Science and Technology Law Articles

Articles written by lawyers and expert witnesses worldwide
explaining the different aspects of Science and Technology.

Australian Privacy Law Reform: A Step Closer to EU Adequacy? - Belgium

  By Lorenz
In 2012 the Australian Parliament will implement reforms to the Privacy Act which grant more powers to the Information Commissioner and streamline some of the public and private sector obligations relating to privacy. Australia’s Privacy Act 1988 (‘the Privacy Act’) governs the federal privacy regime in Australia, along with other legislation relating to telecommunications, health care, government data-matching, and criminal records.

Best Practice for Joint Development Agreements - Taiwan

  By Asia Law
Companies that wish to produce new technologies often choose to jointly develop it with others. That option is popular, as it allows two companies to share their respective strengths, resources and expertise. It is also risky, because each party relies on the other and may be required to share sensitive trade-secrets and other intellectual property rights. However, handled properly, the risks can be minimized and a mutually beneficial relationship can flourish.

How the Internet is Destroying Small Business Commerce and Legal Remedies

The Internet is destroying the enforceability of small business contracts. Here are a few examples: Case 1: Painting Company and the BBB. - A house painting company (“PaintCo”) bid on and signed a contract with a home owner to paint his house. The contract had a three day cancelation clause which was not invoked.

Brazil: Satellite TV Opportunities

I spent three weeks in Brazil at the end of 2011, traveling in Campinas, Sao Paulo, Rio de Janeiro and the upscale resort town of Buzios in RJ State. One way in which Brazilian urban and suburban landscapes differ from those in the United States is that almost everywhere you look, you see new multi-family construction projects being built, mostly high-rises.

Open Wi-Fi Network Owner Not Liable for Copyright Infringement - Malta

In a recent ruling, a Finnish District Court held that when an act of copyright infringement takes place through the use of a person’s open Wi-Fi network, by somebody other than the owner of the network, that same owner cannot be held liable for the infringing acts. The case was brought by the Finnish Anti-Piracy Centre, a coalition of intellectual property right holders. They collectively sued a woman who owned the network for €6,000.

Copyright: The Next Generation - Australia

Broadband is a game changing development and policy-makers are still in “catch-up” mode. Legislatures and courts have so far taken a fairly traditional approach to dealing with the protection of online copyright works. Ultimately, it is expected that creative creators will continue to think outside the square to develop new business models – and that this group will manage to stay “ahead of the curve” when it comes to generating value (and new revenue streams) from their creative efforts.

Transborder Dataflows and Jurisdictional Issues in the Cloud - Australia

Transborder data flows are a significant concern for those interested and involved in cyber-security and information privacy. The issue is given particular focus in the context of cloud computing. A key new source of risk for users on cloud computing services is that associated with the storage of data and the execution of transactions in foreign jurisdictions. This whitepaper examines government and industry responses to cross-border data flows in the context of cloud computing.

Data Security in the Cloud: Issues in Cloud Law - Australia

Inadequate data security leaves businesses open to significant damage and embarrassment. Whilst data security is a key concern for any business when it considers the use of its IT resources, businesses that operate within, or are seeking to operate within, the cloud need to be particularly attuned to the increased risks and dilemmas that cloud computing poses for their data security. - Data Security in the Cloud - A Whitepaper by Nicholls Legal

Privacy and the Cloud: Issues in Cloud Law - Australia

The adequate protection of the privacy of personal and sensitive data has proved to be one of the key concerns that has emerged in the area of cloud computing. Adequate protection of privacy intersects with many other issues affecting cloud computing, including data security, jurisdictional concerns and contractual issues. Cloud Computing and Privacy - A Whitepaper by Nicholls Legal

How to Draft Clinical Trial Agreements

  By TroyGould
Clinical Trial Agreements (“CTAs”) can be surprisingly complex documents with numerous legal issues, particularly in the setting of a multi-center trial for a new drug product candidate. This outline highlights the principal issues typically arising in a CTA and some of the considerations for companies sponsoring pharmaceutical trials (“Sponsors”) in addressing these issues.

