We use cookies to customise content for your subscription and for analytics.
If you continue to browse Lexology, we will assume that you are happy to receive all our cookies. For further information please read our Cookie Policy.
In cooperation with Association of Corporate Counsel
  Request new password

Search results

Order by most recent / most popular / relevance

Results: 1-10 of 145

How can you and your organisation benefit from a Bring Your Own Device (BOYD) policy?

  • BrookStreet des Roches LLP
  • -
  • United Kingdom
  • -
  • January 21 2014

In recent years it has become common for people to use their own personal devices (mobile phones, tablets, personal computers) for work purposes

Dismissal for carelessness - the law of unintended consequences

  • Squire Sanders
  • -
  • United Kingdom
  • -
  • August 24 2011

No doubt an enormous amount of reciprocal finger-pointing going on at recruitment group Hays at the moment following its inadvertently sending 800 people at the Royal Bank of Scotland the pay details of some 3,000 contractors and temps on the Bank’s books

Who owns the contents of an email?

  • Pitmans LLP
  • -
  • United Kingdom
  • -
  • October 14 2013

Once again, for some inexplicable reason, a fairly obvious case has baffled the Courts because it involved the use of email. Although the facts in

ICO guidance on deleting personal data under the Data Protection Act

  • Morgan Lewis & Bockius LLP
  • -
  • United Kingdom
  • -
  • September 12 2012

New guidance defines when electronically held personal data is "beyond use" once deleted

BYOD - data protection and confidentiality risks

  • Penningtons Manches LLP
  • -
  • United Kingdom
  • -
  • June 7 2012

Employees are increasingly using their own devices for work purposes

Monitoring your employees’ use of technology

  • Norton Rose Fulbright LLP
  • -
  • Australia, Canada, France, Germany, Hong Kong, South Africa, United Kingdom
  • -
  • December 20 2011

It has become increasingly common for organisations to incorporate the use of social media into their business strategies

Securing your company's data

  • DMH Stallard LLP
  • -
  • United Kingdom
  • -
  • July 23 2008

Put policies in place that prevent staff leaving with your entire database, says Frank Jennings

TUPE: compliance with the Data Protection Act when providing employee information

  • Shepherd & Wedderburn LLP
  • -
  • United Kingdom
  • -
  • July 3 2008

The Information Commissioner's Office (ICO) has published guidance on complying with the Data Protection Act 1998 (DPA) when providing information about employees in the context of a transfer under TUPE

Protecting the transfer of confidential information

  • Squire Sanders Hammonds
  • -
  • United Kingdom
  • -
  • April 4 2011

The High Court recently considered in Brandeaux Advisers (UK) Limited & Ors v Chadwick 2010 EWHC 3241 (QB) whether an employee's conduct, in sending confidential information belonging to her employer to a private email address, was sufficiently serious to justify termination of her employment contract

Recent decisions by UK courts highlight protection of confidential and proprietary information in employment context Part II

  • Seyfarth Shaw LLP
  • -
  • United Kingdom
  • -
  • August 6 2013

Although not binding authorities throughout the UK, two other recent decisions from lower courts in England and Wales are also notable with respect