The European Parliament dealt a blow to programmers seeking clarity on the patentability of computer-implemented inventions last month when it rejected a draft European Directive on the subject (the "CII Directive") by an overwhelming majority ...
Summary ‡ Information security “breaches” take many forms and occur in a wide variety of settings. However, contrary to recent press reports, they do not appear to be increasing. ‡ Research indicates that only a small percentage of breaches result in any harmful use of data. ‡ Account fraud and true identity fraud — the two identity-based frauds most feared by consumers and policy makers — are actually declining ...
After a prolonged period of development, the announcement in August of the Board of Directors for Scotland's Futures Forum has finally seen this body come to fruition. The development of the Forum has included a substantial period of investigating overseas models, canvassing MSPs and running a conference involving 140 representatives from a number of sectors ...
The Standing Committee of the National People’s Congress passed Amendment (5) to the Criminal Law of the People's Republic of China (the "Amendment") on 28 February 2005. The Amendment was promulgated by President Hu Jintao and became effective on the same date. The Amendment introduces detailed penal provisions on credit card abuse and fraud and on damaging military equipment. We discuss the new sections regarding credit card abuse and fraud below ...
The Ministry of Information Industry ("MII") promulgated the Measures for the Administration of the Filing for the Record of Non-Commercial Internet Information Services (the "Recordal Measures") on 8 February 2005. The Recordal Measures took effect on 20 March 2005. It provides detailed guidelines on recordal filings for non-commercial websites ...
China presents enormous opportunities for the wealth management industry, as the domestic financial market and players develop increasing sophistication. The financial regulators in China are pushing ahead with financial market reforms and regulations, across the equity and bond markets, over banks, insurance companies, securities companies, securities investment fund management companies, trust investment companies and other financial institutions ...
Central Portal for Public Procurement has been recently launched at www.cvpp.lt. The portal publishes information on the public procurement conducted in Lithuania; the main purpose of the portal is to materialize the electronic procurement methods currently lawful under the Law on Public Procurement of the Republic of Lithuania. The main novelty introduced is the possibility to conduct electronic procurement under the normal commercial practice ...
It is just six months on from the introduction of the freedom of information regime, and there is already a wealth of advice and guidance available to public bodies on FOI. Private businesses however, are not as lucky. This article helps redress this imbalance ...
Proposal for Regulation of the European Parliament and of the Council concerning the Visa Information System (VIS) and the exchange of data between Member States on short stay-visas This regulation will enter into force from on the twentieth day following that of its publication in the Official Journal of the European Union. Official Journal of the European Union, C 052 of 2 March 2005 ...
The judgment of the European Court of Justice in Denuit and Cordenier (C-125/04) of 27 January 2005 The case developed out of a dispute between tourists and a travel agency regarding the price of tourist package services. Under the arbitration clause of the initial agreement between the parties, the tourists brought their claims before a Belgian arbitration court ...
What's your Freedom of Information forecast? Reasonably sunny, distinctly rainy or altogether a bit hazy? Whatever your response, it is possible to brighten your outlook and weather those FOI storms. If you’re an in-house lawyer in a public body in Scotland you'll no doubt be more than familiar with the Freedom of Information (Scotland) Act 2002. Five months on from the Act's full implementation date of 1 January 2005, it's time to take stock of your public body's progress so far ...
What is State Aid? The State aid rules seek to control the aid or assistance which is provided by EU Member States to businesses. Article 87 of the EC Treaty states that “any aid granted by a Member State or through State resources in any form whatsoever” is incompatible with the common market. The Commission and the European Court of Justice have a considerable discretion in determining what amounts to State aid and have given the term a wide definition ...
The Federal Civil Liability Law was published in the Federal Official Gazette on December 31, 2004 and entered into full force and effect in January 1, 2005. This law has as its objective that of determining the bases and proceedings for recognizing the right to claim indemnification by those suffering loss or damage as a consequence of improper actions of the executive, legislative, and judicial branches of the federal government and its agencies ...
Revised Guideline on the Sharing and Use of Consumer Credit Data through a Credit Reference Agency On 18th January 2005, the Hong Kong Monetary Authority (“HKMA”) issued a revised statutory guideline, namely the Supervisory Policy Manual on the Sharing and Use of Consumer Credit Data through a Credit Reference Agency (IC-6) (“CRA Guideline”) ...
Out of general interest, we are forwarding the following Informative Note with respect to the first oral trial in Mexico, something that took place in the Municipality of Montemorelos, State of Nuevo Leon, in February 2005. Oral trials have been possible since November 25 of last year when the law of Nuevo Leon changed to allow this in non-serious culpable felonies. The trial was an example of judicial speed. Within a period of five hours, from 10:00 a.m. to 3:00 p.m ...
When it comes to the patentability of computer-implemented inventions, Europe and the United States have differing and diverse opinions. The United States has a liberal approach to the patentability of computer software and will therefore grant patents for such inventions. Not so in Europe though, where computer programs are patentable only if they make a “technical contribution” to the state of the art ...
ICC Publishes Paper on Internet Governance The Internet Corporation for Assigned Names and Numbers (ICANN), a private sector body based in California, currently operates the allocation of domain names and Internet Protocol addresses on a worldwide basis. At the World Summit on the Information Society in Geneva in December 2003, the issue of transferring ICANN’s role to the United Nations was raised by a number of developing countries ...
From Land’s End to John O’Groats, roving reporters, tabloid writers and broadsheet columnists, have been riding on the wave of the new freedom of information acts. As a result of the Freedom of Information (Scotland) Act 2002, and its UK counterpart, the Freedom of Information Act 2000, the public now has a statutory right to recorded information held by most public sector bodies. Although the new right only came into force on 1 January 2005, its effect is retrospective ...
In Denmark, Norway and Sweden, the ownership and rights to intellectual property conceived and put into to practice by researchers employed by the universities have historically rested with the researchers themselves. This system is now rapidly changing to a model more similar to the way in which US universities handle their intellectual property; universities become responsible for stakeholders in such intellectual property ...
The Standing Committee of the 10th National People's Congress passed the Law of the People's Republic of China on Electronic Signatures on 28 August 2004. The Law, which was promulgated on 28 August by President Hu Jintao, will enter into effect on 1 April 2005 and provides a legal basis for electronic transactions. Electronic data text The Law applies to electronic signatures in electronic data text ...
Immigration
California Law Requires Telling Your Customers That You've Been Hacked A new California Law (Assembly Bill No. 700, Chapter 1054) went into effect on July 1, 2002 that requires companies who conduct business in California to notify their California-resident customers if their unencrypted personel information may have been stolen as a result of a security breach ...
Technology Update Authors Brian D. Barnard Randall E. Colson M. Ann Newton Related Practice Groups Intellectual Property A new California Law (Assembly Bill No. 700, Chapter 1054) went into effect on July 1, 2002 that requires companies who conduct business in California to notify their California-resident customers if their unencrypted personel information may have been stolen as a result of a security breach ...
Five years ago your CEO told you that your company had to have a “web” strategy. So, you learned everything about the Internet. You hired specialty law firms, bought software, and entered into web development and hosting agreements. You mastered all the web lingo. Now, all of that is passé ...