Compliance, Ethics & Sustainability

An international journal with a European focus

2025 nr. 3

Redactie

Hoofdredactie

prof. mr. dr. B. Snijder-Kuipers

Redactie

Sam Curtis
Emmeline van Heukelem
Arend Koper
Paulien Makkinga
Edward Nkune
Peter-Jan Engelen
Linda Schut
Claudia Sijstermans LLM
Marlon Straathof
Pauline Wijma

Vaste medewerkers

Edgar D. Karssing

Redactiesecretaris(sen)

Frank T.G.J. Segers
M. Streppel

 

Inleiding

Editorial

Edward Nkune, Pauline Wijma and Birgit Snijder-Kuipers

Privacy, Data Protection and Cyber security will most likely be points, high on the agenda for most Risk Committee meetings. These are the themes for this, the third edition of the Compliance, Ethics and sustainability Journal for 2025.   In their article "Apple Inc v Secretary of State for the Home Department", Julian Hayes, Megan Curzon and Jenna Gayle examine the legal stand-off between the international tech giant Apple and the UK Home Secretary. Apple is challenging the Home Secretary's... ...lees meer

Artikel

Apple Inc v Secretary of State for the Home Department: the latest iteration ...

Julian Hayes, Megan Curzon and Jenna Gayle1

The precise subject matter of the legal stand-off between international tech giant Apple and the UK Home Secretary, currently before the Investigatory Powers Tribunal (``IPT") in London, is unknown. Apple is forbidden from disclosing it, the Home Secretary refuses to disclose it and, when hearing cases, the IPT itself must ensure information is not disclosed which could jeopardise national security, the prevention or detection of serious crime, the UK's economic well-being or the ongoing work of the intelligence services. From a media leak in February and a preliminary IPT ruling in Apri... abonneren of dit artikel kopen.

Navigating a new era of reporting cyber incidents in the UK and EU

Kelly Hagedorn, Alice Portnoy and Hanna Hewitt1

Cyber security continues to be an issue that gathers mainstream attention, and for good reason. Both the costs of, and length of time to recover from, a cyber incident are increasing. According to IBM's 2024 'Cost of a Data Breach' report, the average cost of a data breach in 2024 has risen to $4.88 million.[2] For some incidents (particularly those involving stolen or compromised credentials), the recovery period was recorded as being as long as 292 days.  The increasing prevalence of cyber-attacks, and the disruption they can cause, has led to governments globally introducing ne... abonneren of dit artikel kopen.

Public Data, Private Risks

Carys Whomsley1

How LLMs Might Reshape Compliance Investigations Since the explosion in use of generative AI tools in 2023, and more specifically, in the use of chatbots powered by Large Language Models ("LLMs"), corporate investigators and intelligence specialists have been testing their potential application in open-source investigations. This has given rise to questions surrounding the utility of these tools, particularly in retrieving public information which would otherwise be difficult to access, as well as questions surrounding the privacy implications of their use in the context ... abonneren of dit artikel kopen.

Privacy vs. Whistleblowing: Can Data Breaches Be Justified During Public Disc...

Anastasia Avramenko1

Whistleblowing has recently been at the forefront of the public consciousness increasingly often. Wikileaks, Theranos, and Cambridge Analytics have become household names due to the efforts of internal whistleblowers. However, the history of whistleblowing stretches thousands of years into the past. Its first recorded instances occurred in Ancient Greece, where it was referred to as parrhesia, meaning "speak freely". Although it was not formally codified, parrhesia was extremely valued and considered a cornerstone of democratic society.[2] Today, the role of whistleblow... abonneren of dit artikel kopen.

Europe’s Health Data Shift: Regulation, Anonymisation, and Security

Tanya Chib, Renate van Kempen and Anna Hakkers1

The 2021 ransomware attack on Ireland's Health Service Executive[2], where attackers threatened to publish patient data, presaged a new era of healthcare vulnerability. As Europe implements ambitious data-sharing frameworks in 2025, this incident reminds us of the central challenge facing modern healthcare: how do we make data useful without making it dangerous? To understand this fundamental tension, we examine it through three interconnected lenses that together form what we call the `Privacy-Security-Utility Triangle', or the `Golden Triangle':   abonneren of dit artikel kopen.

Uit de boekenkast van de bedrijfsethiek (94)

prof. dr. E. Karssing1

In de bedrijfsethiek is een groot aantal boeken en artikelen verschenen waarin op praktische wijze prangende vraagstukken worden behandeld en concrete aanbevelingen worden gedaan voor het bevorderen van de ethiek en integriteit van organisaties en hun medewerkers. Niet iedereen weet deze publicaties te vinden of heeft tijd ze te lezen. Daarom kijkt Edgar Karssing geregeld voor het Compliance, Ethics & Sustainability Journal in de boekenkast van de bedrijfsethiek en bespreekt hij een artikel of boek. Deze bijdragen zijn geen recensies, maar een samenvatting v... abonneren of dit artikel kopen.

Deel deze pagina:

Vorige edities

RSS