Firm: All
Practice Industry: Healthcare & Pharmaceuticals, Industrial & Manufacturing, Technology
Region: All
Country/ State: All
Tag: All

The Federal Circuit released the results of its en banc hearing of a case involving the issue of what is patent eligible subject matter under section 101 of the Patent Act. (CLS Bank International v. Alice Corporation Pty. Ltd., F. 3d., Case No. 2011 1301 (May 9, 2013) ...

Last week, a federal jury in South Carolina found that Tuomey Healthcare System, Inc. violated the Stark Law and the False Claims Act by submitting false claims for reimbursement to the United States, resulting in $39 million in damages to the government. United States ex rel. Drakeford v. Tuomey Healthcare Sys., Inc., No. 3:05-2858-MBS (D.S.C. May 8, 2013) ...

Shoosmiths LLP | May 2013

A survey by the Information Commissioner's Office (ICO) has revealed that 47% of all UK adults now use their personal smart phone, laptop or tablet computer for work purposes - known as 'bring your own device' (BYOD).However, fewer than three in 10 users had received guidance on how to use their devices for work. This raises concerns that users may not understand how to protect the personal information accessed and stored on these devices ...

Shoosmiths LLP | May 2013

The first industrial revolution, which began in the 1750s, lasted for between 80 to 100 years. The pace of technological change today encourages us to believe that the second industrial revolution (IR2) will be completed at much greater speed. So if we take the mid-1980s as a starting point, with the emergence of optical disk technologies into consumer markets, you would expect us to be well on the way to completion, 30 years into IR2 ...

The hacker group Anonymous announced that it, in concert with Middle East- and North Africa-based criminal hackers and cyber actors, will conduct a coordinated online attack labeled “OpUSA” against banking and government websites today, May 7. Anonymous stated that OpUSA will be a distributed denial of service (DDoS) in which websites may be defaced and legitimate users may be unable to access websites ...

ALRUD Law Firm | May 2013

I. Recruitment and Social Media 1. Is there a specific legal framework for the use of social media in the recruitment context? There are no specific laws or regulations dealing with the use of information from social media in the recruitment context. However, the following general laws are relevant:  - Article 8, European Convention on Human Rights, 1950; - Articles 23, 24 and 29, Constitution of the Russian Federation; - Federal Law No ...

Shoosmiths LLP | May 2013

On 2 April 2013, data protection authorities across the EU - including the Information Commissioner's Office (ICO) - announced that they are now investigating whether Google's privacy policy complies with national data protection laws.The investigation was prompted by allegations that Google failed to implement recommendations issued to it by the EU Working Party in October 2012 ...

Haynes and Boone, LLP | April 2013

On April 17, 2013, the Health and Human Services Office of Inspector General (OIG) released an Updated Provider Self-Disclosure Protocol (SDP), which replaces the original SDP published in 1998. The SDP is used by providers and suppliers to voluntarily disclose violations of the fraud and abuse laws. According to the OIG, it has received more than 800 disclosures since the SDP’s inception, resulting in more than $280 million in recoveries ...

ENS | April 2013

Lindt received a nasty shock just before the Easter weekend. A 12-year legal battle ended with a German court ruling that Lindt could not use the German trade mark registration that it has for its famous Easter bunny to stop a competitor, Riegelen, from selling very similar looking confectionery – Lindt’s registration is for a sitting bunny wrapped in gold foil and featuring a red ribbon and a bell ...

ENS | April 2013

The issue of a plain packaging requirement for tobacco products has been a hot topic since mid- 2012 ...

ENS | April 2013

The decision of the Indian Supreme Court to deny Novartis’s application for patent protection for an improved version of its patented Glivec drug – the culmination of a seven-year battle - has certainly made the headlines. There are a number of reasons for this. First, Glivec is a well-known drug – described by some as a ‘wonder drug’ – that’s used to combat cancer, including  leukaemia and gastro-intestinal cancer ...

