Firm: All
Practice Industry: Insurance, Technology
Region: All
Country/ State: All
Tag: All
Carey Olsen | April 2023

Contents Legal and Enforcement Framework Blockchain Market Cryptocurrencies Smart Contracts Data and Privacy Cybersecurity Intellectual Property Trends and Predictions Tips and Traps Legal and Enforcement Framework   What general regulatory regimes and issues should blockchain developers consider when building the governance framework for the operation of blockchain/distributed ledger technology protocols? As a matter of policy, Jersey has chosen not to regulate

World Services Group | February 2023

In this JD Supra exclusive, Raspé shares his predictions for 2023, his perspectives on global legal practice, and things to consider when choosing a global legal services network. Herman Raspé is the current Chair of World Services Group, a premier global multidisciplinary professional services network composed of independent law, accounting, and investment banking firms ...

ENSafrica | December 2013

We’ve written about the new Generic Top Level Domains (gTLDs) on more than one occasion.  This refers, of course, to the process whereby companies and organisations can register names – generic words, geographical names, brand names - as top level domain names. So, in the same way that there’s long been .com, .net and .info, you can now have .bank, .google and .capetown. Some 1900 applications have already been filed ...

Shoosmiths LLP | October 2023

It’s the final countdown, with only one year to go before EU member states must transpose the EU’s new Network and Information Security 2 Directive (“NIS 2”) into national law. Key Dates EU Member States have until 17 October 2024 to transpose NIS 2 into national law and those national laws will apply to organisations as early as 18 October 2024. Enforcement is likely to start from 17 January 2025, in line with parallel legislation affecting financial services ...

Shoosmiths LLP | January 2011

In the second of a two-part look at issues arising out of the tender process we consider what can happen when that process is poorly run. Part 1 of the series can be found at IT tendering: Leveraging the benefits. A typical tender process involves the customer analysing and documenting its requirements in a Request for Proposals (RFP) to which interested suppliers will prepare a response ...

Shoosmiths LLP | February 2009

While they are an integral part of most businesses - often with a primary function of delivering cost savings and efficiencies - they must be kept up-to-date to ensure they achieve those aims. So now is a good time to undertake an IT systems review, and look at consolidation and streamlining. Changes to business structures, acquisitions and a system's age are other triggers for an IT stock take ...

Shoosmiths LLP | February 2010

The verdict has finally arrived in the long-running IT dispute between EDS and BSkyB, for which the trial ended over a year ago. With legal fees of around £70m and an anticipated damages award of £200m (against a contract reportedly worth only £48m), the case will change the landscape of supplying IT products and services forever.  EDS supplied a customer relationship management system to BSkyB ...

Shoosmiths LLP | September 2010

IT projects: It’s a team game 28 September 2010 IT projects have a knack of over-running for significant periods, requiring ‘out-of-scope’ changes half way through, and consequently going over budget. Although any project will develop and evolve over time, such problems can be minimised through sensible project management methods. It is not uncommon for IT projects to last several months, if not years, from conception to completion ...

Walder Wyss Ltd. | January 2020

On 1 January 2020 the Swiss Financial Market Supervisory Authority (FINMA) implemented various revised rules primarily targeting small banks (the so-called 'small banks regime'). Among other aspects, this will result in a relaxation of IT outsourcing requirements for financial institutions. In this respect, a revised FINMA Outsourcing Circular is available in English and German, French ...

Shoosmiths LLP | March 2013

The collapse of systems integrator and reseller 2e2 in January has highlighted the danger for clients of companies such as 2e2, and focuses attention on how to deal with this type of situation. At a recent Shoosmiths event, data, IT and banking lawyers shared practical experience of the risks and potential remedies associated with insolvency of IT suppliers ...

Immediate access to the latest data is essential for business. The Internet and other networks ensure that data are readily accessible. But easy access to data carries with it certain risks, including the risk of unauthorised access. According to research by Gartner in 2006, 80 percent of companies will have suffered an application security incident by 2009 ...

ALRUD Law Firm | October 2022

Please be informed that today the online form for submission of applications for IT accreditation according to the new rules was launched. As a reminder, on September 30, 2022, the Russian government approved the new rules and criteria for IT companies1 accreditation ...