EU Commission to further harmonise mobile roaming costs - Update

Update: The Agreement drawn up at EU level regulating this matter will come into force as of 1st July 2012.

Heart Patients: Improved Healing May Come from Use of Stem Cells from Fat by Elizabeth Smith

At least three promising studies during the past decade indicate that heart patients may one day enjoy improved health after their hearts are treated with stem cells taken from some of their own fat cells. Several of these studies have been run by Dr. James Willerson of the Texas Heart Institute. During recent interviews, Dr. Willerson has said that he believes one of his most successful studies was the one he presented in 2011.

Bed Sores are Amongst Most Common Hospital Errors

Recognizing that the development of a bed sore during an admission to a hospital as something that simply should not occur, many facilities have begun to categorize their development for what they truly are a serious medical error. Bed sores now join a list of dreadful occurrences such as: operations on the wrong body part, patient suicides, foreign objects left in during surgery and deadly falls in the hospital as situations that simply shouldn't occur in the presence of proper medical care.

Atlanta Criminal Lawyers Explain the Meaning of “Taking the Fifth”

We’ve all heard the phrase “taking the Fifth.” A defendant in a criminal defense TV drama takes the Fifth in answer to a question as his Atlanta criminal lawyer glances from the stand. A friend jokes that she’s going to take the Fifth about what she was doing last night because her partner would be upset. But what does “taking the Fifth” mean?

Beware of Trademark Scams

Recently, McDole & Williams has received multiple requests to evaluate official-looking trademark registration notices received by clients. These official-looking notices claim to be from governmental trademark offices, alleging that the client must pay fees in order to maintain his/her trademark and rights.

Do's and Don'ts on How to Use Google for Legal Work

Unfortunately, about two out of three new clients come to our firm because they have a problem with their signed contract or legal documentation. Too late, they have received the previously unconsidered information that their contract does not have a jurisdictional provision (so they are being sued in Idaho); or their contract doesn’t allow for....

The New U.S. Patent Law - Pros and Cons

A brief summary of some positive and negative consequences of the America Invents Act. America Invents Act: Pros and Cons - by Todd Juneau

European Watchdog Calls for Stricter Regulation on ‘Cookies’

The European online privacy watchdog known as the ‘Article 29 Working Party’ has called for stricter regulation on the practice of using ‘cookies’ for online advertising. A cookie is a tracking program uploaded to a computer by advertising companies in order to monitor the activities of an internet user. This, in turn, allows the advertising company to forward advertisements to the user tailored to their personal interests.

Stem Cell Research: Potentially Beneficial but Controversial

In 2004, California voters enacted Proposition 71, approving $3 billion worth of funding for stem cell research to be allocated over a 10-year period to different research facilities. Now, in 2011, the money is scheduled to run out in around five years and voters are debating whether to approve a proposition authorizing additional funding. The proposition of providing more public funding for stem cell research has proven controversial among California voters, explains a lawyer.

The Internet is About to Change – Are You Ready for New gTLDs?

Generic top level domains known as “gTLDs” are about to change. If you are thinking that this may be interesting but has no effect on you or your business, think again. Brand owners have several options for protecting their trademarks in this new unlimited gTLD system. By: Maria Crimi Speth

Data Processing in Hungary: New Act and New Authority

The Hungarian Parliament has recently adopted a new act arguing that the provisions of the current data protection are outdated. Although the applicable EU directive is under significant review in the EU, the new Hungarian act still follows the old (current) EU legislation. The new act is called Information Act), and maintains the rigid Hungarian system of data protection and misses the opportunity to help foreign data processing.

SEC Rules Affecting Shell Companies

What is a Shell Company? Securities Act Rule 405 and Exchange Act Rule 12b-2 define a Shell Company as a company, other than an asset-backed issuer, with no or nominal operations; and either: • no or nominal assets; • assets consisting of cash and cash equivalents; or • assets consisting of any amount of cash and cash equivalents and nominal other assets. By: Brenda Lee Hamilton, Attorney Hamilton & Associates Law Group

Petroleum Market Law and Its Implementations

Petroleum Market Law numbered 5015 has been enacted at December 4, 2003, within the efforts performed to institutionalize the market economy and improve the competitive environment in order to update the current legal regulations in the petroleum and petroleum product industry and regulate the markets.

