a Pyrrhic victory for the Borings, as the sum Google paid was $1.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>See further section 4.3.4 of the <span style="color: #c0504d;"><a href="http://www.lawsocietyshop.org.uk/ecom_lawsoc/public/saleproduct.jsf?catalogueCode=9781853288432" target="_blank"><span style="color: #c0504d; text-decoration: underline;">Privacy Law Handbook</span></a></span>.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>(Originally blogged by Tamar Shafran)</span></p>]]></content:encoded></item><item><guid isPermaLink="false">{E314EFC4-357F-4A05-A1CF-BDF2001FD1F1}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/public-access-to-documents-in-criminal-cases/</link><title>Public access to documents in criminal cases</title><description><![CDATA[The Administrative Court has upheld the decision of a district judge to refuse the press access to documents placed before a magistrates court in connection with extradition proceedings]]></description><pubDate>Tue, 11 Jan 2011 09:04:00 Z</pubDate><category>Data and privacy</category><authors:names>Keith Mathieson</authors:names><content:encoded><![CDATA[<p style="margin: 0cm 0cm 10pt; text-align: justify;"><em><span style="color: #c0504d;"><a href="http://www.bailii.org/ew/cases/EWHC/Admin/2010/3376.html" target="_blank"><span style="color: #c0504d; text-decoration: underline;">R (on the application of Guardian News & Media) v City of Westminster Magistrates Court</span></a></span></em><span> [2010] EWHC 3376.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The case concerned the attempted extradition to the US of two men alleged to have been involved in the bribery of Nigerian officials.  During the hearings in the magistrates court, various documents were handed to the judge.  These included correspondence, skeleton arguments and witness statements.  The Guardian asked the judge to order that the documents should be disclosed to its reporters.  The judge declined to do so on the basis that, among other things, there was no legal principle that members of the press or public were entitled to be provided with documents relied upon in open court proceedings.  The judge ruled that "all the issues relied on were fully set out in the oral submissions in open court" by Counsel.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The Administrative Court held that there were six reasons why the judge had been right not to order disclosure:</span></p>
<ol style="margin-top: 0cm;">
    <ol style="margin-top: 0cm;">
        <li style="margin: 0cm 0cm 10pt; text-align: justify; color: #000000;"><span>The principle of open justice in criminal proceedings does not extend to a right for the public or press to inspect documents placed before the court: see <em>Waterfield </em>[1975] 1 WLR 711.</span></li>
        <li style="margin: 0cm 0cm 10pt; text-align: justify; color: #000000;"><span>No case had been cited that undermined or qualified the reasoning in <em>Waterfield</em>.</span></li>
        <li style="margin: 0cm 0cm 10pt; text-align: justify; color: #000000;"><span>It is a reasonable inference that the draftsmen of the Criminal Procedure Rules 2010 were aware of <em>Waterfield </em>and, by making no change to the law, intended that <em>Waterfield </em>should remain in force.</span></li>
        <li style="margin: 0cm 0cm 10pt; text-align: justify; color: #000000;"><span>The Criminal Procedure Rules 2010 give no right of inspection to documents (in contrast to the CPR).</span></li>
        <li style="margin: 0cm 0cm 10pt; text-align: justify; color: #000000;"><span>The Freedom of Information Act 2000 could not be used to obtain the documents.  That statute contains checks and balances and no good reason had been advanced as to why those checks and balances should be overridden by the common law or Article 10.</span></li>
        <li style="margin: 0cm 0cm 10pt; text-align: justify; color: #000000;"><span>The court had no inherent jurisdiction to order disclosure.</span></li>
    </ol>
</ol>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><em><span>See further section 10.5 of the <span style="color: #c0504d;"><a href="http://www.lawsocietyshop.org.uk/ecom_lawsoc/public/saleproduct.jsf?catalogueCode=9781853288432" target="_blank"><span style="color: #c0504d; text-decoration: underline;">Privacy Law Handbook</span></a></span></span></em></p>]]></content:encoded></item><item><guid isPermaLink="false">{FA3439C8-18C9-4693-AC7B-6F3F4FEADEBB}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/van-morrison-gets-privacy-injunction/</link><title>Van Morrison gets privacy injunction</title><description><![CDATA[The musician Van Morrison has obtained an injunction against the News of the World to prevent the publication of private information apparently disclosed to the newspaper by a tradesman working at the musician's house.]]></description><pubDate>Mon, 10 Jan 2011 10:42:00 Z</pubDate><category>Data and privacy</category><authors:names>Keith Mathieson</authors:names><content:encoded><![CDATA[<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The injunction was ordered by Gillen J in the High Court in Northern Ireland.  An injunction was also granted to Gigi Lee, a business associate of Van Morrison with whom he was alleged to be having a personal relationship, and to "X", the child of Gigi Lee.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The information publication of which was sought to be restrained included details of the following:</span></p>
<ul style="margin-top: 0cm; list-style-type: disc;">
    <ul style="margin-top: 0cm; list-style-type: circle;">
        <li style="margin: 0cm 0cm 10pt; text-align: justify; color: #000000;"><span>Van Morrison's home, including its value, layout and furnishings</span></li>
    </ul>
</ul>
<ul style="margin-top: 0cm; list-style-type: disc;">
    <ul style="margin-top: 0cm; list-style-type: circle;">
        <li style="margin: 0cm 0cm 10pt; text-align: justify; color: #000000;"><span>Staff residing there</span></li>
    </ul>
</ul>
<ul style="margin-top: 0cm; list-style-type: disc;">
    <ul style="margin-top: 0cm; list-style-type: circle;">
        <li style="margin: 0cm 0cm 10pt; text-align: justify; color: #000000;"><span>Detailed physical descriptions of X</span></li>
    </ul>
</ul>
<ul style="margin-top: 0cm; list-style-type: disc;">
    <ul style="margin-top: 0cm; list-style-type: circle;">
        <li style="margin: 0cm 0cm 10pt; text-align: justify; color: #000000;"><span>The nature of the relationship between Morrison and Lee</span></li>
    </ul>
</ul>
<ul style="margin-top: 0cm; list-style-type: disc;">
