The Spanish data protection agency reports on international transfers in the context of cloud...

The Spanish Data Protection Agency (AEPD) has released a report providing guidance on international transfers in the context of cloud computing. The report (0157/2012)...

No right to derogation

There has been a lot of talk about the extended rights of the new General Data Protection Regulation ("GDPR") for individuals and the possibility...

Building and operating the 5G Core Network

Cambridge Wireless' recent event on 5G core networks provided a fascinating insight into the challenges and opportunities presented by the adoption of 5G technology....

Political agreement reached on draft Regulation on geo-blocking – entry into force end of...

The European Commission has announced that the European Parliament, the Council and the Commission have reached a political agreement on restrictions on geo-blocking, with...

UK Government Policy and Funding for the Internet of Things

David Cameron's recent announcement that £45 million of public money will be made available to technology companies working in the Internet of Things (IoT)...

Legal considerations on the Internet of things: 2015 and beyond – part 6: Cybersecurity

Cybersecurity of IOT devices will be another central issue to address, and, as already mentioned by the Article 29 Working Party, security should be...

Legal considerations on the Internet of things: 2015 and beyond – Part 4: Standard...

Automatic connected systems will have to interact with each other, normally without any direct human involvement. This implies the use of automatic contracting systems...

There’s something very familiar about all this… Ben Hughes explores current and impending disruptive...

The technological developments depicted in Back to the Future Part II - the one in which Marty McFly and Doc Brown travel forward from...

Cloud computing and privacy series: security requirements and guidance (part 3 of 6)

The issues related to confidentiality and security play an important role in data protection. This is even more so when considering an information technology...

Should we be building online prior restraint machines?

We are living in an age in which there is intense pressure from every direction to make online intermediaries – or at least the...