Protecting Your Personal Information with Online Privacy Laws

A lot of people who use the internet have the need to protect their privacy. However, the internet is still so new that online privacy laws are still being written and modified.

Debt Relief Websites: Are they Honest?

Debt Relief Websites are they trouble? Make sure you review the terms and conditions of any site before agreeing.

Complaints against Microsoft’s Acquisition of Skype

Microsoft is currently in the process of acquiring the well known VoIP (Voice over Internet Protocol) provider Skype. This move has caused a great deal of concern to competing companies, some of which have filed objections in all applicable jurisdictions where the merger is being examined.

European Court of Justice Does Not Rule Out Foreign Television Services

In a preliminary ruling passed by the Grand Chamber of the European Court of Justice on the 4th October 2011, the court laid down a variety of principles which may bring about changes for the television service market.

Retraction Demands Related to 3rd Party Content

Defamation and Section 230 of the Communications Decency Act.

Online Data: The New Oil

The author explains behavior marketing and its possible ramifications on people.

User Agreements for your website

Don't think you need contracts for your website? Think again! Consult a lawyer today that specializes in internet law.

Import Substitution: Adaptation of Foreign Manufacturers of Medicines to the New Ukrainian Reality

Over the last several years the pharmaceutical markets of some countries of the former Soviet Union have witnessed strengthening positions of domestic production of medicines, as well as the general tendency of the imported medicines substitution by the domestically produced pharmaceutical products (so-called “import substitution”).

EU Commission to Further Harmonise Mobile Roaming Costs

The European Commission is persisting in its efforts to bring about further accessibility to consumers roaming within its borders by further standardizing the cost of voice calls, Short Message Service (SMS) and data transfer across the European Union whilst roaming. A new roaming regulation which will be updating the current one should be announced on the 6th July 2011 The regulation must be approved by the European Parliament and the Council of Ministers before being implemented.

The Impact of Constitutional Protections on E-Discovery

The technological advances that have accompanied the digital age have presented lawyers in California and elsewhere with new challenges when conducting discovery for civil cases involving personal injury and wrongful death, as well as criminal ones. This article explores how constitutional protections have further complicated the process.

Regulatory Challenges Related to Mobile Gaming - Malta

Until a few years ago, a mobile phone consisted of a handheld device which enabled a subscriber to make and receive voice calls whilst mobile, as opposed to accessing the public telephony network from a fixed location. As technology progressed, however, both in terms of the handheld device, and in terms of the transmission capabilities on mobile networks, the mobile phone became a ‘smarter’ device, combining voice services with e-mail, fax and/or Internet access.

EU’s Smart Specialization Strategies Platform - Smart Growth in Europe 2020

In the European Commission’s Communication regarding the contribution of the regional policy in the area of smart growth in the Europe 2020 strategy, the central role of European regions in this process is primarily recognized.

Going Mobile: A Quick Guide to Legal Issues When Monetizing (Non-Music) Content

You are a publisher of traditional hard copy content (newspapers, books, graphic novels, magazines, photographs) and your materials are in demand to fill the digital pipeline created by numerous web-based and mobile applications. Or, you are a media agency or corporate brand manager seeking to extend your footprint into the online space. You are eager to have millions of new eyeballs accessing your treasure trove. Your software developers are on board, ready to digitize.

China's Seed Industry

  By MMLC Group
This article looks at the major legal issues associated with China's seed industry, as well as provides a snapshot of the main Chinese entities and government departments that are involved in the seed industry.

Cyber Security Bill: Panacea for Cyber Crimes and Related Practices? - Nigeria

Stakeholders in Information and Communication sector recently reiterated their commitment to the passage of the anti-cyber crime bill into law.