    <ul style="margin-top: 0cm; list-style-type: circle;">
        <li style="margin: 0cm 0cm 10pt; text-align: justify; color: #000000;"><span>Visits to Morrison's home by Lee</span></li>
    </ul>
</ul>
<ul style="margin-top: 0cm; list-style-type: disc;">
    <ul style="margin-top: 0cm; list-style-type: circle;">
        <li style="margin: 0cm 0cm 10pt; text-align: justify; color: #000000;"><span>Visits by Morrison to his wife and child (including photographs)</span></li>
    </ul>
</ul>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The proposed newspaper article and photographs formed a confidential annexe to the judgment and were not otherwise published.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The judge had little difficulty in determining that the claimants had a reasonable expectation of privacy.  He took particular account of the following considerations:</span></p>
<ul style="margin-top: 0cm; list-style-type: disc;">
    <ul style="margin-top: 0cm; list-style-type: circle;">
        <li style="margin: 0cm 0cm 10pt; text-align: justify; color: #000000;"><span>The activities covered by the article were of a private and personal nature</span></li>
    </ul>
</ul>
<ul style="margin-top: 0cm; list-style-type: disc;">
    <ul style="margin-top: 0cm; list-style-type: circle;">
        <li style="margin: 0cm 0cm 10pt; text-align: justify; color: #000000;"><span>Morrison's home residence was "to the fore and at the centre of much of the information being imparted"</span></li>
    </ul>
</ul>
<ul style="margin-top: 0cm; list-style-type: disc;">
    <ul style="margin-top: 0cm; list-style-type: circle;">
        <li style="margin: 0cm 0cm 10pt; text-align: justify; color: #000000;"><span>The nature of the intrusion was to deal with personal relationships and the birth of a child</span></li>
    </ul>
</ul>
<ul style="margin-top: 0cm; list-style-type: disc;">
    <ul style="margin-top: 0cm; list-style-type: circle;">
        <li style="margin: 0cm 0cm 10pt; text-align: justify; color: #000000;"><span>No consent had been obtained from the parties.</span></li>
    </ul>
</ul>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>In relation to the balancing exercise, the News of the World argued that much of the information was already in the public domain and it was also necessary in the public interest to put the record straight in the light of a misleading statement about Van Morrison's private life having been previously made by his spokesman.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>After conducting a careful analysis in accordance with the English authorities, the judge concluded that the claimants' Article 8 rights clearly outweighed the Article 10 rights of the News of the World.  The judge considered that there was no public interest in the details sought to be published, which were "classic illustrations of intrusions into [the claimants'] private lives which Article 8 is designed to protect".  The article and photographs went "beyond the margin of appreciation allowed to a free press" and constituted "an unacceptable intrusion into the private lives" of the claimants.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>In relation to the defendants' public domain argument, the judge was not satisfied that "the information now contained in the impugned articles and photographs had been in the public domain to the extent now proposed or in the sense that publication could have had no significant effect on the lives of the [claimants]".  The judge also rejected the newspaper's argument that it was entitled to publish corrective facts.  In contrast to the <em><span style="color: #c0504d;"><a href="http://www.bailii.org/uk/cases/UKHL/2004/22.html" target="_blank"><span style="color: #c0504d; text-decoration: underline;">Campbell</span></a></span></em><span style="color: #c0504d;"> </span>case, it had not been established to the judge's satisfaction that the claimants had provided any misleading information (Van Morrison gave evidence that the statement by his spokesman had been unauthorised).</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Finally even though the photographs of X and indeed some of the photographs of the adult claimants had been taken in a public place, the judge still considered they were intrusive and the claimants had a reasonable expectation of privacy such that their publication should not be permitted.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><em><span>See further sections 3.3.7, 3.4 and 3.5.3 of the <span style="color: #c0504d;"><a href="http://www.lawsocietyshop.org.uk/ecom_lawsoc/public/saleproduct.jsf;jsessionid=435F4FB591FFDBA2A07BD680E15A7DB1.plukweb5?catalogueCode=9781853288432" target="_blank"><span style="color: #c0504d; text-decoration: underline;">Privacy Law Handbook</span></a></span> </span></em></p>
<p style="margin: 0cm 0cm 10pt;"><span style="color: #c0504d;"><a href="http://www.courtsni.gov.uk/NR/rdonlyres/E7CEA55E-3F99-4279-BDF0-4388095193F8/0/j_j_GIL7954Final.htm" target="_blank"><span style="color: #c0504d; text-decoration: underline;">Van Morrison's injunction</span></a></span></p>]]></content:encoded></item><item><guid isPermaLink="false">{84A4AE49-4F6F-4E37-8B92-E4B7906B2797}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/privacy-judgment-in-northern-ireland/</link><title>Privacy judgment in Northern Ireland</title><description><![CDATA[In King v Sunday Newspapers (Northern Ireland High Court, WEA7948), following a High Court trial before Weatherup J, the claimant obtained an injunction preventing publication of his home address and certain further information about his family.]]></description><pubDate>Mon, 10 Jan 2011 10:36:00 Z</pubDate><category>Data and privacy</category><authors:names>Keith Mathieson</authors:names><content:encoded><![CDATA[<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>He was refused an injunction restraining further publication of his partner's identity, details of their wedding plans and a photograph of him and his partner at her parents' home.   The claimant appears not to have been awarded any damages.   The case is an unusual example of a privacy claim that went all the way to trial, not just to the interim injunction stage.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><strong><span>The facts</span></strong></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The claimant, Drew King, was alleged by Sunday World to be a member of the Loyalist Volunteer Force, a proscribed terrorist organisation.  In 2008 the claimant had been charged with the murder of a former Sunday World journalist.  In 2010 the charge was withdrawn.  