Firm: All
Practice Industry: Intellectual Property, Technology
Region: All
Country/ State: All
Tag: All
Lavery Lawyers | May 2018

Artificial intelligence has undergone significant developments in the last few years, particularly in respect of what is now known as deep learning.1 This method is the extension of the neural networks which have been used for a few years for machine learning. Deep learning, as any other form of machine learning, requires that the artificial intelligence system be placed before various situations in order to react to situations which are similar to previous experiences ...

Heuking | May 2018

Many companies use so-called tracking tools on their website to analyze the use of the website by their visitors, and possibly also to carry out advertising activities on the basis of user profiles created with the tracking tools. These tracking tools mainly use cookies, i.e. small files that can identify a user of a website and that are deposited on the respective user's computer ...

Heuking | May 2018

Under Art. 26 GDPR, "joint controllers" must find an agreement on the data protection obligations between themselves. If they do not do so, they risk a fine pursuant to Art. 83 (4) GDPR. However, the question of when Joint Controllership applies is still a matter of dispute. REQUIREMENTS FOR A JOINT CONTROLLERSHIP Under Art. 26 (1) GDPR, where two or more Controllers jointly determine the purposes and means of processing, they must be classified as "Joint Controllers" ...

Alta QIL+4 ABOGADOS | May 2018

“We simply cannot go on with this utterly outmoded way of working…Endlessly re-keying in the same information; repeatedly printing and photocopying the same documents; moving files about, losing all or parts of them in the process… It is a heavy handed, duplicative, inefficient and costly way of doing our work and it is all about to go. Considerably past time, we will finally catch up with the world.” Sir Brian Leveson ...

The Philippine National Privacy Commission (NPC), which administers the country’s Data Privacy Act (DPA), has recently made available to the public copies of its advisory opinions. These opinions had been issued in response to various queries regarding the proper application and interpretation of the provisions of the DPA and its implementing rules and regulations. Issue of consent Advisory Opinion No ...

Heuking | April 2018

The Bavarian data protection supervisory authority has prepared a series of template documents and overviews, intended to help small companies with GDPR compliance. At first glance, these documents do indeed provide important support for small companies. These have to fulfil almost all obligations under the GDPR in a similar manner to medium-sized businesses and large corporations ...

Afridi & Angell | April 2018

Over the past 1-2 years, a great deal of information concerning the revolutionary technology that is “blockchain” has been published on many business, legal and technology news sources, and innumerable self-proclaimed authorities on the subject have emerged to contribute articles and presentations (ourselves among them) ...

Karanovic & Partners | April 2018

Artificial intelligence is a burning topic in many sectors today and the legal industry is no exception. Recently, at the World Services Group’s annual employment law1 conference held in February, AI was heavily debated along with its’ impact not only on the legal profession, lawyers, clients, the way business is done, but also our traditional understanding of concepts such as “law” or “justice” ...

Karanovic & Partners | April 2018

Artificial intelligence is a burning topic in many sectors today and the legal industry is no exception. Recently, at the World Services Group's annual employment law conference held in February, AI was heavily debated along with its' impact not only on the legal profession, lawyers, clients, the way business is done, but also our traditional understanding of concepts such as "law" or "justice" ...

Dinsmore & Shohl LLP | April 2018

If your company has a cybersecurity incident, this guide is intended help you think through critical disclosure requirements and will direct you to sample disclosures from other companies that have endured cybersecurity issues. I. Introduction With the recent string of high profile cybersecurity attacks, the U.S. Securities and Exchange Commission (the SEC) issued further guidance regarding public companies’ disclosure of cybersecurity incidents ...

COBALT | April 2018

“Belarus will become the first government in the world that opens wide opportunities for the use of blockchain technology”, said in a statement on the official website of the President of Belarus. Alexander Lukashenko, who signed the new law of the land, believes that his county “has every chance of becoming a regional center in this area.” The Presidential Decree of the Republic of Belarus No ...

Dykema | April 2018

In 2017, the Cayman Islands passed the Data Protection Law (“DPL”), which reads much like the upcoming European Union General Data Protection Regulation (“GDPR”) that goes into effect Mary 25, 2018. The DPL applies to entities falling within the definition of “data controller” who are established in the Islands or who process data in the Islands. The DPL divides data into two categories, personal data and sensitive data ...

