In recent weeks the US Department of Justice and U.S. Environmental Protection Agency announced a substantial settlement with the car manufactures Hyundai and Kia. The car manufacturers agreed to pay $100 million penalty as a settlement, arising from a complaint that the car companies sold nearly 1 ...
The Minister of Communications and Informatics issued Regulation No. 19 of 2014 on Controlling Internet Websites Containing Negative Content (Regulation 19). Regulation 19 has been in force since 17 July 2014. This regulation aims to implement “the safe and healthy use of the internet” by all social groups by blocking access to websites that contain pornographic or unlawful material (negative content) ...
As noted in our previous client update, judicial rulings on the patent-eligibility of software and business method patents under section 101 of the U.S. Patent Act have run heavily against patent owners since Alice Corp. v. CLS Bank International, 573 U.S. ___, 134 S. Ct. 2347 (2014). (See 11/17/2014 Client Update). On Friday December 5, 2014, however, the U.S ...
Every day seems to bring word of a new data breach, and given the stakes of these breaches, it would be easy to assume that dealing with the damage they cause would be a top government priority. Unfortunately, a myriad of conflicting state laws, as well as the lack of one over-arching federal law, creates legal and compliance nightmares for companies that these breaches affect. For example, in late February and early March 2014, hackers successfully targeted eBay’s corporate network ...
Nowadays, we live in an information age (also known as the computer age, digital age or new media age) and the advancement of technologies has facilitated information flow and communication through social media. On one hand, people have easy and quick access to others’ information, enabling interaction with one another. However, the free flow of information and wide participation in social media networks also exposes a person to various risks or dangers ...
Judicial rulings on the patent-eligibility of software and business method patents under section 101 of the U.S. Patent Act have run heavily against patent owners since the U.S. Supreme Court’s June 19, 2014 ruling in Alice Corp. v. CLS Bank International, 573 U.S. ___, 134 S. Ct. 2347 (2014). (See Client Update here ...
The Richemont Group, owner of a number of luxury brands including Cartier, Montblanc and IWC, has secured a landmark website blocking order against the five main retail internet service providers (ISPs) in the UK (SKY, BT, EE, Talk Talk, and Virgin). Building upon the website blocking orders available to copyright holders, Richemont applied to the Court for orders requiring the ISPs to prevent subscribers' access to six websites (including www.cartierloveonline.com, and www.ukmontblancoutlet.co ...
Aside from a passing reference to data protection in the Electronic Transactions Ordinance (see below), TCI has no data protection statute. However, a number of other areas of local law are applicable or, in the context of the advice sought, ought to be considered in relation to data protection, confidentiality and privacy matters. In that respect:- a. Data protection, privacy and confidentiality at common law TCI is a British Overseas Territory and is a common law jurisdiction ...
The rise of social media in recent years has had a significant impact on people's private lives and an increasing number of companies are now using social media for business purposes. However, the opportunities and advantages offered by social media platforms also represent its greatest challenges. Companies often forget that such services do not exist in a legal vacuum – the normal legal framework is still applicable ...
Many African brand owners will be familiar with the remedies that exist in cases of so-called ‘cybersquatting’. The brand owner who feels aggrieved by the fact that its trade mark has been registered as a domain name by a third party can lodge a complaint and request that the registration be cancelled or transferred to it. In the case of a .co.za registration, the complaint will be handled in accordance with the Alternative Dispute Resolution Regulations ...
The recent dynamic growth of virtual currencies presents the increasingly realistic chance of creation of an entirely new model of money and payment. Innovations allowing payments to be made at lightning speed, across state borders and outside of official payment systems, are appearing before our very eyes. Such payments are made without the involvement of banks or intermediaries, and often anonymously. This is a revolution not only for traditional payment systems, but also for the law ...
Although data protection laws globally are converging around a set of shared concerns, there is little prospect of their being harmonised. Ultimately, data protection and data privacy issues are rooted in local culture, and evolve in response to specific local challenges. In Europe, our data protection laws were a strong reaction against secret reporting by the state on its citizens that was widespread after the Second World War ...
