Firm: All
Practice Industry: Corporate & Business, Technology, Telecommunications
Region: All
Country/ State: All
Tag: All
ENSafrica | February 2013

It’s well known that computer programs enjoy copyright protection - many have  also been patented, but that’s another story and I’m not going to deal with that here. The South African Copyright Act has protected computer programs as a specific category of works since 1992, although prior to that they were protected as ‘literary works’ ...

Haynes and Boone, LLP | February 2013

The United States Supreme Court yesterday significantly limited the federal government’s ability to bring an action for civil penalties more than five years after the alleged misconduct occurred. In Gabelli v. Securities and Exchange Commission, the Court held that the five-year limitations period governing most enforcement actions begins to run when the underlying violation occurred – not when the government discovered the violation ...

Data Privacy Act of 2012 The Data Privacy Act (Republic Act No. 10173) seeks to protect the confidentiality of “personal information.” The latter is defined as “any information whether recorded in material form or not, from which the identity of an individual is apparent or can be reasonably and directly ascertained by the entity holding the information, or when put together with other information would directly and certainly identify an individual ...

What it’s aboutThe Data Privacy Act (Republic Act No. 10173) seeks to protect the confidentiality of “personal information.” The latter is defined as “any information whether recorded in material form or not, from which the identity of an individual is apparent or can be reasonably and directly ascertained by the entity holding the information, or when put together with other information would directly and certainly identify an individual ...

What it’s aboutThe Cybercrime Prevention Act (Republic Act No. 10175) penalizes “cybercrimes”— acts that fall into any of these major categories:a) offenses against the confidentiality, integrity and availability of computer data and systems (e.g., illegal access, data interference);b) computer-related offenses (e.g., computer-related forgery and fraud);c) content-related offenses (e.g ...

Misick and Stanbrook | February 2013

There are several TCI legal entities regularly established for carrying out business either internationally or domestically. The registration process of these entities is comparatively straightforward and can usually be completed for a fixed cost and within a short timeframe and are often attractive options in TCI as an offshore financial centre with no corporate or personal income tax ...

Misick and Stanbrook | February 2013

Outside the work permit regime, there are two possible types of residency in TCI-a. Permanent residency (which frequently comes with the right to work); b. Shorter term residency. Permanent residency is now available only to those who have lived and worked in TCI for a stipulated period. Previously such residency was available to individuals who made a specific level of investment in TCI: since September 2012, that is no longer the case ...

Haynes and Boone, LLP | February 2013

For the first time, Texas rules permit a motion to dismiss. On February 12, the Texas Supreme Court released the final version of Texas Rule of Civil Procedure 91a, which (1) establishes procedures for dismissal of civil claims, and (2) provides for the mandatory award of attorneys’ fees to the prevailing party ...

Haynes and Boone, LLP | February 2013

President Obama recently signed an executive order focused on improving the security of the nation’s infrastructure from cyber attack. Borrowing concepts from failed legislative efforts, the executive order (“Order”) calls for increased information sharing between the federal government and the private sector and provides for the development of a voluntary cybersecurity program for owners and operators of critical infrastructure ...

Hunton Andrews Kurth LLP | February 2013

An expansion strategy doesn’t always need to be M&A driven. Hunton & Williams LLP partners Robert Acosta-Lewis and Susan Failla make the case for strategic alliances. When considering expanding into emerging markets, companies often look to traditional M&A oppor tunities or explore possible distribution or sales representation relationships. While both of these avenues may offer potential advantages, they also carry risks and limitations ...

Haynes and Boone, LLP | February 2013

On January 31, 2013, the Bankruptcy Court for the District of Delaware in In re Indianapolis Downs, LLC1declined to designate the votes of parties to a post-petition restructuring support agreement (i.e., a lock-up agreement), instead confirming the Debtors’ Modified Second Amended Joint Plan of Reorganization (the “Plan”) based on the votes of such parties ...

Makarim & Taira S. | February 2013

Amendments to Mining Business Regulation The Minister of Energy and Mineral Resources recently issued Regulation No. 24 of 2012 (“Regulation 24”) amending his Regulation No. 28 of 2009 on Organizing Coal and Mineral Mining Businesses ...

