Firm: All
Practice Industry: Retail & Distribution, Technology
Region: All
Country/ State: All
Tag: All
A&L Goodbody LLP | April 2005

The EU Directives on Waste Electrical and Electronic Equipment (WEEE) and the Restriction of certain Hazardous Substances in Electronic and Electrical Equipment (ROHS) are due to take effect from 13 August 2005. The Department of the Environment recently produced draft regulations to implement these directives and make the necessary amendments to existing waste legislation ...

Hanson Bridgett LLP | November 2019

After sending cryptocurrency enforcement letters in the summer of 2019, the IRS recently issued Revenue Ruling 2019-24 and an accompanying frequently asked questions (FAQs) with additional guidance on the taxation of cryptocurrency. The Revenue Ruling addresses the tax treatment of cryptocurrency "hard forks", where one version of the currency is split from its original ledger and a new version of the currency is created with a new ledger ...

Last week, a trial court in Buffalo ruled that a group of personal injury plaintiffs’ strict liability claims against a who’s-who of social media companies, arising out of the tragic 2022 Tops Friendly Markets mass shooting, could proceed to discovery, rejecting the argument that Section 230 of the Communications Decency Act barred such claims from the get-go. Patterson, Diona Et Al v. Meta Platforms, Et Al, 0805896/2023 (NYSCEF Doc No. 409) ...

Lavery Lawyers | June 2018

Despite its coming into force in 2001, the courts have frequently avoided commenting on the application and interpretation of the Act to Establish a Legal Framework for Information Technologies1 (hereafter the “LFIT Act”), preferring instead to rely on the provisions in the Civil Code of Québec2. In the decision of Benisty v. Kloda3, judge Jacques J ...

Shoosmiths LLP | April 2009

Software is part of the day-to-day fabric for most companies. And almost everyone who uses it does so with little or no thought about what happens should it fail, or if it is no longer available. However, the prudent software buyer will consider how to protect against failure of critical or bespoke software, which is where escrow may come in. Be warned, though ...

Lawson Lundell LLP | November 2020

The Privacy Commissioners of Canada, Alberta and British Columbia issued a joint investigation report, finding that Cadillac Fairview did not obtain adequate consent for the collection of digital images of faces through facial recognition technology (Anonymous Video Analytics) installed in wayfinding directories in some of their Canadian shopping malls ...

Shoosmiths LLP | February 2023

Green tech presents a growth area and one in which the UK could flourish, but to do so requires capital investment and a clear strategy alongside developing the necessary skillset of the UK workforce. So how realistic is this in the current climate? Experience to date would suggest that the UK is lagging behind other countries in this sector and that unless more is done, we will miss out on the opportunity green tech offers ...

The E-Sign Act was signed into law over two decades ago. To put that into context, smart phones as we know them did not exist—the most popular mobile phone in 2000 was a flip phone, the Nokia 3310, and the first iPhone would not debut for another seven years. The most popular website was AOL because many people were still using AOL as their internet service provider. Google was a fledgling company with its search engine just starting out among the mainstays like Excite and Lycos ...

Wardynski & Partners | September 2016

Financial technologies need specific legal solutions and an open approach to the law. There are lots of indications that financial technology, or FinTech, is one of the next chapters in the digital revolution unrolling before our eyes. The role of finance in the economic life of the society was laid bare by the last financial crisis. The tragic consequences of errors committed on Wall Street, i.e ...

Shoosmiths LLP | June 2023

A recent Financial Times newspaper article raises the question whether the mandate underlying the UK's competition authority (the CMA) should be reviewed.  The argument is based on the CMA's blocking of the Microsoft/Activision merger, compared to the EU's conditional consent decision. The CMA's decision is being appealed by the merger parties ...

Haynes and Boone, LLP | March 2020

This is a question being asked by many companies. Is the severity of this event such that it enables companies to temporarily (or permanently) be excused from performance of their contractual obligations? As is often the case with legal questions, it depends. The term “force majeure” does not have a recognised meaning under English law ...

