According to the fourth quarter 2001 report of Lodging Econometrics, the accelerated decline in the operating performance of the lodging industry will continue until the middle of the first quarter of 2002 due to the events of September 11, 2001, and the recession. Further, while the operating performance of the lodging industry may show signs of improvement by September of 2002, the effects of that improvement may not be felt until the first quarter of 2003 ...
Introduction Imagine yourself as a trademark owner when domain names were first introduced. Your first thought of “it’s just a fad” quickly fades and you decide that your business needs a web site, whatever that may be. You hire an eighteen year old web designer, tell him to register two different domain names for the site, and sit back. An unexpected problem pops up ...
Copyright 2002 American City Business Journals Inc ...
In the buzzword-compliant society that we live in, one of the loudest buzzes these days is Privacy. Start-up companies trumpet their privacy protecting software. Privacy consultants are starting to dot the landscape. Companies are employing Chief Privacy Officers. The Federal Trade Commission is bringing charges and levying fines against companies for privacy violations ...
The Internal Revenue Service recently issued Revenue Ruling 2002-83 dealing with like-kind exchanges between related parties and unrelated qualified intermediaries ...
The Internet is a rather young, but a very popular source of information for Ukrainian businesses and consumers. The Internet segment of the market has been actively developed recently and has acquired a high level of commercialization. According to the Ukrainian mass media, the number of Internet users in the Ukraine increased by over 70 % in 2002 ...
Five years ago your CEO told you that your company had to have a “web” strategy. So, you learned everything about the Internet. You hired specialty law firms, bought software, and entered into web development and hosting agreements. You mastered all the web lingo. Now, all of that is passé ...
Technology Update Authors Brian D. Barnard Randall E. Colson M. Ann Newton Related Practice Groups Intellectual Property A new California Law (Assembly Bill No. 700, Chapter 1054) went into effect on July 1, 2002 that requires companies who conduct business in California to notify their California-resident customers if their unencrypted personel information may have been stolen as a result of a security breach ...
Aspects of Application of Period of Limitation in Promissory Note and Bill of Exchange Matters In recent years, a substantial growth of the bill of exchange and promissory note circulation has been observed in Ukraine. To a considerable extent, this growth was fostered by the expansion and normalization of the regulatory framework for negotiable instruments ...
California Law Requires Telling Your Customers That You've Been Hacked A new California Law (Assembly Bill No. 700, Chapter 1054) went into effect on July 1, 2002 that requires companies who conduct business in California to notify their California-resident customers if their unencrypted personel information may have been stolen as a result of a security breach ...
On 10 July 2003 the Verkhovna Rada of the Ukraine adopted the Amendment to the Land Code of the Ukraine (Amendment) Act of the Ukraine. The Amendment came into force on 31 July 2003. Under this Amendment, Article 82 of the Land Code of the Ukraine (Land Code) is amended, the very article which regulates land ownership of legal entities ...
Authors Kenneth B ...
Interruption of Statute of Limitations It was interesting for the author hereof to read the article by Denis Mirgorodskiy “Application of the Civil Code in Promissory Note and Bill of Exchange Disputes” (Yuridicheskaya Praktika, #37, September 16, 2003). The author hereof appreciates Mr ...
Commonly, conflicts are settled by a judicial organ, through which a legal expert issues a resolution according to legal criteria and provisions. Nowadays, the options to resolve conflicts are not only limited to the decision of a Judge, but there are alternative means characterized for being voluntary, confidential, economical, and expedite. These means are generally known as Alternative Dispute Resolution (ADR), which mainly include arbitration, mediation, and conciliation ...
It has not been a secret that confidentiality and the possibility of investing less resources (time and money) in the conflict resolution are the most used strategies in the promotion and integration of the mediation process into the formal system ...
The Standing Committee of the 10th National People's Congress passed the Law of the People's Republic of China on Electronic Signatures on 28 August 2004. The Law, which was promulgated on 28 August by President Hu Jintao, will enter into effect on 1 April 2005 and provides a legal basis for electronic transactions. Electronic data text The Law applies to electronic signatures in electronic data text ...
Murray Campbell Lawson Lundell Craig Ferris Lawson Lundell This is a general overview of the subject matter and should not be relied upon as legal advice or opinion. For specific legal advice on the information provided and related topics, please contact your legal counsel. Copyright © 2004, Lawson Lundell All Rights Reserved INTRODUCTION Since the mid-1980s litigation has been a fact of life for pension and employee benefit plan administrators and sponsors ...
When it comes to the patentability of computer-implemented inventions, Europe and the United States have differing and diverse opinions. The United States has a liberal approach to the patentability of computer software and will therefore grant patents for such inventions. Not so in Europe though, where computer programs are patentable only if they make a “technical contribution” to the state of the art ...
ICC Publishes Paper on Internet Governance The Internet Corporation for Assigned Names and Numbers (ICANN), a private sector body based in California, currently operates the allocation of domain names and Internet Protocol addresses on a worldwide basis. At the World Summit on the Information Society in Geneva in December 2003, the issue of transferring ICANN’s role to the United Nations was raised by a number of developing countries ...
This article was originally written for the April 2005 issue of The Negotiator, the magazine of the Canadian Association of the Petroleum Landman. Protected by Copyright 2005 ...
The Fifth Circuit has issued an important opinion on Section 11 of the Securities Act which may limit the potential exposure of issuers and other participants for alleged misrepresentations and omissions in public offering registration statements. The Court’s opinion in Krim v. pcOrder.com, Inc ...
In this edition - Corporate Manslaughter Bill Moves Closer to Reality - Are You Relying on Existing Rights of Drainage to Service Your Development? - Does Your Architect Know He is Working for Free? - SDLT on Development Agreements - Equity Share Mortgages - Tree Huggers - Use Classes Order
In case of a dispute arising between the parties, it may be advisable initially to solve it without the recourse to the courts, i.e. through sending a letter - claim or a warning, signing the court approved settlement agreement, obtaining an executive record of the notary public according to promissory notes or cheques, whether protested or not, or by seeking compromise through negotiations, etc. If the parties fail to solve a dispute amicably, the dispute may be referred to the courts ...
The Ministry of Information Industry ("MII") promulgated the Measures for the Administration of the Filing for the Record of Non-Commercial Internet Information Services (the "Recordal Measures") on 8 February 2005. The Recordal Measures took effect on 20 March 2005. It provides detailed guidelines on recordal filings for non-commercial websites ...
Summary ‡ Information security “breaches” take many forms and occur in a wide variety of settings. However, contrary to recent press reports, they do not appear to be increasing. ‡ Research indicates that only a small percentage of breaches result in any harmful use of data. ‡ Account fraud and true identity fraud — the two identity-based frauds most feared by consumers and policy makers — are actually declining ...