Firm: All
Practice Industry: Financial Services, Insurance, Technology
Region: All
Country/ State: All
Tag: All
ENS | March 2013

Technology-rich South African companies and indeed inventors who have taken the brave step of filing foreign patents -will know that there are two ways of getting patent protection in Europe. The first is the national route, in other words filing a patent directly in the country or countries of interest. The second route is that of the European Patent ...

ENS | March 2013

The BBC recently published a piece called ‘3D Printing Will Be the Next Big Copyright Fight’. It said this:  ‘That moment we’ve been hearing about for years – the one where futuristic-sounding 3D printing becomes ubiquitous – is actually upon us.’  It dealt with a topic that’s also referred to as ‘additive manufacturing’ ...

According to December 2012 data from the federal Bureau of Labor Statistics, the unemployment rate for Gulf War Era veterans, hovering around eight percent, remains higher than the national rate.  Over the last decade, more than 2.3 million Americans were deployed to military duty in Iraq, Afghanistan or both.  Of that total, more than 1 million have since left the military ...

Lavery Lawyers | March 2013

Canadian ratification of the Convention on International Interests in Mobile Equipment and of the Protocol to the Convention on International Interests in Mobile Equipment on Matters Specific to Aircraft Equipment: This Bulletin is intended as a brief overview of the above-mentioned Convention and its Protocol and is not an in depth analysis of each of their provisions ...

Lavery Lawyers | March 2013

On March 1, 2013, the Court of Appeal rendered a judgment on the insurer's duty to defend and indemnify the insured in the area of commercial general liability insurance.1 It confirmed the decision of the trial judge which had held that the insurer has the duty to defend and indemnify,2 and ordered it to reimburse its insured for the amounts paid to settle the claim of a third party and the amounts incurred by the insured in defending itself against the action ...

Many banks formed holding companies in the late 1980s and 1990s. They had various reasons for doing this. Some formed a holding company to hold subsidiaries providing nonbank activities. Some used the holding company to reduce state taxes in states where banks are taxed differently. Some were acquisitive, and holding companies gave them more options in acquiring banks. Some thought the holding company would help improve the marketability of the stock ...

For the first time ever, North Carolina’s Business Court and Court of Appeals both upheld fiduciary duty claims against banks in late 2012. Debtors frequently employ such claims in an attempt to shift liability for failed projects to their lenders or to pressure lenders to settle problem loans in the wake of the financial downturn. Despite their ubiquity, breach of fiduciary duty claims had proven elusive for borrowers before October 2012 ...

It appears that the industry is starting to “enjoy” a modest increase in activity as to participations, assignments and syndications. This “enjoyment” is not without more than a fair share of trepidation and reluctance, but the allure of increased revenue is difficult to withstand. Regardless of this trepidation, participations, assignments, syndications and intercreditor agreements can be done safely and profitably ...

ENS | March 2013

It’s well known that computer programs enjoy copyright protection - many have  also been patented, but that’s another story and I’m not going to deal with that here. The South African Copyright Act has protected computer programs as a specific category of works since 1992, although prior to that they were protected as ‘literary works’ ...

ENS | March 2013

There was an interesting decision in the US recently about the intellectual property (IP) implications of posting a photo on Twitter.   The facts were that a professional photographer by the name of Daniel Morel – a man who has apparently spent over 25 years in Haiti – posted dramatic photos of the earthquake that struck Haiti in January 2010 shortly after the event ...

Haynes and Boone, LLP | March 2013

Only the terms of the insurance policy itself - and not the provisions of an underlying indemnity contract - determine the scope of coverage afforded to an additional insured, provided that the insurance and indemnity provisions in the underlying indemnity contract are separate and independent from one another. For additional insured and indemnity provisions to be deemed “separate and independent,” “Texas law only requires the additional insured provision to be a discrete requirement ...

Shoosmiths LLP | March 2013

The collapse of systems integrator and reseller 2e2 in January has highlighted the danger for clients of companies such as 2e2, and focuses attention on how to deal with this type of situation. At a recent Shoosmiths event, data, IT and banking lawyers shared practical experience of the risks and potential remedies associated with insolvency of IT suppliers ...