Between 2002 and 2009 the Sunday World published numerous articles about the claimant.  These articles were highly defamatory of the claimant, alleging involvement in terrorism, murder and drug-dealing.  The claimant did not, however sue for libel (ostensibly for financial reasons) but he did sue for misuse of private information and harassment.  His claim for an injunction to prevent publication of his address was based on Article 2 of the ECHR (right to life).</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The Article 2 claim was based mainly on the claimant having received various messages from the police warning him that his personal safety was under threat.  The claim for misuse of private information related to the following categories of information: (a) the wedding plans of the claimant and his partner; (b) information about his partner, including her identification, workplace and family members; (c) information about their child, including his religion; and (d) a photograph of the claimant and his partner at her parents' house.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><strong><span>The judge's findings</span></strong></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>On the Article 2 claim, the judge applied <em><span style="color: #c0504d;"><a href="http://www.bailii.org/eu/cases/ECHR/1998/101.html" target="_blank"><span style="color: #c0504d; text-decoration: underline;">Osman v The United Kingdom</span></a></span></em> [1998] 29 EHRR 245 and found that since there was a real and immediate risk of to the claimant's life arising out of publication of his whereabouts, an injunction should be granted to prevent publication of his current or any future address.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>On the misuse of private information claim, the judge refused an injunction in respect of (a) and (d) and granted an injunction in respect of (b) and (c) save as to the identity of the claimant's partner.  Sadly, the basis on which the judge made his rulings are far from easy to follow.  In a criticism of the judgment on the Inforrm blog <span style="color: #c0504d;"><a href="http://inforrm.wordpress.com/2010/10/15/case-law-king-v-sunday-world-northern-ireland-privacy-and-harassment-claim/" target="_blank"><span style="color: #c0504d; text-decoration: underline;">here</span></a></span>, the commentators point out that the judge failed altogether to explain how he had approached the issue of proportionality, it being unclear, for example, how he had reached his conclusion that the published details of the wedding plans were proportionate to the public interest in question.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><em><span>See further sections 3.3 and 3.4 of the <span style="color: #c0504d;"><a href="http://www.lawsocietyshop.org.uk/ecom_lawsoc/public/saleproduct.jsf?catalogueCode=9781853288432" target="_blank"><span style="color: #c0504d; text-decoration: underline;">Privacy Law Handbook</span></a></span></span></em></p>]]></content:encoded></item><item><guid isPermaLink="false">{D7B2ECC3-4A6B-4EFE-A4E7-FD9036C3F7AC}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/harassment-by-newspaper-articles/</link><title>Harassment by newspaper articles</title><description><![CDATA[In King v Sunday Newspapers (Northern Ireland High Court, WEA7948) the claimant alleged that a series of articles in the Northern Irish newspaper Sunday World constituted harassment under the Prevention of Harassment (Northern Ireland) Order 1997 (the equivalent of the Protection From Harassment Act 1997).  ]]></description><pubDate>Mon, 10 Jan 2011 10:32:00 Z</pubDate><category>Data and privacy</category><authors:names>Keith Mathieson</authors:names><content:encoded><![CDATA[<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The case was tried before a High Court judge in Belfast, Weatherup J, who dismissed the claim.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><strong><span>The facts</span></strong></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The claimant, Drew King, was alleged by Sunday World to be a member of the Loyalist Volunteer Force, a proscribed terrorist organisation.  In 2008 the claimant had been charged with the murder of a former Sunday World journalist.  In 2010 the charge was withdrawn.  Between 2002 and 2009 the Sunday World published numerous articles about the claimant.  These articles were highly defamatory of the claimant, alleging involvement in terrorism, murder and drug-dealing.  The claimant did not, however sue for libel (ostensibly for financial reasons) but he did sue for harassment and misuse of private information.  The treatment of his privacy claim is dealt with <span style="color: #c0504d;"><a href="http://blog.rpc.co.uk/privacy-law/privacy-judgment-in-northern-ireland" target="_blank"><span style="color: #c0504d; text-decoration: underline;">here</span></a></span>.  His claim of harassment was that the series of articles in the Sunday World and the private information they included constituted the pursuit of a course of conduct that amounted to harassment.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><strong><span>The judge's findings</span></strong></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The judge considered <em><span style="color: #c0504d;"><a href="http://www.bailii.org/ew/cases/EWCA/Civ/2001/1233.html" target="_blank"><span style="color: #c0504d; text-decoration: underline;">Thomas v News Group Newspapers</span></a></span></em> [2001] EWCA Civ 1233.  He directed himself that (a) a series of newspaper articles could amount to a course of conduct under the legislation; (b) the legislation concerned the effects of conduct rather than the nature of the conduct; and (c) harassment is a word that is generally understood as a term that describes conduct targeted at an individual that is calculated to produce alarm and distress and is oppressive and unreasonable.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The judge found that the Sunday World articles had been targeted at the claimant and had been calculated to alarm and distress him.  The question was whether the newspaper had nonetheless acted reasonably such as to excuse its conduct: see  PHA 1997, s. 1(3)(c).  The judge held that the newspaper had acted reasonably.  The central theme of the articles reflected "the reporting of matters of legitimate public interest concerning criminal activity and criminal lifestyle".  Although the judge said that the truth of those matters was not in issue in the proceedings, he also found that some of the reporting had been inaccurate and its publication unwarranted.  