Firm: All
Practice Industry: Technology
Region: All
Country/ State: All
Tag: All
ENSafrica | September 2017

Many of us are aware of the popular myth that ostriches believe burying their heads in the sand will make them invisible to predators. In other words, an “if I can’t see you, you can’t see me” approach. Even though scientists will tell you that this is not true, the approach seems to bear a resemblance to the online behaviour of some humans ...

ENSafrica | October 2017

  On 25 May 2018, a new set of privacy rules formed by the European Union (“EU”) will take effect. The General Data Protection Regulation (“GDPR”) seeks to replace the Data Protection Directive 95/46/EC. Organisations – including many African ones – will need to make changes to their oversight, technology, processes, and human resources to comply with the GDPR ...

Hunton Andrews Kurth LLP | October 2017

 The autonomous vehicle industry is pressing forward, full speed ahead. The conveniences and efficiencies created by shifting to self-driving vehicles are expected to drive vast economic growth and generate widespread consumer demand. Given the potential benefits, it is no wonder that autonomous technologies are now being embraced by a variety of market players— ranging from small start-up tech companies to perennial automotive giants ...

Haynes and Boone, LLP | October 2017

  The technology that forms the foundation for digital currencies like Bitcoin could be the technology that provides unprecedented security for and access to medical records. The Blockchain For years, online communities sought increased freedom and autonomy by shielding their economic activities from the government and corporate intermediaries ...

TSMP Law Corporation | November 2017

How retailers can harness technology to beat e-commerce at its own game. “It's official: Singapore malls are dead, as occupancy reaches its lowest level in 10 years,” screams one headline. “At some suburban malls, retailers confront the sound of silence,” another chimes in. As e-commerce takes hold, shoppers are eschewing brick and mortar in favour of the convenience of point and click ...

Heuking | November 2017

  The forthcoming General Data Protection Regulation also results in adaptations with regard to the protection of social data. On May 25, 2018, an amended Code of Social Law will therefore come into effect simultaneously with the General Data Protection Regulation. Above all, the Code of Social Law (SGB) X is affected. Many of the adaptations are editorial changes that have become necessary, but the content has also been amended ...

Waller | November 2017

In August 2016, the Office of the National Coordinator for Health Information Technology (ONC) and the National Institute of Standards and Technology (NIST) co-sponsored the Use of Blockchain in Health IT and Health-related Research Ideation Challenge, soliciting whitepapers on how blockchain technology can be used in health care ...

Heuking | December 2017

The Bavarian Data Protection Authority ("BayLDA") has published an online test on its website that can be used by companies to determine how well they are prepared on key topics of the General Data Protection Regulation ("GDPR"). The GDPR will apply directly in the member states of the European Union with effect from May 25, 2018. This will result in significant changes to data protection law in many areas ...

Waller | December 2017

In October 2017, the Eleventh Circuit Court of Appeals reversed a district court’s grant of summary judgement, finding that a college has potentially protectable rights that extend beyond the scope of its federal service mark registrations. Savannah College of Art & Design, Inc. v. Sportswear, Inc., No. 15-13830 (11th Cir. Oct. 3, 2017) ...

Waller | December 2017

The Trademark Trial and Appeal Board (Board) held that the plaintiff licensee in an opposition and cancellation proceeding could not establish priority of use over the defendant based on any common law rights previously acquired by the plaintiff’s licensor. Julie A. Moreno v. Pro Boxing Supplies, Inc., 124 USPQ2d 1028 (TTAB Sept. 8, 2017). Julie A ...

A rash of lawsuits are being filed around the country against businesses and retailers, claiming their websites are not accessible to those with visual or hearing impairments. These lawsuits are being filed under Title III of the Americans with Disabilities Act ("ADA"). Title III of the ADA requires equal access for persons with disabilities in places of public accommodation. This is not a new provision of the ADA, but the focus on websites has been a relatively recent development ...

