This past June marks nine years since the data breach at CardSystems Solutions, which involved the disclosure of names, account numbers and verification codes for some 40 million cardholders. Next month, we will pass the eight-year anniversary of the data breach at Monster.com, which involved the disclosure of contact information for some 1.3 million users ...
SOMMAIRE Nominee in the context of litigationUse of a nominee by limited partnershi8ps and trusts for holding immovablesVoluntary registration for GST and QST purposes by a nomineeImmovables held by a nominee: issues with respect to consumption taxes NOMINEES IN THE CONTEXT OF LITIGATION Léa Maalouf In commercial matters, it frequently happens that two persons agree to hide their true intent from third parties and express such intent in a secret contract (or counter letter), while
Although data protection laws globally are converging around a set of shared concerns, there is little prospect of their being harmonised. Ultimately, data protection and data privacy issues are rooted in local culture, and evolve in response to specific local challenges. In Europe, our data protection laws were a strong reaction against secret reporting by the state on its citizens that was widespread after the Second World War ...
In a win for policyholders relying on multiple coverage layers, the Fifth Circuit held on June 23, 2014 that an excess liability insurance policy could be triggered by exhaustion of a “retained limit” - equal to the limits of underlying insurance - even if the amounts paid to meet the “retained limit” were not covered by the excess policy. Indemnity Insurance Co. of N. Am., et. al. v. W & T Offshore Inc., -- F.3d --, No. 13-20512 (5th Cir. June 23, 2014) ...
The International Swaps and Derivatives Association, Inc. (“ISDA”) has published a form of amendment to the 1992 and 2002 ISDA Master Agreements intended to address continuing uncertainty regarding the condition precedent set forth in Section 2(a)(iii) of both such Master Agreements (“Section 2(a)(iii)”) ...
Browsing the internet – even in a commercial context – does not require authorisation from the relevant copyright owners, says the EU’s top court. The Court of Justice of the European Union (CJEU) confirmed in its recent judgment in Public Relations Consultants Association Ltd (PRCA) v Newspaper Licensing Agency Ltd (NLA) and Others (Case C-360/13) that browsing the internet without a copyright owner’s authorisation does not infringe the owner’s copyright ...
The Financial Services Authority (“OJK”) recently issued Circular Letter No. 2/SEOJK.07/2014 on Services and the Settlement of Complaints from Consumers of Financial Service Businesses (“Circular Letter”) to implement OJK Regulation No. 1/POJK.07/2013 on Consumer Protection in the Financial Services Sector (“Regulation”) ...
The Financial Services Authority (“OJK”) issued Regulation No.3/POJK.02/2014 on the Procedure for Collecting Fees charged by the Financial Service Authority (“OJK Regulation”) on 1 April 2014. The OJK Regulation provides guidelines for the OJK’s collection of fees from financial services institutions and financial services industry support professionals and their firms (Public Accounts, Public Assessors, Legal Consultants, Notaries, Actuaries) ...
The technology to “print” three dimensional objects with a 3D printer is not new, but as prices for the technology fall it becomes more readily available for private individuals. The possibilities that open up when individuals get access to 3D printers trigger the imagination, but the accompanying issues are not without complications. The technology, and the new areas of use to which it is put, also raises many questions, particularly regarding intellectual property rights ...
On June 2nd, 2014, President Michelle Bachelet entered a bill into Congress which seeks to modify Law N° 19.496 on the Protection of the Rights of Consumers (“CPA”). The message of the bill recognizes that the tools provided by the current legislation to address violations to the rights of consumers are not sufficiently efficient or dissuasive: in several cases it is less expensive for providers to pay a fine for breach of the CPA, than to comply with such regulation ...