Despite those inaccuracies, the judge found that the articles did not "constitute an abuse of the freedom of [the] press which the pressing social needs of a democratic society require should be curbed" and he therefore dismissed the claim.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The case appears to be the first UK case in which harassment by the press has been considered at trial.  The judge's approach has been criticised by the editors of the Inforrm blog <span style="color: #c0504d;"><a href="http://inforrm.wordpress.com/2010/10/15/case-law-king-v-sunday-world-northern-ireland-privacy-and-harassment-claim/" target="_blank"><span style="color: #c0504d; text-decoration: underline;">here</span></a></span>, most specifically the judge's failure to undertake a parallel analysis of the parties' competing Article 8 and 10 rights.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><em><span>See further section 8.2.4 of the <span style="color: #c0504d;"><a href="http://www.lawsocietyshop.org.uk/ecom_lawsoc/public/saleproduct.jsf?catalogueCode=9781853288432" target="_blank"><span style="color: #c0504d; text-decoration: underline;">Privacy Law Handbook</span></a></span></span></em></p>]]></content:encoded></item><item><guid isPermaLink="false">{373EC684-5E3A-42CD-96C0-53EDFDC59207}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/tweeting-the-courts/</link><title>Tweeting the courts</title><description><![CDATA[The Lord Chief Justice has issued guidance on the use of Twitter in court.]]></description><pubDate>Mon, 10 Jan 2011 10:28:00 Z</pubDate><category>Data and privacy</category><authors:names>Keith Mathieson</authors:names><content:encoded><![CDATA[<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The <em><span style="color: #c0504d;"><a href="http://www.dailymail.co.uk/news/article-1340165/Twitter-CAN-used-court-cases-rules-Britains-judge.html" target="_blank"><span style="color: #c0504d; text-decoration: underline;">Daily Mail</span></a></span></em> reported this as "Carry on tweeting".  The Lord Chief Justice's civil servants preferred to use more formal Whitehall language, calling their guidance "Interim Practice Guidance: The Use of Live Text-Based Forms of Communication (including Twitter) from Court for the Purposes of Fair and Accurate Reporting".</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The guidance covers the use in court of "live text-based communications", defined to include "mobile email, social media (including Twitter) and internet enabled laptops", but presumably also including text messaging on mobile phones.  It points out that the almost invariable rule is that mobile phones must be turned off in court, but an application can be made to the court for permission to activate and use a mobile phone, small laptop or similar piece of equipment in order to make live text-based communications of the proceedings.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The guidance confirms that there is no statutory prohibition on the use of live text-based communications in court.  This contrasts with the taking of photographs or the making of sound recording in court, which are subject to statutory prohibition or control.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>When considering whether to grant permission to use live text-based communications in court, and if so by whom, the guidance says that the paramount question will be whether the use may interfere with the proper administration of justice.  The most obvious permissible purpose will be to enable the media to produce fair and accurate reports of the proceedings.  According to the guidance: "the use of an unobtrusive, hand-held, virtually silent piece of modern equipment for the purposes of simultaneous reporting of proceedings to the outside world as they unfold in court is generally unlikely to interfere with the proper administration of justice".</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>If, however, there is a risk that witnesses or jury members in a criminal case may be influenced by tweeting or similar communications, there is a clear danger to the administration of justice and permission should not be granted.  The guidance also acknowledges the risk that allowing lots of people in court to tweet may interfere with the court's own sound recording equipment.  In such cases, the court should consider limiting the permission to representatives of the media for journalistic purposes.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The guidance followed a <span style="color: #c0504d;"><a href="http://www.guardian.co.uk/technology/2010/dec/14/twitter-allowed-bail-hearing" target="_blank"><span style="color: #c0504d; text-decoration: underline;">decision</span></a> </span>by the judge hearing Wikileaks founder Julian Assange's bail application at the City of Westminster magistrates court to permit reporters to use Twitter and other electronic media to keep the public informed about what was happening in court.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The Ministry of Justice will shortly be conducting a consultation on the issue.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><em><span>See further section 10.2.5 of the <span style="color: #c0504d;"><a href="http://www.lawsocietyshop.org.uk/ecom_lawsoc/public/saleproduct.jsf?catalogueCode=9781853288432"><span style="color: #c0504d; text-decoration: underline;">Privacy Law Handbook</span></a></span> </span></em></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><em><span>(Originally blogged by Lindsay Hodgkinson)</span></em></p>]]></content:encoded></item><item><guid isPermaLink="false">{AA49F6DB-18C5-4E9D-B6E5-76FB91A80F00}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/applications-for-privacy-injunctions-when-notice-need-not-be-given/</link><title>Applications for privacy injunctions – when notice need not be given</title><description><![CDATA[In DFT v TFD [2010] EWHC 2335 (QB) Sharp J made an order to restrain publication of allegedly private and confidential information without notice having been given to either the respondent or the media.]]></description><pubDate>Mon, 10 Jan 2011 10:08:00 Z</pubDate><category>Data and privacy</category><authors:names>Keith Mathieson</authors:names><content:encoded><![CDATA[<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The case concerned an alleged blackmail attempt by the respondent.  It was said by the claimant that the respondent was threatening to publish information about a sexual relationship between them unless she was paid very substantial sums of money.