On June 23rd the United Kingdom (UK)1 decided, by means of a referendum, to exit from the European Union. This decision is known as “Brexit”. According to Art. 50 of the Treaty on European Union, the UK must notify the European Council – which for this purpose represents the EU – of its intention to exit, after which the parties will negotiate an agreement setting out the arrangements of that withdrawal and of the future relationship between the UK and the EU ...
The US Second Circuit Court of Appeals, overturning an earlier court ruling from a lower court, has held that the US Government cannot compel Microsoft to hand over emails stored on a server in Dublin in a narcotics case. The decision is a milestone victory for privacy rights and will be greatly welcomed by US technology companies storing data abroad ...
The European Commission has today adopted the Privacy Shield. The Privacy Shield is intended to provide a framework for EU-US data transfers. What is the Privacy Shield? European data protection law restricts the transfer of personal data outside the European Economic Area (EEA) unless the country to which the data is transferred ensures an adequate level of data protection ...
An encouraging news update comes from Croatia, as some of the recent reports claim that the Croatian IT market reached a value of EUR 950 million in 2015. According to IDC Adriatic – a regional branch of the global market intelligence provider – this shows an increase of 10.8% when compared to the previous year.IDC Adriatic added that a continuation of the IT market's recovery is expected in 2016 as well. More precisely, further strengthening of the market at an average annual rate of 6 ...
The Hamburg data protection authority has imposed fines against the companies Adobe, Punica and Unilever, stating that they have continued to transfer personal data to the USA contrary to the stipulations of the Safe Harbor judgment. 1. The Safe Harbor judgment of the ECJ dated October 6, 2015 (legal matter C-362/14) makes it clear that European companies can no longer simply transfer personal data to the USA as a "non-secure third country" ...
In 20141, major retailers Best Buy Canada Ltd., Costco Wholesale Canada Ltd., Gap (Canada) Inc., Old Navy (Canada) Inc., Guess? Canada Corporation, Wal-Mart Canada Corp., Toys ?R? Us Canada Ltd. and Curves International Inc ...
The world is moving at a break neck pace, and a crucial element at the root of these changes are technological developments. As the global business landscape has been irrevocably altered by these developments, it was only a matter of time before each comprising industry would have had to adapt and – to a certain degree – reinvent itself as a consequence ...
There is encouraging news for those with plans of getting involved in a start-up project in Slovenia, as theSlovenian Enterprise Fundhas announced almost EUR 5 million to support innovative start-ups this year ...
The Copy Right Act 1987 provides a framework for the protection of copy right and enforcement through civil redress, as well as outlines the powers granted to state authorities for the enforcement of copy right and prosecution of copy right offences. The Copy Right Amendment Act 2012 (“2012 Amendment Act”) came into operation on 1st March 2012. The following is a summary of some of the amendmentspursuant to the 2012 Amendment Act ...
The members of the National Privacy Commission (NPC) have been named. President Benigno Aquino III has appointed Raymond Liboro as the Commissioner of the National Privacy Commission. Prior to his appointment, Liboro was the officer-in-charge of the Department of Science and Technology's Science and Technology Information Institute. The following are the Deputy Privacy Commissioners: Dondi Mapa and Ivy Patdu ...
A company that obtains information from a number of competitors (for example, to create industry statistics or to provide price comparisons) should be careful not to facilitate the flow of confidential information between those competitors. Two recent cases highlight the potential competition law issues. We will then look at some practical considerations to keep in mind ...
On February 1, 2016, the Federal Deposit Insurance Corporation (“FDIC”) published the Winter 2015 issue of Supervisory Insights. Not surprisingly, the first article dealt with the most important issue facing the financial industry today – cybersecurity ...
On 15.12.2015 EU Commission, Council and Parliament agreed on the final terms of the General Data Protection Regulation (GDPR) in their trialogue negotiations. It is generally expected that the draft will be adopted soon, in any event not later than summer 2016. This ends the uncertainty about the content of the new European Data Protection law which will be directly applicable in all Member States two years after the adoption by Commission, Council and Parliament ...
On December 27th, 2015, Anti-Terrorism Law of People's Republic of China has been passed and promulgated on the eighteenth session of the 12th NPC Standing Committee, whose aim is to combat terrorism, safeguard national security and public safety (hereinafter referred to as "Anti-Terrorism Law "). The Anti-Terrorism Law will take effect since January 1st, 2016. Terrorist activities severely jeopardize public security and it is everyone’s hope to eradicate it ...
Since mid-February, there has been an ongoing debate in the public sphere regarding the high profile case that found the global IT giant Apple and FBI on opposite sides of the legal spectrum. The case's background involves the 2015 San Bernardino shooting incident in USA, and the fact that one of the perpetrators was in possession of an iPhone potentially containing relevant information for the ensuing investigation ...
Since mid-February, there has been an ongoing debate in the public sphere regarding the high profile case that found the global IT giant Apple and FBI on opposite sides of the legal spectrum. The case's background involves the 2015 San Bernardino shooting incident in USA, and the fact that one of the perpetrators was in possession of an iPhone potentially containing relevant information for the ensuing investigation ...
Although many of us still wonder at a drone cruising the sky, it has become relatively common to see these devices around. Drones are used for commercial, industrial, marketing and informational purposes, and also for pure fun and enjoyment. Drones, technically referred to as Unmanned Aerial Vehicles (UAV), are now part of our lives. As many other aspects of day-to-day life, there is a regulation in Guatemala that applies to drones, though it is scarcely known by the general public ...
The Finnish Criminal Code has been recently amended to combat cybercrime more effectively. The Criminal Code now takes a tougher stance against cybercrime by amending certain provisions, introducing completely new provisions and more severe penalties. The amendments entered into force 4 September 2015. From now on, cybercrime offences, such as illegal data interference and identity theft, can be found under their own titles in the Criminal Code ...
The Philippine section of The International Comparative Legal Guide to: Patents 2016 was contributed by SyCipLaw partners Enrique T. Manuel and Vida M. Panganiban-Alindogan. The chapter includes patent enforcement, patent amendment, licensing, patent term extension, patent prosecution and opposition, border control measures, antitrust law and inequitable conduct and current developments in relation to patents ...
In this article, we provide a brief overview of the most important new rules applicable to Hungarian data protection laws after 1 October 2015. BCRs accepted after 1 October 2015 Binding corporate rules (BCR) have so far not been recognized by Hungarian law and, thus, could not be used whenever personal data were transferred to a non-EEA country ...
Writer, Margaret Rouse, describes a social media policy as “a corporate code of conduct that provides guidelines for employees who post content on the internet, either as part of their job or as a private person”. Underestimating the significance of a sound social media policy may lead to dire consequences for an organisation ...
In this age of social networks, the dividing line between private life and public life seems more and more blurred. The same is true of the boundary between individuals' personal and professional lives. Indeed, headlines in the past few weeks remind us that the personal and professional aspects of an individual's life can sometimes become confused, at great cost to the individual ...
Earlier this year, the UK government launched 'Tech Nation'; an interactive data project that shows the growth of digital businesses within specific areas/regions across the UK. The report is the first of its kind and ranked Belfast as the second highest region in the UK in terms of the highest average company turnover in this sector, with Greater Manchester securing the top spot and Sheffield, Inner London and South Wales coming third, fourth and fifth respectively ...
At first glance, "net neutrality" may seem a natural principle for the internet environment. This expression, however, gives rise to sometimes divergent interests and some concerns. As a general concept, net neutrality means an open Internet, through which consumers would be able to make their own choices about the content they wish to access and share, as well as the services and applications they want to use ...