Makarim & Taira S. | February 2013

The Government finally issued Government Regulation No. 82 of 2012 9regarding the Implementation of Electronic Systems and Electronic Transactions (“Regulation 82”) for Law No. 11 of 2008 regarding Electronic Information and Electronic Transactions (“Law No.11”). Regulation 82 sets out significant requirements in relation to electronic registration/certification, electronic systems, electronic transactions, electronics agents, electronic signatures and domain names ...

Makarim & Taira S. | February 2013

On 14 November 2012, the Minister of Manpower and Transmigration of the (“MOMT”) issued MOMT Regulation No. 19 of 2012 regarding Terms of Partial Assignment of Work to Third Party Companies (“Regulation No. 19”) Regulation No. 19 covers two types of outsourcing: business activity outsourcing (pemborongan pekerjaan); and manpower outsourcing (penyediaan tenaga kerja) ...

Van Doorne | February 2013

After the financial crisis hit the markets in 2008, small and medium sized enterprises ("SME") have found themselves at the sharp end of diminished access to credit. In their search for credit, they have turned to alternative forms of financing, such as crowdfunding. Last year around €300 million was raised through different types of crowdfunding. This amount is expected to increase significantly in 2013 ...

Hunton Andrews Kurth LLP | February 2013

SummaryEffective January 1, 2013, companies that file Exchange Act reports with the SEC are required to identify whether their products contain certain "conflict minerals" originating from the Democratic Republic of Congo (DRC) and adjoining countries (an area comprising most of Central Africa) ...

Hunton Andrews Kurth LLP | February 2013

Effective January 1, 2013, companies that file Exchange Act reports with the SEC are required to identify whether their products contain certain "conflict minerals" originating from the Democratic Republic of Congo and adjoining countries (the Covered Countries) ...

Krogerus | February 2013

Corruption is undoubtedly one of the biggest problems facing civil societies these days. It prevents naturalcompetition in a marketplace and makes goods or services more costly. It has a detrimental effect on themoral, legality and transparency in a society and is an enemy to democratic decision-making. By underminingpredictability in business transactions, corruption makes investments more hazardous and reduces growthand business opportunities ...

Hunton Andrews Kurth LLP | February 2013

SummaryEffective January 1, 2013, companies that file Exchange Act reports with the SEC are required to identify whether their products contain certain "conflict minerals" originating from the Democratic Republic of Congo (DRC) and adjoining countries (an area comprising most of Central Africa) ...

Haynes and Boone, LLP | January 2013

“The audit committee directly oversees management’s reporting of the company’s financial position and results to investors. Auditors validate. Naturally, both agents should support each other’s work with an open dialogue about how to protect investors from misleading or inadequate management reports.”  - James R. Doty, PCAOB Chairman, PCAOB Open Board Meeting, Aug. 15, 2012 The Public Company Accounting Oversight Board (“PCAOB”) recently issued Auditing Standard No ...

Haynes and Boone, LLP | January 2013

On January 4, 2013, the United States District Court for the Northern District of Illinois, Eastern Division (the “District Court”) issued a Memorandum Opinion and Order1 that seems demonstrably at odds with the majority of cases analyzing the § 546(e) safe harbor provision.2 General Background Facts Sentinel Management Group, Inc ...

Hunton Andrews Kurth LLP | January 2013

In a January 13, 2013 blog post, the Federal Trade Commission’s Bureau of Consumer Protection’s Business Center Blog highlighted the FTC’s recent groundbreaking settlement for violations of the Fair Credit Reporting Act (“FCRA”) in the mobile app context ...

Hunton Andrews Kurth LLP | December 2012

On November 16, 2012, European Data Protection Supervisor Peter Hustinx published an Opinion on the European Commission’s Communication on cloud computing (part of the Commission’s broader cloud computing strategy) ...

Haynes and Boone, LLP | December 2012

Coming as a surprise to some, the European Parliament approved rules creating a Unified Patent Court and a Unitary Patent on December 11, 2012, after lengthy consideration ...

Lavery Lawyers | December 2012

Employment Conditions of Foreign Workers (2) Share Ownership: An Overview (3) Certificate of Intellectual Property Pertaining to Software. Employers frequently resort to the use of foreign workers. In some industries, this is practically unavoidable. Faced with the new reality of foreign workers, many companies have questions about how to manage the workers they hire and the specific conditions applying to them ...

dots