Electronic Evidence Meets Right to Privacy in Texas Divorce Cases

There is a false sense of security that takes place when we log on to the internet, our smart phones, or some other form of electronic communication. Many of us seem to think that our true selves are separated from these pieces of technology and that our words and actions are anonymous and floating somewhere through the netherworld of cell phone towers and W-Fi hotspots.

Easy Steps to Protect Your Website from Being Copied

Website copying is common because of the popular myth that if something is on the Internet; it is in the "public domain" and therefore can be used by anyone.

The Computer Is a Crime Machine

Computer crimes and prosecutions on the rise: cyber espionage, theft of corporate trade secrets and identity fraud continue to increase.

Self-Incrimination in Your Pocket

California Supreme Court allows search of data stored on mobile phone without warrant.

New Law on Data Protection in Ukraine

After years of paralysis, Ukrainian business-related legislation is undergoing major changes. For instance, a new tax code came into effect in the New Year, and we can already hear the protests associated with the proposed new labor code. Meanwhile, completely undetected, a new law has quietly entered into force on January 1, 2011, entitled the Law of Ukraine No. 2297-VI “On Protection of Personal Data”, dated June 1, 2010 (hereinafter the “PDP Law”).


E-justice, the use of Internet technology in handling various administrative procedures before, during and after the administration of justice, provides a host of possibilities throughout the legal process, from lobbying through to the provision of remote authoritative legal information and certificates. It is seen by many as the key to streamlining and expediting justice.

Legal Issues Associated with Cloud Computing in China

  By MMLC Group
This article looks at some of the Chinese regulations that are most relevant to cloud computing in China. It is hoped that more comprehensive data privacy laws will receive attention in China in the near future.

Penny Auctions: Legalities and Realities

Penny auction sites are popping up everywhere on the Internet, like mushrooms after a storm. The basis of their appeal from the bidders' point of view is the old something for nothing. If all goes right and their bid is the winner, then they've managed to get valuable items for dirt cheap. But it's harder to figure out the attraction from the site owner's perspective.

Net Neutrality

Why the debate is anything but neutral and why you should care.

A Recipe for Disaster

Why a magazine is in hot water over a half-baked response to alleged copyright infringement.

How to Protect Your Business against Internet Defamation

The Internet is, as the cliché goes, "a marketplace of ideas." Whether a person has an opinion on politics, commerce, or even the show they saw on TV last night, there is always a forum to spread their opinion on, and that opinion will be available worldwide.

Crucial Elements of a Terms of Service Agreement

The author gives 5 important examples in Terms of Services.

ISP Liability for Internet Defamation

Defamation is a serious problem on the Internet. For the same reason that the Web has become a great tool for research and mass dissemination of information, it has also become a tool for those who would seek to defame others.

Terms of Service: Why You Need Them on Your Website

Why are they important to have on your website?

Domain Name Registering and Domain Name Squatting

Suppose you have an inside lock on the world's best widgets. Not now, but at some point in the indeterminate future, you intend to create an Internet e-commerce site from which you'll sell them.

Penny Auctions: The Legalities and Realities

Penny auction sites are popping up everywhere on the Internet, like mushrooms after a storm. You've seen their ubiquitous banner ads, perhaps without knowing what they are: 95% off Apple iPad 64GB! 46 inch flatscreen LED HDTV for less than a hundred dollars! Why pay full price for a SONY Playstation?

Internet Privacy - New Legislation

An article about Internet Privacy, "Do not track" list, and privacy legislation.

Privacy Policies: Why Your Website Needs One

Privacy Policies are an important part to any website. A good privacy policy, drafted by an internet lawyer, seeks to protect against unauthorized access to the site, as well as the collection, use, and disclosure of any information of the end user. Interestingly enough, the right to privacy is nowhere in the United States Constitution. Nonetheless, the right to privacy has been shaped by the Court system as well as the internet.

How Does the FTC Affect Online Business?

Internet law is a relatively new field of legal practice: state and federal courts and agencies are creating it on an ad hoc basis, attempting to fit the highly specialized disputes that arise from website development, service provider liability, copyright/trademarks, and the professional scope of online businesses and affiliate marketers into preexisting legal frameworks.

