On February 26, 2013, the National Institute of Standards and Technology ("NIST") issued a Request for Information ("RFI") to gather comments regarding the development of a framework to reduce cybersecurity risks to critical infrastructure. As we previously reported, the Obama Administration’s executive order, Improving Critical Infrastructure Cybersecurity (the "Executive Order"), released on February 12, 2013, directs NIST to coordinate development of this framework ...
It’s well known that computer programs enjoy copyright protection - many have also been patented, but that’s another story and I’m not going to deal with that here. The South African Copyright Act has protected computer programs as a specific category of works since 1992, although prior to that they were protected as ‘literary works’ ...
Data Privacy Act of 2012 The Data Privacy Act (Republic Act No. 10173) seeks to protect the confidentiality of “personal information.” The latter is defined as “any information whether recorded in material form or not, from which the identity of an individual is apparent or can be reasonably and directly ascertained by the entity holding the information, or when put together with other information would directly and certainly identify an individual ...
What it’s aboutThe Data Privacy Act (Republic Act No. 10173) seeks to protect the confidentiality of “personal information.” The latter is defined as “any information whether recorded in material form or not, from which the identity of an individual is apparent or can be reasonably and directly ascertained by the entity holding the information, or when put together with other information would directly and certainly identify an individual ...
What it’s aboutThe Cybercrime Prevention Act (Republic Act No. 10175) penalizes “cybercrimes”— acts that fall into any of these major categories:a) offenses against the confidentiality, integrity and availability of computer data and systems (e.g., illegal access, data interference);b) computer-related offenses (e.g., computer-related forgery and fraud);c) content-related offenses (e.g ...
The Philippine Supreme Court has issued a decision that may have a significant impact on how local nationality requirements (i.e., constitutional and statutory provisions requiring minimum Filipino ownership in certain industries) must be construed and applied. Enterprises such as telecommunications, media, advertising and land ownership are subject to such nationality requirements.The case of Gamboa v. Teves, et al. (G.R. No ...
After lengthy discussions among regulators and politicians on ownership of commercial banks, Bank Indonesia issued its Regulation No. 14/8/PBI/2012 regarding Ownership of Shares in Commercial Banks (“BI Regulation No. 14”) which came into effect on 13 July 2012.In general, BI Regulation No. 14 provides rules that restrict ownership of commercial banks by individuals or corporations either on an individual or joint basis. BI Regulation No ...
The Government finally issued Government Regulation No. 82 of 2012 9regarding the Implementation of Electronic Systems and Electronic Transactions (“Regulation 82”) for Law No. 11 of 2008 regarding Electronic Information and Electronic Transactions (“Law No.11”). Regulation 82 sets out significant requirements in relation to electronic registration/certification, electronic systems, electronic transactions, electronics agents, electronic signatures and domain names ...
A client asks, "Can I say ‘Made in USA’ for my product if it has some imported content"? While the question seems simple enough, the proper response requires the advisor to inquire into the reason for the question and the company’s specific objective. Depending on the client’s response and the pertinent facts, the resulting analysis and legal conclusion may differ considerably. If the company wants to assert a "Made in USA" or other U.S ...
On November 16, 2012, European Data Protection Supervisor Peter Hustinx published an Opinion on the European Commission’s Communication on cloud computing (part of the Commission’s broader cloud computing strategy) ...
According to a recent article by Shoosmiths, the cloud software market generated $22 billion in revenue in 2011, and expects growth to $67.3 billion by 2016 Alongside the benefit of cloud computing, however, lies a lack of transparency for cloud customers, causing legitimate concerns about how they can comply with the Data Protection Act 1998 (DPA) ...
What's all this about penguins, pandas and search engine optimisation? Optimising websites to rank highly in Google search results is a lucrative industry. For years, businesses have employed search engine optimisation (SEO) providers to boost rankings ...
On November 10, 2012, the German working group on technical and organizational data protection matters published guidelines (in German) on the technical and organizational separation requirements for automated data processing on shared IT systems (the “Guidelines”). The working group is part of the Conference of the German Data Protection Commissioners, which recently concluded its 84th Conference in Frankfurt (Oder) ...
On October 30, 2012, the U.S. District Court for the Southern District of California ruled that an opt-out confirmation text sent by Citibank (South Dakota), N.A. (“Citibank”) did not violate the Telephone Consumer Protection Act (“TCPA”). Under a “common sense” interpretation, the court determined that Citibank’s opt-out text does not demonstrate the type of invasion of privacy the TCPA seeks to prevent ...
Burma’s Union Parliament has finally passed a much awaited foreign investment law, which has now been signed into law by President Thein Sein (the “MFI Law”) and published in local newspapers on November 3, 2012. The review of the MFI Law by parliament has drawn to the fore a number of issues in particular in respect of the share in a venture that can be held by foreigners ...
On 14 August 2012, the Minister of Industry of the Republic of Indonesia issued Ministerial Regulation Number 81/M-IND/PER/8/2012 of 2012 on The Registration of Cellular Phones and Handheld Computers (“Regulation 81/2012”) ...
Importers are likely to welcome the Minister of Trade’s (MOT) latest move in the import license saga which commenced with a Supreme Court decision of June 2011 striking down MOT Regulation No. 39 of 2010 regarding the import of finished goods by producers. Following the issuance of MOT Regulation 27/2012 (“Reg 27”), and in response to the several concerns which ensued, the MOT recently issued MOT Regulation No. 59/2012 (“Reg 59”) ...
On 24 August 2012, the Minister of Trade (“MOT”) issued Regulation No. 53/M-DAG/PER/8/2012 on Organizing a Franchise Business (“Regulation 53”). Regulation 53 revokes Regulation No. 31/M-DAG/PER/2008 (“Regulation 31”). Direct or Indirect control of Franchise Regulation 53 prohibits franchisors to appoint franchisees with which they have a direct or indirect control relationship ...
Traditionally investors have looked towards developed countries for investment opportunities and, more often than not, investment decisions have been based on the economic development and growth of such countries. However, recently investment strategies have shifted towards emerging markets rather than established markets and for this reason an ever increasing number of investors are turning their attention to the African market ...
The law holds trustees, like any other fiduciary, to a particularly stringent standard of care. As the famed Judge Benjamin Cardozo wrote in 1928, “A trustee is held to something stricter than the morals of the market place. Not honestly alone, but the punctilio of an honor the most sensitive . . ...
The much anticipated Trade Marks Bill (“the Bill”) was recently circulated to the industry for comments. The Bill, which when enacted will be known as the Trade Marks Act, 2012, promises to introduce much needed change to the trademark industry in the British Virgin Islands and place the jurisdiction in line with other modern jurisdictions ...
Long gone are the days when discussions about customs and foreign trade in Mexico was always in reference to opening borders and policies to promote the development of local industries in a global economy. Today we find that the focus is more on new topics concerning security of the supply chain and compliance with customs regulations, as the key elements that determine the success of a business ...
This article will discuss a type of international audit intended on verifying compliance with international trade rules that indicate when a good is made in a specific country or region. These rules are called “Rules of Origin” and the type of audit is generally called “Origin Verification” ...
Few may rebate that internet, is majorly responsible for most of the mayor changes in the past fifteen years in fields such as science, communications, technology, commerce amongst other being necessary to adapt the legal system regulating it. Honduras has not been the exception in this modernization process regardless of the civil code nature of its legal system which is not as adaptable as common law systems are ...