Uganda has enacted the Investment Code Act, 2019 (the “Code”). The previous Code was enacted in 1991 and was long overdue for amendment given the changes in approach to attracting investment and the glaring weaknesses in the old Code. The new Code strengthens the Uganda Investment Authority (the “Authority”), establishing it as a one-stop investment centre, and also provides for the financing and auditing of the Authority ...
With the enactment of Law No. 81 on Protection of Personal Data, the Republic of Panama aims to establish the principles, rights, obligations and procedures that regulate the protection of personal data, also considering their interrelation with private life and other rights and fundamental freedoms of citizens, by natural or legal persons, public or private law, lucrative or not, that process personal data in the terms provided in the Law ...
The law governing companies globally, and in India, recognises a company to be a personality, distinct from its shareholders. In the celebrated case of Salomon v Salomon & Co. Ltd[1]., Lord Halsbury LC, had stated:“[A] company must be treated like any other independent person with its rights and liabilities [legally] appropriate to itself … whatever may have been the ideas or schemes of those who brought it into existence.”1 ...
Even before the General Data Protection Regulation (GDPR) came into force, there were discussions as to whether the use of tracking cookies, which make it possible to analyze the usage and browsing behavior of a user on the Internet and use it for interest-based advertising, requires prior consent (opt-in) of the user or whether a dissent solution (opt-out) is sufficient. The German data protection authorities are of the opinion that users must give their consent ...
The Regional Labor Court (LAG) of Baden-Württemberg, in its ruling of December 20, 2018 (Ref. 17 Sat 11/18), granted an employee a comprehensive right to information against his employer with regard to all personal data collected about his person. The right to information was explicitly confirmed in relation to personal data resulting from internal investigations and data from potential whistleblowers ...
In a recent decision by the Technology and Construction Court (TCC), Judge Stewart-Smith has clarified the position when determining whether two adjudications are “the same or substantially the same” when a party challenges jurisdiction under Para 9(2) of the Scheme for Construction Contracts. He stated that thedecisionreached in the first adjudication must be considered as well as the disputesreferredto adjudication in each ...
Companies will need to take appropriate steps in the future to protect their secrets. The new law on the protection of trade secrets places greater demands on the sensitivity of secrets to this extent. Whistleblowers can also reveal trade secrets with impunity - one more reason to set up a whistleblower hotline. Reverse engineering will be a permissible way of acquiring a trade secret in the future ...
On 13 March 2019, the State Commissioner for Data Protection and Freedom of Information in Baden-Württemberg (LfDI BaWü) published the latest version of his guidebook on employee data protection. In this brochure, the LfDI BaWü offers an insight into his work and explains his opinion regarding the various points of view surrounding employee data protection ...
Although it is included in Indonesia’s annual national legislation program(Program Legislasi Nasional/Prolegnas)so far, the draft new Indonesian Competition Law which will replace Law No. 5 of 1999 on The Prohibition against Monopolistic Practices and Unfair Business Competition (the “Competition Law”), has not been passed ...
As seen in Bank Director A bank’s board of directors must answer to a variety of constituencies, including shareholders, regulatory agencies, customers and employees. At times those constituencies may have competing interests or priorities. Other times, what may appear to be competing interests are actually variations of aligned interests ...
Are the two trade marks confusingly similar? It’s the question that’s most commonly asked in trade mark law. The issue of confusion can arise in the context of registration: should the trade mark be registered in the face of the earlier trade mark? It can also arise in the context of use: does the trade mark that’s being used infringe the registered trade mark? The two cases that we will consider here both involve registration ...
Cloud computing and offshoring of data is no longer a taboo among banks. It is becoming a necessity and is the current definitive trend. However, the South African Reserve Bank (“SARB”) has issued a directive and guidance note detailing items banks must consider when electing to adopt cloud computing as a service or any offshoring of data ...
The implementation of cybercrime legislation is a pressing issue given that South Africa has one of the highest numbers of cybercrime victims in the world. In addition, a number of unsuspecting individuals and organisations alike fell prey to the scourge of cyber scams which seemed to spike quite rapidly in the past year. The Cybercrime Bill was adopted by the Portfolio Committee for Justice and Correctional Services in November 2018 and sent to the National Assembly for debate ...
The pervasiveness of the Internet of Things has spawned a recent fear that the devices are listening to the conversations of their users. For instance, the My Friend Cayla doll talks to children and answers their questions by connecting to the internet and using a combination of voice recognition software and Google searches to provide these responses ...
Gone are the days when a helicopter had to be hired to secure fantastic shots of a neighbourhood or local stadium in anticipation of a major public or private event. Drones have ushered in a new kind of photography and can be used in many instances and applications even in traditional industries like agriculture or last mile logistics. One of the primary functions of using drones is to capture, store and transmit data ...
Digital rights management (“DRM”) refers to the methods used by content owners to protect their digital content. A number of methods can be used to control and restrict access and usage of digital material. Popular DRM mechanisms include password protecting a digital file/content, as well as platform DRM, which is typically deployed by online streaming platforms and electronic databases to restrict access to content that users are required to pay for ...
TheBig Maccase has enjoyed considerable publicity – many publications have reported on it, includingWorld IP Review. The decision shines a spotlight on some important aspects of trade mark law. In this case, an Irish company called Supermac’s applied for the cancellation of the EU trade mark registration for Big Mac (belonging to McDonald’s) on the basis of non-use ...
It is no surprise that in this digital age, social media is more than a platform to connect with old school friends, share experiences or watch funny videos. Businesses have realised the value in leveraging social media platforms so as to directly connect with and market themselves and their businesses to existing and potential customers. Social media platforms allow businesses to increase their brand awareness and entrench themselves with their clients and secure their loyalty ...
The much awaited revised new regulations governing who qualifies for the FLSA white collar exemption has finally been revealed by the Department of Labor. It did so on March 8 by publishing anNPRM(“Notice of Proposed Rule Making”). In December of 2016, a Texas federal court entered a nationwide injunction halting the implementation of new regulations which would have dramatically increased the salary threshold for exempting most white collar employees from overtime ...
The fallout from the Illinois Supreme Court’s January 25, 2019, opinion in Rosenbach v. Six Flags Entertainment Corp., 19 IL 12316, continues.Rosenbach settled the dispute of who qualifies as an “aggrieved person” under the Illinois Biometric Information Privacy Act (“BIPA”), and in doing so opened the floodgates for this litigation to proliferate ...
Corporations and governments are ferreting out and squirreling away voluminous, detailed and private information about each and every one of us – and they are not afraid to use it. Should we be worried? Singapore’s Health Minister recently revealed that confidential details of 14,200 HIV-positive people, stolen from a government public health database, had been leaked online by a disgruntled US citizen who had been in a romantic relationship with a local doctor ...
On January 19, 2019, federal Magistrate Judge Kandis Westmore of the Northern District of California denied the Government’s application for a search warrant that sought: “all digital devices” present at a California residence; (Order at 3), and “any individual present at the time of the search to press a finger (including thumb) or utilize other biometric features…for the purposes of unlocking the digital devices found in order to permit a search of
We would like to inform you of the new rules of audits/inspections of companies processing personal data approved by the Decree of the Russian Government dated February 13, 2019 No. 146 «On Approving the Rules on Arranging and Exercising Control over Compliance of Personal Data Processing» («Decree»). The Russian Data Protection Authority (DPA) is entitled to investigate companies’ compliance with data protection laws ...