Firm: All
Practice Industry: Retail & Distribution, Technology
Region: All
Country/ State: All
Tag: All
ENSafrica | July 2013

Counterfeiting continues to make the news.  Locally, we’ve just had a report of a R10 million bust in the Vereeniging area, during which fake soaps, shampoos, clothing and bags were seized, and seven suspects from Malawi, Mozambique and China (no surprises there), were taken into custody.But we are increasingly getting reports of counterfeiting in product areas that go way beyond the traditional stomping ground of FMCG and luxury goods ...

ENSafrica | July 2013

We recently had a Namibian court decision in a passing off matter, in the case of Mega Power Centre CC t/a Talisman Plant and Tool Hire v Talisman Franchise Operations (Pty) Ltd. The decision is interesting for a number of reasons. First, passing off cases are fairly rare, so any new decision is welcome ...

ENSafrica | July 2013

There were two recent decisions – one in the USA and one in the UK – which dealt with the important but seldom-discussed concept of patent exhaustion.  Patent exhaustion in essence means this: the initial authorised sale of a patented item terminates all patent rights to that item, for the reason that the owner of the patent (the patentee) has been rewarded for its ingenuity by that sale ...

ENSafrica | July 2013

There was a fascinating article about a patent case in CNBC.com recently. Fascinating because it deals with a number of the issues that inventors face when it comes to protecting their inventions, and subsequently enforcing their rights ...

ENSafrica | June 2013

It’s been well reported that the singer Rihanna has sued the UK retail chain Topshop for US$5 million in damages for the unauthorised use of her image on a t-shirt. Rihanna is apparently suing  for passing-off, the argument being that people seeing the t-shirt are likely to assume that she has endorsed the brand.  This may have got you wondering what the law is in South Africa on the issue of unauthorised endorsement ...

ENSafrica | June 2013

Domain names and trade marks are inextricably linked. The reason for this is simple – when a company needs to decide on a name at which it wants people to find it on the Internet, it generally opts for one of its own trade marks. As a result, the issues that crop up in trade mark disputes often crop up in domain name disputes too ...

ENSafrica | June 2013

The KZN High Court handed down a really interesting judgment in May 2013 in the case of Distell v KZN Wines & Spirits.  The decision’s  interesting  because  it not only looks at the issues that need to be considered in a trade mark infringement claim, but it also highlights the differences between trade mark infringement and  passing off ...

ENSafrica | June 2013

The Indian Patent Office has proposed a very substantial increase in fees across the board for patent matters. The proposal is for a 100% increase in official fees and it seems likely that this will be implemented before the end of July 2013 ...

Haynes and Boone, LLP | June 2013

You’ve seen all the articles about the Supreme Court’s decision in Assoc. for Molecular Pathology v. Myriad Genetics Inc. and the end of DNA patents, but what does this mean outside the biotech world? It means more insight into patent eligibility under 35 U.S.C. § 101. While Myriad does not affect business method and software patents, it is indicative of the general trend of the Supreme Court with respect to the threshold required to obtain a valid patent ...

Garrigues | May 2013

Although we observed a increasingly widespread use of computer-based solutions in the cloud ( cloud computing ) in the information systems of companies and administrations, sometimes the obvious advantages it brings to the customer do not pay the necessary attention to the assessment of corporate risks that can generate its adoption ...

Morgan & Morgan | May 2013

As Panama became part of a number of industrial property related treaties, our internal laws have become more territorial; the use of a trademark is territorial again and registration becomes imperative for protection. Use as a Basis for Protection In Panama, as happens in most of the countries around the world, the right to register a trademark is acquired by its first use in commerce ...

ENSafrica | May 2013

There was a bit of a stir in the British press recently, with certain companies complaining that the major UK supermarket chains are now using get-ups for their own-label products that are so similar to the get-ups used by the major brand owners that consumer confusion is inevitable.   An industry spokesman said this: ‘Our research shows that consumers are more likely to buy own-label products if they look like brands ...

