Blog: Legal Requirements

Page 14

What Can Happen if You Violate Privacy Laws

Failing to respect your customers' privacy can result in reputational harm, loss of personal information, and wasted resources. Increasingly, it can also put you in violation of the law, and lead to large fines and legal claims. No matter where your business operates, there is almost certainly at least one privacy...

Computer Misuse Act 1990

The Computer Misuse Act 1990 is the UK's legal defense against hacking, allowing the state to prosecute those who use or access computers for malicious purposes. Understanding this law is a key way for businesses with UK operations to keep cybercriminals out of their systems. This article will break down what this...

User-Generated Content on Social Media: Avoiding Legal Issues

Companies are increasingly turning to User-Generated Content (UGC) in order to boost their social media presence. Getting your customers to create content for your company can increase your reach and brand engagement. But this sort of campaign is fraught with legal pitfalls. Without due consideration of copyright and privacy issues, reposting or...

2-Factor Authentication for Payments in the EU

A new EU law will soon change how Payment Service Providers authenticate customers making payments online. The EU revised Payment Services Directive (PSD2) imposes strict verification requirements via a process called "Strong Customer Authentication" (SCA). The law aims to tackle online fraud, but some ecommerce businesses are concerned that it may lead...

FTC Requirements for Influencers

Influencers are advertisers. Instagram personalities promoting a local business can be regulated by the same laws as the world's largest companies. And the Federal Trade Commission (FTC) is not afraid to go after influencers, and even those with just a handful of followers. But the FTC isn't looking to catch influencers unaware....

IT Security Policy

As your company grows, it will handle increasing amounts of personal and sensitive information. As you bring on new staff and expand your operations, you'll acquire more and more devices, software, and network infrastructure. It's easy to lose track of your IT equipment, which can lead to data breaches and misuse...