Firm: All
Practice Industry: Insurance, Technology
Region: All
Country/ State: All
Tag: All
Krogerus | March 2015

When copyright has been infringed online, what court is competent to hear and decide the case? The EU top court’s recent ruling provides clarity and states that online infringement cases can be heard where the infringing content is accessible. The content right holders will be able to take legal action against the infringer in their home countries, but only regarding damage that occurred there ...

Gianni & Origoni | March 2015

On 3 March 2015 IVASS published Regulation No.8 (the “Regulation”) on the simplification of procedures and requirements in the relationship between insurance companies, intermediaries and clients, implementing section 22, paragraph 15 bis, of Law Decree of 18 October 2012,No. 179, converted into Law No. 221 dated 17 December 2012 ...

Target, Home Depot, Sony, Anthem. All of these companies have been victims of very public cybersecurity breaches. Given what we know about those breaches, how can any other company know that it is safe from a cyber attack? No firewall appears to be unbreachable and no security system impenetrable.  No company is big or small or traditional enough to avoid such exposure, as long as the business receives or transmits data or uses computer networks ...

Dinsmore & Shohl LLP | February 2015

This week, I caught up with patent attorneys Jonathan D’Silva and Bryan Walker of MacDonald Illig Jones & Britton, LLP to hear their perspectives on some key strategic intellectual property (IP) legal issues ...

Haynes and Boone, LLP | February 2015

The Texas Supreme Court has looked to the drilling contract between Transocean and BP to limit BP’s “additional insured” coverage for liability arising out of the Deepwater Horizon disaster ...

Makarim & Taira S. | December 2014

On 8 April 2014, the Financial Services Authority (OJK) issued Regulation No. 2/POJK05/2014 of 2014 on Good Corporate Governance for Insurance Companies (Regulation 2). Loss and life insurance companies, as well as reinsurance companies must have at least 3 directors and 3 commissioners. Meanwhile, insurance and reinsurance brokerage firms are required to have 2 directors and 2 commissioners if their annual income exceeds IDR 10 billion ...

Makarim & Taira S. | December 2014

The Minister of Communications and Informatics issued Regulation No. 19 of 2014 on Controlling Internet Websites Containing Negative Content (Regulation 19). Regulation 19 has been in force since 17 July 2014. This regulation aims to implement “the safe and healthy use of the internet” by all social groups by blocking access to websites that contain pornographic or unlawful material (negative content) ...

Makarim & Taira S. | December 2014

The Insurance Bill (Insurance Bill) was passed by the House of Representatives on 23 September 2014. The Insurance Bill repeals and replaces the current Law No. 2 of 1992 on The Insurance Business. In addition to the current insurance businesses such as general insurance, life insurance, and reinsurance businesses, the Insurance Bill regulates Sharia insurance. Under the Insurance Bill: 1 ...

Haynes and Boone, LLP | December 2014

As noted in our previous client update, judicial rulings on the patent-eligibility of software and business method patents under section 101 of the U.S. Patent Act have run heavily against patent owners since Alice Corp. v. CLS Bank International, 573 U.S. ___, 134 S. Ct. 2347 (2014). (See 11/17/2014 Client Update). On Friday December 5, 2014, however, the U.S ...

Every day seems to bring word of a new data breach, and given the stakes of these breaches, it would be easy to assume that dealing with the damage they cause would be a top government priority. Unfortunately, a myriad of conflicting state laws, as well as the lack of one over-arching federal law, creates legal and compliance nightmares for companies that these breaches affect. For example, in late February and early March 2014, hackers successfully targeted eBay’s corporate network ...

Deacons | December 2014

Nowadays, we live in an information age (also known as the computer age, digital age or new media age) and the advancement of technologies has facilitated information flow and communication through social media. On one hand, people have easy and quick access to others’ information, enabling interaction with one another. However, the free flow of information and wide participation in social media networks also exposes a person to various risks or dangers ...

Haynes and Boone, LLP | December 2014

On November 4, 2014, voters in Denton made that city the first in Texas to ban hydraulic fracturing within city limits. Within a day, lawsuits were filed by the Texas General Land Office and the Texas Oil and Gas Association, and state lawmakers and regulators voiced strong opposition to the ballot measure ...