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>In circumstances involving alleged blackmail, Sharp J considered it appropriate to make an order without notice to the respondent or any other party.  In so ruling, she cited the Court of Appeal's decision in <em><span style="color: #c0504d;"><a href="http://www.bailii.org/ew/cases/EWCA/Civ/2009/1574.html" target="_blank"><span style="color: #c0504d; text-decoration: underline;">ASG v GSA</span></a></span></em> [2009] EWCA Civ 1574, a case also involving alleged blackmail, in which Waller LJ said:</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>As regards the point about the application being made without notice, it seems to me that if the allegation of blackmail is established, it would also be established that there was a serious risk that if given notice of the application of an injunction, the girl would have simply gone to the media and either sought to obtain money for publication or simply published. I would therefore respectfully disagree with the judge that it was not appropriate to bring this without notice application.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>(Although <em>ASG v GSA</em> was decided in August 2009, it does not seem to have been transcribed until a year later.  The reason for the delay is unknown.)</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Sharp J also considered Eady J's observations on prior notification of the media in <em><span style="color: #c0504d;"><a href="http://www.bailii.org/ew/cases/EWHC/QB/2010/853.html" target="_blank"><span style="color: #c0504d; text-decoration: underline;">TUV v Persons Unknown</span></a></span></em><span style="color: #c0504d;"> </span>[2010] EWHC 853.  In that case Eady J said that the need for prior notification should be addressed according to the facts of each case.  He did not think it right that an applicant for an injunction should be required to give prior notice to every media group simply on the basis that they might be interested in the information in question.  It was sufficient to notify only those media groups who were already believed to have shown an interest in publishing.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><em><span>See further section 3.9.1 of the <span style="color: #c0504d;"><a href="http://www.lawsocietyshop.org.uk/ecom_lawsoc/public/saleproduct.jsf?catalogueCode=9781853288432" target="_blank"><span style="color: #c0504d; text-decoration: underline;">Privacy Law Handbook</span></a></span> </span></em></p>]]></content:encoded></item><item><guid isPermaLink="false">{85F82E13-E9B2-44A5-87DA-0701C0D916C0}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/privacy-and-anonymisation-in-commercial-cases-and-in-the-court-of-appeal/</link><title>Privacy and anonymisation in commercial cases and in the Court of Appeal</title><description><![CDATA[In a music royalties dispute involving Pink Floyd, the Court of Appeal has made it clear that a private hearing or anonymisation of parties should take place only where the court is satisfied this is necessary for the proper administration of justice.]]></description><pubDate>Mon, 10 Jan 2011 10:04:00 Z</pubDate><category>Data and privacy</category><authors:names>Keith Mathieson</authors:names><content:encoded><![CDATA[<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>In the Pink Floyd case – <span style="color: #c0504d;"><a href="http://www.bailii.org/ew/cases/EWCA/Civ/2010/1429.html" target="_blank"><span style="color: #c0504d; text-decoration: underline;">Pink Floyd Music Limited v EMI Records</span></a></span> [2010] EWCA Civ 1429 – the appeal was listed to be heard in private under the case name P v E.  The reason was that a particular percentage figure was alleged to be commercially sensitive.  Lord Neuberger MR pointed out that even if that was correct, the problem could be dealt with by redacting the figure: it was unnecessary either to anonymise the parties or to hold the hearing in private.  To the extent that the figure was inadvertently mentioned in open court, that could be dealt with by an order preventing the figure from being publicly disclosed.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><em><span>See further sections 10.2 and 10.3 of the <span style="color: #c0504d;"><a href="http://www.lawsocietyshop.org.uk/ecom_lawsoc/public/saleproduct.jsf?catalogueCode=9781853288432" target="_blank"><span style="color: #c0504d; text-decoration: underline;">Privacy Law Handbook</span></a></span></span></em></p>]]></content:encoded></item><item><guid isPermaLink="false">{1143581F-FF4C-4ABC-95FD-C72114AA2627}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/privacy-and-blackmail/</link><title>Privacy and blackmail</title><description><![CDATA[Those seeking to profit from making unauthorised disclosures of private information sometimes resort to blackmail, seeking to extort money from those who would prefer to keep the information private.]]></description><pubDate>Mon, 10 Jan 2011 09:59:00 Z</pubDate><category>Data and privacy</category><authors:names>Keith Mathieson</authors:names><content:encoded><![CDATA[<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>It is clear from a number of recent decisions that the courts will go to considerable lengths to protect alleged victims of blackmail.  First, the usual requirement to give notice of an intended application for an injunction is likely to be relaxed where there exists credible evidence that the respondent has been attempting to blackmail the claimant: this is discussed at xx.  Second, the courts are likely to confer anonymity on the parties in such cases: see <em><span style="color: #c0504d;"><a href="http://www.bailii.org/ew/cases/EWCA/Civ/2009/1574.html" target="_blank"><span style="color: #c0504d; text-decoration: underline;">ASG v GSA</span></a></span></em>, <em><span style="color: #c0504d;"><a href="http://www.bailii.org/ew/cases/EWHC/QB/2010/2335.html" target="_blank"><span style="color: #c0504d; text-decoration: underline;">DFT v TFD</span></a></span></em>, <em><span style="color: #c0504d;"><a href="http://www.bailii.org/ew/cases/EWHC/QB/2010/2457.html" target="_blank"><span style="color: #c0504d; text-decoration: underline;">AMM v HXW</span></a></span> </em>and <em><span style="color: #c0504d;"><a href="http://www.bailii.org/ew/cases/EWHC/QB/2010/3064.html" target="_blank"><span style="color: #c0504d; text-decoration: underline;">KJH v HGF</span></a></span></em>.  Third, the courts are likely to impose strict requirements on the extent to which any such cases may be reported, though they will probably stop short of imposing a super-injunction that prevents the existence of the proceedings themselves being revealed.