Artificial intelligence is a burning topic in many sectors today and the legal industry is no exception. Recently, at the World Services Group's annual employment law conference held in February, AI was heavily debated along with its' impact not only on the legal profession, lawyers, clients, the way business is done, but also our traditional understanding of concepts such as "law" or "justice" ...
If your company has a cybersecurity incident, this guide is intended help you think through critical disclosure requirements and will direct you to sample disclosures from other companies that have endured cybersecurity issues. I. Introduction With the recent string of high profile cybersecurity attacks, the U.S. Securities and Exchange Commission (the SEC) issued further guidance regarding public companies’ disclosure of cybersecurity incidents ...
“Belarus will become the first government in the world that opens wide opportunities for the use of blockchain technology”, said in a statement on the official website of the President of Belarus. Alexander Lukashenko, who signed the new law of the land, believes that his county “has every chance of becoming a regional center in this area.” The Presidential Decree of the Republic of Belarus No ...
When a half-mile from the nearest body of water, must you obtain a federal permit when discharging treated wastewater to groundwater? According to a recent Ninth Circuit decision, the answer may be yes.[1] This alarmed many because the Clean Water Act regulates discharges to navigable waters from "point sources" like pipes or ditches ...
Biosimilar developers have been aggressive in filing petitions for inter partesreviews of biologics patents before the Patent Trial and Appeal Board, many ofthem preceding the filing of a marketing application. Such early IPRs are attractiveto biosimilar makers, because they provide a chance to challenge innovator patentsyears before the biosimilar maker files a marketing application with the U.S. Foodand Drug Administration ...
In 2017, the Cayman Islands passed the Data Protection Law (“DPL”), which reads much like the upcoming European Union General Data Protection Regulation (“GDPR”) that goes into effect Mary 25, 2018. The DPL applies to entities falling within the definition of “data controller” who are established in the Islands or who process data in the Islands. The DPL divides data into two categories, personal data and sensitive data ...
Technologies based on blockchains and AI imply a considerable change for our society. Being that the security of data exchanged is vital, companies must begin adopting a long-term approach right now. Many businesses develop services based on blockchains, in particular in the financial services sector. Cryptocurrencies, one example of blockchain use, transform the way in which some monetary transactions are made, far from the oversight of financial institutions and governments ...
The General Data Protection Regulation (GDPR) is aimed at extensive harmonization of data protection in the EU, and will be applicable with effect from May 25, 2018. The GDPR will replace the current EU Data Protection Directive (Directive 95/46/EC) and will be directly applicable in all EU member states. The new regulations mean that German employers will also have to prepare for changes as regards the protection of employees’ personal data ...
In light of the increasing significance of cybersecurity incidents, the Securities and Exchange Commission (SEC) recently found it necessary to provide further guidance with respect to cybersecurity disclosure requirements under the federal securities laws as they apply to public operating companies ...
Population growth has become the be-all and end-all for economic prosperity, but how on Earth can we cope with the extra billions of people? While “leafing” – or should I instead say “scrolling” in today’s need to sound tech savvy – through the news websites, the two subjects seemed to have captured the media’s attention: immigration and plastic ...
Activists are recasting risk in a way that can only damage industry Last August, a California jury awarded plaintiff Eva Echeverria a total of $417m in compensatory and punitive damages in a lawsuit against Johnson & Johnson (J&J). Her case was that the company should have warned consumers that studies had found an inconclusive correlation between ovarian cancer and talcum powder ...
Can “consent” to use a registered trade mark be considered an abandonment by the owner of the exclusive rights to that registered trade mark in perpetuity? Section 40(1)(dd) of theTrade Mark Act 1976 (“Act”) provides that it is not a trade mark infringement if it is “the use by a person of a trade mark in relation to goods or services to which the registered proprietor or registered userhas at any time expressly or impliedly consented to” [Emph
More than two and a half years after the U.S. Food and Drug Administration (FDA) announced that it was reevaluating its regulatory framework for homeopathic products, the FDA released its Draft Guidance on Drug Products Labeled as Homeopathic. The Draft Guidance summarizes the FDA’s current enforcement perspective on homeopathic products and provides a list of the FDA’s enforcement priorities.The bills reawakened a debate about the pros and cons of POHs ...
On February 12, 2018 the Mexican Secretariat of Communications and Transportation (“SCT”) published the draft of Mexican Environmental Standard PROY-NOM-036-SCT3-2017 in the Official Daily Gazette, which sets forth the maximum allowable limits of noise generated by aircraft. Within the next 60 calendar days, any interested party may provide comments to the National Consultation Committee of Air Transportation Standardization ...
On February 22, 2018, the Center for Biological Diversity (CBD) sent the Environmental Protection Agency (EPA) a notice of intent to sue letter for failure to approve Kentucky’s air quality plan for limiting fine particulate (PM2.5) emissions in the Louisville, Kentucky area. Kentucky’s Energy and Environment Cabinet submitted a revision to the Jefferson County portion of the Kentucky State Implementation Plan (SIP) to EPA December 21, 2016 ...
U.S. technology company Cogint, Inc. (NASDAQ: COGT) announced the termination of its proposed business combination with BlueFocus International Limited after the Committee on Foreign Investment in the United States indicated the committee’s unwillingness to approve the transaction ...
The CPA appointed the National Bureau of Investigation (NBI) and Philippine National Police (PNP) as enforcement authorities and regulates their access to computer data, creating the Cybercrime Investigation and Coordinating Center (CICC) as an inter-agency body for policy coordination and enforcement of the national cybersecurity plan, and an Office of Cybercrime within the Department of Justice (DOJ-OC) for international mutual assistance and extradition ...
The GDPR contains rules on when it is mandatory for controllers and processors to designate a data protection officer. The Article 29 Data Protection Working Party (WP29) issued guidelines on the data protection officers (DPOs) interpreting the respective provisions of the GDPR (Articles 37-39 and Recitals 77 and 97). The Data Protection Officer (DPO) The GDPR contains rules on when it is mandatory for controllers and processors to designate a data protection officer ...
Since not only individual people, but also the overall project, are being presented, online presentation can be divided into two main parts. First is the management of personal social media. Avoid any disrespectful or offensive discourse, as well as any ambiguous posts and photos. Or as a minimum , do not display them publicly. Secondly, visual communication is absolutely crucial to protect the name of a reliable project ...
Technology’s dark side may well be the silent threat to democracy. A year ago, Americans installed a reality TV star in the White House who doesn’t seem to let the facts get in the way of a good tweet. Trump’s shambolic management style has given America’s enemies a perceived opportunity to drive their country’s agendas ...
As technology has advanced, cyber extortion attacks have risen, and they will continue to be a major security issue for organizations. Cyber extortion can take many forms, but it typically involves cybercriminals demanding money to stop or delay their malicious activities, which include stealing sensitive data or disrupting computer services. Health care and public health sector organizations that maintain sensitive data are often targets for cyber extortion attacks ...