On March 26, 2013, the U.S. Court of Appeals for the Federal Circuit affirmed the U.S. Patent Office’s rejection of the claim of a design patent continuation application, bringing some degree of clarity to the practice of claiming a portion of a previously-claimed design while seeking priority to the filing date of the previously-claimed design. In re Owens, No. 2012-1261 (Fed. Cir. March 26, 2013). In the case, Timothy S. Owens et al ...
The decision of the Court of Appeal in the La Capitale Case has been expected since February 2012 when the Superior Court dismissed the Class Action taken against an insurer who, with the consent of the policyholder, had unilaterally modified the waiver of premiums clause in a group insurance contract2. To better understand the context, please refer to our NEWSLETTER IN JUNE 2012 following the Superior Court judgment ...
On Wednesday, the Supreme Court held in a 5-4 opinion in Comcast Corp. v. Behrend, 569 U.S. ___ (2013), that a party seeking to maintain a class action must satisfy Rule 23’s requirements through evidentiary proof, even where such analysis may overlap with the merits of the underlying claim ...
Here are select February 2013 rulings of the Supreme Court of the Philippines on commercial law:Corporation; liability of officers and directors. Basic is the rule in corporation law that a corporation is a juridical entity which is vested with a legal personality separate and distinct from those acting for and in its behalf and, in general, from the people comprising it ...
Last February 15, 2013, the President signed into law Republic Act No. 10365 or the “Act Further Strengthening the Anti-Money Laundering Law.” True to its name, the third amending law to the Anti-Money Laundering Act (“AMLA”) gave it more teeth and strengthened the government’s ability to prevent and prosecute money laundering. The following discusses the new amendments to the AMLA ...
The Seventh Circuit recently reversed a $2.7 million damages award against a mortgage company accused of lying in applications for federal loan guarantees. See United States v. Anchor Mortg. Corp., 2013 WL 1150213 (7th Cir. Mar. 21, 2013) ...
SyCip Salazar Hernandez & Gatmaitan's new website went live on 1 March 2013. As a result, previously sent links to downloadable publications are no longer accessible. Below are a few updated links: Client Alert: SEC requires tax identification number for foreign investorsLegal Bulletin: Technology, Media & Telecoms (Jan ...
CONTENTS Some practical advice on the recording of customer phone calls in QuebecEmployment placement agencies : who is responsible for the source deductions?What are your recourses if you believe a contract is about to be, or has been, awarded to another bidder? SOME PRACTICAL ADVICE ON THE RECORDING OF CUSTOMER PHONE CALLS IN QUEBECGuillaume LabergeMany businesses engage in the practice of recording customer calls ...
Information is often the most valuable asset that a business has. Businesses that think strategically about how they create and develop their information assets are able to increase their value, frequently by substantial amounts. For example, data analytics can help a business understand its clients, what they are likely to buy - when and how. Cloud computing offers efficiencies and cost savings ...
The Florida Supreme Court issued an opinion on March 7, 2013 that eliminated an oft-used tool in the defense arsenal by limiting application of the economic loss rule to products liability cases. The DecisionIn a 5-2 decision authored by Justice Jorge Labarga, the court held unequivocally that "the application of the economic loss rule is limited to products liability cases." Tiara Condo. Ass’n, Inc. v. Marsh & McLennan Cos., Inc., __ So.3d __, 2013 WL 828003, *8 (Fla. Mar. 7, 2013) ...
The U.S. Director of National Intelligence, James Clapper, advised the Senate Intelligence Committee this week that cyber attacks are the number one threat to national security. “Increasingly, state and non-state actors are gaining and using cyber expertise,” Clapper stated in his remarks to the Committee. “These capabilities put all sectors of our country at risk, from government and private networks to critical infrastructure ...
An increasing number of public companies – particularly banks and financial institutions – are disclosing cybersecurity incidents in their filings with the Securities and Exchange Commission. Companies are also replacing boilerplate cyber risk disclosures with more detailed disclosures of specific events or threats ...
On March 1, 2013, the Court of Appeal rendered a judgment on the insurer's duty to defend and indemnify the insured in the area of commercial general liability insurance.1 It confirmed the decision of the trial judge which had held that the insurer has the duty to defend and indemnify,2 and ordered it to reimburse its insured for the amounts paid to settle the claim of a third party and the amounts incurred by the insured in defending itself against the action ...
Bankruptcy Code § 1129(a)(10) provides that in order for a plan proponent to “cram down” - i.e., force acceptance of - a plan of reorganization on a dissenting class of creditors, at least one impaired class of creditors must vote in favor of the plan. Because a plan is often not accepted by all classes entitled to vote, the ability to procure at least one impaired, accepting class in order to cram down a dissenting class is essential in achieving plan confirmation ...
Only the terms of the insurance policy itself - and not the provisions of an underlying indemnity contract - determine the scope of coverage afforded to an additional insured, provided that the insurance and indemnity provisions in the underlying indemnity contract are separate and independent from one another. For additional insured and indemnity provisions to be deemed “separate and independent,” “Texas law only requires the additional insured provision to be a discrete requirement ...
A recent ruling by the Court of Justice of the European Union (CJEU) could mean trouble for many Community trade marks. There is now a heightened risk that national courts will invalidate these trade marks if they have not been used extensively enough in the European Union. Is broader protection better?A Community trade mark (CTM) confers protection in all 27 EU member states ...
A federal court jury in Illinois found that nursing home operator Momence Meadows fraudulently billed Medicare and Medicaid for “worthless services” and falsely certified compliance with health care laws and regulations, resulting in $28 million in damages to the government. United States ex rel. Absher v. Momence Meadows Nursing Ctr., Inc., No. 2:04-cv-02289 (C.D. Ill. Feb. 8, 2013) ...
On February 27, 2013, the Supreme Court held in a 6-3 opinion in Amgen Inc. v. Connecticut Retirement Plans and Trust Funds, 568 U.S. ___ (2013), that securities fraud class action plaintiffs need not prove materiality at the class certification stage to invoke the fraud-on-the-market presumption of class-wide reliance ...
The United States Supreme Court yesterday significantly limited the federal government’s ability to bring an action for civil penalties more than five years after the alleged misconduct occurred. In Gabelli v. Securities and Exchange Commission, the Court held that the five-year limitations period governing most enforcement actions begins to run when the underlying violation occurred – not when the government discovered the violation ...
It took thirteen years, four months, and five days of heated debates and passionate protests before the country’s first reproductive health law was passed. Four days shy of Christmas last year, President Aquino finally signed the 24-page bill into law. It is now Republic Act No. 10354 or The Responsible Parenthood and Reproductive Health Act of 2012 (RH Law). The passing of the RH Law, however, does by no means close this chapter of Philippine history ...
On Tuesday, February 19, 2013, information security firm Mandiant issued a report documenting computer security breaches at hundreds of organizations, allegedly resulting from a cyber-espionage campaign undertaken by elements of the Chinese government. The Mandiant report is only the latest in a series of much-publicized incidents of “hacking” performed by what is believed to be a variety of public and private actors ...
There are several TCI legal entities regularly established for carrying out business either internationally or domestically. The registration process of these entities is comparatively straightforward and can usually be completed for a fixed cost and within a short timeframe and are often attractive options in TCI as an offshore financial centre with no corporate or personal income tax ...