Firm: All
Practice Industry: Energy & Natural Resources, Technology, Transportation
Region: All
Country/ State: All
Tag: All

The County Commission in Doddridge County, West Virginia is currently considering amendments to its Floodplain Ordinance as a result of a December 17, 2012 decision by the Circuit Court of Doddridge County. (Comments to the amended floodplain ordinance were due by March 25, 2013.) The facts and procedural posture of the Doddridge County case are convoluted ...

By October 1, 2013, the North Carolina Mining and Energy Commission (“N.C. MEC”) must report its findings and recommendations for hydraulic fracturing to the Joint Legislative Commission on Energy Policy and the Environmental Review Commission. One of the issues being considered by the N.C. MEC is whether the state will permit forced pooling by oil and gas companies ...

Makarim & Taira S. | April 2013

Following the dissolution of BP Migas, SKK Migas has taken over all upstream oil and gas business activities until the new law on oil and gas is enacted. The Minister of Energy and Mineral Resources recently issued Regulation No. 9 of 2013 on the duties and organizational structure of SKK Migas ...

The primary issue in the three (3) consolidated cases involving San Roque Power, Taganito Mining and Philex Mining decided last February 12, 2013 revolves around the proper period for filing the judicial claim for refund or credit of creditable input tax ...

When was the last time when you or someone you know shared a bad experience or a complaint about a person in Facebook or Twitter?  A good bet is that a longer time has passed than if this question was asked a year ago.  The reason for this is probably Republic Act No. 10175, also known as the Cybercrime Prevention Act of 2012, which President Noynoy Aquino signed into law on September 12, 2012. A ...

Adopted in 2000, Regulation FD generally prohibits public companies and personnel acting on their behalf from selectively disclosing material, nonpublic information to certain groups, such as brokers, investment advisers, analysts and shareholders who are likely to trade on information, without concurrently making widespread public disclosure ...

It’s not impossible for nations in conflict to put aside their differences to coordinate the delivery of natural resources, but it’s unusual. For the Democratic Republic of Congo, Rwanda, and Burundi, cooperation is transforming the shared Ruzizi River into a valuable source of hydro power for three peoples ...

In continuing our commitment to best serve our clients, we have been closely monitoring legislative changes in West Virginia that may affect the shale gas industry in the state. This update covers a new rule affecting horizontal drilling and the results of a recent pit and impoundment study ...

ENS | March 2013

Technology-rich South African companies and indeed inventors who have taken the brave step of filing foreign patents -will know that there are two ways of getting patent protection in Europe. The first is the national route, in other words filing a patent directly in the country or countries of interest. The second route is that of the European Patent ...

ENS | March 2013

The BBC recently published a piece called ‘3D Printing Will Be the Next Big Copyright Fight’. It said this:  ‘That moment we’ve been hearing about for years – the one where futuristic-sounding 3D printing becomes ubiquitous – is actually upon us.’  It dealt with a topic that’s also referred to as ‘additive manufacturing’ ...

Lawson Lundell LLP | March 2013

Mining has become one of the largest industries in British Columbia, and Vancouver is considered by many to be the world's leading centre of expertise for mineral exploration, with some 1,200 exploration companies located in the province. As a result, many British Columbians have a disproportionate stake in what lies ahead for the mining industry. In 2011, B.C ...

Lavery Lawyers | March 2013

Here is an overview prepared by Lavery of the highlights of the consultation document (in French) released last Thursday by the Quebec government in connection with the forum on mining royalties to be held on March 15, 2013. Overview of the consultation document entitled "Le régime d’impôt minier du Québec" ...

The Department of Environment and Natural Resources (DENR) issued DENR Memorandum Order No. 2013-01 (theMemorandum Order), which increased the minimum capital requirements for mining applicants. Under the Memorandum Order, the minimum authorized capital stock and paid-up capital of mining applicants were increased as follows:Authorized Capital: From PhP10 million; To PhP100 million.Paid-Up Capital: From PhP2.5 million; To PhP6.25 million ...

