Firm: All
Practice Industry: Corporate & Business, Financial Services, Technology
Region: All
Country/ State: All
Tag: All

The Florida Supreme Court issued an opinion on March 7, 2013 that eliminated an oft-used tool in the defense arsenal by limiting application of the economic loss rule to products liability cases. The DecisionIn a 5-2 decision authored by Justice Jorge Labarga, the court held unequivocally that "the application of the economic loss rule is limited to products liability cases." Tiara Condo. Ass’n, Inc. v. Marsh & McLennan Cos., Inc., __ So.3d __, 2013 WL 828003, *8 (Fla. Mar. 7, 2013) ...

Haynes and Boone, LLP | March 2013

The U.S. Director of National Intelligence, James Clapper, advised the Senate Intelligence Committee this week that cyber attacks are the number one threat to national security. “Increasingly, state and non-state actors are gaining and using cyber expertise,” Clapper stated in his remarks to the Committee. “These capabilities put all sectors of our country at risk, from government and private networks to critical infrastructure ...

Haynes and Boone, LLP | March 2013

An increasing number of public companies – particularly banks and financial institutions – are disclosing cybersecurity incidents in their filings with the Securities and Exchange Commission. Companies are also replacing boilerplate cyber risk disclosures with more detailed disclosures of specific events or threats ...

Many banks formed holding companies in the late 1980s and 1990s. They had various reasons for doing this. Some formed a holding company to hold subsidiaries providing nonbank activities. Some used the holding company to reduce state taxes in states where banks are taxed differently. Some were acquisitive, and holding companies gave them more options in acquiring banks. Some thought the holding company would help improve the marketability of the stock ...

For the first time ever, North Carolina’s Business Court and Court of Appeals both upheld fiduciary duty claims against banks in late 2012. Debtors frequently employ such claims in an attempt to shift liability for failed projects to their lenders or to pressure lenders to settle problem loans in the wake of the financial downturn. Despite their ubiquity, breach of fiduciary duty claims had proven elusive for borrowers before October 2012 ...

It appears that the industry is starting to “enjoy” a modest increase in activity as to participations, assignments and syndications. This “enjoyment” is not without more than a fair share of trepidation and reluctance, but the allure of increased revenue is difficult to withstand. Regardless of this trepidation, participations, assignments, syndications and intercreditor agreements can be done safely and profitably ...

ENS | March 2013

It’s well known that computer programs enjoy copyright protection - many have  also been patented, but that’s another story and I’m not going to deal with that here. The South African Copyright Act has protected computer programs as a specific category of works since 1992, although prior to that they were protected as ‘literary works’ ...

ENS | March 2013

There was an interesting decision in the US recently about the intellectual property (IP) implications of posting a photo on Twitter.   The facts were that a professional photographer by the name of Daniel Morel – a man who has apparently spent over 25 years in Haiti – posted dramatic photos of the earthquake that struck Haiti in January 2010 shortly after the event ...

Haynes and Boone, LLP | March 2013

Bankruptcy Code § 1129(a)(10) provides that in order for a plan proponent to “cram down” - i.e., force acceptance of - a plan of reorganization on a dissenting class of creditors, at least one impaired class of creditors must vote in favor of the plan. Because a plan is often not accepted by all classes entitled to vote, the ability to procure at least one impaired, accepting class in order to cram down a dissenting class is essential in achieving plan confirmation ...

Shoosmiths LLP | March 2013

The collapse of systems integrator and reseller 2e2 in January has highlighted the danger for clients of companies such as 2e2, and focuses attention on how to deal with this type of situation. At a recent Shoosmiths event, data, IT and banking lawyers shared practical experience of the risks and potential remedies associated with insolvency of IT suppliers ...

Krogerus | March 2013

A recent ruling by the Court of Justice of the European Union (CJEU) could mean trouble for many Community trade marks. There is now a heightened risk that national courts will invalidate these trade marks if they have not been used extensively enough in the European Union. Is broader protection better?A Community trade mark (CTM) confers protection in all 27 EU member states ...