Haynes and Boone, LLP | November 2014

Judicial rulings on the patent-eligibility of software and business method patents under section 101 of the U.S. Patent Act have run heavily against patent owners since the U.S. Supreme Court’s June 19, 2014 ruling in Alice Corp. v. CLS Bank International, 573 U.S. ___, 134 S. Ct. 2347 (2014). (See Client Update here ...

Shoosmiths LLP | November 2014

The Richemont Group, owner of a number of luxury brands including Cartier, Montblanc and IWC, has secured a landmark website blocking order against the five main retail internet service providers (ISPs) in the UK (SKY, BT, EE, Talk Talk, and Virgin). Building upon the website blocking orders available to copyright holders, Richemont applied to the Court for orders requiring the ISPs to prevent subscribers' access to six websites (including www.cartierloveonline.com, and www.ukmontblancoutlet.co ...

Haynes and Boone, LLP | November 2014

The Fifth Circuit Court of Appeals has held that a contractor’s breach of an express warranty to repair does not constitute an “assumption of liability in a contract or agreement” for purposes of the “contractual liability” exclusion found in most general liability policies ...

Lavery Lawyers | October 2014

I. Intact, compagnie d’assurances v. Théberge & Belley (1985) inc. and l’Union canadienne compagnie d’assurance and EBC inc.1In this case, the Court of Appeal held that an insurer who indemnified its insured pursuant to “contractors’ equipment” coverage cannot exercise its subrogation rights against the subcontractor who committed a fault.FACTSEBC was the general contractor for the construction of a deep water wharf ...

Misick and Stanbrook | September 2014

Aside from a passing reference to data protection in the Electronic Transactions Ordinance (see below), TCI has no data protection statute.  However, a number of other areas of local law are applicable or, in the context of the advice sought, ought to be considered in relation to data protection, confidentiality and privacy matters.  In that respect:- a. Data protection, privacy and confidentiality at common law TCI is a British Overseas Territory and is a common law jurisdiction ...

DORDA | September 2014

The rise of social media in recent years has had a significant impact on people's private lives and an increasing number of companies are now using social media for business purposes. However, the opportunities and advantages offered by social media platforms also represent its greatest challenges. Companies often forget that such services do not exist in a legal vacuum – the normal legal framework is still applicable ...

Hunton Andrews Kurth LLP | September 2014

You are in charge of finances for a small business and are on vacation at the beach.  Suddenly, you remember you have forgotten to pay a company bill.  All is not lost, you think.  You run to you room, grab a laptop, and bring it down to the Tiki Bar. There, you order a drink and connect to the hotel's wireless system.  Then you call up your company's bank's Web page, click the "log-in" button, enter your password, and order a check issued to the creditor ...

ENS | August 2014

Many African brand owners will be familiar with the remedies that exist in cases of so-called ‘cybersquatting’. The brand owner who feels aggrieved by the fact that its trade mark has been registered as a domain name by a third party can lodge a complaint and request that the registration be cancelled or transferred to it. In the case of a .co.za registration, the complaint will be handled in accordance with the Alternative Dispute Resolution Regulations ...

As noted in numerous recent publications, captives have been receiving an increased amount of regulatory attention, not just from the domicile states which regulate them, but, more significantly, from national or international bodies.  The NAIC Captives and Special Purpose Vehicles Working Group completed its examination of captives and now two captive related proposals are being considered at the NAIC ...

Wardynski & Partners | August 2014

The recent dynamic growth of virtual currencies presents the increasingly realistic chance of creation of an entirely new model of money and payment. Innovations allowing payments to be made at lightning speed, across state borders and outside of official payment systems, are appearing before our very eyes. Such payments are made without the involvement of banks or intermediaries, and often anonymously. This is a revolution not only for traditional payment systems, but also for the law ...

Haynes and Boone, LLP | July 2014

This past June marks nine years since the data breach at CardSystems Solutions, which involved the disclosure of names, account numbers and verification codes for some 40 million cardholders. Next month, we will pass the eight-year anniversary of the data breach at Monster.com, which involved the disclosure of contact information for some 1.3 million users ...

Although data protection laws globally are converging around a set of shared concerns, there is little prospect of their being harmonised. Ultimately, data protection and data privacy issues are rooted in local culture, and evolve in response to specific local challenges. In Europe, our data protection laws were a strong reaction against secret reporting by the state on its citizens that was widespread after the Second World War ...

dots