Get the latest news from our members | World Services Group
Firm: All
Practice Industry: Industrial & Manufacturing, Technology
Region: All
Country/ State: All
Tag: All
Dykema | April 2018

In 2017, the Cayman Islands passed the Data Protection Law (“DPL”), which reads much like the upcoming European Union General Data Protection Regulation (“GDPR”) that goes into effect Mary 25, 2018. The DPL applies to entities falling within the definition of “data controller” who are established in the Islands or who process data in the Islands. The DPL divides data into two categories, personal data and sensitive data ...

Shoosmiths LLP | April 2018

The Department for Digital, Culture, Media and Sport (DCMS) has published the Creative Industries Sector Deal aimed at making the UK the best place in the world for businesses in the creative industries. This is the latest sector deal to flow from the government's Industrial Strategy White Paper after sector deals for life sciences and the automotive industry were announced in late 2017/early 2018, respectively ...

Lavery Lawyers | April 2018

Technologies based on blockchains and AI imply a considerable change for our society. Being that the security of data exchanged is vital, companies must begin adopting a long-term approach right now. Many businesses develop services based on blockchains, in particular in the financial services sector. Cryptocurrencies, one example of blockchain use, transform the way in which some monetary transactions are made, far from the oversight of financial institutions and governments ...

The General Data Protection Regulation (GDPR) is aimed at extensive harmonization of data protection in the EU, and will be applicable with effect from May 25, 2018. The GDPR will replace the current EU Data Protection Directive (Directive 95/46/EC) and will be directly applicable in all EU member states. The new regulations mean that German employers will also have to prepare for changes as regards the protection of employees’ personal data ...

Dykema | April 2018

In light of the increasing significance of cybersecurity incidents, the Securities and Exchange Commission (SEC) recently found it necessary to provide further guidance with respect to cybersecurity disclosure requirements under the federal securities laws as they apply to public operating companies ...

Shearn Delamore & Co. | March 2018

  Can “consent” to use a registered trade mark be considered an abandonment by the owner of the exclusive rights to that registered trade mark in perpetuity? Section 40(1)(dd) of theTrade Mark Act 1976 (“Act”) provides that it is not a trade mark infringement if it is “the use by a person of a trade mark in relation to goods or services to which the registered proprietor or registered userhas at any time expressly or impliedly consented to” [Emph

Waller | March 2018

Tennessee has become one of the first states in the country to approve the use of “smart contracts,” which are made through the use of blockchain technology. In essence, the law gives blockchain contracts and electronic signatures submitted through blockchain as having equal standing to more traditional forms of contracts ...

Dinsmore & Shohl LLP | March 2018

This article provides a brief review of MSHA enforcement data and a look at MSHA’s regulatory agenda. MSHA Enforcement Data (data from January 1, 2017 to December 31, 2017) MSHA issued 104,412 enforcement actions to mine operators in 2017, an increase of approximately 11,793 or 11.3 percent from 2016. Of these, 58,083 (or 55.63 percent) were issued to metal/nonmetal operators while 46,329 (or 44.37 percent) were issued to coal operators ...

Waller | February 2018

Hidden in the details of the Bipartisan Budget Act of 2018 are some key telehealth provisions that are receiving praise from many industry groups and could mark a significant development for Medicare telehealth policy. The new legislation promotes telehealth in several ways. Tele-stroke. Medicare currently only covers tele-stroke services for patients located in rural health professional shortage areas and counties not classified as a metropolitan statistical area ...

Dinsmore & Shohl LLP | February 2018

U.S. technology company Cogint, Inc. (NASDAQ: COGT) announced the termination of its proposed business combination with BlueFocus International Limited after the Committee on Foreign Investment in the United States  indicated the committee’s unwillingness to approve the transaction ...

The CPA appointed the National Bureau of Investigation (NBI) and Philippine National Police (PNP) as enforcement authorities and regulates their access to computer data, creating the Cybercrime Investigation and Coordinating Center (CICC) as an inter-agency body for policy coordination and enforcement of the national cybersecurity plan, and an Office of Cybercrime within the Department of Justice (DOJ-OC) for international mutual assistance and extradition ...