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The courts have also made it clear that the Article 10 rights of someone reasonably suspected of blackmail will be given little weight if indeed they are engaged in the first place.  In <em>DFT v TFD</em> Sharp J said:</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>As to the Article 10 rights of the respondent, the evidence before me currently suggests the applicant is likely to establish at trial that disclosure of the information (whether to the media or generally) would be the fulfilment of a blackmailing threat.  I accept [the applicant's] submission that the expression rights of blackmailers are extremely weak (if they are engaged at all). [para 23]</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The judgment of Tugendhat J in <em>AMM v HXW</em> contains at paras [23] to [43] a useful exploration of the issues raised by blackmail threats in the context of applications for injunctions in privacy cases.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><em><span>See further section 3.3 of the <span style="color: #c0504d;"><a href="http://www.lawsocietyshop.org.uk/ecom_lawsoc/public/saleproduct.jsf?catalogueCode=9781853288432" target="_blank"><span style="color: #c0504d; text-decoration: underline;">Privacy Law Handbook</span></a></span></span></em></p>]]></content:encoded></item><item><guid isPermaLink="false">{044EB14A-E1DE-4B7D-806A-B7619C3A253D}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/anonymisation-of-parties-in-matrimonial-proceedings/</link><title>Anonymisation of parties in matrimonial proceedings</title><description><![CDATA[The Court of Appeal has lifted an order by a family court judge which directed that the parties to the proceedings should be anonymised.  ]]></description><pubDate>Mon, 10 Jan 2011 09:40:00 Z</pubDate><category>Data and privacy</category><authors:names>Keith Mathieson</authors:names><content:encoded><![CDATA[<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>In <em><span style="color: #c0504d;"><a href="http://www.bailii.org/ew/cases/EWCA/Civ/2010/1315.html" target="_blank"><span style="color: #c0504d; text-decoration: underline;">Lykiardopolu v Lykiardopolu</span></a></span> </em>[2010] EWCA Civ 1315 Mrs Justice Baron had ordered that the parties’ identities should be protected in order to avoid damage to their commercial interests and to the husband’s health and wellbeing.  The judge was also concerned that if publicity arose from family proceedings, parties would in future be deterred from using the courts.  The judge made her order despite having made serious findings adverse to the husband and his family, including that they had conspired to manufacture evidence in order to disguise the extent of the husband’s assets.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The parties belonged to a wealthy and well-known Greek family with substantial shipping interests.  The judge's direction of anonymisation was unspecific about precisely how their anonymity should be achieved.  It was interpreted by Counsel for one of the parties as requiring not just the substitution of initials for the parties' names but the alteration of certain factual details to disguise their identities.  These alterations included the relocation of the family seat from Cephalonia to St Petersburg.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The Court of Appeal was not satisfied that any of the judge’s reasons stood up.  In any event, in view of the identity of the parties, who were part of a wealthy and well-known Greek shipping family, the court saw the case as presenting a choice between either reporting the judgment (with certain redactions) or not reporting it at all.  It did not approve of anonymisation combined with selective fictionalisation of the facts: redaction was one thing, but invention was quite another.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>In ordering the judgment to be reported, the Court of Appeal emphasised that parties to a matrimonial dispute who bring their financial affairs before the court will generally be assured of confidentiality and in most cases the parties’ entitlement to privacy will mean that an anonymous judgment is the right way of proceeding.  But the court also stressed the importance of open justice and of litigants not misleading the court.  In this case, in the absence of other factors justifying anonymity, “the judgment must be redacted to protect the privacy of the husband and the family wherever that protection can be given without reducing or veiling the scale of their litigation misconduct”.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><em><span>See further section 10.4.2 of the <span style="color: #c0504d;"><a href="http://www.lawsocietyshop.org.uk/ecom_lawsoc/public/saleproduct.jsf?catalogueCode=9781853288432" target="_blank"><span style="color: #c0504d; text-decoration: underline;">Privacy Law Handbook</span></a></span></span></em></p>]]></content:encoded></item><item><guid isPermaLink="false">{F4AEA6B0-04FD-4B6D-B1AA-E94218DF6C5C}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/school-photographs-data-protection-and-common-sense/</link><title>School photographs, data protection and common sense</title><description><![CDATA[In the run up to Christmas the Information Commissioner's Office (ICO) has issued a press release confirming that the Data Protection Act 1998 (DPA) does not prevent family and friends from taking photographs at school concerts or plays.  ]]></description><pubDate>Thu, 06 Jan 2011 10:58:00 Z</pubDate><category>Data and privacy</category><authors:names>Keith Mathieson</authors:names><content:encoded><![CDATA[<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>While this might seem a statement of the blindingly obvious, the DPA has in the past been cited by schools and local authorities as a reason to stop parents from taking photographs at events such as school plays and sports days.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>Information Commissioner Christopher Graham said: “A common sense approach is needed – clearly, photographs simply taken for a family album are exempt from data protection laws.  Armed with our guidance, parents should feel free to snap away this Christmas and stand ready to challenge any schools or councils that say ‘Bah, Humbug’ to a bit of festive fun.”</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The DPA has no practical application in most cases where parents take photographs in schools.  The DPA will, however, apply when photographs are taken of children for official use by a school or college, such as issuing identification passes.