Contents Please click on the links below to jump to the relevant section: Government attitude and definition Cryptocurrency regulation Digital Asset Business Act Scope of the DABA Licensing requirement Application process Criteria to be met by licensees Continuing obligations of licence holders BMA’s supervision and enforcement powers Digital Asset Issuance Act Scope of DAIA Authorisation requirements Authorisation criteria Ongoing obligations BMA’s supervis
Contents Government attitude and definition Cryptocurrency regulation Sales regulation Taxation Money transmission laws and anti-money laundering requirements Promotion and testing Ownership and licensing requirements Mining Border restrictions and declaration Reporting requirements Estate planning and testamentary succession Government attitude and definition The Cayman Islands is a leading global financial centre and has developed a reputation as one of the world’s most
The Carey Olsen chapters provide analysis and commentary on blockchain and cryptocurrency regulation in Bermuda, the Cayman Islands and Jersey ...
Background Ukrainian citizens fleeing their homeland due to the ongoing crisis are welcome to Romania, where they will receive protection and necessary support. During their stay in Romania, accommodation, food and medical services are accessible for Ukrainians seeking safety from the ongoing military invasion, as a result of a combined effort of the authorities and unrivalled mobilization of private entities and the civil society ...
Romania¡¦s yearly economic growth has triggered in the past few years an increased interest for investment in the existing domestic companies. Most of the financial investors seek to leverage their acquisitions and expect the possibility to use the target companies¡¦ assets to such purpose. This article will briefly review corporate limits and prevailing interpretation.Prohibition of financial assistanceRomania has implemented the provisions of art ...
A Georgia intermediate appellate court has affirmed summary judgment in favor of an insurer, holding that there can be no “advertising injury” coverage under a commercial general liability insurance contract where an underlying lawsuit concerning division of profits from a joint copyright work fails to allege a misappropriation of advertising ideas. James C. Shafe, et al. v. American States Insurance Co., No. A07A0879, 2007 Ga. App. LEXIS 1193 (Ga ...
The current global climate has changed the manner in which we socialize, work and engage even in the simplest activities. We had to quickly adapt to speaking with our friends over video calls, working primarily from home and going out of the house to the most limited extent possible, generally only to conduct essential activities, as defined by the public authorities ...
The passion Brazilians have for football is nothing new. As children, we learn the game and argue over the rules, which are often anything but black and white and, on occasion, are difficult to apply. That’s true even for referees, who, well into the 21st century, are still barred from employing the full array of technologies available to make their work easier. In contrast to other sports, the rules governing football evolve very slowly ...
On September 28, 2023, the Cyberspace Administration of China (the "CAC") issued theProvisions on Regulating and Promoting Cross-border Data Flows (Draft for Comment)(the "Draft Provisions") ...
The production and circulation of counterfeit products have been an economic and social problem for some time. Not only can such products pose a safety risk to consumers who use them, counterfeit products also lead to considerable lost income for legitimate businesses, decrease consumer confidence in the marketplace and are often used to finance organized crime. The retail value of counterfeit goods seized by the RCMP increased from $7.6 million in 2005 to $38 million in 2012 ...
What is spamdexing? The Internet contains a lot of information. In 2002, the total number of web pages was estimated at 2.024 million; by 2005 this estimate had risen to 11.5 billion2. The ever- increasing amount of information found on the Internet also has disadvantages. In this jungle of information, it is getting harder and harder to see the wood for the trees ...
Ransomware has wreaked so much havoc in recent years that many people forget about other cybersecurity risks. For some, not storing personal information makes them feeling immune to hackers and cyber incidents. For others, as long as their computers are woring, they do not feel exposed to no malware. Unfortunately, the reality is quite different ...
However, Guernsey is also home to a number of insurers and reinsurers underwriting third party risks including life insurance/assurance as well as more exotic risks such as kidnap and ransom and “after the event” insurance ...
Over the years, the Quebec courts have repeatedly stated that dismissed employees have a duty to mitigate the damages they suffer as a result of a dismissal. This obligation, which is now codified in the Civil Code of Québec,1 has been adapted to the circumstances of the cases over which the courts have presided. The question, then, is whether the COVID-19 pandemic is likely to have an impact on a dismissed employee?s obligation to mitigate damages ...
In terms of ordinary contract principles, if an employee commits an act of serious misconduct, this constitutes a breach of contract. This breach alone does not terminate the contract of employment. The employer can elect to either “accept” the breach or “reject” it. If the employer accepts the breach, it is this election of the employer to accept the breach that terminates the contract. This would, in common law terminology, constitute a dismissal ...
In seeking to address the impact of climate change within Hong Kong’s fund management industry, the SFC has introduced new climate-related regulatory requirements for fund managers in relation to disclosures and to their investment risk and management processes. In this ten-minute podcast, Jeremy Lam outlines key features of the new regime, the timeframe for implementation and how best to plan ahead ...
What to Know When Pursuing Coverage For A Cyber/Privacy Breach During an investor conference call on Wednesday, February 26, Target CFO John Mulligan reported that the highest profile data breach of 2013 cost the retailer $61 million in out-of-pocket expenses during the fourth quarter, of which $44 million was covered by insurance ...
The Firestorm: Civil Litigation and Class Actions Following a Cyber Incident As soon as your company has tangible evidence of a data breach, you must start thinking about what a lawsuit would entail, especially in light of the complexity of electronic evidence. In this installment of our special series, A Desk Guide to Data Protection and Breach Response, we discuss the firestorm of litigation that can arise following a breach and provide practical guidance for preparing for the worst ...
Criminal Referrals When a company falls victim to a damaging cyber attack or suffers a theft of sensitive data or intellectual property, the incident very well may fall within the ambit of one or more criminal statutes designed to deter and punish perpetrators with the prospect of jail time, financial penalties and restitution. Under appropriate circumstances, the company should give serious consideration to making a referral to law enforcement as part of its response strategy ...
Breaking the News: Disclosing Data Breaches and Withstanding Regulatory Scrutiny Breached companies are often crime victims, but they are also potential targets for regulatory actions (and, as we will discuss in future installments, potential parties to a wide range of litigation) ...
The Clock is Ticking: Investigating and Responding to a Breach Once your company becomes aware of a suspected data breach, time is of the essence. Losses from the breach are likely mounting, the clock is running on your organization’s legal rights and obligations, and the potential liability to claims by regulators and plaintiffs begins to expand ...
Insurance Coverage for Cyber Attacks: What Do You Need in a Cyber Liability Policy?With more and more businesses suffering costly data breaches and cyber attacks, companies should utilize every tool they have to shift the potentially enormous expenses associated with those breaches and attacks. That’s where insurance comes in ...
Tailor-Made: Designing and Implementing a Bespoke Data Security Plan When you hear the term “bespoke,” you may think suits or dresses, but you should be thinking data security plans. Savvy organizations realize that there is no “one size fits all” approach to data security ...