Firm: All
Practice Industry: Dispute Resolution, Technology, Telecommunications
Region: All
Country/ State: All
Tag: All
Haynes and Boone, LLP | September 2011

Beginning today, September 7, 2011, owners of registered trademarks can file applications to block third parties from registering adult-oriented .XXX domains that contain their marks. This “Sunrise” period runs through October 28, 2011. Opt-out applications can be submitted using any .XXX accredited registrar. The current list of accredited registrars is available here. Registars’ fees vary but typically range from $200 to $500 per mark ...

MinterEllison | August 2011

A recent decision in the Full Federal Court has shown that while manufacturers are generally free to make goods according to a design that is not registered, care must be taken to ensure that those products are branded in a way that distinguishes them from the market leader ...

The past year has seen a significant rise in the uptake of mediation as an alternative means of dispute resolution and this is a trend which is likely to continue. Designed to resolve disputes to the (relative) satisfaction of both parties at an early stage, mediation uses an independent, specially trained third party mediator to facilitate private and confidential settlement discussions between parties ...

Shoosmiths LLP | July 2011

There are numerous internet-based interactive platforms that may be referred to as social media outlets, for example Facebook, Linkedin or Twitter. It is hard to spend any time online without coming across some form of social media platform. Many retail websites will have a section for user feedback and reviews, such message boards are themselves a form of social media ...

Advances in digital technology have created a virtually limitless supply of content available in “byte-sized” forms, where original works are being increasingly “atomized” into smaller, digestible digital content pieces for consumers and content providers alike ...

Dykema | July 2011

It’s an all too common scenario. An unsuspecting Internet user opens an email with a link to a website spoofing that of a leading financial institution. The user is asked to input personal information such as bank credentials or social security numbers and in a matter of seconds the user becomes the victim of a phishing scam and is left to deal with the financial and emotional fallout stemming from the identity theft ...

Asters | June 2011

INTRODUCTION TO DISPUTE RESOLUTION FRAMEWORK   Ukraine is a civil law country with the Constitution being a principal source of law. The main sources of civil and commercial law are acts promulgated by the legislative and executive branches of the state. International treaties ratified by Parliament become part of national law and prevail in a conflict with domestic law ...

Shoosmiths LLP | June 2011

Should the internet be free and open, with all internet traffic treated equally and no restrictions on transmitting content regardless of its type or size (so called 'net neutrality')? That is the view taken by Dutch lawmakers, who have finally approved a new piece of legislation to force internet service providers (ISPs) to do just that ...

A recent technical malfunction that knocked out websites and affected hundreds of businesses using Amazons cloud computing services offered high profile evidence of both the widespread popularity of cloud services and the potential consequences of storing company data in the cloud. The incident also drew attention to cloud service contracts, raising questions about performance levels and backups in the event of a service interruption ...

Haynes and Boone, LLP | June 2011

First proposed more than a decade ago, .XXX top-level domains have now been approved and will be launching shortly. The domains are intended for use by the adult entertainment industry, but for trademark owners in other industries, the potential association of their valuable brands with .XXX domains could have serious consequences. Fortunately, owners of registered trademarks can soon apply to block third parties from registering .XXX domains that contain their marks. The ...

Haynes and Boone, LLP | June 2011

The Supreme Court ruled last week in Microsoft Corporation v. i4i Limited Partnership that “clear and convincing evidence” is still the standard of proof required to invalidate a patent. Section 282 of the Patent Act states that “a patent shall be presumed valid” and that “[t]he burden of establishing invalidity of a patent or any claim thereof shall rest on the party asserting such invalidity ...

Dykema | June 2011

Your employees may be using your business’s credit cards to make charges you haven’t authorized. And if you don’t discover it soon after the fact, you may be liable for those charges.   “A court’s rationale is pragmatic and straightforward ...

The Social Network did not just tell the fascinating story of Facebook's rise to a social media power house. It showed how society is increasingly using social platforms as one of its primary channels for communication. Social media is broader than social networking sites such as Facebook or Linked-In ...

