log in
Submit an Article | Back

Member Articles

Technology - all

 

Sort By Title  |  Sort By Date

Consent for the Use of Cookies
Heuking Kühn Lüer Wojtek, April 2019

Even before the General Data Protection Regulation (GDPR) came into force, there were discussions as to whether the use of tracking cookies, which make it possible to analyze the usage and browsing behavior of a user on the Internet and use it for interest-based advertising, requires prior consent (opt-in) of the user or whether a dissent solution (opt-out) is sufficient. The German data protection authorities are of the opinion that users must give their consent...

Hitachi Zosen Inova AG Ltd v John Sisk + Son Ltd – The Same Disputes, But Different?
Shepherd and Wedderburn LLP, March 2019

In a recent decision by the Technology and Construction Court (TCC), Judge Stewart-Smith has clarified the position when determining whether two adjudications are “the same or substantially the same” when a party challenges jurisdiction under Para 9(2) of the Scheme for Construction Contracts. He stated that thedecisionreached in the first adjudication must be considered as well as the disputesreferredto adjudication in each...

Private Use of Company Email Accounts by Employees
Heuking Kühn Lüer Wojtek, March 2019

On 13 March 2019, the State Commissioner for Data Protection and Freedom of Information in Baden-Württemberg (LfDI BaWü) published the latest version of his guidebook on employee data protection. In this brochure, the LfDI BaWü offers an insight into his work and explains his opinion regarding the various points of view surrounding employee data protection...

Cloud Outsource Directive and Guidance Note Issued by the South African Reserve Bank
ENSafrica, March 2019

  Cloud computing and offshoring of data is no longer a taboo among banks. It is becoming a necessity and is the current definitive trend. However, the South African Reserve Bank (“SARB”) has issued a directive and guidance note detailing items banks must consider when electing to adopt cloud computing as a service or any offshoring of data...

Cybercrime Legislation on South Africa's Horizon: Is Your Organisation Ready?
ENSafrica, March 2019

The implementation of cybercrime legislation is a pressing issue given that South Africa has one of the highest numbers of cybercrime victims in the world. In addition, a number of unsuspecting individuals and organisations alike fell prey to the scourge of cyber scams which seemed to spike quite rapidly in the past year. The Cybercrime Bill was adopted by the Portfolio Committee for Justice and Correctional Services in November 2018 and sent to the National Assembly for debate...

Eavesdropping: The Privacy Myth
ENSafrica, March 2019

The pervasiveness of the Internet of Things has spawned a recent fear that the devices are listening to the conversations of their users. For instance, the My Friend Cayla doll talks to children and answers their questions by connecting to the internet and using a combination of voice recognition software and Google searches to provide these responses...

Expanding your Data Governance Policies to Accommodate Drone Data
ENSafrica, March 2019

  Gone are the days when a helicopter had to be hired to secure fantastic shots of a neighbourhood or local stadium in anticipation of a major public or private event. Drones have ushered in a new kind of photography and can be used in many instances and applications even in traditional industries like agriculture or last mile logistics. One of the primary functions of using drones is to capture, store and transmit data...

Peek-a-Boo, I See You: Privacy Concerns Around Digital Rights Management and Monitoring Tools
ENSafrica, March 2019

  Digital rights management (“DRM”) refers to the methods used by content owners to protect their digital content. A number of methods can be used to control and restrict access and usage of digital material. Popular DRM mechanisms include password protecting a digital file/content, as well as platform DRM, which is typically deployed by online streaming platforms and electronic databases to restrict access to content that users are required to pay for...

The Importance of Having a Social Media Manager
ENSafrica, March 2019

  It is no surprise that in this digital age, social media is more than a platform to connect with old school friends, share experiences or watch funny videos. Businesses have realised the value in leveraging social media platforms so as to directly connect with and market themselves and their businesses to existing and potential customers. Social media platforms allow businesses to increase their brand awareness and entrench themselves with their clients and secure their loyalty...

All Stop: Ruling on the Applicability of Exclusion to BIPA Claims Delayed
Dykema, March 2019

The fallout from the Illinois Supreme Court’s January 25, 2019, opinion in Rosenbach v. Six Flags Entertainment Corp., 19 IL 12316, continues.Rosenbach settled the dispute of who qualifies as an “aggrieved person” under the Illinois Biometric Information Privacy Act (“BIPA”), and in doing so opened the floodgates for this litigation to proliferate...

Biometrics and Search Warrants: The Intersection of Your iPhone and the Fourth and Fifth Amendments
Dykema, March 2019

On January 19, 2019, federal Magistrate Judge Kandis Westmore of the Northern District of California denied the Government’s application for a search warrant that sought: “all digital devices” present at a California residence; (Order at 3), and “any individual present at the time of the search to press a finger (including thumb) or utilize other biometric features…for the purposes of unlocking the digital devices found in order to permit a search of

Big Data Bad Brother
TSMP Law Corporation, March 2019

Corporations and governments are ferreting out and squirreling away voluminous, detailed and private information about each and every one of us – and they are not afraid to use it. Should we be worried? Singapore’s Health Minister recently revealed that confidential details of 14,200 HIV-positive people, stolen from a government public health database, had been leaked online by a disgruntled US citizen who had been in a romantic relationship with a local doctor...

Ohio Enacts New Cybersecurity Requirements for Insurers
Dinsmore & Shohl LLP, February 2019

Senate Bill 273 goes into effect on March 20, 2019, and creates new requirements for Ohio insurance companies, including health insurance plans, to develop and implement specific information security programs to safeguard nonpublic business and personal information. Senate Bill 273 is based upon the National Association of Insurance Commissioners’ Insurance Data Security Model Law (also referred to as "MDL-668")...

