Firm: All
Practice Industry: Hospitality, Media & Leisure, Technology, Telecommunications
Region: All
Country/ State: All
Tag: All
Carey | June 2015

In connection with the regulatory framework for the communications sector in Chile, the primary law to take into account is the General Telecommunications Law (GTL), which mainly rules the following matters ...

Kudun and Partners | June 2021

Due to the Covid-19 pandemic, the telecommunications business has not grown as substantially as anticipated. However, based on a forecast of the National Broadcasting and Telecommunications Commission (the “NBTC”), the business should have an opportunity to grow in the near future ...

Heuking | January 2008

1 Framework 1.1 When did Germany first liberalise telecommunications networks and/or services? In 1989 the markets for telecommunications end-user devices, data and value added services, satellite and mobile communications were liberalised. The first mobile communications licence was awarded to a private entity in 1989 (Mannesmann Mobilfunk, now Vodafone) ...

In the current context of COVID-19 epidemic, President of Romania issued Decree No. 195/2020 on the declaration of the state of emergency on the territory of Romania,published in the Official Journal of Romania, Part I, No. 212/16.03.2020 (the “Decree”), with effect for a period of 30 days as of its publication, which can be further extended ...

In the great George Orwell novel “Nineteen Eighty-Four,” the Ministry of Truth is a vast bureaucracy that ironically exists to falsify historical events in the service of political ideology. Its headquarters is an 80-story building of 3,000 rooms, and its outside walls bear the words “War is Peace,” “Freedom is Slavery,” and “Ignorance is Strength ...

Data Privacy Act of 2012 The Data Privacy Act (Republic Act No. 10173) seeks to protect the confidentiality of “personal information.” The latter is defined as “any information whether recorded in material form or not, from which the identity of an individual is apparent or can be reasonably and directly ascertained by the entity holding the information, or when put together with other information would directly and certainly identify an individual ...

Haynes and Boone, LLP | August 2003

California Law Requires Telling Your Customers That You've Been Hacked A new California Law (Assembly Bill No. 700, Chapter 1054) went into effect on July 1, 2002 that requires companies who conduct business in California to notify their California-resident customers if their unencrypted personel information may have been stolen as a result of a security breach ...

MinterEllison | March 2010

 2009 Prediction: Further penetration of Software as a Service (SaaS) Australia will see a proliferation of businesses adopting SaaS in 2009.  With no hardware, maintenance or upfront capital costs, SaaS will be seen as ideal for companies looking to control their costs in an uncertain economic environment.  Some analysts predict that the global SaaS industry may be worth as much as A$10.7 billion during 2009 ...

Van Doorne | November 2020

With the steady emergence of new technologies and disruption of traditional industries, the technology M&A sector is poised to continue to grow and the demand for technology-savvy legal advisers is set to rise. The purpose of this edition of the Getting the Deal Through - Technology M&A 2021 guide is to provide an overview of the various factors affecting technology M&A transactions across various jurisdictions ...

On June 23, 2021, the Department of Telecom (“DoT”) released revised regulations relating to Other Service Providers (“OSP”) replacing the previous OSP regulations that were issued last year. This client update provides a summary of key issues that have been addressed by the new regulations. SUMMARY OF NEW OSP REGULATIONS Effective Date. The regulations are stated to come into force immediately ...

Introduction The Joint Committee of Parliament (“Committee”) appointed to review the draft Personal Data Protection Bill submitted its report to Parliament on December 16, 2021. The report also includes a revised draft Bill which has now been renamed as the Data Protection Bill, 2021 (“Bill”). As there is less than a week left of the winter session of Parliament, it is very unlikely the Bill will be passed by Parliament in 2021 ...

Wardynski & Partners | September 2017

Any new technology that gains universal application changes the existing world. The reconfiguration occurs imperceptibly but thoroughly. But in this new reality, how should the rule of law, values essential to the civil society and human rights be protected? A new economic reality functioning in cyberspace has arisen before our very eyes. Human activity, both positive and negative, is moving to the virtual arena that functions above and beyond state borders ...