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The full press release can be seen <span style="color: #c0504d;"><a href="http://www.ico.gov.uk/~/media/documents/pressreleases/2010/christmas_duck_outs_press-release_07122010.ashx" target="_blank"><span style="color: #c0504d; text-decoration: underline;">here</span></a></span>.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>ICO guidance on taking photographs in schools can be found <span style="color: #c0504d;"><a href="http://www.ico.gov.uk/upload/documents/library/data_protection/practical_application/taking_photos.pdf" target="_blank"><span style="color: #c0504d; text-decoration: underline;">here</span></a></span>.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><em><span>See further section 4.3.5 of the <span style="color: #c0504d;"><a href="http://www.lawsocietyshop.org.uk/ecom_lawsoc/public/saleproduct.jsf?catalogueCode=9781853288432" target="_blank"><span style="color: #c0504d; text-decoration: underline;">Privacy Law Handbook</span></a></span> </span></em></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><em><span>(Originally blogged by Tamar Shafran)</span></em></p>]]></content:encoded></item><item><guid isPermaLink="false">{FDF7364D-CD39-4C02-B2FB-5AF2C17A3F07}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/first-monetary-penalty-notices-issued-by-ico/</link><title>First monetary penalty notices issued by ICO</title><description><![CDATA[On 24 November the Information Commissioner's Office ("ICO") issued its first monetary penalty notices, marking the first use of this power since it became available to the ICO in April.]]></description><pubDate>Thu, 06 Jan 2011 10:55:00 Z</pubDate><category>Data and privacy</category><authors:names></authors:names><content:encoded><![CDATA[<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The first monetary penalty, of £100,000, was issued to Hertfordshire County Council for two serious incidents where council employees faxed highly sensitive personal information to the wrong recipients.  The first incident involved information regarding child sexual abuse, which was intended to be sent to a barrister's chambers.  The second incident involved details of care proceedings.  On both occasions, an employee incorrectly entered the full fax number of the intended recipient manually, rather than the standard practice of using the auto-dial function.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The second monetary penalty, of £60,000, was issued to employment services company A4e for the loss of an unencrypted laptop which contained personal information relating to 24,000 people who had used community legal advice centres in Hull and Leicester.  The laptop, which was intended for home use, was stolen from an employee's house during a burglary.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><strong><span>Legal basis of monetary penalties</span></strong></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The ICO is authorised to issue monetary penalty notices by virtue of s55A of the Data Protection Act 1998.  This section, inserted by the Criminal Justice and Immigration Act 2008, came into force on 6 April this year.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The ICO is authorised to issue a monetary penalty notice where there has been a serious contravention of s4(4) of the Data Protection Act (the 'data protection principles') by the data controller of a kind likely to cause substantial damage or distress; and either the contravention was deliberate or the data controller knew or ought to have known that there was a risk that the contravention would occur and that such a contravention would be of a kind likely to cause substantial damage or distress, but failed to take reasonable steps to prevent the contravention.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The maximum penalty notice is £500,000.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><strong><span>Suitability of a monetary penalty notice in these cases</span></strong></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The ICO has issued guidance stating that monetary penalty notices are intended to act as an encouragement towards compliance with the Data Protection Act, or at least a deterrent to non-compliance.  The guidelines also make clear that a monetary penalty notice is only appropriate in the most serious situations.  Essentially, the ICO has stated that it will use its power against a data controller who has deliberately or negligently disregarded the law.  This stated aim is reinforced by the notices issued to the two organisations at hand, which state that "<em>[the ICO's] underlying objective in imposing a monetary penalty notice is to promote compliance with the Act</em>".</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>In both cases, the data protection principle breached was principle seven, which states that "<em>appropriate technical and organisational measures shall be taken against unauthorised or unlawful processing of personal data and against accidental loss or destruction of, or damage to, personal data</em>".  In each case the ICO decided that breach was "serious" and necessitated the issue of a monetary penalty notice.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><strong><span>Consequences</span></strong></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The service of the first monetary penalty notices, seven months after the availability of the power arose, suggests that the ICO will not be afraid to issue fines in order to promote compliance with the Data Protection Act through deterrence.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The fact that both cases involve breach of the same 'appropriate technical measures' principle underlines the importance of organisations encrypting any sensitive data they may possess, especially where that information is leaving their managed ecosystem.  Both cases are similar to high profile incidents in recently years involving the loss of personal data when being sent or held externally, most notably in cases of laptops and memory sticks being left on trains.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The A4e case, involving the theft of a laptop in use by a home worker, shows that the ICO is seeking to clamp down on this type of data breach.  In neither of the cases does the issue of the notice concern the content or processing of the data held, but rather the fact that data controllers have a duty to safeguard sensitive information wherever it is held.