The Sound Commercial Practices Guideline (the “Guideline”) published by the Autorité des marchés financiers (the “AMF”) in June 2013 and intended for insurers of persons or damages, holding companies controlled by an insurer, trust and savings companies or financial services cooperatives that are authorized by the AMF to conduct business in Quebec, including in particular those financial institutions governed by the statues of another province or country (collectively referred to hereaft
After two years of heated debate fuelled by a diplomatic scandal with the US, Brazil has enacted a groundbreaking bill of internet rights which will protect consumers and give added certainty to businesses. The government initially sought to stem the controversy related to the US government spying on Brazilian internet by proposing rules which would require all companies with operations in Brazil to keep their data stored within the country by setting up local servers ...
A. Legal Framework. In the Republic of Panama, the operation of investment funds and the securities market in general is regulated by Decree-Law No. 1 of 8 of July of 1999 (as amended to date, the “Securities Act”) and the regulations issued by the SSM (the “Regulations”). The government entity that is in charge of the regulation and supervision of the securities market in Panama is the Superintendency of the Securities Market (the “SSM”) ...
In Nautilus, Inc. v. Biosig Instruments, Inc., issued on June 2, 2014, the Supreme Court established a new legal test to determine whether a patent claim satisfies the definiteness requirement of 35 U.S.C. Section 112 ...
At the turn of the 21st century, various high-ranking Federal Trade Commission (FTC) officials stated that the Federal Trade Commission Act does not create requirements for what data-security measures companies must enact to ensure that private information is protected. The FTC Act’s catch-all prohibition against “unfair” or “deceptive” acts or practices, 15 U.S.C. § 45(a), was not believed to cover the data-breach and cyber security domain ...
International infringers are notoriously difficult litigants to get in touch with; all too often the methods of service routinely available in the United States to serve defendants and bring them into court to halt infringement fail when exported overseas. The defendants in these cases often have little incentive to cooperate with either the court or whatever physical mechanism or service might be available in their jurisdiction ...
If you like having options in obtaining patent rights faster, the U.S. Patent and Trademark Office (PTO) has been eager to please in the last decade. Expediting a patent application can be highly desirable since the average pendency from filing to issuance is about three years on average, and can be even longer in certain technology areas or if an appeal to the Patent Trial & Appeal Board is required ...
An employer faces a difficult situation when a temporarily disabled employee who cannot perform his or her essential job functions requests an accommodation. This situation becomes significantly more complicated when the employee receives the “accommodation,” but never recovers enough to resume performing the essential job functions ...
On 1 April 2014 amendments to the Contributions Act increasing the general rate for health insurance contributions from 13% to 15% came into force. The new contribution rate will be applied to salaries beginning in April 2014. Receipts related to previous periods will be grandfathered in at the previous applicable rate. Unused vacation for 2013 will be calculated at the 13% contribution rate and the new rate will apply to unused vacation in 2014 ...
On May 4, 2014 the Commission for Compensation and Royalties of the Israeli Patent Authority (the "Commission") rendered a decision relating to an employee's request to receive royalties for service inventions (the "Decision"). The Decision reduces the uncertainty that had surrounded the nature of an employee’s right to receive royalties for service inventions, and provides important guidelines for examining employee royalty waivers in agreements between employers and employees ...
It seems every week, there is a new story about a company being impacted by a major data breach and the consequences that follow from such breach, including the inevitable lawsuits, public relations nightmare, and governmental investigations. These breach stories are then followed by articles about the high costs to deal with these breach events, including costs to notify consumers, to identify the source of the breach, to pay for credit monitoring, among many other costs ...
The Federal Circuit today overruled a federal district judge and held that Oracle’s API computer source code qualifies for copyright protection, potentially breathing new life into Oracle’s billion-dollar lawsuit against Google. Oracle America, Inc. v. Google Inc., Case No. 13-1021 (Fed. Cir. May 9, 2014) ...
Texas operators and service companies need to carefully consider how a recent trend in Texas law affects the availability of insurance coverage - for themselves and their counterparties - for contractual liability. Most general liability policies, which insure claims for bodily injury and property damage, exclude coverage for liability assumed under a contract, unless the liability either exists in the absence of the contract or was assumed in a defined “insured contract ...