On May 4, 2017, the en banc Federal Circuit heard oral arguments in Wi-Fi One, LLC v. Broadcom Corp., Appeal 2015-1944 (Fed. Cir. Sept. 16, 2016) to consider whether the findings of the Patent Trial & Appeals Board (“PTAB”) regarding 35 U.S.C. § 315(b), which governs the timeliness of filing a petition for inter partes review (“IPR”), are subject to judicial review on appeal ...

In the beginning of the 2000s, as a result of the advance in technology, the Federal Trade Commission (“FTC”) looked to Congress to pass legislation that would ensure protection of citizens' privacy rights. However, Congress thus far has been unable to pass comprehensive privacy protection legislation, leaving it instead to the states to pass their own such legislation in a piecemeal fashion ...

ENSafrica | February 2013

It’s well known that computer programs enjoy copyright protection - many have  also been patented, but that’s another story and I’m not going to deal with that here. The South African Copyright Act has protected computer programs as a specific category of works since 1992, although prior to that they were protected as ‘literary works’ ...

ENSafrica | March 2013

It’s well known that computer programs enjoy copyright protection - many have  also been patented, but that’s another story and I’m not going to deal with that here. The South African Copyright Act has protected computer programs as a specific category of works since 1992, although prior to that they were protected as ‘literary works’ ...

Dinsmore & Shohl LLP | January 2020

On Jan. 14, 2020, Microsoft ended support for its Windows 2007 operating system. This means Microsoft will no longer issue regular security updates for users of Window 2007. The process of issuing security updates for computer systems is commonly referred to as “patching.” Similar to fabric patches that repair holes in clothing, software patches repair holes in computer programs ...

Carey Olsen | January 2023

This briefing sets out the key requirements of PIPA and the steps that your organisation can take to prepare for its implementation.   PIPA coming into force PIPA was enacted in 2016 to regulate the use of personal information in Bermuda by individuals, companies, public authorities and other organisations ...

ENSafrica | January 2018

In an increasingly connected world, the protection of privacy and personal data has become a key concern for legislators in a number of jurisdictions. In South Africa, an attempt to give effect to the constitutional right to privacy resulted in the Protection of Personal Information Act, 2013 (“POPI”), which was gazetted on 26 November 2013 ...

ALRUD Law Firm | October 2022

Please be informed that today the online form for submission of applications for IT accreditation according to the new rules was launched. As a reminder, on September 30, 2022, the Russian government approved the new rules and criteria for IT companies1 accreditation ...

Immediate access to the latest data is essential for business. The Internet and other networks ensure that data are readily accessible. But easy access to data carries with it certain risks, including the risk of unauthorised access. According to research by Gartner in 2006, 80 percent of companies will have suffered an application security incident by 2009 ...

Shoosmiths LLP | March 2013

The collapse of systems integrator and reseller 2e2 in January has highlighted the danger for clients of companies such as 2e2, and focuses attention on how to deal with this type of situation. At a recent Shoosmiths event, data, IT and banking lawyers shared practical experience of the risks and potential remedies associated with insolvency of IT suppliers ...

Walder Wyss Ltd. | January 2020

On 1 January 2020 the Swiss Financial Market Supervisory Authority (FINMA) implemented various revised rules primarily targeting small banks (the so-called 'small banks regime'). Among other aspects, this will result in a relaxation of IT outsourcing requirements for financial institutions. In this respect, a revised FINMA Outsourcing Circular is available in English and German, French ...

Shoosmiths LLP | September 2010

IT projects: It’s a team game 28 September 2010 IT projects have a knack of over-running for significant periods, requiring ‘out-of-scope’ changes half way through, and consequently going over budget. Although any project will develop and evolve over time, such problems can be minimised through sensible project management methods. It is not uncommon for IT projects to last several months, if not years, from conception to completion ...

dots