Karanovic & Partners | January 2018

The Serbian Competition Commission (the "Commission") recently finished sector inquiries concerning quite distinct industries – raspberries and the public procurement for software and hardware. The aim behind the inquiries was to perform extensive market research and analysis in order to acquire a clearer picture of the possible antitrust issues and risks in two sectors widely perceived as strategic for the development of the Serbian economy ...

ENSafrica | January 2018

In an increasingly connected world, the protection of privacy and personal data has become a key concern for legislators in a number of jurisdictions. In South Africa, an attempt to give effect to the constitutional right to privacy resulted in the Protection of Personal Information Act, 2013 (“POPI”), which was gazetted on 26 November 2013 ...

Waller | February 2018

In vacating a jury’s award of almost $54 million based on a finding of willful trademark and trade dress infringement, an Illinois federal district court granted the defendants’ motion for a new trial, finding the trial “fundamentally unfair due to the admission of unreliable and prejudicial expert testimony.” The Black & Decker Corporation et al v. Positec USA Inc.,No. 1:2011cv05426 (N.D. Ill. Sept. 11, 2017) ...

Dinsmore & Shohl LLP | February 2018

As technology has advanced, cyber extortion attacks have risen, and they will continue to be a major security issue for organizations. Cyber extortion can take many forms, but it typically involves cybercriminals demanding money to stop or delay their malicious activities, which include stealing sensitive data or disrupting computer services. Health care and public health sector organizations that maintain sensitive data are often targets for cyber extortion attacks ...

TSMP Law Corporation | February 2018

Technology’s dark side may well be the silent threat to democracy. A year ago, Americans installed a reality TV star in the White House who doesn’t seem to let the facts get in the way of a good tweet. Trump’s shambolic management style has given America’s enemies a perceived opportunity to drive their country’s agendas ...

COBALT | February 2018

Since not only individual people, but also the overall project, are being present­ed, online presentation can be divided into two main parts. First is the management of personal social media. Avoid any dis­respectful or offensive discourse, as well as any ambiguous posts and photos. Or as a minimum , do not display them publicly. Secondly, visual communication is ab­solutely crucial to protect the name of a reliable project ...

ENSafrica | February 2018

  The question of when the South African Protection of Personal Information Act, 2013 (“POPI”) will come into force has been asked many times since the Bill was signed into law by the president on 19 November 2013 ...

Szecskay Attorneys at Law | February 2018

The GDPR contains rules on when it is mandatory for controllers and processors to designate a data protection officer. The Article 29 Data Protection Working Party (WP29) issued guidelines on the data protection officers (DPOs) interpreting the respective provisions of the GDPR (Articles 37-39 and Recitals 77 and 97). The Data Protection Officer (DPO) The GDPR contains rules on when it is mandatory for controllers and processors to designate a data protection officer ...

The CPA appointed the National Bureau of Investigation (NBI) and Philippine National Police (PNP) as enforcement authorities and regulates their access to computer data, creating the Cybercrime Investigation and Coordinating Center (CICC) as an inter-agency body for policy coordination and enforcement of the national cybersecurity plan, and an Office of Cybercrime within the Department of Justice (DOJ-OC) for international mutual assistance and extradition ...

Waller | February 2018

Hidden in the details of the Bipartisan Budget Act of 2018 are some key telehealth provisions that are receiving praise from many industry groups and could mark a significant development for Medicare telehealth policy. The new legislation promotes telehealth in several ways. Tele-stroke. Medicare currently only covers tele-stroke services for patients located in rural health professional shortage areas and counties not classified as a metropolitan statistical area ...

Dinsmore & Shohl LLP | February 2018

U.S. technology company Cogint, Inc. (NASDAQ: COGT) announced the termination of its proposed business combination with BlueFocus International Limited after the Committee on Foreign Investment in the United States  indicated the committee’s unwillingness to approve the transaction ...

dots