Firm: All
Practice Industry: Retail & Distribution, Technology
Region: All
Country/ State: All
Tag: All

Immediate access to the latest data is essential for business. The Internet and other networks ensure that data are readily accessible. But easy access to data carries with it certain risks, including the risk of unauthorised access. According to research by Gartner in 2006, 80 percent of companies will have suffered an application security incident by 2009 ...

Lavery Lawyers | January 2007

On November 9, 2006, the Minister of Justice, Yvon Marcoux, introduced Bill 48, entitled An Act to amend the Consumer Protection Act and the Act respecting the collection of certain debts (hereinafter, the “Bill”).The Bill is based on the Internet Sales Contract Harmonization Template agreed on by the provinces further to the Agreement on Internal Trade ...

Deacons | January 2007

For the first time in Hong Kong, during the first half of 2006, civil suits were filed against Internet users for illegally uploading, downloading and sharing pirated music on the Internet using the WinMX file-sharing software ...

Haynes and Boone, LLP | January 2007

The Federal Trade Commission yesterday published its long awaited revisions to the FTC’s Franchising Rule. The new disclosures may be used effective July 1, 2007 and must be used for all franchises offered or sold after July 1, 2008. The Amended Rule prescribes a disclosure format which largely mirrors the Uniform Franchise Offering Circular ("UFOC") format, and modifies it in certain places by adding new disclosures ...

Shepherd and Wedderburn LLP | November 2006

Broadband providers will be required to ensure that their ten million UK customers can more easily take advantage of cheaper broadband deals in an increasingly competitive market, under new regulations proposed by the UK communications industry watchdog OFCOM on 17 August 2006 ...

Van Doorne | November 2006

The IT outsourcing market has matured in the past years. Many IT outsourcing relationships are fruitful and long lasting. Nevertheless international surveys continue to show that numerous outsourcing deals are untimely terminated in the first two to four years. This paper highlights the key risk factors for failure of IT outsourcing relationships. These key risk factors will be underlined by various failed outsourcing case law. Such case law probably only represents the top of the iceberg ...

Open source software ("OSS") is quickly entering the mainstream and becoming increasingly widely used. In fact International Data Group analysts have predicted that the OSS marketplace will be worth £35 billion by 2008. OSS is software that is freely available (without discrimination) and can be copied, modified and redistributed ...

Procuring and implementing an ICT system within an organisation can be a stressful task. High profile failures in both the public and private sectors hit the headlines all too often. The National Audit Office's report last month on the £6.2bn NHS IT upgrade in England put many of the challenges firmly in the spotlight. In the heat of the procurement process it is easy to forget some basic procurement principles ...

Deacons | July 2006

Every day in Mumbai, India, a team of 5,000 couriers deliver, collect and return 200,000 lunch boxes. This massive logistics operation is undertaken with an error rate of less than 1 in 8 million deliveries and without using any information technology. Enormous labour cost disparities enable this manual operation to be undertaken cost-effectively ...

The Police and Justice Bill was put before the House of Commons on 25 January 2006. The main aim of the Bill is to improve the powers and scope of the police force but there are a number of sections which look to update the Computer Misuse Act 1990 (CMA) and in particular to make Denial of Service (DOS) Attacks illegal. DOS attacks can take many forms but are essentially an attempt to disrupt the use of a computer, server or website ...

PLMJ | April 2006

Dominant companies have special responsibility to ensure that the way they do business doesn’t prevent competition on the merits and does not harm consumers and innovation», said European Competition Commissioner Mário Monti, regarding the Commission’s Microsoft decision dated March 24th, 2004 ...

PLMJ | April 2006

The interoperability information on Microsoft’s decision deserves special attention by the undertakings that have a dominant position in the market. Intellectual property rights, granted as an incentive for the creation of innovation and as a tool to recoup the investments made by companies, used to be understood as providing several rights to its owners ...