Haynes and Boone, LLP | March 2013

On February 27, 2013, the Supreme Court held in a 6-3 opinion in Amgen Inc. v. Connecticut Retirement Plans and Trust Funds, 568 U.S. ___ (2013), that securities fraud class action plaintiffs need not prove materiality at the class certification stage to invoke the fraud-on-the-market presumption of class-wide reliance ...

Hunton Andrews Kurth LLP | February 2013

On February 26, 2013, the National Institute of Standards and Technology ("NIST") issued a Request for Information ("RFI") to gather comments regarding the development of a framework to reduce cybersecurity risks to critical infrastructure. As we previously reported, the Obama Administration’s executive order, Improving Critical Infrastructure Cybersecurity (the "Executive Order"), released on February 12, 2013, directs NIST to coordinate development of this framework ...

ENS | February 2013

It’s well known that computer programs enjoy copyright protection - many have  also been patented, but that’s another story and I’m not going to deal with that here. The South African Copyright Act has protected computer programs as a specific category of works since 1992, although prior to that they were protected as ‘literary works’ ...

Haynes and Boone, LLP | February 2013

The United States Supreme Court yesterday significantly limited the federal government’s ability to bring an action for civil penalties more than five years after the alleged misconduct occurred. In Gabelli v. Securities and Exchange Commission, the Court held that the five-year limitations period governing most enforcement actions begins to run when the underlying violation occurred – not when the government discovered the violation ...

Lavery Lawyers | February 2013

On February 13, 2013, the Financial Consumer Agency of Canada (the “Agency”) issued a new guidance (the “Guidance”) to clarify the interpretation that must be given to the Code of Conduct for the Credit and Debit Card Industry in Canada (the “Code”) with regard to three issues within the Canadian payment card industry (credit or debit cards) that, according to the Agency, are not in line with some of the key principles set out in the Code ...

Data Privacy Act of 2012 The Data Privacy Act (Republic Act No. 10173) seeks to protect the confidentiality of “personal information.” The latter is defined as “any information whether recorded in material form or not, from which the identity of an individual is apparent or can be reasonably and directly ascertained by the entity holding the information, or when put together with other information would directly and certainly identify an individual ...

What it’s aboutThe Data Privacy Act (Republic Act No. 10173) seeks to protect the confidentiality of “personal information.” The latter is defined as “any information whether recorded in material form or not, from which the identity of an individual is apparent or can be reasonably and directly ascertained by the entity holding the information, or when put together with other information would directly and certainly identify an individual ...

What it’s aboutThe Cybercrime Prevention Act (Republic Act No. 10175) penalizes “cybercrimes”— acts that fall into any of these major categories:a) offenses against the confidentiality, integrity and availability of computer data and systems (e.g., illegal access, data interference);b) computer-related offenses (e.g., computer-related forgery and fraud);c) content-related offenses (e.g ...

Misick and Stanbrook | February 2013

There are several TCI legal entities regularly established for carrying out business either internationally or domestically. The registration process of these entities is comparatively straightforward and can usually be completed for a fixed cost and within a short timeframe and are often attractive options in TCI as an offshore financial centre with no corporate or personal income tax ...

Misick and Stanbrook | February 2013

Outside the work permit regime, there are two possible types of residency in TCI-a. Permanent residency (which frequently comes with the right to work); b. Shorter term residency. Permanent residency is now available only to those who have lived and worked in TCI for a stipulated period. Previously such residency was available to individuals who made a specific level of investment in TCI: since September 2012, that is no longer the case ...

Haynes and Boone, LLP | February 2013

Pursuant to new rules and interpretations issued by the U.S. Commodity Futures Trading Commission (the “CFTC”) and the Securities Exchange Commission under the Dodd-Frank Wall Street Reform and Consumer Protection Act1(together with related rules, regulations and interpretations, the “Dodd-Frank Act”), a “swap” has been interpreted to include any guarantee of a swap ...

Lavery Lawyers | February 2013

The quality of corporate governance practices increasingly represents a key factor to maintaining the trust of depositors, policyholders and most stakeholders who are active on capital markets. Considering the unique features of financial institutions and the risks arising from their responsibilities, some aspects of corporate governance are particularly important for these institutions, including banks, insurers, trust companies, loan companies and cooperative credit associations ...

dots