Wardynski & Partners | June 2020

This time we address solutions from the front lines: devices for remote diagnostics which can improve effective detection of the coronavirus and also unburden the health service in other areas. These solutions can also serve as aproving ground for the regulatory approach to oversight of algorithms. The immediate inspiration for writing this text was asolution from the company StethoMe presented at the DemoDay organised by the MIT Enterprise Forum CEE ...

It has long been recommended that when you contract with a technology vendor that you include an indemnity clause in the contract wherein the vendor will indemnify you if its product is compromised and results in a data breach of your computer network. This recommendation was recently validated by both cyber authorities in the U.S. and in the U.K., Germany, Canada, Australia, New Zealand, and the Netherlands ...

AELEX | April 2021

Tech Start-Up Companies Toolkits - ǼLEX Legal .avada-select-parent .select-arrow{background-color:#ffffff}.select-arrow{background-color:#ffffff} Are you running a start-up or contemplating starting that business and you are uncertain on how to proceed? Do not fret as AELEX Fintech centre has compiled this start-up tool kit to guide you on setting up your business ...

Shoosmiths LLP | March 2023

Tech Nation is a government-backed organisation which has supported digital-tech start-ups and scale-ups as well as offering global talent visa endorsement for over a decade. At the end of January, it announced its closure, effective from 31 March 2023. Tech Nation received its core grant funding from the Department for Culture, Media and Sport (DCMS), but this funding will now be awarded to Barclays Bank ...

Shoosmiths LLP | September 2021

Exclusion and limitation clauses are central to any IT or technology contract. When a dispute arises exclusions and limitations of liability are invariably key to determining whether there is liability and the extent of it. When a dispute arises exclusions and limitations of liability are very often key to determining whether there is liability, and the extent of it ...

AELEX | March 2021

Tech Companies and Fund Raising: The New Way of Going Public (Part 2) In the second part of our article, we focus on Spotify, a digital music service that utilised a direct listing to become a public company, the key steps they took that differed from a traditional IPO, and how the NSE can modify its current regulatory framework to include direct listings. Case Study: Spotify Technology S ...

AELEX | March 2021

  A NEW PATHWAY From Uber to Jumia and even older technology (tech) companies like Etranzact and Chams Plc, it is arguable that Initial Public Offerings (“IPOs”) have not offered great returns for tech companies in Nigeria and across the globe[1]. Investors are speculating on whether the great tech bubble is about to burst because, considering the cost of IPOs, tech companies have to scrutinise the expected returns when contemplating an IPO ...

Buchalter | March 2023

March 28, 2023 By: Meghna Parikh The Department of Justice (DOJ) Civil Cyber-Fraud Initiative continues to raise the stakes for government contractors. This initiative uses the False Claims Act (“FCA”) to hold government contractors accountable for knowingly (1) failing to monitor and report cyber data breaches, (2) implementing inadequate cybersecurity measures or (3) misrepresenting their cybersecurity practices ...

Shoosmiths LLP | October 2023

At the end of last week, the FT published a guest article on quantum computing. For those unfamiliar with quantum computing, it is the technology that will be capable of harnessing the powers of quantum mechanics to solve problems which are too complex for ‘classical’ computers (the computers of today). Classical computing employs streams of electrical impulses to encode information: an electrical impulse may be only 1 or 0 (i.e. on or off) – a classical 'bit’ ...

ALRUD Law Firm | March 2016

Further to our previous alert relating to inspections of the Russian Data Protection Authority (‘DPA’) we would like to draw your attention that DPA is also entitled to undertake measures of so-called systematic monitoring in order to supervise compliance of data controllers with the Russian legislation on personal data. These measures mainly cover checking websites and information placed in a public domain ...

dots