When buying and selling cryptocurrency, it is important to understand the legal side of the process. more
The UK’s Data Protection Act was passed almost twenty years ago. Since then, the collection and use of data by organisations, both public and private has changed enormously. Mobile phones now dominate how we receive and assimilate data. Giant corporations like Google and Facebook keep track of your online activities, so they can sell the information to advertisers and governments are demanding ‘big brother’ powers to access citizens’ data to protect people from terrorist attacks. more
dentity theft is very real in today’s digital world. Many of us now bank and shop online and these online transactions provide the perfect stage for criminals to assume your identity and defraud you, your bank or the business you are buying goods or services from. The ‘good’ ones rip off all three. Here are five ways you can protect yourself from becoming a victim of identity theft. more
IT outsourcing is the transfer of information technology processes or services by a customer to a third party supplier, instead of the customer performing the IT functions itself. The term encompasses a wide range of specific types of transaction, each with their own distinct set of challenges and issues. The contracting for each type of IT outsourcing must be carefully considered by customers, suppliers and their respective advisers in order to reach a good deal for all, both at the commencement of the transaction and as the technology matures and evolves over the transaction’s term. more
There are eight key principles under the Data Protection Act 1998 that any person or organisation handling data must comply with. These are: more