Earlier this year, the UK government launched 'Tech Nation'; an interactive data project that shows the growth of digital businesses within specific areas/regions across the UK. The report is the first of its kind and ranked Belfast as the second highest region in the UK in terms of the highest average company turnover in this sector, with Greater Manchester securing the top spot and Sheffield, Inner London and South Wales coming third, fourth and fifth respectively ...
At first glance, "net neutrality" may seem a natural principle for the internet environment. This expression, however, gives rise to sometimes divergent interests and some concerns. As a general concept, net neutrality means an open Internet, through which consumers would be able to make their own choices about the content they wish to access and share, as well as the services and applications they want to use ...
Whereaw Canadian businesses have barely recovered from the first phase of Canada's Anti-Spam Legislation (CASL), which aims primarily to regulate the sending of unsolicited commercial electronic messages, a new series of requirments applicable to the unauthorized installation of computer programs came into force on January 15, 2015. Like the rules applicable to commercial electronic messages, the second phase of the CASL is based on an opt-in mechanism as opposed to an opt-out mechanism ...
When copyright has been infringed online, what court is competent to hear and decide the case? The EU top court’s recent ruling provides clarity and states that online infringement cases can be heard where the infringing content is accessible. The content right holders will be able to take legal action against the infringer in their home countries, but only regarding damage that occurred there ...
Download a free copy of the Philippine section of The International Comparative Legal Guide to: Telecoms, Media and Internet Laws and Regulations 2015, which was contributed by SyCipLaw partner Rose Marie M. King-Dominguez and senior associate Ruben P. Acebedo II ...
This week, I caught up with patent attorneys Jonathan D’Silva and Bryan Walker of MacDonald Illig Jones & Britton, LLP to hear their perspectives on some key strategic intellectual property (IP) legal issues ...
The Minister of Communications and Informatics has issued Regulation No. 18 of 2014 on The Certification of Telecommunication Devices and Equipment. This regulation has been in force since 27 June 2014. All telecommunications devices and equipment that are produced, assembled, and imported in and to Indonesia for commercial purposes uses, must satisfy the prevailing technical requirements including a Telecommunications Devices and Equipment certificate ...
The Minister of Communications and Informatics issued Regulation No. 19 of 2014 on Controlling Internet Websites Containing Negative Content (Regulation 19). Regulation 19 has been in force since 17 July 2014. This regulation aims to implement “the safe and healthy use of the internet” by all social groups by blocking access to websites that contain pornographic or unlawful material (negative content) ...
As noted in our previous client update, judicial rulings on the patent-eligibility of software and business method patents under section 101 of the U.S. Patent Act have run heavily against patent owners since Alice Corp. v. CLS Bank International, 573 U.S. ___, 134 S. Ct. 2347 (2014). (See 11/17/2014 Client Update). On Friday December 5, 2014, however, the U.S ...
A Ministerial Order (S.I. 541/2014) has been passed commencing Part 3 of the Criminal Justice (Mutual Assistance) Act 2008 (the Act), from last Monday 1 December, 2014. The Act provides for various forms of mutual legal assistance to foreign law enforcement authorities. Part 3 concerns requests for mutual assistance between Ireland and other Member States of the EU for interception of telecommunications messages for the purposes of criminal investigations ...
Every day seems to bring word of a new data breach, and given the stakes of these breaches, it would be easy to assume that dealing with the damage they cause would be a top government priority. Unfortunately, a myriad of conflicting state laws, as well as the lack of one over-arching federal law, creates legal and compliance nightmares for companies that these breaches affect. For example, in late February and early March 2014, hackers successfully targeted eBay’s corporate network ...
Nowadays, we live in an information age (also known as the computer age, digital age or new media age) and the advancement of technologies has facilitated information flow and communication through social media. On one hand, people have easy and quick access to others’ information, enabling interaction with one another. However, the free flow of information and wide participation in social media networks also exposes a person to various risks or dangers ...
Judicial rulings on the patent-eligibility of software and business method patents under section 101 of the U.S. Patent Act have run heavily against patent owners since the U.S. Supreme Court’s June 19, 2014 ruling in Alice Corp. v. CLS Bank International, 573 U.S. ___, 134 S. Ct. 2347 (2014). (See Client Update here ...
The Richemont Group, owner of a number of luxury brands including Cartier, Montblanc and IWC, has secured a landmark website blocking order against the five main retail internet service providers (ISPs) in the UK (SKY, BT, EE, Talk Talk, and Virgin). Building upon the website blocking orders available to copyright holders, Richemont applied to the Court for orders requiring the ISPs to prevent subscribers' access to six websites (including www.cartierloveonline.com, and www.ukmontblancoutlet.co ...
The Federal Communications Commission (“FCC”) is the latest government agency to make a foray into data breach enforcement, proposing a $10 million fine against two telecommunications carriers for failing to protect the personal information of up to 305,000 consumers. In light of this development, companies regulated by the FCC must now be alert to potential liability to the FCC for failing to secure consumers’ “proprietary information” (“PI”) ...
Aside from a passing reference to data protection in the Electronic Transactions Ordinance (see below), TCI has no data protection statute. However, a number of other areas of local law are applicable or, in the context of the advice sought, ought to be considered in relation to data protection, confidentiality and privacy matters. In that respect:- a. Data protection, privacy and confidentiality at common law TCI is a British Overseas Territory and is a common law jurisdiction ...
The rise of social media in recent years has had a significant impact on people's private lives and an increasing number of companies are now using social media for business purposes. However, the opportunities and advantages offered by social media platforms also represent its greatest challenges. Companies often forget that such services do not exist in a legal vacuum – the normal legal framework is still applicable ...
Many African brand owners will be familiar with the remedies that exist in cases of so-called ‘cybersquatting’. The brand owner who feels aggrieved by the fact that its trade mark has been registered as a domain name by a third party can lodge a complaint and request that the registration be cancelled or transferred to it. In the case of a .co.za registration, the complaint will be handled in accordance with the Alternative Dispute Resolution Regulations ...
Launch of South African City Domain Name Extensions Three South African city domain names extensions have recently been launched, namely .Joburg, .Durban and .Capetown. It is very important for clients that own co.za domain names, or South African trade marks, to register the matching city domain name extensions. The launch of the city domain name extensions commenced with the Sunrise and land rush phases running concurrently ...
The recent dynamic growth of virtual currencies presents the increasingly realistic chance of creation of an entirely new model of money and payment. Innovations allowing payments to be made at lightning speed, across state borders and outside of official payment systems, are appearing before our very eyes. Such payments are made without the involvement of banks or intermediaries, and often anonymously. This is a revolution not only for traditional payment systems, but also for the law ...
As of 23 May 2014, the usage fee for the radio frequency spectrum was increased for Croatian operators. As a result of this increase, three of Croatia's largest operators have announced an increase in the price of their mobile network services, as well as the introduction of additional fees for recipients of public communication services. The announced price increase will range from between 10 and 15% ...
Although data protection laws globally are converging around a set of shared concerns, there is little prospect of their being harmonised. Ultimately, data protection and data privacy issues are rooted in local culture, and evolve in response to specific local challenges. In Europe, our data protection laws were a strong reaction against secret reporting by the state on its citizens that was widespread after the Second World War ...