Hunton Andrews Kurth LLP | February 2013

On February 26, 2013, the National Institute of Standards and Technology ("NIST") issued a Request for Information ("RFI") to gather comments regarding the development of a framework to reduce cybersecurity risks to critical infrastructure. As we previously reported, the Obama Administration’s executive order, Improving Critical Infrastructure Cybersecurity (the "Executive Order"), released on February 12, 2013, directs NIST to coordinate development of this framework ...

ENS | February 2013

It’s well known that computer programs enjoy copyright protection - many have  also been patented, but that’s another story and I’m not going to deal with that here. The South African Copyright Act has protected computer programs as a specific category of works since 1992, although prior to that they were protected as ‘literary works’ ...

Lavery Lawyers | February 2013

On February 13, 2013, the Financial Consumer Agency of Canada (the “Agency”) issued a new guidance (the “Guidance”) to clarify the interpretation that must be given to the Code of Conduct for the Credit and Debit Card Industry in Canada (the “Code”) with regard to three issues within the Canadian payment card industry (credit or debit cards) that, according to the Agency, are not in line with some of the key principles set out in the Code ...

Data Privacy Act of 2012 The Data Privacy Act (Republic Act No. 10173) seeks to protect the confidentiality of “personal information.” The latter is defined as “any information whether recorded in material form or not, from which the identity of an individual is apparent or can be reasonably and directly ascertained by the entity holding the information, or when put together with other information would directly and certainly identify an individual ...

What it’s aboutThe Data Privacy Act (Republic Act No. 10173) seeks to protect the confidentiality of “personal information.” The latter is defined as “any information whether recorded in material form or not, from which the identity of an individual is apparent or can be reasonably and directly ascertained by the entity holding the information, or when put together with other information would directly and certainly identify an individual ...

What it’s aboutThe Cybercrime Prevention Act (Republic Act No. 10175) penalizes “cybercrimes”— acts that fall into any of these major categories:a) offenses against the confidentiality, integrity and availability of computer data and systems (e.g., illegal access, data interference);b) computer-related offenses (e.g., computer-related forgery and fraud);c) content-related offenses (e.g ...

Haynes and Boone, LLP | February 2013

On Tuesday, February 19, 2013, information security firm Mandiant issued a report documenting computer security breaches at hundreds of organizations, allegedly resulting from a cyber-espionage campaign undertaken by elements of the Chinese government. The Mandiant report is only the latest in a series of much-publicized incidents of “hacking” performed by what is believed to be a variety of public and private actors ...

Haynes and Boone, LLP | February 2013

Pursuant to new rules and interpretations issued by the U.S. Commodity Futures Trading Commission (the “CFTC”) and the Securities Exchange Commission under the Dodd-Frank Wall Street Reform and Consumer Protection Act1(together with related rules, regulations and interpretations, the “Dodd-Frank Act”), a “swap” has been interpreted to include any guarantee of a swap ...

Lavery Lawyers | February 2013

The quality of corporate governance practices increasingly represents a key factor to maintaining the trust of depositors, policyholders and most stakeholders who are active on capital markets. Considering the unique features of financial institutions and the risks arising from their responsibilities, some aspects of corporate governance are particularly important for these institutions, including banks, insurers, trust companies, loan companies and cooperative credit associations ...

Savings and Credit Entities (SCEs) are regulated financial institutions of private capital authorised to develop lending activities. The operation of SCEs is governed by the Law of Cooperative Banks and Savings and Credit Entities, which came into force on July 1 2001, amended in January 1 2009 to its current regime ...

Haynes and Boone, LLP | February 2013

On January 23, 2013, the Federal Financial Institutions Examination Council (FFIEC)1 issued a notice for comment on its proposed guidance, Social Media: Consumer Compliance Risk Management Guidance2 (the “Guidance”) ...

Makarim & Taira S. | February 2013

The Government finally issued Government Regulation No. 82 of 2012 9regarding the Implementation of Electronic Systems and Electronic Transactions (“Regulation 82”) for Law No. 11 of 2008 regarding Electronic Information and Electronic Transactions (“Law No.11”). Regulation 82 sets out significant requirements in relation to electronic registration/certification, electronic systems, electronic transactions, electronics agents, electronic signatures and domain names ...

dots