On Friday 25 May 2018, the EU General Data Protection Regulation (Regulation (EU) 2016/679), commonly referred to by its acronym of GDPR, comes into force across the EU. In the UK, this will be accompanied by the coming into force of the Data Protection Act 2018 which received Royal Assent on 23 May 2018. The new Act repeals the existing Data Protection Act 1998 and revokes the secondary legislation made under the 1998 Act.
The GDPR is directly applicable, which means that with the exception of limited areas of Member State discretion, it applies in the UK without further need for national legislation. The Data Protection Act 2018 addresses those areas of Member State discretion, and also implements the new Data Protection Directive for Police and Criminal Justice Authorities (Directive (EU) 2016/680), which is designed to protect individuals’ personal data when their data is being processed by police and criminal justice authorities, and to improve cooperation in the fight against terrorism and cross-border crime in the EU by enabling police and criminal justice authorities in EU countries to exchange information necessary for investigations efficiently and effectively.
Andrew Charlesworth, Reader in IT law at the University of Bristol Law School, is currently actively engaged in the analysis of the new rules through a series of short articles on the GDPR in conjunction with Cloudview (UK) Limited. Andrew is also providing key expertise in the development of the Privacy Flag initiative. You can access Andrew’s analysis and other work through the links provided in this post. Continue reading →
The day has arrived on which a cyber attack has succeeded in breaching a bank’s security with the result that customers’ money has been taken from their accounts. According to press reports the accounts of around 40,000 customers of Tesco Bank have been accessed and the bank has refunded £2.5 million to 9,000 who have had money removed.
Banks’ IT systems are an obvious target for cybercriminals. The fact that such systems contain both money and data on customers makes them extremely tempting. As banks have developed new channels for delivery of services, such as websites, mobile applications and social media, these have often been added, or linked, to existing out-dated systems. This increased complexity may mean that new avenues of attack are inadvertently created, and make it difficult for a bank to rapidly pinpoint the source of system risks and breaches. The increased use of distributed computing, with multiple systems running across multiple servers, can also create new system risks and simultaneously increase the number of staff requiring access. While external threats are increasing, it appears that industry insiders remain responsible for a significant share of bank fraud. How the Tesco cyber attack was carried out remains unclear, but the scale and speed of the transfer of funds suggests a degree of sophistication. Continue reading →