Policies and Procedures for Online Businesses

Understanding the online business world can help you build value for your business. From the founding of your company, and every day thereafter, you should be thinking about maintaining a presence online and building relationships that will be of value. Each move you make can make your company more or less valuable. This advice applies to both local businesses and those wishing to operate in the global market.

Putting Your Business Online? Untangle the Legal Web First

The internet has been instrumental in helping businesses grow. Before putting your business on the internet, it is important to make sure you are complying with the law. There is a growing consensus that there is a quasi-relationship between every website owner and its visitor or viewer. Some of these duties are statutory, while others are contractual.

SaaS Law and SaaS Agreements

Software as a Service (SaaS), or sometimes known as cloud computing, has been hailed as the next level of modern software. SaaS offers significant advantages to businesses and consumers alike, both in its cost and ease of use. This article will provide a basic overview of SaaS and SaaS law and why developers and end users alike need to understand the role an SaaS attorney plays in this new software.

FTC Compliance for Bloggers and Internet Marketing

Lately there have been many questions from our clients in the internet marketing and blogging industry about the new Federal Trade Commission Guidelines. Specifically, whether an affiliate marketer or blogger must disclose certain information on their web page, and if so how the disclaimer must be presented. This article will highlight several portions of the new guidelines and offer a framework for clients in how to disclose certain information on their websites.

10 Things Every Internet Marketer Should Know

Summarize your business plans, goals, and time frames in order to become a successful internet marketer.

What is Net Neutrality?

From its inception, the promise of the Internet has been parity. The Internet is fundamentally democratic. It does not discriminate between packets of information. It allows you to access the website of that tiny independent bookstore around the corner just as quickly as you access It does not filter out access to digital forums where unpopular ideas or opinions are expressed. It does not transmit MSNBC content any more efficiently than it relays content from Fox News.

Section 230 of the CDA and Website Immunity

The Communications Decency Act, found in Section 230 of Title 47 of the US Code, was enacted in 1996 to provide website operators with immunity for third-party content. At the time, Section 230 seemed like the best approach to help the internet grow, as several court cases threatened to put many service providers such as AOL and Prodigy out of business. Yet, Section 230 of the CDA has caused many unintentional problems that, at the time, were probably never contemplated.

Mining Evidence under the California Electronic Discovery Act

Now that California has adopted procedures for conducting E-Discovery, requests for electronically stored information (ESI) should be part of a routine discovery plan. Getting ESI in electronic form is better than paper because it contains more information, is easier to use and distribute, and eliminates wasteful printing. This article gives practice tips on conducting E-Discovery in California.

10 Things Every Internet Marketer Should Know

The author describes the 10 things you should know to market in Internet.

FTC and Online Advertising/Marketing

Internet law is a relatively new field of legal practice: state and federal courts and agencies are creating it on an ad hoc basis, attempting to fit the highly specialized disputes that arise from website development, service provider liability, copyright/trademarks, and the professional scope of online businesses and affiliate marketers into preexisting legal frameworks.

Linguistic Dispute: Perversion of Online Arbitration Concept in Ukraine

There is no specific regulation allowing or prohibiting online arbitration in Ukraine at the time.

Is My Domain Name a Trademark?

Is My Domain Name a Trademark? This is not only a common legal question but also a great question as the answer is - it depends! A domain name simply is an address on the Internet.

What About that Fine Print? Website "Terms of Use" and "Privacy Policy"

Whether your business has always been Internet based or your traditional brick and mortar business has evolved to a click and mortar business, you have a website. It's likely that you know that you need the fine print - "terms of use" and a "privacy policy."

Telecomms Regulators to Require SIM Card Registration to Curb Cell Phone-Related Crimes - Nigeria

The recent direction by the Ministry of Information and Communications to the effect that all mobile telecoms operators selling new Subscriber Identification Module (SIM) cards must obtain the data of prospective subscribers and that all previously obtained SIM cards must be registered without delay is no doubt a good policy aimed at reducing the incidents of technology related crimes.

