to help enterprise security across Europe
The resource centre for busy senior executives seeking the latest insights into IT Compliance & Privacy issues for major organizations
 
sarbaines oxley ofcom communications regulator
Latest Resources      data protection register
compliance resources privacy resource center

Breaking Global News
Global Compliance and Privacy News
- Breaking News, updated every 30 minutes
•   Compliance, Privacy and Security
•  Money Laundering
•  Phishing
•  Regulatory Issues
•  SOX, Basel 2, MiFID


You Tell Us:
S
S
L

T
E
C
H
N
O
L
O
G
Y
We use SSL Technology for web data entry points:

Always
Sometimes
Never
What is SSL?

News
Are Smartphones Endangering Security? - Wick Hill
Dealing with Internet Security Threats - Ian Kilpatrick
How the New EU Rules on Data Export Affect Companies in and Outside the EU - Thomas Helbing
Farmers' Data Leak Highlights Old Technology Use - Wick Hill
Saving Money with SFTP - Wick Hill
UK Information Commissioner targets firm selling vetting data - Eversheds e80
12 Key Steps to Internet Security - Wick Hill
Telephone Monitoring Legality in the UK - Dechert
Firewall or UTM - Wick Hill
UK Information Commissioner demands mobile device encryption - Eversheds e80
Data loss - liability, reputation and mitigation of risk - Eversheds e80
Phorm, Webwise and OIX - BCS Security Forum
The challenges of PCI DSS compliance - Thales, Russell Fewing
"Quality" Data Vendor Spams us! Editor astounded!
National Gateway Security Survey 2008 - Wick Hill
Unified Threat Management - Watchguard Technologies

news archives
:
0 | 1 | 2 | 3 | 4 | 5 |
6 | 7 | 8 | 9 | 10 | 11 |
12 | 13
[What is this?]

Industry Blogs
Tim Berners Lee's Blog
Tim Callan's SSL Blog
Davis Wright Tremaine's Privacy & Security Law Blog
Emergent Chaos Blog
Michael Farnum's Blog
Phillip Hallam-Baker's Blog - The dotFuture Manifesto: Internet Crime, Web Services, Philosophy
Stuart King's Security and Risk Management Blog
David Lacey's IT Security Blog
Metasploit Official Blog
Jeff Pettorino's Security Convergence Blog
Jeff Richards's Demand Insights Blog
David Rowe's Risk ManagementBlog
Bruce Schneier's Security Blog
Larry Seltzer's Security Weblog
Mike Spinney's Private Communications Blog
Richard Steinnon's Threat Chaos Blog
The TechWeb Blog
Tim Trent's Marketing by Permission Blog
Rebecca Wong 's DP Thinker Blog

Newsletters
23 February Newsletter
Newsletter Archives are located in "News"

Industry Update
Internet Security Intelligence Briefing - November 2005
Find out the latest trends in e-commerce, web usage & the latest threats from adware/Spyware

Reports
Phorm, Webwise and OIX
- BCS Security Forum

'The Any Era has Arrived, and Everyione has Noticed' - Stratton Sclavos - VeriSign
Identity Security - Time to Share
Malicious code threats - iDefense
Public Alerts - updated as they happen from Stopbadware.org
Public Alerts - updated as they happen from Websense
Public Advisories - updated as they happen, from iDefense
Phoraging - Privacy invasion through the Semantic web: a special report by Mike Davies of VeriSign

Legislation
Privacy Laws & Business International E-news, Issue 57
Privacy Laws & Business UNited Kingdom E-news, Issue 60

Security Reviews
February 2007 - VeriSign Security Review
The security review archive is here

Case Studies
Finance Industry
Case Study Example

A case study on a Finance industry company.

White Papers
VeriSign® Intelligent Infrastructure for the 21st Century
VeriSign® Intelligent Infrastructure for Security
VeriSign® Intelligent Infrastructure: An Overview
Identity Protection Fraud Detection Service - description of the service
Life of a Threat - Video on Threat Management Lifecycle
Optimizing Enterprise Information Security Compliance - Dealing with all the audits
For a full list of all whitepapers, visit our Whitepaper library

Legal Notices
Privacy Policy
Terms of use

basel 2 sarbanes oxley
    legislation
data controller notification binding corporate rules BCR data transfer third countries third part data transfer basel 2 regualtor regulation regulate FSA banking network security RSA encryptin algorithm Bits sacked bank staff
Blogs compliance Reports compliancy Legislation Data Protection Case Studies data privacy White Papers data protection act News information commissioner Events security standards Links information security iDefense
Retail Solutions

Legislation

compliance and privacy

Current News Updates

PL&B International E-news, Issue 54

10 May, 2007
© Privacy Laws & Business 2007

  1. France's CNIL Fines Tyco Healthcare for giving false information and non-cooperation
  2. European Court of Human Rights gives judgment on an employer's monitoring of an employee's personal communications  
  3. Italy's DPA issues legally binding rules on employee monitoring
  4. EU takes action against three states for data law deficiencies
  5. Dubai Data Protection Regulations now published

1. CNIL Fines Tyco Healthcare for giving false information and non-cooperation

On 12th April, France's data protection authority, the CNIL (Commission Nationale de l'informatique et des Libertés) fined the US-based Tyco Healthcare France corporation 30,000 Euros for non-cooperation and for providing CNIL with erroneous information. After Tyco Healthcare, which specializes in medical equipment manufacturing, was formally notified by CNIL to provide information about a file on the management of its 450 employees, Tyco made an inaccurate reply.  Tyco indicated to CNIL that it had suspended implementation of this file.

2. European Court of Human Rights

gives judgment on an employer's monitoring of an employee's personal communications

An employee's right to keep personal matters personal even when these intrude into the work place, subject to certain limitations, was confirmed by the European Court of Human Rights in April and applies to the 46 states of the Council of Europe.

The decision in the case of Copland v United Kingdom was delivered in April 2007 and demonstrates that even before the Data Protection Act 1998 and the Human Rights Act 1998 came into the force in the UK, an employer's ability to monitor an employee's private communications and internet use conducted over the employer's equipment has always been very limited. The law now specifies that unless an employer has the right policies and procedures in place the courts will not tolerate unwarranted intrusions into an employee's personal and private life.

A fuller report on this case will be published in the May issue of the Privacy Laws & Business International Newsletter.

3. Italy's DPA issues legally binding rules on employee monitoring

On 10 March, the Garante, Italy's data protection authority, issued a guidance paper which attempts to assist employers to overcome some of the hurdles and to allow monitoring in a way that satisfies the requirements of the EU Data Protection Directive as implemented in Italy. The paper contains a legally binding interpretation of the statutory requirements for monitoring in the workplace.

A fuller report on this case will be published in the May issue of the Privacy Laws & Business International Newsletter.

4. EU takes action against three states for data law deficiencies

The European Commission has launched proceedings against Germany, Austria and the United Kingdom for breaches of Community data protection law.

A fuller report on this case will be published in the May issue of the Privacy Laws & Business International Newsletter.

5. Dubai Data Protection Regulations now published

The Dubai International Financial Centre Authority issued on March 1st the Data Protection Regulations 2007, so that the system of regulation established under the Data Protection Law is now fully in place. This process illustrates the speed with which legislation enacted by a Ruler is possible. The Regulations are very similar to the systems established by legislation in most EU countries with one important exception.

Click here for further information about subscribing to the international newsletter.

 


This site is independent of all its sources
The contents of the site are sourced from across the industry. All copyrights are acknowledged.