Firm: All
Practice Industry: Retail & Distribution, Technology
Region: All
Country/ State: All
Tag: All
Krogerus | June 2014

Browsing the internet – even in a commercial context – does not require authorisation from the relevant copyright owners, says the EU’s top court. The Court of Justice of the European Union (CJEU) confirmed in its recent judgment in Public Relations Consultants Association Ltd (PRCA) v Newspaper Licensing Agency Ltd (NLA) and Others (Case C-360/13) that browsing the internet without a copyright owner’s authorisation does not infringe the owner’s copyright ...

World Services Group | February 2019

When a scion of the investment banking world gets into crypto it is probably worth taking notice. JP Morgan Chase, America's largest bank, has just grabbed everyone's attention with the launch of its very own cryptocurrency, the JPM Coin. JP Morgan intends the internally developed crypto asset to be used in its wholesale payment system, which currently sees daily volumes in the region of $6 trillion ...

Heuking | January 2019

The Court of Justice of the European Union (ECJ) must currently clarify whether and how website operators can legally integrate the so-called "Like" button of Facebook on their website (Case C-40/17). A German online retailer had integrated the "Facebook Like" button into their online shop. Due to the functionality of the "Facebook Like" button, personal information was transmitted to Facebook Ireland each time the website was visited, including the IP address ...

Heuking | June 2019

The topic of “joint controllers” according to Art. 26 GDPR continues to gain momentum. The State Commissioner for Data Protection and Freedom of Information in Baden-Württemberg (LfDI) has now, for the first time, published a sample of an agreement for joint controllers under Art. 26(1) s. 2 GDPR as well as a sample relating to the fulfillment of obligations to inform the data subjects pursuant to Art. 26(2) s. 2 GDPR ...

Carey Olsen | April 2023

Contents Legal and Enforcement Framework Blockchain Market Cryptocurrencies Smart Contracts Data and Privacy Cybersecurity Intellectual Property Trends and Predictions Tips and Traps Legal and Enforcement Framework   What general regulatory regimes and issues should blockchain developers consider when building the governance framework for the operation of blockchain/distributed ledger technology protocols? As a matter of policy, Jersey has chosen not to regulate

World Services Group | February 2023

In this JD Supra exclusive, Raspé shares his predictions for 2023, his perspectives on global legal practice, and things to consider when choosing a global legal services network. Herman Raspé is the current Chair of World Services Group, a premier global multidisciplinary professional services network composed of independent law, accounting, and investment banking firms ...

ENSafrica | December 2013

We’ve written about the new Generic Top Level Domains (gTLDs) on more than one occasion.  This refers, of course, to the process whereby companies and organisations can register names – generic words, geographical names, brand names - as top level domain names. So, in the same way that there’s long been .com, .net and .info, you can now have .bank, .google and .capetown. Some 1900 applications have already been filed ...

Shoosmiths LLP | October 2023

It’s the final countdown, with only one year to go before EU member states must transpose the EU’s new Network and Information Security 2 Directive (“NIS 2”) into national law. Key Dates EU Member States have until 17 October 2024 to transpose NIS 2 into national law and those national laws will apply to organisations as early as 18 October 2024. Enforcement is likely to start from 17 January 2025, in line with parallel legislation affecting financial services ...

Shoosmiths LLP | January 2011

In the second of a two-part look at issues arising out of the tender process we consider what can happen when that process is poorly run. Part 1 of the series can be found at IT tendering: Leveraging the benefits. A typical tender process involves the customer analysing and documenting its requirements in a Request for Proposals (RFP) to which interested suppliers will prepare a response ...

Shoosmiths LLP | February 2009

While they are an integral part of most businesses - often with a primary function of delivering cost savings and efficiencies - they must be kept up-to-date to ensure they achieve those aims. So now is a good time to undertake an IT systems review, and look at consolidation and streamlining. Changes to business structures, acquisitions and a system's age are other triggers for an IT stock take ...

Shoosmiths LLP | February 2010

The verdict has finally arrived in the long-running IT dispute between EDS and BSkyB, for which the trial ended over a year ago. With legal fees of around £70m and an anticipated damages award of £200m (against a contract reportedly worth only £48m), the case will change the landscape of supplying IT products and services forever.  EDS supplied a customer relationship management system to BSkyB ...