The Supreme Court’s recent decision has seeded another patent protection feather in Monsanto’s increasingly large cap, in addition to providing guidance on application of the patent exhaustion doctrine in the case of self-replicating technology. In Bowman v ...

The Federal Circuit released the results of its en banc hearing of a case involving the issue of what is patent eligible subject matter under section 101 of the Patent Act. (CLS Bank International v. Alice Corporation Pty. Ltd., F. 3d., Case No. 2011 1301 (May 9, 2013) ...

Shoosmiths LLP | May 2013

A survey by the Information Commissioner's Office (ICO) has revealed that 47% of all UK adults now use their personal smart phone, laptop or tablet computer for work purposes - known as 'bring your own device' (BYOD).However, fewer than three in 10 users had received guidance on how to use their devices for work. This raises concerns that users may not understand how to protect the personal information accessed and stored on these devices ...

Shoosmiths LLP | May 2013

The first industrial revolution, which began in the 1750s, lasted for between 80 to 100 years. The pace of technological change today encourages us to believe that the second industrial revolution (IR2) will be completed at much greater speed. So if we take the mid-1980s as a starting point, with the emergence of optical disk technologies into consumer markets, you would expect us to be well on the way to completion, 30 years into IR2 ...

The hacker group Anonymous announced that it, in concert with Middle East- and North Africa-based criminal hackers and cyber actors, will conduct a coordinated online attack labeled “OpUSA” against banking and government websites today, May 7. Anonymous stated that OpUSA will be a distributed denial of service (DDoS) in which websites may be defaced and legitimate users may be unable to access websites ...

Shoosmiths LLP | May 2013

On 2 April 2013, data protection authorities across the EU - including the Information Commissioner's Office (ICO) - announced that they are now investigating whether Google's privacy policy complies with national data protection laws.The investigation was prompted by allegations that Google failed to implement recommendations issued to it by the EU Working Party in October 2012 ...

ALRUD Law Firm | May 2013

I. Recruitment and Social Media 1. Is there a specific legal framework for the use of social media in the recruitment context? There are no specific laws or regulations dealing with the use of information from social media in the recruitment context. However, the following general laws are relevant:  - Article 8, European Convention on Human Rights, 1950; - Articles 23, 24 and 29, Constitution of the Russian Federation; - Federal Law No ...

Lavery Lawyers | April 2013

The production and circulation of counterfeit products have been an economic and social problem for some time. Not only can such products pose a safety risk to consumers who use them, counterfeit products also lead to considerable lost income for legitimate businesses, decrease consumer confidence in the marketplace and are often used to finance organized crime. The retail value of counterfeit goods seized by the RCMP increased from $7.6 million in 2005 to $38 million in 2012 ...

When was the last time when you or someone you know shared a bad experience or a complaint about a person in Facebook or Twitter?  A good bet is that a longer time has passed than if this question was asked a year ago.  The reason for this is probably Republic Act No. 10175, also known as the Cybercrime Prevention Act of 2012, which President Noynoy Aquino signed into law on September 12, 2012. A ...

Adopted in 2000, Regulation FD generally prohibits public companies and personnel acting on their behalf from selectively disclosing material, nonpublic information to certain groups, such as brokers, investment advisers, analysts and shareholders who are likely to trade on information, without concurrently making widespread public disclosure ...

ENSafrica | March 2013

Technology-rich South African companies and indeed inventors who have taken the brave step of filing foreign patents -will know that there are two ways of getting patent protection in Europe. The first is the national route, in other words filing a patent directly in the country or countries of interest. The second route is that of the European Patent ...

ENSafrica | March 2013

The BBC recently published a piece called ‘3D Printing Will Be the Next Big Copyright Fight’. It said this:  ‘That moment we’ve been hearing about for years – the one where futuristic-sounding 3D printing becomes ubiquitous – is actually upon us.’  It dealt with a topic that’s also referred to as ‘additive manufacturing’ ...

dots