News
Chinese courts take a different approach to the issue of AI generating copyright protected images, the DLA Piper team reports ...
Without question, cybercrime is one of the leading threats facing every industry today. Ransomware remains not only rampant but devastatingly expensive, with average ransomware payments having ...
The European Commission has announced that it has decided to close its investigation into Apple’s user choice obligations under the Digital Markets Act (DMA). In less good news for Apple, it has also ...
The House of Commons Business and Trade Select Committee has published a report ahead of the UK-EU summit in May. The Committee highlights that the UK government has described raising growth as its ...
Ofcom has launched an investigation into whether the provider of an online suicide forum has failed to comply with its duties under the Online Safety Act 2023. This is the first investigation opened ...
These new MCTs and SCCs will not be mandatory. In some cases they are more like templates to show SME buyers of IT services what good could look like in a market where IT contracts are often one-sided ...
A look at the emerging alternative visions of the AI stack around the world. Episode 2 considers alternative visions for the AI stack. The discussion begins by thinking about the emergent ‘EuroStack’, ...
We have teamed up with the LIDC (International League of Competition Law) to share a series of podcasts examining some of the increasingly pressing questions around cloud computing, AI and competition ...
We have teamed up with the LIDC (International League of Competition Law) to share a series of podcasts examining some of the increasingly pressing questions around cloud computing, AI and competition ...
The UK government has provided more information about its new Cyber Security Bill, which aims to protect public services and safeguard growth. It was announced in the King’s Speech last year. The aim ...
The Information Commissioner’s Office has published guidance about anonymisation and pseudonymisation techniques, aimed at helping organisations handle personal data in compliance with data protection ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results