Deacons | March 2006

The China Banking Regulatory Commission (CBRC) recently promulgated Measures for the Administration of Electronic Banking Business (the Measures) and the Guidelines on E-banking Security Evaluation (the Guideline) ...

Deacons | February 2006

Complaints by foreign businesses regarding protection of intellectual property rights in China have been a consistent feature in media reports since large scale foreign investment commenced some 20 years ago. However, China's economic revolution over the same period means that opinions based on negative experiences in the past must be constantly reassessed ...

Internet telephones are set to take the global communications industry by storm. Big names like Microsoft, AOL, Yahoo! and eBay are piling into the market and former state-run telecoms providers like BT are also investing. The technology was first developed by the US Defense Department as part of a research project on interconnection in the 1970s. But until recently only techno-geeks have had the interest and ability to make any use of it. But times have changed ...

A&L Goodbody LLP | January 2006

On 1 May 2004 a new and revised Technology Transfer Block Exemption Regulation (the TTBER) entered into force - Regulation No. 772/2004. The TTBER will provide block exemptions for IP licensing agreements, ensuring that certain technology transfer agreements are automatically exempt from the application of Article 81(1) of the EC Treaty, which prohibits anti-competitive agreements ...

Haynes and Boone, LLP | December 2005

The European Union has recently launched a new ccTLD (country code top level domain). Instead of using the various national European ccTLD's, such as .fr for French companies, .de for German companies, and .co.uk for U.K. companies, the EU has made available the .eu suffix as a Community-wide ccTLD. The new domain extension has already proved widely popular, with more than 100,000 applications for domain names filed thus far ...

Haynes and Boone, LLP | December 2005

Germany. November 9, 1938. Kristallnacht. “The Night of Broken Glass.” Nazi secret police and the Hitler youth swarm over Jewish businesses and homes, terrorizing and victimizing helpless individuals all over the country.1 SS leadership orchestrates attacks on every vestige of Jewish culture as “punishment” for fictitious crimes that will never be recognized by the rest of the world ...

A&L Goodbody LLP | November 2005

In our previous ezines we tracked the progress of the Alcohol Products (Control of Advertising, Sponsorship and Marketing Practices/Sales Promotions) Bill. The Bill was set to have a major impact on the relationship between alcohol advertising and sport in Ireland but a recent controversial turnabout by the Government means that the Bill may never be enacted ...

Shepherd and Wedderburn LLP | September 2005

At the end of June, the US entertainment industry won a long fought victory to help bring file swappers to heel ...

Shepherd and Wedderburn LLP | September 2005

The European Parliament dealt a blow to programmers seeking clarity on the patentability of computer-implemented inventions last month when it rejected a draft European Directive on the subject (the "CII Directive") by an overwhelming majority ...

Hunton Andrews Kurth LLP | September 2005

Summary ‡ Information security “breaches” take many forms and occur in a wide variety of settings. However, contrary to recent press reports, they do not appear to be increasing. ‡ Research indicates that only a small percentage of breaches result in any harmful use of data. ‡ Account fraud and true identity fraud — the two identity-based frauds most feared by consumers and policy makers — are actually declining ...

Deacons | August 2005

The Ministry of Information Industry ("MII") promulgated the Measures for the Administration of the Filing for the Record of Non-Commercial Internet Information Services (the "Recordal Measures") on 8 February 2005. The Recordal Measures took effect on 20 March 2005. It provides detailed guidelines on recordal filings for non-commercial websites ...

Kocian Solc Balastik | June 2005

Directive of the European Parliament No. 2004/27EC of 31 March 2004 amending Directive 2001/83/EC on the Community code relating to medicinal products for human use (OJ EU [2004], L 136, p. 34) Scientific progress and the development of new types of products explain the rise in issues regarding the legal qualification of so-called “borderline” products ...

Kocian Solc Balastik | June 2005

Commission Guidelines for the Notification of Dangerous Consumer Products to the Competent Authorities of the Member States by Producers and Distributors in accordance with Article 5(3) of Directive 2001/95/EC (Commission document No ...

dots