In principle, the author of a work protected by copyright has an exclusive right to reproduce or copy it. In Austria, however, anyone has the right to make copies of such works for private use. Originally, the legislator had scenarios in mind where people recorded music from the radio with their stereo system and a blank tape cassette, or recorded films via a video recorder. Collecting societies collect a levy as compensation for this private copying right ...
Open source software ("OSS") is quickly entering the mainstream and becoming increasingly widely used. In fact International Data Group analysts have predicted that the OSS marketplace will be worth £35 billion by 2008. OSS is software that is freely available (without discrimination) and can be copied, modified and redistributed ...
Smart buildings offer individuals, businesses and even cities better and more efficient ambient experiences. However, the connected technologies that make buildings “smart” tend to require processing massive amounts of data inputs, often including personal information ...
Brenna K. Legaard is a registered patent attorney with Schwabe, Williamson & Wyatt. Legaard wrote the following op-ed on the use of blockchain technology in health care. When health care professionals and consumers think of blockchain, their minds very likely go to famous cryptocurrencies like Bitcoin. But blockchain technology can be applied to so much more, including to the field of health care ...
The Bavarian Data Protection Authority ("BayLDA") has published an online test on its website that can be used by companies to determine how well they are prepared on key topics of the General Data Protection Regulation ("GDPR"). The GDPR will apply directly in the member states of the European Union with effect from May 25, 2018. This will result in significant changes to data protection law in many areas ...
Many companies use so-called tracking tools on their website to analyze the use of the website by their visitors, and possibly also to carry out advertising activities on the basis of user profiles created with the tracking tools. These tracking tools mainly use cookies, i.e. small files that can identify a user of a website and that are deposited on the respective user's computer ...
The Online Safety Bill is to be amended to include an offence for officers or senior managers of key tech companies who fail to comply with duties to protect children online. As currently drafted, the offence will apply to senior managers and officers (or those purporting to fulfil such functions) of "user-to-user services" (better known as social media sites, but they could include many online businesses, including forums, online gaming sites and cloud storage providers) ...
The Online Safety Act 2023 (the "OSA") became law on 26 October 2023 and will affect over 100,000 organisations. Here, we focus specifically on the overlaps between the OSA and data protection legislation, outlining the synergies (and differences) in key areas, together with some practical tips. This firm has been a consistent source of commentary and practical guidance on the new Online Safety Act 2023 (the ‘OSA’) ...
On 26 October 2023 the Online Safety Act (‘the Act’) received Royal Assent, enacting rules designed to, in the UK government’s words, make the UK the safest place in the world to be online ...
The online retail sector has seen a considerable increase in intervention by the competition authorities both on a national level and in Brussels. Most recently, in December 2018, the European Commission fined the clothing company Guess € 39.8 million for applying online sales and advertising restrictions ...
November 16, 2022 By: William Miller, Anne Marie Ellis, and David DeBerry On August 1, 2022, the California Court of Appeals issued the decision in Martinez v. Cot’n Wash, Inc. (2022) 81 Cal.App.5th 1026 [297 Cal.Rptr.3d 712]. In Martinez, the plaintiff claimed that Cot’n Wash’s website (dropps.com) was inaccessible because it did not comply with the Web Content Accessibility Guidelines (WCAG) 2.1 ...
On 14 March 2021, the law of 5 March 2021 on certain rules for the implementation of Regulation (EU) No 2019/1150 of the European Parliament and of the Council of 20 June 2019 on promoting fairness and transparency for business users of online intermediation services (the “P2B Regulation”) (hereinafter the “Law”) entered into force ...
Who knows why Luis Suarez bit Giorgio Chiellini at the FIFA World Cup 2014. Perhaps it’s a compliment to great Italian defending? Or something to do with the increasing demands of the modern game? Whatever the answer may be, none of us truly believe that this sort of thing is acceptable. But precisely what are the rules that regulate this sort of conduct? Most of us were told not to bite when we were very young - so that we know ...
The Nils Svensson v Retriever Sverige AB decision addresses fundamental questions of copyright and Internet use. In essence, the case addresses the question of whether hyperlinking to freely accessible content requires authorization. The original plaintiffs of the Svensson case were Swedish journalists who wrote press articles that were published in the Goteborge-Posten newspaper and on its website, where they were freely accessible ...
Prior to the onset of the COVID-19 pandemic, the use of telehealth across Ohio and the United States was steadily increasing. However, out of necessity over the last two years, telehealth has expanded exponentially in order to reduce risks of COVID-19 transmission to practitioners and patients alike. Nearly overnight, the health care community was forced to change the way services were accessed, delivered, and received ...
Ohio legislators recently introduced proposed H.B. 679, expanding telehealth services. As a result of the COVID-19 pandemic, telehealth has become more prevalent and necessary. Ohio lawmakers realize telehealth is only going to become more widespread in the future, as patient usage and acceptance continue to grow. If enacted, H.B ...
Senate Bill 273 goes into effect on March 20, 2019, and creates new requirements for Ohio insurance companies, including health insurance plans, to develop and implement specific information security programs to safeguard nonpublic business and personal information. Senate Bill 273 is based upon the National Association of Insurance Commissioners’ Insurance Data Security Model Law (also referred to as "MDL-668") ...
I. Introduction Rising interest rates and a general economic downturn in 2022 has impacted the value of digital assets, including the relatively well-established likes of Bitcoin and Ether. In addition to market headwind, momentum around federal digital assets regulation is growing, culminating in the proposed “Responsible Financial Innovation Act” (the “RFIA”) ...
As if businesses did not have enough to worry about during this COVID-19 pandemic, it’s times like these when cybersecurity risk is at its peak. Distracted employees may be psychologically vulnerable to attack, and shifting quickly and unexpectedly to a remote workforce can create technology and control risks. It’s a perfect storm for cyber risk ...
The House of Lords has clarified what makes a message sent by means of a public electronic communications network "grossly offensive" and therefore capable of amounting to a crime under the Communications Act 2003 ("Act") ...
The Department of Health and Human Services Office of Civil Rights (OCR) Spring 2019 Cybersecurity Newsletter includes new recommendations regarding how HIPAA covered entities can prepare to defend against cybersecurity attacks such as advanced persistent threats (APTs) and zero-day vulnerabilities ...
Not only are healthcare providers under attack in the daily battle against the coronavirus, criminal actors are quickly taking advantage of relaxed HIPAA enforcement and standards, teleworking and the general intensity of the situation to exploit patient and other confidential information ...
OCIE’s most recent Risk Alert, published Sept. 15, 2020, address another cybersecurity issue, this time highlighting the dangers of “credential stuffing.” Credential stuffing is a method of cyberattack that uses compromised client login credentials and can lead to loss of customer assets and the disclosure of confidential or other personal information. Hackers will obtain groups or lists of usernames, email addresses, and their passwords from sellers on the dark web ...
On July 10, 2020, the Office of Compliance Inspections and Examinations (OCIE) released a Risk Alert highlighting the dangers of ransomware to SEC-registered entities, including investment advisers. The Risk Alert is a response to a marked uptick in both the prevalence and sophistication of ransomware attacks in recent months. Ransomware is a type of malware used by criminals to gain control of your or your firm’s confidential information and customer data ...
The Office of the Comptroller of the Currency (“OCC”) issued an interpretive letter (the “Stablecoin Letter”) confirming that national banks and federal savings associations are permitted to take and hold fiat currency deposits that serve as reserves for fiat-currency backed stablecoins associated with hosted digital wallets (the “OCC Stablecoin Letter”) ...