JP Morgan Goes Crypto, Argo Blockchain Exits
World Services Group, February 2019

When a scion of the investment banking world gets into crypto it is probably worth taking notice. JP Morgan Chase, America's largest bank, has just grabbed everyone's attention with the launch of its very own cryptocurrency, the JPM Coin. JP Morgan intends the internally developed crypto asset to be used in its wholesale payment system, which currently sees daily volumes in the region of $6 trillion...

Regulation of Cryptoassets: Stifling Innovation or a Catalyst for Growth?
Shepherd and Wedderburn LLP, February 2019

The Financial Conduct Authority (FCA) recently launched a consultation on its proposed guidance on cryptoassets (CP19/3) which can be read in fullhere. The move comes as part of the UK Cryptoasset Taskforce's wider look into the regulation of the cryptoasset market. The consultation follows a report published in October 2018 by the Taskforce, which consists of the Bank of England, HM Treasury and the FCA. Our discussion of that report can be readhere...

Facebook - Bundeskartellamt [German Federal Cartel Office] Prohibits the Processing of User Data from Third Party Sources
Heuking Kühn Lüer Wojtek, February 2019

In its decision from February 7, 2019, the Bundeskartellamt prohibited Facebook from the further processing of user data which it has generated from so-called third party sources. In order to make use of these personal data in future, Facebook will need the consent of the data subject as defined by the General Data Protection Regulation (GDPR). It remains to be seen whether this will be granted by the majority of users. 1...

First Fines Issued by Supervisory Authorities for Infringements Against the GDPR
Heuking Kühn Lüer Wojtek, February 2019

The General Data Protection Regulation (GDPR) provides for a significant increase of the maximum possible fine for legal infringements compared to previous data protection legislation. Fines of up to 20 million euros or 4 percent of the worldwide annual turnover, whichever is higher, can be imposed (Art. 83 para. 5 GDPR). Yet, the first few months after the introduction of the GDPR in May 2018 were uneventful in this regard. That is now changing, however...

HHS and HSSC Release New Cybersecurity Practices for the Health Care Industry
Dinsmore & Shohl LLP, January 2019

On December 28, 2018, the Department of Health and Human Services (HHS), in partnership with the Health Sector Coordinating Council (HSSC), published the “Health Industry Cybersecurity Practices: Managing Threats and Protecting Patients” (HICP Publication), which is a four-volume publication designed to provide voluntary cybersecurity practices to health care organizations of all types and sizes, ranging from local clinics to large health care systems...

GDPR Breach: Google Fined EUR 50 Million
Karanovic & Partners, January 2019

The US tech giant, Google is fined EUR 50 million by France's data protection regulator, CNIL, for failing to comply with its General Data Protection Regulation (GDPR) obligations. This is the biggest GDPR fine yet to be issued by a European regulator and the first time that one of the tech giants has been found in breach with the new regulations that came into force in May 2017...

"Right to be Forgotten" - Search Engine Operators Must Comply with Requests to Delete Links to Personal Data
Heuking Kühn Lüer Wojtek, January 2019

The use of the Internet without the use of search engines, which list links to Internet pages after keywords have been entered, is almost unthinkable. In the context of the search results, however, websites may appear that contain personal data and thus fall within the scope of the GDPR...

Google Fined $57 Million in First Major Enforcement of GDPR Against a US-based Company
Dinsmore & Shohl LLP, January 2019

On January 21, 2019, Google was fined nearly $57 million (approximately 50 million euros) by France’s Data Protection Authority, CNIL, for an alleged violation of the General Data Protection Regulation (GDPR).[1] CNIL found Google violated the GDPR based on a lack of transparency, inadequate information, and lack of valid consent regarding ad personalization. This fine is the largest imposed under the GDPR since it went into effect in May 2018 and the first to be imposed on a U.S...

Rejection of the Brexit Withdrawal Agreement: What do Companies Have to Consider Now?
Heuking Kühn Lüer Wojtek, January 2019

The Brexit Withdrawal Agreement negotiated between the European Union and the United Kingdom envisaged that during the United Kingdom's transitional period data protection legislation would have been treated in the same way as with the countries of the European Economic Area. This would have allowed a transfer of personal data from the European Union to the United Kingdom without additional measures to ensure adequate levels of data protection...

McDonald's: No Longer the Big Cheese after Losing Big Mac Trade Mark Battle with Supermac's
Shepherd and Wedderburn LLP, January 2019

In a landmark decision, the European Union Intellectual Property Office (‘EUIPO’) has ruled that McDonald’s, one of the world’s largest fast food chains, will lose its EU trade mark for “Big Mac”...

Joint Controllership in the Integration of Third-Party Website Plug-Ins - Concluding Opinion of the Advocate General to the ECJ on The "Facebook Like" Button
Heuking Kühn Lüer Wojtek, January 2019

The Court of Justice of the European Union (ECJ) must currently clarify whether and how website operators can legally integrate the so-called "Like" button of Facebook on their website (Case C-40/17). A German online retailer had integrated the "Facebook Like" button into their online shop. Due to the functionality of the "Facebook Like" button, personal information was transmitted to Facebook Ireland each time the website was visited, including the IP address...

Data Protection in the Application Process
Heuking Kühn Lüer Wojtek, January 2019

Under its Article 88(1), the GDPR allows Member States to draw up their own rules for the area of employee data protection. Germany has taken advantage of this option with Section 26 of the Federal Data Protection Act (BDSG). The first sentence of Section 26(1) already applies while the decision to establish an employment relationship is made and hence it needs to be taken into account early in the application process...

 

 

WSG's members are independent firms and are not affiliated in the joint practice of professional services. Each member exercises its own individual judgments on all client matters.

HOME | SITE MAP | GLANCE | PRIVACY POLICY | DISCLAIMER |  © World Services Group, 2019