Coronavirus Act 2020 – how might this impact your business?

Phil McDonnell | Associate Partner | Law | PMcDonnell@uk.ey.com Chi Lam | Manager | Law | CLam2@uk.ey.com In a departure from our usual commercial and technology focused topics, we will be bringing you some ‘guest editors’ in the coming days/weeks as we all grapple with the diverse legal implications of the current COVID-19 pandemic. In … More Coronavirus Act 2020 – how might this impact your business?

Collaborate to protect: How changes to Competition Law are helping the supply chain

Phil McDonnell | Associate Partner | Law | PMcDonnell@uk.ey.com Background The Government has moved swiftly to ensure that suppliers can cooperate to protect the delivery of food and non-food essentials and health services without fear of breaching competition law.  It has done this by excluding, temporarily, the application of the Chapter 1 prohibition to certain … More Collaborate to protect: How changes to Competition Law are helping the supply chain

Geo-blocking: cross-border online provision of goods and services must comply with new EU rules – don’t get caught out

Atiq Bhagwan | Manager | EY Law | +44 2079 800 717 | atiq.bhagwan@uk.ey.com   Geo-blocking is the practice of blocking or limiting a customer’s access to aspects of a trader’s website on the basis of geographical factors. Geo-blocking is used by many online businesses as a key method to limit access to their goods … More Geo-blocking: cross-border online provision of goods and services must comply with new EU rules – don’t get caught out

NIS Regulations: Overlooked Cybersecurity Requirements

Cavan Fabris | Senior Manager | EY Law Cybersecurity Registration Deadline Looming The Network and Information Security Regulations 2018 (“NIS”) are now in force in the UK. NIS has been somewhat overlooked whilst most clients and their professional advisors were focussing on GDPR compliance. Upcoming NIS registration deadlines and compliance requirements provide us an opportunity … More NIS Regulations: Overlooked Cybersecurity Requirements