The BBC recently published a piece called ‘3D Printing Will Be the Next Big Copyright Fight’. It said this: ‘That moment we’ve been hearing about for years – the one where futuristic-sounding 3D printing becomes ubiquitous – is actually upon us.’ It dealt with a topic that’s also referred to as ‘additive manufacturing’ ...
On March 1, 2013, the Court of Appeal rendered a judgment on the insurer's duty to defend and indemnify the insured in the area of commercial general liability insurance.1 It confirmed the decision of the trial judge which had held that the insurer has the duty to defend and indemnify,2 and ordered it to reimburse its insured for the amounts paid to settle the claim of a third party and the amounts incurred by the insured in defending itself against the action ...
It’s well known that computer programs enjoy copyright protection - many have also been patented, but that’s another story and I’m not going to deal with that here. The South African Copyright Act has protected computer programs as a specific category of works since 1992, although prior to that they were protected as ‘literary works’ ...
There was an interesting decision in the US recently about the intellectual property (IP) implications of posting a photo on Twitter. The facts were that a professional photographer by the name of Daniel Morel – a man who has apparently spent over 25 years in Haiti – posted dramatic photos of the earthquake that struck Haiti in January 2010 shortly after the event ...
Only the terms of the insurance policy itself - and not the provisions of an underlying indemnity contract - determine the scope of coverage afforded to an additional insured, provided that the insurance and indemnity provisions in the underlying indemnity contract are separate and independent from one another. For additional insured and indemnity provisions to be deemed “separate and independent,” “Texas law only requires the additional insured provision to be a discrete requirement ...
The collapse of systems integrator and reseller 2e2 in January has highlighted the danger for clients of companies such as 2e2, and focuses attention on how to deal with this type of situation. At a recent Shoosmiths event, data, IT and banking lawyers shared practical experience of the risks and potential remedies associated with insolvency of IT suppliers ...
On February 26, 2013, the National Institute of Standards and Technology ("NIST") issued a Request for Information ("RFI") to gather comments regarding the development of a framework to reduce cybersecurity risks to critical infrastructure. As we previously reported, the Obama Administration’s executive order, Improving Critical Infrastructure Cybersecurity (the "Executive Order"), released on February 12, 2013, directs NIST to coordinate development of this framework ...
It’s well known that computer programs enjoy copyright protection - many have also been patented, but that’s another story and I’m not going to deal with that here. The South African Copyright Act has protected computer programs as a specific category of works since 1992, although prior to that they were protected as ‘literary works’ ...
Data Privacy Act of 2012 The Data Privacy Act (Republic Act No. 10173) seeks to protect the confidentiality of “personal information.” The latter is defined as “any information whether recorded in material form or not, from which the identity of an individual is apparent or can be reasonably and directly ascertained by the entity holding the information, or when put together with other information would directly and certainly identify an individual ...
What it’s aboutThe Data Privacy Act (Republic Act No. 10173) seeks to protect the confidentiality of “personal information.” The latter is defined as “any information whether recorded in material form or not, from which the identity of an individual is apparent or can be reasonably and directly ascertained by the entity holding the information, or when put together with other information would directly and certainly identify an individual ...
What it’s aboutThe Cybercrime Prevention Act (Republic Act No. 10175) penalizes “cybercrimes”— acts that fall into any of these major categories:a) offenses against the confidentiality, integrity and availability of computer data and systems (e.g., illegal access, data interference);b) computer-related offenses (e.g., computer-related forgery and fraud);c) content-related offenses (e.g ...
On Tuesday, February 19, 2013, information security firm Mandiant issued a report documenting computer security breaches at hundreds of organizations, allegedly resulting from a cyber-espionage campaign undertaken by elements of the Chinese government. The Mandiant report is only the latest in a series of much-publicized incidents of “hacking” performed by what is believed to be a variety of public and private actors ...
The Government finally issued Government Regulation No. 82 of 2012 9regarding the Implementation of Electronic Systems and Electronic Transactions (“Regulation 82”) for Law No. 11 of 2008 regarding Electronic Information and Electronic Transactions (“Law No.11”). Regulation 82 sets out significant requirements in relation to electronic registration/certification, electronic systems, electronic transactions, electronics agents, electronic signatures and domain names ...
Sometimes, litigants are forced to reevaluate their strategy mid-course. Occasionally, a plaintiff in a pending trademark infringement action faces a cancellation counterclaim that poses a real threat to the plaintiff’s trademark. In that situation, to avoid the risk of cancellation or a declaration of invalidity, the plaintiff may want to voluntarily dismiss its claim and grant a covenant not to sue to the alleged infringer ...
The access to records clause, sometimes called the inspection or audit clause, is a common fixture in reinsurance agreements and serves an important function. It enables the reinsurer to track the performance of the agreement and maintain an accurate view of the business ceded. More specifically, it allows the reinsurer to ensure the cedent is complying with the terms and conditions of the agreement, including timely reporting of losses and calculation of premiums ...
On November 16, 2012, European Data Protection Supervisor Peter Hustinx published an Opinion on the European Commission’s Communication on cloud computing (part of the Commission’s broader cloud computing strategy) ...
According to a recent article by Shoosmiths, the cloud software market generated $22 billion in revenue in 2011, and expects growth to $67.3 billion by 2016 Alongside the benefit of cloud computing, however, lies a lack of transparency for cloud customers, causing legitimate concerns about how they can comply with the Data Protection Act 1998 (DPA) ...
The U.S. Court of Appeals for the Second Circuit, in VAM Check Cashing Corp. v. Federal Insurance Company, No. 11-2644-cv, (2d Cir. Nov. 7, 2012), found the "overt felonious act" requirement in a crime insurance policy to be ambiguous. The court held, therefore, that the insured would be entitled to coverage for a theft at the insured’s store, even though it occurred as a result of a covert scheme to defraud ...
With the continued development of the Marcellus and Utica Shale, businesses in West Virginia, Pennsylvania and Ohio are experiencing rapid growth and facing many issues related to this growth they had not previously experienced. One important consideration is whether and how to insure these growing assets. While myriad issues may arise regarding insurance, this article will address some general types of insurance coverage growing businesses should consider ...
What's all this about penguins, pandas and search engine optimisation? Optimising websites to rank highly in Google search results is a lucrative industry. For years, businesses have employed search engine optimisation (SEO) providers to boost rankings ...
We are all too familiar with stories of contaminated food and drugs that sicken and even kill consumers. Given the increasing number of product recalls and their enormous financial impact, it is not surprising the demand for recall insurance has increased exponentially in the middle market. Why has the number of recalls increased so dramatically? The answer is twofold ...
On November 10, 2012, the German working group on technical and organizational data protection matters published guidelines (in German) on the technical and organizational separation requirements for automated data processing on shared IT systems (the “Guidelines”). The working group is part of the Conference of the German Data Protection Commissioners, which recently concluded its 84th Conference in Frankfurt (Oder) ...
On October 30, 2012, the U.S. District Court for the Southern District of California ruled that an opt-out confirmation text sent by Citibank (South Dakota), N.A. (“Citibank”) did not violate the Telephone Consumer Protection Act (“TCPA”). Under a “common sense” interpretation, the court determined that Citibank’s opt-out text does not demonstrate the type of invasion of privacy the TCPA seeks to prevent ...
Insurers are well aware of the typical bad faith scenario in third-party claims. Counsel for a claimant sends a demand for policy limits to the insurer in the hope that the insurer does not accept within a time limit specified in the demand ...