Firm: All
Practice Industry: Government & Public Sector, Intellectual Property, Technology
Region: All
Country/ State: All
Tag: All

When was the last time when you or someone you know shared a bad experience or a complaint about a person in Facebook or Twitter?  A good bet is that a longer time has passed than if this question was asked a year ago.  The reason for this is probably Republic Act No. 10175, also known as the Cybercrime Prevention Act of 2012, which President Noynoy Aquino signed into law on September 12, 2012. A ...

Adopted in 2000, Regulation FD generally prohibits public companies and personnel acting on their behalf from selectively disclosing material, nonpublic information to certain groups, such as brokers, investment advisers, analysts and shareholders who are likely to trade on information, without concurrently making widespread public disclosure ...

Haynes and Boone, LLP | April 2013

The New Amparo Law-On April 2, 2013, the Amparo Law, Regulatory of Articles 103 and 107 of the Constitution of the United Mexican Estates, was published in the Official Gazette of the Federation.  This new law broadens the constitutional defense of rights, since more individuals can have access to the amparo actions ...

On March 22, 2013, the Department of Homeland Security ("DHS") announced that it will submit to the Office of Management and Budget ("OMB") a new Information Collection Request ("ICR") related to the implementation of the Chemical Facility Anti-Terrorism Standards ("CFATS") Personnel Surety Program ("PSP"). DHS is soliciting comments during a 60-day public comment period (which ends May 21, 2013) prior to the submission of the ICR to OMB ...

ENS | March 2013

In 2008 the government introduced important intellectual property (IP) legislation.  The Intellectual Property Rights from Publicly Financed Research and Development Act 51 of 2008 - which only came into force on 2 August 2010 – governs the ownership and exploitation of IP which flows from publicly financed research and development (R&D) ...

ENS | March 2013

Technology-rich South African companies and indeed inventors who have taken the brave step of filing foreign patents -will know that there are two ways of getting patent protection in Europe. The first is the national route, in other words filing a patent directly in the country or countries of interest. The second route is that of the European Patent ...

ENS | March 2013

This is the second of three articles that we’ve written on  the Intellectual Property Rights from Publicly Financed Research and Development Act 51 of 2008 (‘the Act’), which came into effect on 2 August 2010 ...

ENS | March 2013

The BBC recently published a piece called ‘3D Printing Will Be the Next Big Copyright Fight’. It said this:  ‘That moment we’ve been hearing about for years – the one where futuristic-sounding 3D printing becomes ubiquitous – is actually upon us.’  It dealt with a topic that’s also referred to as ‘additive manufacturing’ ...

ENS | March 2013

In 2008 the government introduced important intellectual property (IP) legislation.  The Intellectual Property Rights from Publicly Financed Research and DevelopmentAct 51 of 2008 - which only came into force on 2 August 2010– governs the ownership and exploitation of IP which flows from publicly financed research and development (R&D) ...

ENS | March 2013

It’s well known that computer programs enjoy copyright protection - many have  also been patented, but that’s another story and I’m not going to deal with that here. The South African Copyright Act has protected computer programs as a specific category of works since 1992, although prior to that they were protected as ‘literary works’ ...

ENS | March 2013

There was an interesting decision in the US recently about the intellectual property (IP) implications of posting a photo on Twitter.   The facts were that a professional photographer by the name of Daniel Morel – a man who has apparently spent over 25 years in Haiti – posted dramatic photos of the earthquake that struck Haiti in January 2010 shortly after the event ...

Shoosmiths LLP | March 2013

The collapse of systems integrator and reseller 2e2 in January has highlighted the danger for clients of companies such as 2e2, and focuses attention on how to deal with this type of situation. At a recent Shoosmiths event, data, IT and banking lawyers shared practical experience of the risks and potential remedies associated with insolvency of IT suppliers ...