Szecskay Attorneys at Law | February 2018

The GDPR contains rules on when it is mandatory for controllers and processors to designate a data protection officer. The Article 29 Data Protection Working Party (WP29) issued guidelines on the data protection officers (DPOs) interpreting the respective provisions of the GDPR (Articles 37-39 and Recitals 77 and 97). The Data Protection Officer (DPO) The GDPR contains rules on when it is mandatory for controllers and processors to designate a data protection officer ...

ENSafrica | February 2018

  The question of when the South African Protection of Personal Information Act, 2013 (“POPI”) will come into force has been asked many times since the Bill was signed into law by the president on 19 November 2013 ...

Dykema | February 2018

Strong contracting processes and communications which establishes clearly the expectations of each of the parties reduces disputes and costs and strengthens relationships. The key to strong contracting processes is to approach contracts in a holistic manner making sure all documents interconnect in a logical uniform manner. Because manufacturing processes can be complex, this is often not as easy as it sounds ...

COBALT | February 2018

Since not only individual people, but also the overall project, are being present­ed, online presentation can be divided into two main parts. First is the management of personal social media. Avoid any dis­respectful or offensive discourse, as well as any ambiguous posts and photos. Or as a minimum , do not display them publicly. Secondly, visual communication is ab­solutely crucial to protect the name of a reliable project ...

TSMP Law Corporation | February 2018

Technology’s dark side may well be the silent threat to democracy. A year ago, Americans installed a reality TV star in the White House who doesn’t seem to let the facts get in the way of a good tweet. Trump’s shambolic management style has given America’s enemies a perceived opportunity to drive their country’s agendas ...

Dinsmore & Shohl LLP | February 2018

As technology has advanced, cyber extortion attacks have risen, and they will continue to be a major security issue for organizations. Cyber extortion can take many forms, but it typically involves cybercriminals demanding money to stop or delay their malicious activities, which include stealing sensitive data or disrupting computer services. Health care and public health sector organizations that maintain sensitive data are often targets for cyber extortion attacks ...

Waller | February 2018

In vacating a jury’s award of almost $54 million based on a finding of willful trademark and trade dress infringement, an Illinois federal district court granted the defendants’ motion for a new trial, finding the trial “fundamentally unfair due to the admission of unreliable and prejudicial expert testimony.” The Black & Decker Corporation et al v. Positec USA Inc.,No. 1:2011cv05426 (N.D. Ill. Sept. 11, 2017) ...

ENSafrica | January 2018

In an increasingly connected world, the protection of privacy and personal data has become a key concern for legislators in a number of jurisdictions. In South Africa, an attempt to give effect to the constitutional right to privacy resulted in the Protection of Personal Information Act, 2013 (“POPI”), which was gazetted on 26 November 2013 ...

Karanovic & Partners | January 2018

The Serbian Competition Commission (the "Commission") recently finished sector inquiries concerning quite distinct industries – raspberries and the public procurement for software and hardware. The aim behind the inquiries was to perform extensive market research and analysis in order to acquire a clearer picture of the possible antitrust issues and risks in two sectors widely perceived as strategic for the development of the Serbian economy ...

Heuking Kuhn Luer Wojtek | January 2018

As of now, manufacturers in the premium segment – for example in the area of cosmetics, cars, and luxury goods – can prohibit their selective sales partners from reselling goods via platforms such as Amazon, eBay, etc. to maintain the luxury image of the contractual goods ...

Dykema | December 2017

The U.S. International Trade Commission (“ITC”) issued a determination at the end of 2017, finding that solar panel imports are hurting domestic businesses that operate in the solar industry. The ITC’s determination was issued in connection with a trade case filedby a Georgia-based company, Suniva, Inc., shortly after filing for bankruptcy protection. SolarWorld Americas, Inc. joined Suniva’s petition ...

dots