Browsing the internet – even in a commercial context – does not require authorisation from the relevant copyright owners, says the EU’s top court. The Court of Justice of the European Union (CJEU) confirmed in its recent judgment in Public Relations Consultants Association Ltd (PRCA) v Newspaper Licensing Agency Ltd (NLA) and Others (Case C-360/13) that browsing the internet without a copyright owner’s authorisation does not infringe the owner’s copyright ...
The technology to “print” three dimensional objects with a 3D printer is not new, but as prices for the technology fall it becomes more readily available for private individuals. The possibilities that open up when individuals get access to 3D printers trigger the imagination, but the accompanying issues are not without complications. The technology, and the new areas of use to which it is put, also raises many questions, particularly regarding intellectual property rights ...
On June 2nd, 2014, President Michelle Bachelet entered a bill into Congress which seeks to modify Law N° 19.496 on the Protection of the Rights of Consumers (“CPA”). The message of the bill recognizes that the tools provided by the current legislation to address violations to the rights of consumers are not sufficiently efficient or dissuasive: in several cases it is less expensive for providers to pay a fine for breach of the CPA, than to comply with such regulation ...
After two years of heated debate fuelled by a diplomatic scandal with the US, Brazil has enacted a groundbreaking bill of internet rights which will protect consumers and give added certainty to businesses. The government initially sought to stem the controversy related to the US government spying on Brazilian internet by proposing rules which would require all companies with operations in Brazil to keep their data stored within the country by setting up local servers ...
In Nautilus, Inc. v. Biosig Instruments, Inc., issued on June 2, 2014, the Supreme Court established a new legal test to determine whether a patent claim satisfies the definiteness requirement of 35 U.S.C. Section 112 ...
The United Arab Emirates (the UAE) was established in 1971 as a Federation of the Emirates of Abu Dhabi, Dubai, Sharjah, Ajman, Umm Al Quwain and Fujeirah. In 1972 the Emirate of Ras Al Khaimah joined the Federation, with the result that the UAE presently comprises the seven named Emirates. The UAE is strategically located on the northeastern tip of the Arabian Peninsula, having its shores along the Arabian (Persian) Gulf and the Gulf of Oman where it joins the Arabian Sea ...
At the turn of the 21st century, various high-ranking Federal Trade Commission (FTC) officials stated that the Federal Trade Commission Act does not create requirements for what data-security measures companies must enact to ensure that private information is protected. The FTC Act’s catch-all prohibition against “unfair” or “deceptive” acts or practices, 15 U.S.C. § 45(a), was not believed to cover the data-breach and cyber security domain ...
International infringers are notoriously difficult litigants to get in touch with; all too often the methods of service routinely available in the United States to serve defendants and bring them into court to halt infringement fail when exported overseas. The defendants in these cases often have little incentive to cooperate with either the court or whatever physical mechanism or service might be available in their jurisdiction ...
If you like having options in obtaining patent rights faster, the U.S. Patent and Trademark Office (PTO) has been eager to please in the last decade. Expediting a patent application can be highly desirable since the average pendency from filing to issuance is about three years on average, and can be even longer in certain technology areas or if an appeal to the Patent Trial & Appeal Board is required ...
On May 4, 2014 the Commission for Compensation and Royalties of the Israeli Patent Authority (the "Commission") rendered a decision relating to an employee's request to receive royalties for service inventions (the "Decision"). The Decision reduces the uncertainty that had surrounded the nature of an employee’s right to receive royalties for service inventions, and provides important guidelines for examining employee royalty waivers in agreements between employers and employees ...
The Federal Circuit today overruled a federal district judge and held that Oracle’s API computer source code qualifies for copyright protection, potentially breathing new life into Oracle’s billion-dollar lawsuit against Google. Oracle America, Inc. v. Google Inc., Case No. 13-1021 (Fed. Cir. May 9, 2014) ...