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The ICO Press Release is <span style="color: #c0504d;"><a href="http://www.ico.gov.uk/~/media/documents/pressreleases/2010/first_monetary_penalties_press_release_24112010.ashx" target="_blank"><span style="color: #c0504d; text-decoration: underline;">here</span></a></span>.  The Hertfordshire penalty notice is <span style="color: #c0504d;"><a href="http://www.ico.gov.uk/~/media/documents/library/Data_Protection/Notices/hertfordshire_cc_monetary_penalty_notice.ashx" target="_blank"><span style="color: #c0504d; text-decoration: underline;">here</span></a> </span>and the A4e notice is <span style="color: #c0504d;"><a href="http://www.ico.gov.uk/~/media/documents/library/Data_Protection/Notices/a4e_monetary_penalty_notice.ashx" target="_blank"><span style="color: #c0504d; text-decoration: underline;">here</span></a></span>.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><em><span>See further section 5.8.1 of the <span style="color: #c0504d;"><a href="http://www.lawsocietyshop.org.uk/ecom_lawsoc/public/saleproduct.jsf?catalogueCode=9781853288432" target="_blank"><span style="color: #c0504d; text-decoration: underline;">Privacy Law Handbook</span></a></span></span></em></p>]]></content:encoded></item><item><guid isPermaLink="false">{B5FF367D-A476-4F22-901F-0B78506E598F}</guid><link>https://www.rpclegal.com/thinking/data-and-privacy/the-stig-reveals-himself/</link><title>The Stig reveals himself</title><description><![CDATA[Ben Collins is the second man to play the part of the anonymous racing driver “The Stig” in the BBC's popular Top Gear programme. ]]></description><pubDate>Thu, 06 Jan 2011 10:48:00 Z</pubDate><category>Data and privacy</category><authors:names></authors:names><content:encoded><![CDATA[<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>He is also the second Stig unable to resist revealing his identity, on this occasion in a book entitled "<em><span style="color: #c0504d;"><a href="http://www.amazon.co.uk/Man-White-Suit-Ben-Collins/dp/000732796X/ref=sr_1_1?ie=UTF8&qid=1294327451&sr=8-1" target="_blank"><span style="color: #c0504d; text-decoration: underline;">The Man in the White Suit</span></a></span>"</em>.  Despite the BBC’s best efforts to stop it, the book has now been published in time for the 2010 Christmas market, Morgan J having refused to grant the BBC an interim injunction to prevent publication: <span style="color: #c0504d;"><a href="http://www.bailii.org/ew/cases/EWHC/Ch/2010/2424.html" target="_blank"><span style="text-decoration: underline;"><em><span style="color: #c0504d;">BBC v HarperCollins</span></em><span style="color: #c0504d;"> [2010] EWHC 2424</span></span></a></span>.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>It was clear from a number of contracts entered into between Collins’s company and the BBC that the Stig’s anonymity was a key feature of the programme and he was not meant to say who he really was. Morgan J found that while Mr Collins was not personally party to the contracts, having signed them as agent for his company, he was clearly subject to an equitable duty of confidence to the BBC.  Whether he was in breach of that duty was a matter for trial.  The issue on the injunction hearing was whether Collins should be enjoined from revealing his identity in the interim period pending a full trial.  Unfortunately for the BBC, the Stig’s identity had ceased to be confidential by the time its application reached court.  In the words of Morgan J:</span></p>
<p style="margin: 0cm 0cm 10pt 36pt; text-align: justify;"><span>In my judgment, the press coverage, in particular the press coverage in August 2010, goes well beyond speculation as to the identity of The Stig. The statements in the press that Mr Collins was The Stig would be understood by the public as statements of fact. The number of different newspapers which have stated that fact is such that the fact is now generally accessible. For all practical purposes, anyone who would have any interest in knowing the identity of The Stig now knows it. The identity of The Stig is no longer a secret and it is no longer confidential information.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The BBC tried to argue that the press coverage about the Stig's identity was only speculation and there was still some confidence to protect, as in the case of <em>Schering Chemicals v Falkman Limited </em>[1982] 1 QB 1.  The judge found, however, thatthis was not a case where there was a residual or limited confidentiality in the information which should be protected by an injunction.  He also rejected the BBC's argument that an injunction should be granted to prevent Mr Collins from benefiting from a past misuse of confidential information even if it was no longer confidential (a springboard injunction).  The damage had been done by newspaper publications definitively identifying the Stig as Ben Collins.  Since The Stig's identity was in the public domain, it wasn't clear how further harm would be caused to the BBC if <em>The Man in the White Suit</em> was published.  (See further the recent case of <em>Vestergaard Frandsen A/S v Bestnet Europe Limited </em>[2010] FSR 2about the less glamorous subject of mosquito nets, which reviewed the springboard doctrine and also came out against the grant of an injunction.)</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The judgment suggests that Ben Collins would have been unlikely to succeed at trial with an argument that he had breached his duty of confidence.  However, since the secret was out by the time of the injunction application, even a breach of contract by Collins's company and a breach of confidence by Collins himself would not afford the BBC an interim remedy.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><span>The dispute is unlikely to go any further.  Ben Collins has got a job with <em>Fifth Gear</em>, Channel Five's home for retired Top Gear presenters, and can drive with his face in view.  <em>Top Gear </em>goes from strength to strength and it cannot be long before Stig Mark III appears.</span></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><em><span>See further section 2.5.1 of the <span style="color: #c0504d;"><a href="http://www.lawsocietyshop.org.uk/ecom_lawsoc/public/saleproduct.jsf?catalogueCode=9781853288432" target="_blank"><span style="color: #c0504d; text-decoration: underline;">Privacy Law Handbook</span></a></span> </span></em></p>
<p style="margin: 0cm 0cm 10pt; text-align: justify;"><em><span style="color: #c0504d;"><a href="http://www.topgear.com/uk/" target="_blank"><span style="color: #c0504d; text-decoration: underline;">Top Gear</span></a></span></em></p>]]></content:encoded></item></channel></rss>