Firm: All
Practice Industry: Technology, Transportation
Region: All
Country/ State: All
Tag: All
Walder Wyss Ltd. | November 2020

On 19 October 2020 the Federal Council's Cyber Committee adopted a report on the advancement of the 2018-2022 national strategy for the protection of Switzerland against cyber risks (2018-2022 NCS) and its gradual implementation. The report focuses mainly on the progress made in supporting small and medium-sized enterprises (SMEs) and promoting research and training ...

Han Kun Law Offices | November 2021

On 14 November 2021, the Cyberspace Administration of China (“CAC”) published the network Internet Data Protection Draft Regulations (Draft for Comments) (the “Draft Regulations”). The Draft Regulations build on the foundations set by the Personal Information Protection Law, the Data Security Law, and the Cybersecurity Law ...

Dykema | December 2018

Over the last several years, the emphasis on privacy and data protection has grown significantly. With the amount of data collected by companies and technology skyrocketing, the need to protect personal information has been at the forefront of states’ legislative agendas. While all 50 states now have breach notification statutes, states are now taking a closer look at issues such as tracking online behavior and the use of biometric data ...

Shoosmiths LLP | May 2021

To support our IHL community, on 21 April we hosted our latest webinar on “Fraud” where we discussed the recent upsurge in fraud due to home working, general awareness of fraudulent activity and what businesses can do to protect themselves. Here are the key takeaways: What types of fraud are you seeing at the moment? The world is a turbulent place right now, and therefore the perfect time for fraud and illicit activity to thrive ...

Dykema | July 2011

It’s an all too common scenario. An unsuspecting Internet user opens an email with a link to a website spoofing that of a leading financial institution. The user is asked to input personal information such as bank credentials or social security numbers and in a matter of seconds the user becomes the victim of a phishing scam and is left to deal with the financial and emotional fallout stemming from the identity theft ...

Much has been made of the e-communication provisions set out in the new Companies Act 2006. However, less is known of a piece of legislation which came into force on 1 January 2007, the Companies (Registrar, Languages and Trading Disclosures) Regulations 2006, which affect the electronic communications of every company and limited liability partnership in the UK ...

ALTIUS/Tiberghien | October 2020

The functioning of the World Wide Web is in many ways dependent on the use of hyperlinks. Many of those hyperlinks refer to works protected by copyright. In his recent Opinion, Advocate General Szpunar has considered which kinds of hyperlinks should be regarded as a communication to the public that require the copyright holder’s prior authorisation ...

ALTIUS/Tiberghien | March 2021

The Court of Justice of the European Union has given a welcome answer to the question of under what circumstances embedding, by means of the technique of framing, should be regarded as a communication to the public that requires the copyright holder’s prior authorisation. In doing so, it has decided not to follow Advocate General Szpunar’s proposed approach (discussed here) ...

Shoosmiths LLP | June 2023

It is broadly accepted that hydrogen has an important part to play in our net zero future -the shape and the extent of that role, however, is widely debated. Low carbon mobility is one of those areas. Most analysis has focussed on the commanding position held by battery electric vehicles (BEVs) in personal mobility, and some of the advantages which hydrogen fuel cells have in heavy duty or return-to-base applications like buses[1], waste vehicles[2] and heavy haulage ...

World Services Group | July 2022

In a recent article published in Risk & Insurance, WSG Member Andrea DeField, Partner at Hunton Andrews Kurth, provides insight on cyber captive options for businesses to manage growing cyber threats and exposure, as cyber coverage terms are tightening and policy rates continue to increase. Cyber Captives 101: Is Self-Insuring the Right Risk Mitigation Choice for Your Business? Cyber coverage is tightening ...

Shoosmiths LLP | March 2024

The government’s push to drive down net migration figures has been well documented. 2024 will see a raft of changes aimed at reducing this figure from the 745,000 that was recorded for 2022. Whilst there is no doubt that the changes will result in reduced migration, it will also make things more difficult for sectors that rely on the sponsorship system to fill vacancies in areas where there are skills shortages in the resident labour market ...

Shoosmiths LLP | December 2022

In the final instalment of our “future of work” series, we look at the potential ways advancements in technology have changed and continue to change the way we work. Keeping us connected Technology has been used in workplaces for many years and has been at the forefront of the move away from traditional employment models – the advent of mobile apps to support the gig economy being a prime example ...

Deacons | October 2021

The Personal Information Protection Law (the “PIPL”) will take effect on 1 November 2021. It follows the fundamental rules on protecting personal information under the Cybersecurity Law and Civil Code of the People’s Republic of China (PRC). We highlight below the key points in the PIPL on processing personal information within China, and outbound transfer of personal information, which may impact businesses whether they are operating in or outside the PRC. 1 ...

Waller | March 2020

Zoom, the social platform which has become nearly ubiquitous in the past few weeks, has unintentionally introduced the world to a new term: “Zoom Bombing." Millions of people are struggling to maintain some semblance of normalcy as they continue to engage in personal and business interactions while simultaneously practicing social distancing during the COVID-19 pandemic ...

Cyber risks are increasing, and as a result, due diligence inquiries and valuations are increasingly focusing on the cybersecurity and privacy risks inherent in a business’s collection, use, retention and disposal of data. Similarly, a business’s information security posture and vulnerability to cyberattacks has become a key concern in corporate due diligence ...

Shepherd and Wedderburn LLP | February 2021

Early last year the Prime Minister dropped the “E-bomb” on British motorists, announcing a ban on cars powered wholly by petrol and diesel from 2030, and on the sale of new hybrid vehicles with the capability to drive a significant distance with zero emissions (such as plug-in or full hybrids) from 2035. Since then, the COVID-19 pandemic has impacted the world in an unprecedented manner ...

Shoosmiths LLP | February 2021

Earlier this month, Elon Musk revealed that Tesla, the electric car company run by the world's richest person, had bought $1.5bn (£1.1bn) in bitcoin and might soon also accept payment in the popular but controversial cryptocurrency. News of Tesla’s investment boosted bitcoin, and while lately it dropped from its record high, it appears to be rebounding. Cryptocurrency investment continues to move into the mainstream as global interest rates remain at record lows ...

dots