The EU Directives on Waste Electrical and Electronic Equipment (WEEE) and the Restriction of certain Hazardous Substances in Electronic and Electrical Equipment (ROHS) are due to take effect from 13 August 2005. The Department of the Environment recently produced draft regulations to implement these directives and make the necessary amendments to existing waste legislation ...
After sending cryptocurrency enforcement letters in the summer of 2019, the IRS recently issued Revenue Ruling 2019-24 and an accompanying frequently asked questions (FAQs) with additional guidance on the taxation of cryptocurrency. The Revenue Ruling addresses the tax treatment of cryptocurrency "hard forks", where one version of the currency is split from its original ledger and a new version of the currency is created with a new ledger ...
Last week, a trial court in Buffalo ruled that a group of personal injury plaintiffs’ strict liability claims against a who’s-who of social media companies, arising out of the tragic 2022 Tops Friendly Markets mass shooting, could proceed to discovery, rejecting the argument that Section 230 of the Communications Decency Act barred such claims from the get-go. Patterson, Diona Et Al v. Meta Platforms, Et Al, 0805896/2023 (NYSCEF Doc No. 409) ...
Despite its coming into force in 2001, the courts have frequently avoided commenting on the application and interpretation of the Act to Establish a Legal Framework for Information Technologies1 (hereafter the “LFIT Act”), preferring instead to rely on the provisions in the Civil Code of Québec2. In the decision of Benisty v. Kloda3, judge Jacques J ...
Software is part of the day-to-day fabric for most companies. And almost everyone who uses it does so with little or no thought about what happens should it fail, or if it is no longer available. However, the prudent software buyer will consider how to protect against failure of critical or bespoke software, which is where escrow may come in. Be warned, though ...
The Privacy Commissioners of Canada, Alberta and British Columbia issued a joint investigation report, finding that Cadillac Fairview did not obtain adequate consent for the collection of digital images of faces through facial recognition technology (Anonymous Video Analytics) installed in wayfinding directories in some of their Canadian shopping malls ...
Green tech presents a growth area and one in which the UK could flourish, but to do so requires capital investment and a clear strategy alongside developing the necessary skillset of the UK workforce. So how realistic is this in the current climate? Experience to date would suggest that the UK is lagging behind other countries in this sector and that unless more is done, we will miss out on the opportunity green tech offers ...
The E-Sign Act was signed into law over two decades ago. To put that into context, smart phones as we know them did not exist—the most popular mobile phone in 2000 was a flip phone, the Nokia 3310, and the first iPhone would not debut for another seven years. The most popular website was AOL because many people were still using AOL as their internet service provider. Google was a fledgling company with its search engine just starting out among the mainstays like Excite and Lycos ...
Financial technologies need specific legal solutions and an open approach to the law. There are lots of indications that financial technology, or FinTech, is one of the next chapters in the digital revolution unrolling before our eyes. The role of finance in the economic life of the society was laid bare by the last financial crisis. The tragic consequences of errors committed on Wall Street, i.e ...
A recent Financial Times newspaper article raises the question whether the mandate underlying the UK's competition authority (the CMA) should be reviewed. The argument is based on the CMA's blocking of the Microsoft/Activision merger, compared to the EU's conditional consent decision. The CMA's decision is being appealed by the merger parties ...
This is a question being asked by many companies. Is the severity of this event such that it enables companies to temporarily (or permanently) be excused from performance of their contractual obligations? As is often the case with legal questions, it depends. The term “force majeure” does not have a recognised meaning under English law ...
On May 4, 2017, the en banc Federal Circuit heard oral arguments in Wi-Fi One, LLC v. Broadcom Corp., Appeal 2015-1944 (Fed. Cir. Sept. 16, 2016) to consider whether the findings of the Patent Trial & Appeals Board (“PTAB”) regarding 35 U.S.C. § 315(b), which governs the timeliness of filing a petition for inter partes review (“IPR”), are subject to judicial review on appeal ...
In the beginning of the 2000s, as a result of the advance in technology, the Federal Trade Commission (“FTC”) looked to Congress to pass legislation that would ensure protection of citizens' privacy rights. However, Congress thus far has been unable to pass comprehensive privacy protection legislation, leaving it instead to the states to pass their own such legislation in a piecemeal fashion ...
It’s well known that computer programs enjoy copyright protection - many have also been patented, but that’s another story and I’m not going to deal with that here. The South African Copyright Act has protected computer programs as a specific category of works since 1992, although prior to that they were protected as ‘literary works’ ...
It’s well known that computer programs enjoy copyright protection - many have also been patented, but that’s another story and I’m not going to deal with that here. The South African Copyright Act has protected computer programs as a specific category of works since 1992, although prior to that they were protected as ‘literary works’ ...
On Jan. 14, 2020, Microsoft ended support for its Windows 2007 operating system. This means Microsoft will no longer issue regular security updates for users of Window 2007. The process of issuing security updates for computer systems is commonly referred to as “patching.” Similar to fabric patches that repair holes in clothing, software patches repair holes in computer programs ...
This briefing sets out the key requirements of PIPA and the steps that your organisation can take to prepare for its implementation. PIPA coming into force PIPA was enacted in 2016 to regulate the use of personal information in Bermuda by individuals, companies, public authorities and other organisations ...
In an increasingly connected world, the protection of privacy and personal data has become a key concern for legislators in a number of jurisdictions. In South Africa, an attempt to give effect to the constitutional right to privacy resulted in the Protection of Personal Information Act, 2013 (“POPI”), which was gazetted on 26 November 2013 ...
Please be informed that today the online form for submission of applications for IT accreditation according to the new rules was launched. As a reminder, on September 30, 2022, the Russian government approved the new rules and criteria for IT companies1 accreditation ...
Immediate access to the latest data is essential for business. The Internet and other networks ensure that data are readily accessible. But easy access to data carries with it certain risks, including the risk of unauthorised access. According to research by Gartner in 2006, 80 percent of companies will have suffered an application security incident by 2009 ...
The collapse of systems integrator and reseller 2e2 in January has highlighted the danger for clients of companies such as 2e2, and focuses attention on how to deal with this type of situation. At a recent Shoosmiths event, data, IT and banking lawyers shared practical experience of the risks and potential remedies associated with insolvency of IT suppliers ...
On 1 January 2020 the Swiss Financial Market Supervisory Authority (FINMA) implemented various revised rules primarily targeting small banks (the so-called 'small banks regime'). Among other aspects, this will result in a relaxation of IT outsourcing requirements for financial institutions. In this respect, a revised FINMA Outsourcing Circular is available in English and German, French ...
IT projects: It’s a team game 28 September 2010 IT projects have a knack of over-running for significant periods, requiring ‘out-of-scope’ changes half way through, and consequently going over budget. Although any project will develop and evolve over time, such problems can be minimised through sensible project management methods. It is not uncommon for IT projects to last several months, if not years, from conception to completion ...