Firm: All
Practice Industry: Life Sciences, Technology
Region: All
Country/ State: All
Tag: All
Hunton Andrews Kurth LLP | February 2013

On February 26, 2013, the National Institute of Standards and Technology ("NIST") issued a Request for Information ("RFI") to gather comments regarding the development of a framework to reduce cybersecurity risks to critical infrastructure. As we previously reported, the Obama Administration’s executive order, Improving Critical Infrastructure Cybersecurity (the "Executive Order"), released on February 12, 2013, directs NIST to coordinate development of this framework ...

ENSafrica | February 2013

It’s well known that computer programs enjoy copyright protection - many have  also been patented, but that’s another story and I’m not going to deal with that here. The South African Copyright Act has protected computer programs as a specific category of works since 1992, although prior to that they were protected as ‘literary works’ ...

Data Privacy Act of 2012 The Data Privacy Act (Republic Act No. 10173) seeks to protect the confidentiality of “personal information.” The latter is defined as “any information whether recorded in material form or not, from which the identity of an individual is apparent or can be reasonably and directly ascertained by the entity holding the information, or when put together with other information would directly and certainly identify an individual ...

What it’s aboutThe Data Privacy Act (Republic Act No. 10173) seeks to protect the confidentiality of “personal information.” The latter is defined as “any information whether recorded in material form or not, from which the identity of an individual is apparent or can be reasonably and directly ascertained by the entity holding the information, or when put together with other information would directly and certainly identify an individual ...

What it’s aboutThe Cybercrime Prevention Act (Republic Act No. 10175) penalizes “cybercrimes”— acts that fall into any of these major categories:a) offenses against the confidentiality, integrity and availability of computer data and systems (e.g., illegal access, data interference);b) computer-related offenses (e.g., computer-related forgery and fraud);c) content-related offenses (e.g ...

Makarim & Taira S. | February 2013

The Government finally issued Government Regulation No. 82 of 2012 9regarding the Implementation of Electronic Systems and Electronic Transactions (“Regulation 82”) for Law No. 11 of 2008 regarding Electronic Information and Electronic Transactions (“Law No.11”). Regulation 82 sets out significant requirements in relation to electronic registration/certification, electronic systems, electronic transactions, electronics agents, electronic signatures and domain names ...

Hunton Andrews Kurth LLP | December 2012

On November 16, 2012, European Data Protection Supervisor Peter Hustinx published an Opinion on the European Commission’s Communication on cloud computing (part of the Commission’s broader cloud computing strategy) ...

Shoosmiths LLP | December 2012

According to a recent article by Shoosmiths, the cloud software market generated $22 billion in revenue in 2011, and expects growth to $67.3 billion by 2016 Alongside the benefit of cloud computing, however, lies a lack of transparency for cloud customers, causing legitimate concerns about how they can comply with the Data Protection Act 1998 (DPA) ...

Shoosmiths LLP | November 2012

What's all this about penguins, pandas and search engine optimisation? Optimising websites to rank highly in Google search results is a lucrative industry. For years, businesses have employed search engine optimisation (SEO) providers to boost rankings ...

Hunton Andrews Kurth LLP | November 2012

On November 10, 2012, the German working group on technical and organizational data protection matters published guidelines (in German) on the technical and organizational separation requirements for automated data processing on shared IT systems (the “Guidelines”). The working group is part of the Conference of the German Data Protection Commissioners, which recently concluded its 84th Conference in Frankfurt (Oder) ...

Hunton Andrews Kurth LLP | November 2012

On October 30, 2012, the U.S. District Court for the Southern District of California ruled that an opt-out confirmation text sent by Citibank (South Dakota), N.A. (“Citibank”) did not violate the Telephone Consumer Protection Act (“TCPA”). Under a “common sense” interpretation, the court determined that Citibank’s opt-out text does not demonstrate the type of invasion of privacy the TCPA seeks to prevent ...

ENSafrica | October 2012

Apple’s recent US$ 1 billion damages award against Samsung was world news. In case you missed it, a California court found that Samsung had, in its Galaxy 10.1 smartphone,  infringed various patents belonging to Apple ...

Few may rebate that internet, is majorly responsible for most of the mayor changes in the past fifteen years in fields such as science, communications, technology, commerce amongst other being necessary to adapt the legal system regulating it. Honduras has not been the exception in this modernization process regardless of the civil code nature of its legal system which is not as adaptable as common law systems are ...