Imitation is the sincerest form of flattery — so they say. Boosters in Wellington, New Zealand, call themselves “Silicon Welly.” And Texas Gov. Rick Perry said somewhere in America “Silicon Valley will be replicated. I want it to be in Austin” — even though central Texas dubbed itself “Silicon Hills” long ago. There’s also the Silicon Forest, Prairies, Alleys and other Valleys. Not to mention the No. 1 Silicon Alley — in New York City ...

Shoosmiths LLP | May 2011

All businesses possess confidential information - trade secrets, customer lists, staff records - which could mean loss of business, reputational damage, or give competitors an advantage if leaked, whether deliberately or accidentally.Depending on the type of information disclosed and the type of organisation, there are potential consequences regarding public policy and data protection ...

In the latest in a series of legal challenges around internet keywords and particularly the Google AdWords system, the special adviser to the Court of Justice of the European Union, Advocate General Jaaskinen, has issued his opinion ...

The situation is this: you represent a manufacturer in a tort dispute.  During discovery, plaintiffs notice a Rule 30(b)(6) deposition of your client’s representative, but elect to forgo the deposition in exchange for negligible admissions filed by your client.  Discovery has closed.  The trial date is looming ...

MinterEllison | February 2011

Alternative dispute resolution benefits the public no matter what the outcome Attorney-General Robert McClelland continues to pus alternative dispute resolution after launching the report A Strategic Framework for Access to Justice in the Federal Civil Justice System late last year. One of its main recommendations is to encourage Commonwealth agencies to use ADR ...

Shoosmiths LLP | February 2011

The majority of disputes are settled before trial, and an increasing number are settled before proceedings are issued. The Civil Procedure Rules that provide the framework for litigation in England and Wales encourage parties to consider alternative ways to resolve their differences. There are a variety of techniques that can be utilised to achieve an early and cost effective settlement. Collectively, these are known as ADR ...

Shoosmiths LLP | February 2011

Website accessibility is a requirement of the Equality Act 201.  The first of a two-part article explaining Equality Act 2010 to websites. In our last article, Website accessibility: Industry standards and best practice, we considered how the Equality Act 2010 would be implemented, and considered what the new BSI Standard for website accessibility might look like ...

Lavery Lawyers | February 2011

Concents : * Technology Licences in the Event of Bankruptcy * New Quebec Business Corporations Regime * The Shareholder Agreement: the "Specifications" of the Private Corporation Shareholder Technology Licences in the Event of Bankruptcy Sive Burns [email protected] The owner of a technology protected by an intellectual property right (copyright or patent) or protected by secret (trade secret) may grant a licence to a licensee ...

Lawson Lundell LLP | February 2011

The Federal government’s legislation to control spam and other ills of the electronic age with the oh-so-catchy title of  An Act to promote the efficiency and adaptability of the Canadian economy by regulating certain activities that discourage reliance on electronic means of carrying out commercial activities, and to amend the Canadian Radio-television and Telecommunications Commission Act, the Competition Act, the Personal Information Protection and Electronic Documents Act and

ALTIUS/Tiberghien | February 2011

1. How can the government’s attitude and approach to internet issues best be described? The attitude of the Belgian government can be described as positive and their approach is proactive. In 2003, the Belgian authorities announced the introduction of ‘egovernment’ ...

Shoosmiths LLP | January 2011

In the second of a two-part look at issues arising out of the tender process we consider what can happen when that process is poorly run. Part 1 of the series can be found at IT tendering: Leveraging the benefits. A typical tender process involves the customer analysing and documenting its requirements in a Request for Proposals (RFP) to which interested suppliers will prepare a response ...

Shoosmiths LLP | January 2011

In a recent article we looked at some of the employment risks for customers associated with cloud computing. Following on from Cloud computing: Employment law implications, we now consider how best to assess the other risks associated with cloud computing ...

dots