The IT outsourcing market has matured in the past years. Many IT outsourcing relationships are fruitful and long lasting. Nevertheless international surveys continue to show that numerous outsourcing deals are untimely terminated in the first two to four years. This paper highlights the key risk factors for failure of IT outsourcing relationships. These key risk factors will be underlined by various failed outsourcing case law. Such case law probably only represents the top of the iceberg ...
Open source software ("OSS") is quickly entering the mainstream and becoming increasingly widely used. In fact International Data Group analysts have predicted that the OSS marketplace will be worth £35 billion by 2008. OSS is software that is freely available (without discrimination) and can be copied, modified and redistributed ...
Procuring and implementing an ICT system within an organisation can be a stressful task. High profile failures in both the public and private sectors hit the headlines all too often. The National Audit Office's report last month on the £6.2bn NHS IT upgrade in England put many of the challenges firmly in the spotlight. In the heat of the procurement process it is easy to forget some basic procurement principles ...
Every day in Mumbai, India, a team of 5,000 couriers deliver, collect and return 200,000 lunch boxes. This massive logistics operation is undertaken with an error rate of less than 1 in 8 million deliveries and without using any information technology. Enormous labour cost disparities enable this manual operation to be undertaken cost-effectively ...
The Police and Justice Bill was put before the House of Commons on 25 January 2006. The main aim of the Bill is to improve the powers and scope of the police force but there are a number of sections which look to update the Computer Misuse Act 1990 (CMA) and in particular to make Denial of Service (DOS) Attacks illegal. DOS attacks can take many forms but are essentially an attempt to disrupt the use of a computer, server or website ...
Dominant companies have special responsibility to ensure that the way they do business doesn’t prevent competition on the merits and does not harm consumers and innovation», said European Competition Commissioner Mário Monti, regarding the Commission’s Microsoft decision dated March 24th, 2004 ...
The interoperability information on Microsoft’s decision deserves special attention by the undertakings that have a dominant position in the market. Intellectual property rights, granted as an incentive for the creation of innovation and as a tool to recoup the investments made by companies, used to be understood as providing several rights to its owners ...
Complaints by foreign businesses regarding protection of intellectual property rights in China have been a consistent feature in media reports since large scale foreign investment commenced some 20 years ago. However, China's economic revolution over the same period means that opinions based on negative experiences in the past must be constantly reassessed ...
Internet telephones are set to take the global communications industry by storm. Big names like Microsoft, AOL, Yahoo! and eBay are piling into the market and former state-run telecoms providers like BT are also investing. The technology was first developed by the US Defense Department as part of a research project on interconnection in the 1970s. But until recently only techno-geeks have had the interest and ability to make any use of it. But times have changed ...
On 1 May 2004 a new and revised Technology Transfer Block Exemption Regulation (the TTBER) entered into force - Regulation No. 772/2004. The TTBER will provide block exemptions for IP licensing agreements, ensuring that certain technology transfer agreements are automatically exempt from the application of Article 81(1) of the EC Treaty, which prohibits anti-competitive agreements ...
The European Union has recently launched a new ccTLD (country code top level domain). Instead of using the various national European ccTLD's, such as .fr for French companies, .de for German companies, and .co.uk for U.K. companies, the EU has made available the .eu suffix as a Community-wide ccTLD. The new domain extension has already proved widely popular, with more than 100,000 applications for domain names filed thus far ...
Germany. November 9, 1938. Kristallnacht. “The Night of Broken Glass.” Nazi secret police and the Hitler youth swarm over Jewish businesses and homes, terrorizing and victimizing helpless individuals all over the country.1 SS leadership orchestrates attacks on every vestige of Jewish culture as “punishment” for fictitious crimes that will never be recognized by the rest of the world ...
At the end of June, the US entertainment industry won a long fought victory to help bring file swappers to heel ...
The European Parliament dealt a blow to programmers seeking clarity on the patentability of computer-implemented inventions last month when it rejected a draft European Directive on the subject (the "CII Directive") by an overwhelming majority ...
Summary ‡ Information security “breaches” take many forms and occur in a wide variety of settings. However, contrary to recent press reports, they do not appear to be increasing. ‡ Research indicates that only a small percentage of breaches result in any harmful use of data. ‡ Account fraud and true identity fraud — the two identity-based frauds most feared by consumers and policy makers — are actually declining ...
The Ministry of Information Industry ("MII") promulgated the Measures for the Administration of the Filing for the Record of Non-Commercial Internet Information Services (the "Recordal Measures") on 8 February 2005. The Recordal Measures took effect on 20 March 2005. It provides detailed guidelines on recordal filings for non-commercial websites ...
When it comes to the patentability of computer-implemented inventions, Europe and the United States have differing and diverse opinions. The United States has a liberal approach to the patentability of computer software and will therefore grant patents for such inventions. Not so in Europe though, where computer programs are patentable only if they make a “technical contribution” to the state of the art ...
ICC Publishes Paper on Internet Governance The Internet Corporation for Assigned Names and Numbers (ICANN), a private sector body based in California, currently operates the allocation of domain names and Internet Protocol addresses on a worldwide basis. At the World Summit on the Information Society in Geneva in December 2003, the issue of transferring ICANN’s role to the United Nations was raised by a number of developing countries ...
The Standing Committee of the 10th National People's Congress passed the Law of the People's Republic of China on Electronic Signatures on 28 August 2004. The Law, which was promulgated on 28 August by President Hu Jintao, will enter into effect on 1 April 2005 and provides a legal basis for electronic transactions. Electronic data text The Law applies to electronic signatures in electronic data text ...
California Law Requires Telling Your Customers That You've Been Hacked A new California Law (Assembly Bill No. 700, Chapter 1054) went into effect on July 1, 2002 that requires companies who conduct business in California to notify their California-resident customers if their unencrypted personel information may have been stolen as a result of a security breach ...
Technology Update Authors Brian D. Barnard Randall E. Colson M. Ann Newton Related Practice Groups Intellectual Property A new California Law (Assembly Bill No. 700, Chapter 1054) went into effect on July 1, 2002 that requires companies who conduct business in California to notify their California-resident customers if their unencrypted personel information may have been stolen as a result of a security breach ...
Five years ago your CEO told you that your company had to have a “web” strategy. So, you learned everything about the Internet. You hired specialty law firms, bought software, and entered into web development and hosting agreements. You mastered all the web lingo. Now, all of that is passé ...
The Internet is a rather young, but a very popular source of information for Ukrainian businesses and consumers. The Internet segment of the market has been actively developed recently and has acquired a high level of commercialization. According to the Ukrainian mass media, the number of Internet users in the Ukraine increased by over 70 % in 2002 ...
In the buzzword-compliant society that we live in, one of the loudest buzzes these days is Privacy. Start-up companies trumpet their privacy protecting software. Privacy consultants are starting to dot the landscape. Companies are employing Chief Privacy Officers. The Federal Trade Commission is bringing charges and levying fines against companies for privacy violations ...