Firm: All
Practice Industry: Agriculture, Corporate & Business, Technology
Region: All
Country/ State: All
Tag: All
ENS | March 2018

A key feature of ENSafrica’s fourth annual anti-bribery and corruption (“ABC”) survey was understanding whether organisations were familiar with the new ISO 37001 anti-bribery management standard (“ABMS”). The International Organization for Standardisation released the ABMS in October 2016 ...

ENS | March 2018

We have previously reported on the amendments to the Harare Protocol that came into effect on 1 January 2017. One of these changes was that a mandatory request for search and examination must be made to the African Regional Intellectual Property Organization’s (“ARIPO’s”) office within three-years of the ARIPO filing date, along with payment of search and examination fees ...

ENS | March 2018

By its own very high standards, Real Madrid is not having the greatest of soccer seasons, although it has, at least, triumphed in a recent domain name case.The decision in the case of Real Madrid Club de Futbol v Jose Delfim Mendosa de Vasconelos was handed down by panelist Eduardo Machado on 24 January 2018. The issue in the case was straightforward: an individual in Brazil registered the domain name www.realmadrid.com.br ...

ENS | March 2018

Taylor Swift has been in the IP spotlight again and, as always, there are valuable lessons to be learned. The singer was recently sued in a US court for copyright infringement ...

ENS | March 2018

The issue of offensive trade marks rumbles on.In 2017, the landmark US decision in Matal v Tam came after the founder of an Asian-American rock group sought trade mark registration for the band’s name, The Slants. The US Patent and Trademark Office (the “USPTO”) refused the application on the basis that the trade mark was offensive ...

Haynes and Boone, LLP | March 2018

On February 21, 2018, the Securities and Exchange Commission (the “SEC”) issued interpretive guidance to assist public companies in preparing disclosures concerning cybersecurity risks and incidents ...

Hanson Bridgett LLP | March 2018

On January 8, 2018, the California Court of Appeal for Division 4 of the First Appellate District issued a decision in Alameda County Deputy Sheriff’s Association v. Alameda County Employees’ Retirement Association (“Alameda”). The outcome in Alameda results in conflicting decisions in California appellate courts on the appropriate “vested rights” analysis where pension rights are being reduced or eliminated for existing employees ...

O'Neal Webster | February 2018

Best-known for its stunning natural beauty—jewel-colored waters, soft sandy beaches, and lush mountain ridges—the British Virgin Islands also excels among her peers in the international financial services industry. Notably, the Territory is relentless in its pursuit of refining and advancing its financial services legal structures and complying with worldwide regulatory regimes ...

Dinsmore & Shohl LLP | February 2018

U.S. technology company Cogint, Inc. (NASDAQ: COGT) announced the termination of its proposed business combination with BlueFocus International Limited after the Committee on Foreign Investment in the United States  indicated the committee’s unwillingness to approve the transaction ...

Haynes and Boone, LLP | February 2018

Yesterday, the U.S. Supreme Court significantly narrowed the scope of the Dodd-Frank Act's anti-retaliation measures. The decision resolved a split in authority by excluding from Dodd-Frank's whistleblower protections those persons reporting suspected violations only within their companies. In reversing the Ninth Circuit, the Court held that "Dodd-Frank's anti-retaliation provision does not extend to an individual who has not reported a violation of the securities laws to the SEC ...

Afridi & Angell | February 2018

UAE Federal Law 20 of 2016 (Regarding the pledge of moveables as a security for debts) (the Pledge Law) introduced a new regime for registering a pledge over moveable assets which are pledged as security for the repayment of a debt. We reported on this law in our inBrief of January 2017, New UAE Pledge Law Over Moveable Assets. The actual registration of pledges was subject to establishment of a security register pursuant to the implementing regulations issued under the Pledge Law ...

The CPA appointed the National Bureau of Investigation (NBI) and Philippine National Police (PNP) as enforcement authorities and regulates their access to computer data, creating the Cybercrime Investigation and Coordinating Center (CICC) as an inter-agency body for policy coordination and enforcement of the national cybersecurity plan, and an Office of Cybercrime within the Department of Justice (DOJ-OC) for international mutual assistance and extradition ...