Hidden Camera Detectors Take On High-Tech Voyeurs

New Yorkers Among Many Across Country Fed Up With The Notion That Someone Could Be Watching

Chemical Burn Injury Treatment

The best way to avoid chemical burn injuries is through prevention. All chemicals should be properly labeled and stored, whether they are in the home or the workplace.

China Clarifies Procedures of Tax Refund and Exemption for Foreign-invested Research and Development Centers

On 22 March 2010, China’s Ministry of Commerce, Ministry of Finance, General Administration of Customs and the State Administration of Taxation jointly issued Circular on Measures of Qualification Review for Tax Refund and Exemption Granted to Foreign-invested Research and Development Centers concerning Equipment Purchases to clarify the procedures that foreign-invested R&D Centers shall follow when claiming refund or exemption of import taxes imposed on purchase of equipment.

China’s Anti-Monopoly Bureau - Decision to Approve HP’s Acquisition of 3Com

  By MMLC Group
HP and 3Com Corporation (3Com) announced in November 2009 that they had entered into a definitive agreement under which HP will purchase 3Com, a leading provider of networking switching, routing and security solutions, at a price of $7.90 per share in cash or an enterprise value of approximately $2.7 billion. The Chinese government approved this transaction in early April 2010.

PCI DSS: Is Your Company Compliant?

  By Lorenz
The Payment Card Industry (PCI) Data Security Standards (DSS) is a set of comprehensive requirements for enhancing the data security of customer details from card transactions. Find out why every company that is accepting online debit or credit card payment should be aware of these standards.

‘Dear valued customer, we regret to inform you that your data has been compromised...’

  By Lorenz
Paving the way for new standards in data security, on October 26, 2009, the Council of the European Union approved the directive amending Directive 2002/58/EC concerning the processing of personal data and the protection of privacy in the electronic communications sector (the “Directive”).

An Introduction to China's Biotech Industry

  By MMLC Group
China has just seen double-digit growth in its biotechnology industry and has gone from being one of the slowest to one of the fastest nations in the adoption of new biotechnologies. By 2010, the Chinese biotech market is projected to reach US$9 billion. This article gives a snapshot of the industry and major laws.

Telecommunications Law in Cameroon

Telecoms activities in Cameroon is administered by the Ministry of Posts and Telecommunications. But since communications is the knot which ties both the national and international business community together, the government in 1982 set up INTELCAM, a structure with a business outlook. While this state corporation managed international telecommunications activities, ACTEL was created alongside to take care of the internal telecommunications network.

Are Your Cell Phone Conversations Secure?

Eavesdroppers, thieves and hackers are all out there -- but you can prevent them from accessing your secrets.

Belgian Consumers To Pay For Privacy Unfriendly Data Retention Measures?

  By Lorenz
Jan Dhont comments on new data retention bill announced by the Belgian Ministry of Justice. “The proposed data retention requirements risk to violate consumer’s privacy and comes with a high cost. Belgian consumers are likely to pay twice for unpopular and privacy-unfriendly measures”, Mr. Dhont says.

U.S. Supreme Court Declines to Review Important Copyright Case Involving Legality of Remote Storage DVR Systems

On the final day of its term, the U.S. Supreme Court declined to review an important copyright case involving the legality of “remote storage digital video recorder” (“RS-DVR”) systems. At issue in the case was whether Cablevision’s RS-DVR system directly infringed on the copyrights owned by plaintiff content providers, which included Hollywood studios and television networks such as Twentieth Century Fox, University City Studios, Paramount Pictures and Disney.

Federal Computer Fraud and Abuse Act Remedies Potentially Available to Hawaii Employers for Deleted Files

Hawaii employers could have a federal civil remedy available in federal court in addition to the ability to invoke Hawaii criminal statutory law for damage caused to either network or company-owned computers by former employees.

Hospital Employee's Misuse of Personal Health Information: a Wake Up Call for Hawaii Employers

Hawaii employers covered by HIPAA should review their privacy and HIPAA policies and conduct an audit of their practices in order to protect against the improper use and disclosure of private health information and to reduce the risk of privacy breaches in their own organization.