Hunton Andrews Kurth LLP | August 2012

Introduction Title and date of national law The Act on the protection of privacy in relation to the processing of personal data of December 8,1992 (the 'Data Protection Act' or 'DPA') and its Royal Decree of February 13, 2001. Relation with international instruments The DPA implements EU Directive 95/46/EC on the protection of individuals regarding the processing of personal data and the free movement of such data ...

Haynes and Boone, LLP | August 2012

CLS Bank and Bancorp: Back to Back Federal Circuit Decisions Offer Different Conclusions on Patentability 08/03/2012 Richard D. Rochford, Casey H. Kempner The issue of whether particular inventions include “patent eligible” subject matter under § 101 of the patent statute has become highly controversial in recent years, raising questions with high economic stakes and profound legal and philosophical implications. Twice the Supreme Court has entered the fray, first in Bilski v ...

Shoosmiths LLP | July 2012

Creators of software programs may not be able to prevent the resale of 'used' copies of software programs legitimately paid for and downloaded by their own customers from the internet.It follows a recent Opinion from Advocate General Yves Bot, a legal adviser to the European Court of Justice (ECJ), in Axel W. Bierbach (liquidator of UsedSoft GmbH) v Oracle International Corp ...

Haynes and Boone, LLP | June 2012

After several delays, ICANN has published the list of generic top level domain (“gTLD” or “string”) applicants and the gTLDs they have applied for. This new initiative from ICANN will allow a wide variety of entities to act as registrars for gTLDs of their choosing. Once these systems are up and running, consumers will be able to access websites not only ending with .com or .net, but also ending with .NETFLIX, .AOL, and .PIZZA. The list can be found at:http://newgtlds.icann ...

In the great George Orwell novel “Nineteen Eighty-Four,” the Ministry of Truth is a vast bureaucracy that ironically exists to falsify historical events in the service of political ideology. Its headquarters is an 80-story building of 3,000 rooms, and its outside walls bear the words “War is Peace,” “Freedom is Slavery,” and “Ignorance is Strength ...

New law regarding the use of cookies on websites was introduced in the UK in May last year.  Broadly speaking, the new law requires a website owner/operator to: - tell users that cookies are used on its website; - explain to users what the cookies are doing; and - obtain users’ explicit consent to store cookies on their device. The Information Commissioner is responsible for enforcing this new law ...

MinterEllison | May 2012

On 1 March 2012, Google launched a new privacy policy by consolidating over 60 of its global privacy policies into one document. The new privacy policy does not indicate that Google will collect any new or additional data about users. What it does do, however, is inform people that Google will merge data which it already collects from services such as YouTube and Web History (which records all searches performed on Google ...

Shoosmiths LLP | April 2012

With the Information Commissioner's Office (ICO) grace period for enforcing the new cookies rules almost at an end, companies should work with their website developers at an early stage to ensure compliance. The ICO will soon be confirming that its 12 month ‘lead in’ implementation period has come to an end.  Website operators then run the risk of enforcement action and fines if they fail to comply with the new cookies regime ...

Shoosmiths LLP | April 2012

A trubunal has ruled that an employee was fairly dismissed for makng vulgar comment to female colleague on his facebook page while at home.  A recent decision from a tribunal in Northern Ireland held that an employee was fairly dismissed because comments which he posted on his Facebook page amounted to harassment of a female colleague and was in breach of the employer’s Dignity at Work Policy ...

Haynes and Boone, LLP | April 2012

The Fourth Circuit has just released its highly anticipated keyword advertising decision in Rosetta Stone Ltd. v. Google Inc., No. 10-2007 (4th Cir. Apr. 9, 2012), vacating much of a district court order favorable to Google ...

Shoosmiths LLP | March 2012

Today, Google have made the very interesting (but arguably provocative) move of completely rejecting the French data protection regulator's request to put a hold on the implementation of proposed changes to its privacy policies.  In doing so it has become the subject of a Europe-wide investigation. What has changed? Up until today, the information collected by Google on each of its platforms, such as Gmail and YouTube, was kept separate ...

Haynes and Boone, LLP | February 2012

The new abbreviated regulatory approval pathway for “biosimilar” and “interchangeable” types of biologic drug products was implemented in the Biologics Price Competition and Innovation Act of 2009 (BPCI Act) as part of the Patient Protection and Affordable Care Act of 2010. The details about the use of this pathway were left for further development through Food & Drug Administration (“FDA”) action ...

dots