Hunton Andrews Kurth LLP | February 2013

On February 26, 2013, the National Institute of Standards and Technology ("NIST") issued a Request for Information ("RFI") to gather comments regarding the development of a framework to reduce cybersecurity risks to critical infrastructure. As we previously reported, the Obama Administration’s executive order, Improving Critical Infrastructure Cybersecurity (the "Executive Order"), released on February 12, 2013, directs NIST to coordinate development of this framework ...

ENS | February 2013

It’s well known that computer programs enjoy copyright protection - many have  also been patented, but that’s another story and I’m not going to deal with that here. The South African Copyright Act has protected computer programs as a specific category of works since 1992, although prior to that they were protected as ‘literary works’ ...

Data Privacy Act of 2012 The Data Privacy Act (Republic Act No. 10173) seeks to protect the confidentiality of “personal information.” The latter is defined as “any information whether recorded in material form or not, from which the identity of an individual is apparent or can be reasonably and directly ascertained by the entity holding the information, or when put together with other information would directly and certainly identify an individual ...

The Comelec promulgated Resolution No. 9615 on 15 January 2013. This Resolution implements the provisions of Republic Act No. 9006, more popularly known as the Fair Election Act, for purposes of the 2013 national and local mid-term elections ...

What it’s aboutThe Data Privacy Act (Republic Act No. 10173) seeks to protect the confidentiality of “personal information.” The latter is defined as “any information whether recorded in material form or not, from which the identity of an individual is apparent or can be reasonably and directly ascertained by the entity holding the information, or when put together with other information would directly and certainly identify an individual ...

What it’s aboutThe Cybercrime Prevention Act (Republic Act No. 10175) penalizes “cybercrimes”— acts that fall into any of these major categories:a) offenses against the confidentiality, integrity and availability of computer data and systems (e.g., illegal access, data interference);b) computer-related offenses (e.g., computer-related forgery and fraud);c) content-related offenses (e.g ...

Hunton Andrews Kurth LLP | February 2013

On February 12, 2013, in conjunction with the release of the Executive Order on Improving Critical Infrastructure Cybersecurity (the Executive Order), President Obama signed a Presidential Policy Directive/PPD-21 on Critical Infrastructure Security and Resilience. The PPD revokes the 2003 Homeland Security Presidential Directive-7 (issued by President George W ...

Makarim & Taira S. | February 2013

The Government finally issued Government Regulation No. 82 of 2012 9regarding the Implementation of Electronic Systems and Electronic Transactions (“Regulation 82”) for Law No. 11 of 2008 regarding Electronic Information and Electronic Transactions (“Law No.11”). Regulation 82 sets out significant requirements in relation to electronic registration/certification, electronic systems, electronic transactions, electronics agents, electronic signatures and domain names ...

Hunton Andrews Kurth LLP | February 2013

On February 12, 2013, the Obama Administration released an executive order, Improving Critical Infrastructure Cybersecurity (the "Executive Order"), which is focused primarily on government actions to support critical infrastructure owners and operators in protecting their systems and networks from cyber threats ...

MinterEllison | January 2013

Some favourable news on the global economic front has been trickling in. Markets around the world rallied as the US avoided the fiscal cliff-dive by a nanosecond; China's economy is showing signs of renewed strength, with the powerful manufacturing sector now performing at its best levels in almost two years; and share prices in most of Europe, Britain and even Japan have been trading solidly higher over the past few months ...

Brigard Urrutia | January 2013

In September, the National Customs and Tax Authority - DIAN - presented the third draft of the new Customs Statute, which will regulate most of Colombia’s customs law. Although scholars and business associations have presented their comments to the project, the draft seems to be definitive for the most part ...

Hunton Andrews Kurth LLP | January 2013

The Iran Freedom and Counter-Proliferation Act of 2012 (IFCPA), enacted this week by Congress as part of the National Defense Authorization Act for Fiscal Year 2013, further ratchets up U.S. economic sanctions against Iran. U.S. persons or entities (hereafter "persons"), including their foreign subsidiaries, or persons in the U.S., are already prohibited from virtually all transactions involving Iran. Under IFCPA, U.S ...

dots