Header graphic for print
Global Media and Communications Watch The International Legal Blog for the Tech, Media and Telecoms Industry

Tag Archives: UK

Posted in Data Protection & Privacy Lilly Taranto

Recap on the ICO Stance on Data Security

The UK’s Information Commissioner’s Office (ICO) is known to prefer an “engaging” rather than an enforcement approach with organisations.  However, when looking at the “action we’ve taken” page on the ICO website the ICO’s enforcement activity seems to be increasing by the day.  While the ICO has stated that it wants to focus its enforcement efforts going forward on unsolicited … Continue Reading

Posted in Copyright Penny Thornton

UK High Court quashes copyright exception for private copying

Last month we reported on the case of BASCA v Secretary of State for Business and Innovation in which Green J held that the Government’s introduction of a UK “private copying” exception was unlawful. On 17 July 2015 Green J handed down a follow-up judgment quashing the regulations that introduced the private copying exception. This means that, going forward, the … Continue Reading

Posted in Copyright, Policy & Regulation Penny Thornton

UK High Court holds government’s introduction of a private copying exception was unlawful

On 19 June 2015, Green J handed down his judgment in British Academy of Songwriters, Composers and Authors (BASCA) and Secretary of State for Business Innovation and Skills. The case involved a judicial review of the Secretary of State’s decision to introduce an exception into UK copyright law that allows individuals to make copies of copyright works they have … Continue Reading

Posted in Internet, Policy & Regulation Conor Ward

Amendments to UK Hacking Legislation under The Serious Crime Act 2015 come into force

Amendments to the Computer Misuse Act 1990 (“CMA”) introduced by Part 2 of the Serious Crime Act 2015 (“2015 Act”) came into effect on the 3rd May 2015. The 2015 Act makes 4 changes to the CMA, in particular these:

  • Create a new offence to ensure that the most serious cyber attacks attract penalties commensurate with the harm caused;
Continue Reading
Posted in Policy & Regulation

Taxation of the Digital Economy

The emergence of a digital economy presents challenging tax questions. The non-tangible nature of the new technologies affects the ability of the tax authorities to successfully tax digital transactions and leads to a shortfall in fiscal revenue. Governments are therefore trying to reform their tax rules in order to be able to tax part of the profits made by digital … Continue Reading

Posted in Broadcasting, Internet, Policy & Regulation, Telecoms & Broadband

UK: A New Chief Executive for Ofcom at a Pivotal Time for the Telecoms and Media Industry

After Ed Richards announced in October 2014 that he would step down as Ofcom Chief Executive at the end of the year, the hunt for his successor was on and in late December 2014, the Ofcom Board announced the appointment of Sharon White as Chief Executive.

Steve Unger, Ofcom’s Strategy head, is acting as interim chief executive until Ms … Continue Reading

Posted in Copyright, Policy & Regulation Penny Thornton

New UK licensing scheme for use of orphan works

On 29 October 2014 the UK government released its orphan works licensing scheme (the “Scheme”). An “orphan work” is a copyright work or performance for which one or more of the right holders is either unknown or cannot be found after a diligent search.

Under the Scheme any person wishing to use an orphan work for commercial or non-commercial purposes … Continue Reading

Posted in Policy & Regulation Mark Taylor

Survey Exposes Gaps in UK Companies’ Readiness for Cyber Threats

A recent survey from the UK Government’s Department for Business, Innovation & Skills has highlighted that the majority of FTSE 350 firms are not regularly taking cyber risks into account in their decision making. Despite a growing international trend in cyber crime targeted at businesses, the survey showed that only 14 percent of FTSE 350 companies regularly consider cyber threats, … Continue Reading