When was the last time when you or someone you know shared a bad experience or a complaint about a person in Facebook or Twitter?  A good bet is that a longer time has passed than if this question was asked a year ago.  The reason for this is probably Republic Act No. 10175, also known as the Cybercrime Prevention Act of 2012, which President Noynoy Aquino signed into law on September 12, 2012. A ...

Adopted in 2000, Regulation FD generally prohibits public companies and personnel acting on their behalf from selectively disclosing material, nonpublic information to certain groups, such as brokers, investment advisers, analysts and shareholders who are likely to trade on information, without concurrently making widespread public disclosure ...

ENS | March 2013

The Supreme Court of Appeal recently handed down a rare trade mark judgment.  The protagonists were Adidas and Pepkor, and the main issue was whether Pepkor had infringed certain trade mark registrations belonging to Adidas for its famous three-stripe mark. Adidas was founded by a German called Adi Dassler in 1920 ...

ENS | March 2013

Rooibos certainly does make the headlines ...

ENS | March 2013

Technology-rich South African companies and indeed inventors who have taken the brave step of filing foreign patents -will know that there are two ways of getting patent protection in Europe. The first is the national route, in other words filing a patent directly in the country or countries of interest. The second route is that of the European Patent ...

ENS | March 2013

The BBC recently published a piece called ‘3D Printing Will Be the Next Big Copyright Fight’. It said this:  ‘That moment we’ve been hearing about for years – the one where futuristic-sounding 3D printing becomes ubiquitous – is actually upon us.’  It dealt with a topic that’s also referred to as ‘additive manufacturing’ ...

ENS | March 2013

It’s well known that computer programs enjoy copyright protection - many have  also been patented, but that’s another story and I’m not going to deal with that here. The South African Copyright Act has protected computer programs as a specific category of works since 1992, although prior to that they were protected as ‘literary works’ ...

ENS | March 2013

There was an interesting decision in the US recently about the intellectual property (IP) implications of posting a photo on Twitter.   The facts were that a professional photographer by the name of Daniel Morel – a man who has apparently spent over 25 years in Haiti – posted dramatic photos of the earthquake that struck Haiti in January 2010 shortly after the event ...

Shoosmiths LLP | March 2013

The collapse of systems integrator and reseller 2e2 in January has highlighted the danger for clients of companies such as 2e2, and focuses attention on how to deal with this type of situation. At a recent Shoosmiths event, data, IT and banking lawyers shared practical experience of the risks and potential remedies associated with insolvency of IT suppliers ...

Haynes and Boone, LLP | March 2013

A federal court jury in Illinois found that nursing home operator Momence Meadows fraudulently billed Medicare and Medicaid for “worthless services” and falsely certified compliance with health care laws and regulations, resulting in $28 million in damages to the government. United States ex rel. Absher v. Momence Meadows Nursing Ctr., Inc., No. 2:04-cv-02289 (C.D. Ill. Feb. 8, 2013) ...

ENS | February 2013

It’s well known that computer programs enjoy copyright protection - many have  also been patented, but that’s another story and I’m not going to deal with that here. The South African Copyright Act has protected computer programs as a specific category of works since 1992, although prior to that they were protected as ‘literary works’ ...

Hunton Andrews Kurth LLP | February 2013

On February 26, 2013, the National Institute of Standards and Technology ("NIST") issued a Request for Information ("RFI") to gather comments regarding the development of a framework to reduce cybersecurity risks to critical infrastructure. As we previously reported, the Obama Administration’s executive order, Improving Critical Infrastructure Cybersecurity (the "Executive Order"), released on February 12, 2013, directs NIST to coordinate development of this framework ...

Data Privacy Act of 2012 The Data Privacy Act (Republic Act No. 10173) seeks to protect the confidentiality of “personal information.” The latter is defined as “any information whether recorded in material form or not, from which the identity of an individual is apparent or can be reasonably and directly ascertained by the entity holding the information, or when put together with other information would directly and certainly identify an individual ...

dots