EU Introduces Information Security Breach Notification Requirements

  By Lorenz
With the proposed amendments to the Electronic Communications Privacy Directive 2002/58 (hereinafter: “E-Com Directive”), the European Union is setting its first steps towards introducing information security legislation in Europe.

IP Telephony Vs. Traditional Telecom Systems

  By CHL Firm
A large shift is underway in the telecommunications industry; many customers are transitioning from traditional telephone systems or Analog Communications [1] to Internet packet-based networks or VoIP.

Legal Knowledge Management (A Knowledge Manager’s Perspective)

In a nutshell Legal Knowledge Management (LKM) refers to - the collection, organization, dissemination, and reuse of knowledge contained natively within documents and individuals’ minds. The term specifically includes the development of standard forms, tools, and templates to streamline the delivery of service. This definition is quoted from the LKM White Paper One entitled: “Legal Knowledge Management A Holistic Model” dated April 2003.

Cyber Crime Top 10 Dos & Don’ts

Cyber crime is on the rise. That may not be a novel or new statement, but what is novel and new is the way that law enforcement, attorneys and judges are dealing with this new area of the law. Unlike the categories of the law that we’re used to, like family or bankruptcy, cyber law isn’t a body of law unto itself, but a collection of laws regulating how people behave when they use computers, networks and the Internet. It frequently also draws on both state and federal law.

Hawaii Employment Law and Litigation Basics: How do I Draft a Litigation Hold Policy and Implement a Plan for Electronic Discovery?

Electronic evidence is quickly evolving into one of the most difficult areas of litigation to navigate. Hawaii businesses, especially human resource managers in employment disputes, must understand that it is extremely important to work closely with counsel to determine the extent of their discovery obligations.

Ten Legal Tips for your Internet Business in Spain

This article summarizes some of the most important legal tips that every Internet entrepreneur should take into account for their online businesses in Spain, and to help them understand such legal risks, a key point in keeping their business healthy and profitable.

What is Sexting?

Sexting Among Children; Criminal Behavior or Brash Sign of the Times

Fencing Copyrighted Content Off in the Digital Age - A Case for Trusted Computing - Greece

Please Note: This work is licensed under a Creative Commons Attribution—Non-Commercial-No Derivative Works 3.0 Greece License.

Non-Competition Clauses in Israel

Employers in the Hi-Tech sector are concerned about “hitting a homerun” before any competitor does so. A significant aspect of that concern is that their own employees could, utilizing knowledge and/or skills acquired in the course of their employment, either join a competitor or start up their own competing business. The “Non-competition Clause” has, therefore, become an integral provision in employment agreements.

Landing Permits for Trans-Continental under Sea Optic Cables in West Africa: Challenges for Telecommunications Outfits

There is a paucity of fibre optic capability in the West African telecommunications industry. In addition to widening the digital divide between Africa and the rest of the world, this situation has resulted in slower Internet connections and expensive telecommunications facilities in the sub-region.

Can Law Keep up with Technology?

Science and technology is advancing at a breakneck pace. With each passing day, new technologies and advancements make our world easier, safer and point toward a brighter future. But with each advancement and innovation, legal issues arise.

How to Succeed in Negotiations for Investment in High-tech Companies

How to Succeed in Negotiations for Investment in High-tech Companies. Some Helpful Advice for Both the Entrepreneur and the Investor

Monitoring of Employees Electronic Communication

Monitoring of employee’s data messages at the workplace: What about the employee’s right to privacy?

Countering Espionage - A Modern Threat

Corporate Espionage was once thought of as a risk that only affects the richest of companies in high-risk sectors or emerging markets, the latest trends suggest that this is far from the truth.

Alternative Domain Name Dispute Resolution

The United States Government, in its June 5, 1998 Statement of Policy on the Management of Internet Names and Addresses (the “White Paper”), called for the privatization of the DNS “in a manner that allows for the development of robust competition and that facilitates global participation in the management of Internet names and addresses.”

.Info Domain Name

History of the .Info Domain Name

Contact a Lawyer

Find a Local Lawyer