ENSafrica | January 2018

In an increasingly connected world, the protection of privacy and personal data has become a key concern for legislators in a number of jurisdictions. In South Africa, an attempt to give effect to the constitutional right to privacy resulted in the Protection of Personal Information Act, 2013 (“POPI”), which was gazetted on 26 November 2013 ...

Carey Olsen | January 2023

This briefing sets out the key requirements of PIPA and the steps that your organisation can take to prepare for its implementation.   PIPA coming into force PIPA was enacted in 2016 to regulate the use of personal information in Bermuda by individuals, companies, public authorities and other organisations ...

Dinsmore & Shohl LLP | January 2020

On Jan. 14, 2020, Microsoft ended support for its Windows 2007 operating system. This means Microsoft will no longer issue regular security updates for users of Window 2007. The process of issuing security updates for computer systems is commonly referred to as “patching.” Similar to fabric patches that repair holes in clothing, software patches repair holes in computer programs ...

ENSafrica | March 2013

It’s well known that computer programs enjoy copyright protection - many have  also been patented, but that’s another story and I’m not going to deal with that here. The South African Copyright Act has protected computer programs as a specific category of works since 1992, although prior to that they were protected as ‘literary works’ ...

ENSafrica | February 2013

It’s well known that computer programs enjoy copyright protection - many have  also been patented, but that’s another story and I’m not going to deal with that here. The South African Copyright Act has protected computer programs as a specific category of works since 1992, although prior to that they were protected as ‘literary works’ ...

In the beginning of the 2000s, as a result of the advance in technology, the Federal Trade Commission (“FTC”) looked to Congress to pass legislation that would ensure protection of citizens' privacy rights. However, Congress thus far has been unable to pass comprehensive privacy protection legislation, leaving it instead to the states to pass their own such legislation in a piecemeal fashion ...

On May 4, 2017, the en banc Federal Circuit heard oral arguments in Wi-Fi One, LLC v. Broadcom Corp., Appeal 2015-1944 (Fed. Cir. Sept. 16, 2016) to consider whether the findings of the Patent Trial & Appeals Board (“PTAB”) regarding 35 U.S.C. § 315(b), which governs the timeliness of filing a petition for inter partes review (“IPR”), are subject to judicial review on appeal ...

Shoosmiths LLP | June 2023

A recent Financial Times newspaper article raises the question whether the mandate underlying the UK's competition authority (the CMA) should be reviewed.  The argument is based on the CMA's blocking of the Microsoft/Activision merger, compared to the EU's conditional consent decision. The CMA's decision is being appealed by the merger parties ...

Wardynski & Partners | September 2016

Financial technologies need specific legal solutions and an open approach to the law. There are lots of indications that financial technology, or FinTech, is one of the next chapters in the digital revolution unrolling before our eyes. The role of finance in the economic life of the society was laid bare by the last financial crisis. The tragic consequences of errors committed on Wall Street, i.e ...

The E-Sign Act was signed into law over two decades ago. To put that into context, smart phones as we know them did not exist—the most popular mobile phone in 2000 was a flip phone, the Nokia 3310, and the first iPhone would not debut for another seven years. The most popular website was AOL because many people were still using AOL as their internet service provider. Google was a fledgling company with its search engine just starting out among the mainstays like Excite and Lycos ...

Shoosmiths LLP | February 2023

Green tech presents a growth area and one in which the UK could flourish, but to do so requires capital investment and a clear strategy alongside developing the necessary skillset of the UK workforce. So how realistic is this in the current climate? Experience to date would suggest that the UK is lagging behind other countries in this sector and that unless more is done, we will miss out on the opportunity green tech offers ...

Lawson Lundell LLP | November 2020

The Privacy Commissioners of Canada, Alberta and British Columbia issued a joint investigation report, finding that Cadillac Fairview did not obtain adequate consent for the collection of digital images of faces through facial recognition technology (Anonymous Video Analytics) installed in wayfinding directories in some of their Canadian shopping malls ...

Shoosmiths LLP | April 2009

Software is part of the day-to-day fabric for most companies. And almost everyone who uses it does so with little or no thought about what happens should it fail, or if it is no longer available. However, the prudent software buyer will consider how to protect against failure of critical or bespoke software, which is where escrow may come in. Be warned, though ...

dots