The Richemont Group, owner of a number of luxury brands including Cartier, Montblanc and IWC, has secured a landmark website blocking order against the five main retail internet service providers (ISPs) in the UK (SKY, BT, EE, Talk Talk, and Virgin). Building upon the website blocking orders available to copyright holders, Richemont applied to the Court for orders requiring the ISPs to prevent subscribers' access to six websites (including www.cartierloveonline.com, and www.ukmontblancoutlet.co ...
Judicial rulings on the patent-eligibility of software and business method patents under section 101 of the U.S. Patent Act have run heavily against patent owners since the U.S. Supreme Court’s June 19, 2014 ruling in Alice Corp. v. CLS Bank International, 573 U.S. ___, 134 S. Ct. 2347 (2014). (See Client Update here ...
Nowadays, we live in an information age (also known as the computer age, digital age or new media age) and the advancement of technologies has facilitated information flow and communication through social media. On one hand, people have easy and quick access to others’ information, enabling interaction with one another. However, the free flow of information and wide participation in social media networks also exposes a person to various risks or dangers ...
Every day seems to bring word of a new data breach, and given the stakes of these breaches, it would be easy to assume that dealing with the damage they cause would be a top government priority. Unfortunately, a myriad of conflicting state laws, as well as the lack of one over-arching federal law, creates legal and compliance nightmares for companies that these breaches affect. For example, in late February and early March 2014, hackers successfully targeted eBay’s corporate network ...
A Ministerial Order (S.I. 541/2014) has been passed commencing Part 3 of the Criminal Justice (Mutual Assistance) Act 2008 (the Act), from last Monday 1 December, 2014. The Act provides for various forms of mutual legal assistance to foreign law enforcement authorities. Part 3 concerns requests for mutual assistance between Ireland and other Member States of the EU for interception of telecommunications messages for the purposes of criminal investigations ...
As noted in our previous client update, judicial rulings on the patent-eligibility of software and business method patents under section 101 of the U.S. Patent Act have run heavily against patent owners since Alice Corp. v. CLS Bank International, 573 U.S. ___, 134 S. Ct. 2347 (2014). (See 11/17/2014 Client Update). On Friday December 5, 2014, however, the U.S ...
The Minister of Communications and Informatics has issued Regulation No. 18 of 2014 on The Certification of Telecommunication Devices and Equipment. This regulation has been in force since 27 June 2014. All telecommunications devices and equipment that are produced, assembled, and imported in and to Indonesia for commercial purposes uses, must satisfy the prevailing technical requirements including a Telecommunications Devices and Equipment certificate ...
The Minister of Communications and Informatics issued Regulation No. 19 of 2014 on Controlling Internet Websites Containing Negative Content (Regulation 19). Regulation 19 has been in force since 17 July 2014. This regulation aims to implement “the safe and healthy use of the internet” by all social groups by blocking access to websites that contain pornographic or unlawful material (negative content) ...
This week, I caught up with patent attorneys Jonathan D’Silva and Bryan Walker of MacDonald Illig Jones & Britton, LLP to hear their perspectives on some key strategic intellectual property (IP) legal issues ...
Download a free copy of the Philippine section of The International Comparative Legal Guide to: Telecoms, Media and Internet Laws and Regulations 2015, which was contributed by SyCipLaw partner Rose Marie M. King-Dominguez and senior associate Ruben P. Acebedo II ...
When copyright has been infringed online, what court is competent to hear and decide the case? The EU top court’s recent ruling provides clarity and states that online infringement cases can be heard where the infringing content is accessible. The content right holders will be able to take legal action against the infringer in their home countries, but only regarding damage that occurred there ...
Whereaw Canadian businesses have barely recovered from the first phase of Canada's Anti-Spam Legislation (CASL), which aims primarily to regulate the sending of unsolicited commercial electronic messages, a new series of requirments applicable to the unauthorized installation of computer programs came into force on January 15, 2015. Like the rules applicable to commercial electronic messages, the second phase of the CASL is based on an opt-in mechanism as opposed to an opt-out mechanism ...
At first glance, "net neutrality" may seem a natural principle for the internet environment. This expression, however, gives rise to sometimes divergent interests and some concerns. As a general concept, net neutrality means an open Internet, through which consumers would be able to make their own choices about the content they wish to access and share, as well as the services and applications they want to use ...
Earlier this year, the UK government launched 'Tech Nation'; an interactive data project that shows the growth of digital businesses within specific areas/regions across the UK. The report is the first of its kind and ranked Belfast as the second highest region in the UK in terms of the highest average company turnover in this sector, with Greater Manchester securing the top spot and Sheffield, Inner London and South Wales coming third, fourth and fifth respectively ...
In this age of social networks, the dividing line between private life and public life seems more and more blurred. The same is true of the boundary between individuals' personal and professional lives. Indeed, headlines in the past few weeks remind us that the personal and professional aspects of an individual's life can sometimes become confused, at great cost to the individual ...
Writer, Margaret Rouse, describes a social media policy as “a corporate code of conduct that provides guidelines for employees who post content on the internet, either as part of their job or as a private person”. Underestimating the significance of a sound social media policy may lead to dire consequences for an organisation ...
In this article, we provide a brief overview of the most important new rules applicable to Hungarian data protection laws after 1 October 2015. BCRs accepted after 1 October 2015 Binding corporate rules (BCR) have so far not been recognized by Hungarian law and, thus, could not be used whenever personal data were transferred to a non-EEA country ...
The Technology, Media & Telecoms Legal Bulletin (Aug ...
Ukrainian telecom market has developed gradually from a state-controlled monopoly to a competitive sector. Over the recent years, Ukrainian telecom policy makers and regulator have been striving to establish pro-competitive regulations aimed at liberalizing the telecom market at large. For instance, in 2011, the Ukrainian Parliament abolished licensing of three out of eleven types of telecom services that required a telecom license ...
The Philippine section of The International Comparative Legal Guide to: Patents 2016 was contributed by SyCipLaw partners Enrique T. Manuel and Vida M. Panganiban-Alindogan. The chapter includes patent enforcement, patent amendment, licensing, patent term extension, patent prosecution and opposition, border control measures, antitrust law and inequitable conduct and current developments in relation to patents ...
It can hardly have escaped anyone’s attention that personal integrity is a highly topical subject within the EU, and that the work to adapt the existing regulations to new technical developments has been ongoing for several years. The work with the new data protection regulation has taken a long time but has now entered an exciting phase, after the start of the so-called “trialog negotiations” between the Commission, the Council and the European Parliament over the summer ...
Although many of us still wonder at a drone cruising the sky, it has become relatively common to see these devices around. Drones are used for commercial, industrial, marketing and informational purposes, and also for pure fun and enjoyment. Drones, technically referred to as Unmanned Aerial Vehicles (UAV), are now part of our lives. As many other aspects of day-to-day life, there is a regulation in Guatemala that applies to drones, though it is scarcely known by the general public ...