Lavery Lawyers | April 2018

Technologies based on blockchains and AI imply a considerable change for our society. Being that the security of data exchanged is vital, companies must begin adopting a long-term approach right now. Many businesses develop services based on blockchains, in particular in the financial services sector. Cryptocurrencies, one example of blockchain use, transform the way in which some monetary transactions are made, far from the oversight of financial institutions and governments ...

Heuking | April 2018

The General Data Protection Regulation (GDPR) is aimed at extensive harmonization of data protection in the EU, and will be applicable with effect from May 25, 2018. The GDPR will replace the current EU Data Protection Directive (Directive 95/46/EC) and will be directly applicable in all EU member states. The new regulations mean that German employers will also have to prepare for changes as regards the protection of employees’ personal data ...

Dykema | April 2018

In light of the increasing significance of cybersecurity incidents, the Securities and Exchange Commission (SEC) recently found it necessary to provide further guidance with respect to cybersecurity disclosure requirements under the federal securities laws as they apply to public operating companies ...

Shearn Delamore & Co. | March 2018

  Can “consent” to use a registered trade mark be considered an abandonment by the owner of the exclusive rights to that registered trade mark in perpetuity? Section 40(1)(dd) of theTrade Mark Act 1976 (“Act”) provides that it is not a trade mark infringement if it is “the use by a person of a trade mark in relation to goods or services to which the registered proprietor or registered userhas at any time expressly or impliedly consented to” [Emph

Dinsmore & Shohl LLP | February 2018

U.S. technology company Cogint, Inc. (NASDAQ: COGT) announced the termination of its proposed business combination with BlueFocus International Limited after the Committee on Foreign Investment in the United States  indicated the committee’s unwillingness to approve the transaction ...

The CPA appointed the National Bureau of Investigation (NBI) and Philippine National Police (PNP) as enforcement authorities and regulates their access to computer data, creating the Cybercrime Investigation and Coordinating Center (CICC) as an inter-agency body for policy coordination and enforcement of the national cybersecurity plan, and an Office of Cybercrime within the Department of Justice (DOJ-OC) for international mutual assistance and extradition ...

Szecskay Attorneys at Law | February 2018

The GDPR contains rules on when it is mandatory for controllers and processors to designate a data protection officer. The Article 29 Data Protection Working Party (WP29) issued guidelines on the data protection officers (DPOs) interpreting the respective provisions of the GDPR (Articles 37-39 and Recitals 77 and 97). The Data Protection Officer (DPO) The GDPR contains rules on when it is mandatory for controllers and processors to designate a data protection officer ...

ENS | February 2018

  The question of when the South African Protection of Personal Information Act, 2013 (“POPI”) will come into force has been asked many times since the Bill was signed into law by the president on 19 November 2013 ...

COBALT | February 2018

Since not only individual people, but also the overall project, are being present­ed, online presentation can be divided into two main parts. First is the management of personal social media. Avoid any dis­respectful or offensive discourse, as well as any ambiguous posts and photos. Or as a minimum , do not display them publicly. Secondly, visual communication is ab­solutely crucial to protect the name of a reliable project ...

TSMP Law Corporation | February 2018

Technology’s dark side may well be the silent threat to democracy. A year ago, Americans installed a reality TV star in the White House who doesn’t seem to let the facts get in the way of a good tweet. Trump’s shambolic management style has given America’s enemies a perceived opportunity to drive their country’s agendas ...

Dinsmore & Shohl LLP | February 2018

As technology has advanced, cyber extortion attacks have risen, and they will continue to be a major security issue for organizations. Cyber extortion can take many forms, but it typically involves cybercriminals demanding money to stop or delay their malicious activities, which include stealing sensitive data or disrupting computer services. Health care and public health sector organizations that maintain sensitive data are often targets for cyber extortion attacks ...

ENS | January 2018

In an increasingly connected world, the protection of privacy and personal data has become a key concern for legislators in a number of jurisdictions. In South Africa, an attempt to give effect to the constitutional right to privacy resulted in the Protection of Personal Information Act, 2013 (“POPI”), which was gazetted on 26 November 2013 ...

dots