Essential contacts

The security arena is like every other aspect of the IT industry, suppliers and special interest groups come and go. However,...

The security arena is like every other aspect of the IT industry, suppliers and special interest groups come and go. However, where security differs is that there are essential sources of information that anyone who has responsibility for security must have in their address books. Here Karl Cushing lists those must-have details

Legislative material and government reports

Data Protection Act

Human Rights Act

Regulation of Investigatory Powers Act

Computer Misuse Act


Government contacts and organisations

Legal specialists with technology/computer crime expertise
  • - law firm DLA has a dedicated technology, media and communications group

  • - law firm Herbert Smith has a separate group dealing with IT and e-commerce matters. E-mail:, tel: Mark Turner on 020-7466 3602

  • - law firm Mishcon De Reya deals with IT-related crime and fraud

  • Philipson, Crawford and Berwold - Steven Philipson heads up the department that deals with most computer-related areas. Tel: 020-7831 2691

  • - Web site of the Law Society, the representative and regulatory body for solicitors of England and Wales. E-mail:, tel: 020-7242 1222

Computer crime investigators

Courses and resources


  • - European arm of the Storage Networking Industry Association. The site includes sections on data protection and has links to case studies and white papers on topics such as standards

  • - the European affiliate of the Fibre Channel Industry Association promotes fibre channel technology. The site includes white papers and other useful advice and resources on effective storage strategies


Hacker sites

Viruses etc
This was first published in May 2002



Enjoy the benefits of CW+ membership, learn more and join.

Read more on IT risk management



Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:




  • Dissecting the Hack

    In this excerpt from chapter three of Dissecting the Hack: The V3RB0TEN Network, authors Jayson E. Street, Kristin Sims and Brian...

  • Digital Identity Management

    In this excerpt of Digital Identity Management, authors Maryline Laurent and Samia Bousefrane discuss principles of biometrics ...

  • Becoming a Global Chief Security Executive Officer

    In this excerpt of Becoming a Global Chief Security Executive Officer: A How to Guide for Next Generation Security Leaders, ...