ENS | March 2013

It’s well known that computer programs enjoy copyright protection - many have  also been patented, but that’s another story and I’m not going to deal with that here. The South African Copyright Act has protected computer programs as a specific category of works since 1992, although prior to that they were protected as ‘literary works’ ...

ENS | March 2013

There was an interesting decision in the US recently about the intellectual property (IP) implications of posting a photo on Twitter.   The facts were that a professional photographer by the name of Daniel Morel – a man who has apparently spent over 25 years in Haiti – posted dramatic photos of the earthquake that struck Haiti in January 2010 shortly after the event ...

Shoosmiths LLP | March 2013

The collapse of systems integrator and reseller 2e2 in January has highlighted the danger for clients of companies such as 2e2, and focuses attention on how to deal with this type of situation. At a recent Shoosmiths event, data, IT and banking lawyers shared practical experience of the risks and potential remedies associated with insolvency of IT suppliers ...

ENS | February 2013

It’s well known that computer programs enjoy copyright protection - many have  also been patented, but that’s another story and I’m not going to deal with that here. The South African Copyright Act has protected computer programs as a specific category of works since 1992, although prior to that they were protected as ‘literary works’ ...

Hunton Andrews Kurth LLP | February 2013

On February 26, 2013, the National Institute of Standards and Technology ("NIST") issued a Request for Information ("RFI") to gather comments regarding the development of a framework to reduce cybersecurity risks to critical infrastructure. As we previously reported, the Obama Administration’s executive order, Improving Critical Infrastructure Cybersecurity (the "Executive Order"), released on February 12, 2013, directs NIST to coordinate development of this framework ...

Makarim & Taira S. | February 2013

 Shipment in Indonesia is regulated by the Indonesian Commercial Code (“ICC”) and Law No. 17 of 2008 (the “Shipping Act”), which spawned a variety of implementing regulations.  After 2008 a package of new implementing regulations to the Shipping Act sought to regulate a broad spectrum of water transportation aspects, including:   •       Port Affairs (Government Regulation No ...

Data Privacy Act of 2012 The Data Privacy Act (Republic Act No. 10173) seeks to protect the confidentiality of “personal information.” The latter is defined as “any information whether recorded in material form or not, from which the identity of an individual is apparent or can be reasonably and directly ascertained by the entity holding the information, or when put together with other information would directly and certainly identify an individual ...

What it’s aboutThe Data Privacy Act (Republic Act No. 10173) seeks to protect the confidentiality of “personal information.” The latter is defined as “any information whether recorded in material form or not, from which the identity of an individual is apparent or can be reasonably and directly ascertained by the entity holding the information, or when put together with other information would directly and certainly identify an individual ...

What it’s aboutThe Cybercrime Prevention Act (Republic Act No. 10175) penalizes “cybercrimes”— acts that fall into any of these major categories:a) offenses against the confidentiality, integrity and availability of computer data and systems (e.g., illegal access, data interference);b) computer-related offenses (e.g., computer-related forgery and fraud);c) content-related offenses (e.g ...

Lawson Lundell LLP | February 2013

The mining sector is affected by constant changes in the market, along with exploration results and discoveries. The fast pace of this change results in trends developing on a micro or macro scale, and one of the re-emerging trends seen in the industry today is the use of strategic alliances for mineral exploration purposes.   The nature and terms of a strategic alliance can vary greatly, depending upon the objectives of the parties ...

Makarim & Taira S. | February 2013

The Government finally issued Government Regulation No. 82 of 2012 9regarding the Implementation of Electronic Systems and Electronic Transactions (“Regulation 82”) for Law No. 11 of 2008 regarding Electronic Information and Electronic Transactions (“Law No.11”). Regulation 82 sets out significant requirements in relation to electronic registration/certification, electronic systems, electronic transactions, electronics agents, electronic signatures and domain names ...

dots