Firm: All
Practice Industry: Technology, Telecommunications
Region: All
Country/ State: All
Tag: All

A company that obtains information from a number of competitors (for example, to create industry statistics or to provide price comparisons) should be careful not to facilitate the flow of confidential information between those competitors.  Two recent cases highlight the potential competition law issues.  We will then look at some practical considerations to keep in mind ...

On February 1, 2016, the Federal Deposit Insurance Corporation (“FDIC”) published the Winter 2015 issue of Supervisory Insights. Not surprisingly, the first article dealt with the most important issue facing the financial industry today – cybersecurity ...

Karanovic & Partners | March 2016

It is well-known that a solid framework for attracting investment is a key strategy for fostering investments in a sector as big and significant as telecommunications are. As consolidation and M&A activities continue to be looked for in the region, there is an idea that the use of new technology and smart solutions is the best way to gain a competitive advantage over other market participants ...

Heuking | March 2016

On 15.12.2015 EU Commission, Council and Parliament agreed on the final terms of the General Data Protection Regulation (GDPR) in their trialogue negotiations. It is generally expected that the draft will be adopted soon, in any event not later than summer 2016. This ends the uncertainty about the content of the new European Data Protection law which will be directly applicable in all Member States two years after the adoption by Commission, Council and Parliament ...

Han Kun Law Offices | March 2016

On December 27th, 2015, Anti-Terrorism Law of People's Republic of China has been passed and promulgated on the eighteenth session of the 12th NPC Standing Committee, whose aim is to combat terrorism, safeguard national security and public safety (hereinafter referred to as "Anti-Terrorism Law "). The Anti-Terrorism Law will take effect since January 1st, 2016. Terrorist activities severely jeopardize public security and it is everyone’s hope to eradicate it ...

Heuking | March 2016

On February 29, 2016, the European Commission issued a draft of the so-called Adequacy-Decision for the new agreement between the European Union and the USA called EU-US Privacy Shield to facilitate data transfers between the European Union and the USA. It is doubtful whether the Privacy Shield will be a reliable basis for a simplified transfer of personal data ...

Karanovic & Partners | March 2016

Since mid-February, there has been an ongoing debate in the public sphere regarding the high profile case that found the global IT giant Apple and FBI on opposite sides of the legal spectrum. The case's background involves the 2015 San Bernardino shooting incident in USA, and the fact that one of the perpetrators was in possession of an iPhone potentially containing relevant information for the ensuing investigation ...

Karanovic & Partners | March 2016

Since mid-February, there has been an ongoing debate in the public sphere regarding the high profile case that found the global IT giant Apple and FBI on opposite sides of the legal spectrum. The case's background involves the 2015 San Bernardino shooting incident in USA, and the fact that one of the perpetrators was in possession of an iPhone potentially containing relevant information for the ensuing investigation ...

ALRUD Law Firm | March 2016

Further to our previous alert relating to inspections of the Russian Data Protection Authority (‘DPA’) we would like to draw your attention that DPA is also entitled to undertake measures of so-called systematic monitoring in order to supervise compliance of data controllers with the Russian legislation on personal data. These measures mainly cover checking websites and information placed in a public domain ...

Lavery Lawyers | February 2016

The United States and the European Union recently concluded a new agreement aimed at allowing U.S. companies to continue to collect, use and disclose personal information concerning European citizens, while still preserving their fundamental rights ...

ENSafrica | January 2016

As we previously reported, the Protection of Personal Information Act 4 of 2013 (“POPI”) was signed into law in November 2013. Those provisions which deal with the establishment of the Information Regulator came into effect on 11 April 2014. Expectations are that the President will proclaim the rest of the provisions of POPI into effect once the Information Regulator has been established ...

Alta QIL+4 ABOGADOS | December 2015

Although many of us still wonder at a drone cruising the sky, it has become relatively common to see these devices around. Drones are used for commercial, industrial, marketing and informational purposes, and also for pure fun and enjoyment. Drones, technically referred to as Unmanned Aerial Vehicles (UAV), are now part of our lives. As many other aspects of day-to-day life, there is a regulation in Guatemala that applies to drones, though it is scarcely known by the general public ...