Szecskay Attorneys at Law | February 2018

The GDPR contains rules on when it is mandatory for controllers and processors to designate a data protection officer. The Article 29 Data Protection Working Party (WP29) issued guidelines on the data protection officers (DPOs) interpreting the respective provisions of the GDPR (Articles 37-39 and Recitals 77 and 97). The Data Protection Officer (DPO) The GDPR contains rules on when it is mandatory for controllers and processors to designate a data protection officer ...

ENS | February 2018

Every now and then, a dispute comes along that adds an extraordinary amount to the law. One such dispute is the Clearvu trade mark case.We have reported on the case of Cochrane Steel Products (Pty) Ltd v M-Systems Group (Pty) Ltd on a number of occasions. This was the case in which a South African court had to consider whether or not it is unlawful for a company to bid on the trade mark of a competitor as a keyword/search term ...

ENS | February 2018

In South Africa, the song Akanamali, sung by the artist Sun-El Musician and featuring Samthing Soweto, was one of the most popular songs of 2017. Towards the end of the year, South African financial services giant First National Bank (“FNB”) ran a campaign to promote its products and services. It called this campaign Akanamali and featured the hook of the song, which was about a lack of money ...

ENS | February 2018

A South African judgment dealing with joint ownership of copyright in databases has recently come to light. The judgment was handed down almost a year ago, but it seems to have slipped under the radar. This judgment will, however, be of interest to those involved in IP.The case is The Philanthropic Collection (Pty) Ltd v Girls & Boys South Africa ...

ENS | February 2018

It’s interesting how often trade marks and politics intersect, especially in South Africa!In the most recent example, the issue was whether a political party that had broken away from the ruling African National Congress (“ANC”) – the African Democratic Change – had infringed the rights of the ruling party. As is commonly known, the logo of the ANC features the colours black, green and gold, as well as an image of a hand grasping a spear ...

ENS | February 2018

  The question of when the South African Protection of Personal Information Act, 2013 (“POPI”) will come into force has been asked many times since the Bill was signed into law by the president on 19 November 2013 ...

COBALT | February 2018

Since not only individual people, but also the overall project, are being present­ed, online presentation can be divided into two main parts. First is the management of personal social media. Avoid any dis­respectful or offensive discourse, as well as any ambiguous posts and photos. Or as a minimum , do not display them publicly. Secondly, visual communication is ab­solutely crucial to protect the name of a reliable project ...

TSMP Law Corporation | February 2018

Technology’s dark side may well be the silent threat to democracy. A year ago, Americans installed a reality TV star in the White House who doesn’t seem to let the facts get in the way of a good tweet. Trump’s shambolic management style has given America’s enemies a perceived opportunity to drive their country’s agendas ...

Dinsmore & Shohl LLP | February 2018

As technology has advanced, cyber extortion attacks have risen, and they will continue to be a major security issue for organizations. Cyber extortion can take many forms, but it typically involves cybercriminals demanding money to stop or delay their malicious activities, which include stealing sensitive data or disrupting computer services. Health care and public health sector organizations that maintain sensitive data are often targets for cyber extortion attacks ...

Dinsmore & Shohl LLP | February 2018

As seen in Property Casualty 360: 1.  Policies & procedures   The methods employees utilize to steal from their employers are fairly common. Some examples include falsifying expenses, inflating expenses, double billing expenses, misusing petty cash accounts, using the company credit card for personal expenses, routing money to fictitious vendors, fabricating invoices, and putting friends and family on the payroll ...

Haynes and Boone, LLP | February 2018

Increase in HSR Thresholds.The jurisdictional thresholds for premerger notification filings under the Hart-Scott-Rodino Antitrust Improvements Act of 1976 (HSR Act) will increase February 28, 2018 and will apply to any transaction closing on or after that date. The revised thresholds will remain in effect until the next annual adjustment, expected in the first quarter of 2019. “Size of Transaction” Threshold ...

ENS | February 2018

In an effort for the South African government to assess the state of transformation of publicly listed companies, the Broad-Based Black Economic Empowerment Act, 2003 (the “B-BBEE Act”), read together with the B-BBEE Regulations, requires that all companies listed on the Johannesburg Stock Exchange (“JSE”) report to the B-BBEE Commission annually on their compliance with broad-based black economic empowerment (“B-BBEE”) ...

dots