Legal considerations on the Internet of things: 2015 and beyond – Part 3: Regulatory...

IOT was made possible with the introduction of the IPV6 Internet Protocol, which allowed millions of new objects to connect to the internet using...

Legal considerations on the Internet of things: 2015 and beyond – Part 2: Data...

The Article 29 Data Protection Working Party recently issued an Opinion (8/2014) in which they started to address some of the privacy related aspects...

Legal considerations on the Internet of things: 2015 and beyond – Part 1

We're currently witnessing a new technological evolution, one that will change the way in which we perceive and relate to the world around us....

The internet of things: seminar highlights

On Wednesday April 23 international law firm Bird & Bird hosted over 200 representatives from a wide range of private and public sector entities...

UK Government Policy and Funding for the Internet of Things

David Cameron's recent announcement that £45 million of public money will be made available to technology companies working in the Internet of Things (IoT)...

Cybersecurity and the EU: regulating for network security

With cyber security becoming an increasingly high profile issue, the European Commission has published proposals that it hopes will improve the EU's network resilience....

European Cybersecurity Directive moves closer to becoming a reality

The European Union's draft directive regarding network and information security ("the Directive") took one step closer to becoming law on 23 January 2014, when...

MEPs vote strongly in favour of the proposed European Cybersecurity Directive

  The European Parliament today voted to approve the draft Network and Information Security Directive (known colloquially as the Cybersecurity Directive), which contains new rules...

Data Protection, Privacy and Cybersecurity in the Internet of Things

Privacy Context ‘Pretty soon, even your trousers will have their own Twitter account,’ wrote Paul Ford in Hemispheres magazine. Devices communicating Machine to Machine (M2M)...

Cybersecurity and the food supply chain

Cybersecurity is an increasingly important issue for many in the food and beverage sector as the growing reliance on information systems for business critical...

Cybersecurity concerns in food and beverage organisations: Interview with Chia Ling Koh

Cybersecurity breaches against retail companies have been heavily discussed in the last year. The food and beverage industry is very similar to retail, using...

Digital Single Market: Sample post

This is an article about how the Digital Single Market came to be.

Internet of Things: Sample post 2

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Integer sagittis bibendum tortor eget elementum. Fusce ultricies eros aliquam massa iaculis, vel suscipit tellus egestas....

Cloud Computing: sample article 1

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Integer sagittis bibendum tortor eget elementum. Fusce ultricies eros aliquam massa iaculis, vel suscipit tellus egestas....

Bird & Bird launches new and improved Cloud Computing App

Bird & Bird launched the third version of its Cloud Computing app today, which allows suppliers and users of cloud services to easily determine...

Cloud computing and privacy series: legal issues related to sensitive (health) data (part 6...

This sixth and final article of our cloud computing and privacy series (links to our previous articles below) discusses the legal issues related to...