Krogerus | December 2015

The Finnish Criminal Code has been recently amended to combat cybercrime more effectively. The Criminal Code now takes a tougher stance against cybercrime by amending certain provisions, introducing completely new provisions and more severe penalties. The amendments entered into force 4 September 2015. From now on, cybercrime offences, such as illegal data interference and identity theft, can be found under their own titles in the Criminal Code ...

Delphi | December 2015

It can hardly have escaped anyone’s attention that personal integrity is a highly topical subject within the EU, and that the work to adapt the existing regulations to new technical developments has been ongoing for several years. The work with the new data protection regulation has taken a long time but has now entered an exciting phase, after the start of the so-called “trialog negotiations” between the Commission, the Council and the European Parliament over the summer ...

The Philippine section of The International Comparative Legal Guide to: Patents 2016 was contributed by SyCipLaw partners Enrique T. Manuel and Vida M. Panganiban-Alindogan. The chapter includes patent enforcement, patent amendment, licensing, patent term extension, patent prosecution and opposition, border control measures, antitrust law and inequitable conduct and current developments in relation to patents ...

Asters | October 2015

Ukrainian telecom market has developed gradually from a state-controlled monopoly to a competitive sector. Over the recent years, Ukrainian telecom policy makers and regulator have been striving to establish pro-competitive regulations aimed at liberalizing the telecom market at large. For instance, in 2011, the Ukrainian Parliament abolished licensing of three out of eleven types of telecom services that required a telecom license ...

The Technology, Media & Telecoms Legal Bulletin (Aug ...

In this article, we provide a brief overview of the most important new rules applicable to Hungarian data protection laws after 1 October 2015. BCRs accepted after 1 October 2015 Binding corporate rules (BCR) have so far not been recognized by Hungarian law and, thus, could not be used whenever personal data were transferred to a non-EEA country ...

ENSafrica | July 2015

Writer, Margaret Rouse, describes a social media policy as “a corporate code of conduct that provides guidelines for employees who post content on the internet, either as part of their job or as a private person”. Underestimating the significance of a sound social media policy may lead to dire consequences for an organisation ...

Lavery Lawyers | July 2015

In this age of social networks, the dividing line between private life and public life seems more and more blurred. The same is true of the boundary between individuals' personal and professional lives. Indeed, headlines in the past few weeks remind us that the personal and professional aspects of an individual's life can sometimes become confused, at great cost to the individual ...

A&L Goodbody LLP | July 2015

Earlier this year, the UK government launched 'Tech Nation'; an interactive data project that shows the growth of digital businesses within specific areas/regions across the UK. The report is the first of its kind and ranked Belfast as the second highest region in the UK in terms of the highest average company turnover in this sector, with Greater Manchester securing the top spot and Sheffield, Inner London and South Wales coming third, fourth and fifth respectively ...

Waller | June 2015

When Congress passed the Medicare Access and CHIP Reauthorization Act of 2015, the elimination of the Sustainable Growth Rate—the so-called “Doc Fix”—received most of the attention. The fact that Congress had officially waded into the quagmire of health information technology interoperability, however, went largely unnoticed ...

Carey | June 2015

In connection with the regulatory framework for the communications sector in Chile, the primary law to take into account is the General Telecommunications Law (GTL), which mainly rules the following matters ...

Veirano Advogados | May 2015

At first glance, "net neutrality" may seem a natural principle for the internet environment. This expression, however, gives rise to sometimes divergent interests and some concerns. As a general concept, net neutrality means an open Internet, through which consumers would be able to make their own choices about the content they wish to access and share, as well as the services and applications they want to use ...

Lavery Lawyers | April 2015

Whereaw Canadian businesses have barely recovered from the first phase of Canada's Anti-Spam Legislation (CASL), which aims primarily to regulate the sending of unsolicited commercial electronic messages, a new series of requirments applicable to the unauthorized installation of computer programs came into force on January 15, 2015. Like the rules applicable to commercial electronic messages, the second phase of the CASL is based on an opt-in mechanism as opposed to an opt-out mechanism ...

dots