Shoosmiths LLP | September 2010

IT projects: It’s a team game 28 September 2010 IT projects have a knack of over-running for significant periods, requiring ‘out-of-scope’ changes half way through, and consequently going over budget. Although any project will develop and evolve over time, such problems can be minimised through sensible project management methods. It is not uncommon for IT projects to last several months, if not years, from conception to completion ...

Walder Wyss Ltd. | January 2020

On 1 January 2020 the Swiss Financial Market Supervisory Authority (FINMA) implemented various revised rules primarily targeting small banks (the so-called 'small banks regime'). Among other aspects, this will result in a relaxation of IT outsourcing requirements for financial institutions. In this respect, a revised FINMA Outsourcing Circular is available in English and German, French ...

Shoosmiths LLP | March 2013

The collapse of systems integrator and reseller 2e2 in January has highlighted the danger for clients of companies such as 2e2, and focuses attention on how to deal with this type of situation. At a recent Shoosmiths event, data, IT and banking lawyers shared practical experience of the risks and potential remedies associated with insolvency of IT suppliers ...

Immediate access to the latest data is essential for business. The Internet and other networks ensure that data are readily accessible. But easy access to data carries with it certain risks, including the risk of unauthorised access. According to research by Gartner in 2006, 80 percent of companies will have suffered an application security incident by 2009 ...

ALRUD Law Firm | October 2022

Please be informed that today the online form for submission of applications for IT accreditation according to the new rules was launched. As a reminder, on September 30, 2022, the Russian government approved the new rules and criteria for IT companies1 accreditation ...

ENSafrica | January 2018

In an increasingly connected world, the protection of privacy and personal data has become a key concern for legislators in a number of jurisdictions. In South Africa, an attempt to give effect to the constitutional right to privacy resulted in the Protection of Personal Information Act, 2013 (“POPI”), which was gazetted on 26 November 2013 ...

Carey Olsen | January 2023

This briefing sets out the key requirements of PIPA and the steps that your organisation can take to prepare for its implementation.   PIPA coming into force PIPA was enacted in 2016 to regulate the use of personal information in Bermuda by individuals, companies, public authorities and other organisations ...

Dinsmore & Shohl LLP | January 2020

On Jan. 14, 2020, Microsoft ended support for its Windows 2007 operating system. This means Microsoft will no longer issue regular security updates for users of Window 2007. The process of issuing security updates for computer systems is commonly referred to as “patching.” Similar to fabric patches that repair holes in clothing, software patches repair holes in computer programs ...

ENSafrica | February 2013

It’s well known that computer programs enjoy copyright protection - many have  also been patented, but that’s another story and I’m not going to deal with that here. The South African Copyright Act has protected computer programs as a specific category of works since 1992, although prior to that they were protected as ‘literary works’ ...

ENSafrica | March 2013

It’s well known that computer programs enjoy copyright protection - many have  also been patented, but that’s another story and I’m not going to deal with that here. The South African Copyright Act has protected computer programs as a specific category of works since 1992, although prior to that they were protected as ‘literary works’ ...

In the beginning of the 2000s, as a result of the advance in technology, the Federal Trade Commission (“FTC”) looked to Congress to pass legislation that would ensure protection of citizens' privacy rights. However, Congress thus far has been unable to pass comprehensive privacy protection legislation, leaving it instead to the states to pass their own such legislation in a piecemeal fashion ...

On May 4, 2017, the en banc Federal Circuit heard oral arguments in Wi-Fi One, LLC v. Broadcom Corp., Appeal 2015-1944 (Fed. Cir. Sept. 16, 2016) to consider whether the findings of the Patent Trial & Appeals Board (“PTAB”) regarding 35 U.S.C. § 315(b), which governs the timeliness of filing a petition for inter partes review (“IPR”), are subject to judicial review on appeal ...

Haynes and Boone, LLP | March 2020

This is a question being asked by many companies. Is the severity of this event such that it enables companies to temporarily (or permanently) be excused from performance of their contractual obligations? As is often the case with legal questions, it depends. The term “force majeure” does not have a recognised meaning under English law ...

dots