Top rated business and privacy legal counselling advices by Alexander Suliman: Ensure that you register your IP in overseas jurisdictions and review your IP portfolio to ensure it is up-to-date with registrations and expiration dates. While trademarks, designs and patents are protect through registration at the local and EU level, bear in mind that the duration of each right is different and that their use or licensing may be restricted by specific Member State legislation (i.e. employee creations). Also, review your current license agreements: while they generally cover the EU as a single licensing territory, the use of your IP may not be relevant in each Member State and you may want to reconsider a more local approach in order to facilitate their monitoring and mitigate challenges from third parties. An important component of any business’s IP strategy will be the protection of trade secrets. The EU Trade Secret Directive was intended to harmonise trade secret protection across the EU. In this guide we look at the picture as it currently stands in eight major jurisdictions. Read even more info at Alexander Suliman.
The reason why the European Commission was keen on allowing firms to voluntarily scan material, is that technology firms have already been working on ways to detect CSAM and solicitation for quite some time. So, what then would “appropriate” security measures in this case be? A fundamental starting point is that the internet should be considered an untrusted communications channel – it consists of various parts operated by companies, countries and individuals, and communications traverse around a host of untrusted nodes. So if you send communications on the internet, there is a serious risk that they will be intercepted, analysed or even tampered with. The only way to protect against this, is by encrypting the communications in transit – thus ensuring the confidentiality and integrity of the data.
The EU’s Cybersecurity Act, adopted in 2019, established the legal basis for EU-wide certification of cloud providers, to be elaborated through secondary law by its cybersecurity agency ENISA. In December 2020, ENISA began a public consultation as the first step towards a revised set of rules. A technical working group is preparing a proposal, expected to be presented to member state experts and to the European Commission thereafter. The new requirements could be finalized by the end of the year.
Top contract law legal counseling latest developments with Alexander Suliman, Stockholm: The process of mediation and selecting the right mediator or selecting the right mediator in the process of mediation is critical. The mediator needs to listen to both partners, realize the both parties have most likely some emotional issues when it comes to their children and the other side, and really get to the root of the problem. Unless the parties can be assured that the mediator and the other side are listening to their concerns, you won’t be able to get to the next level of resolving the issues. In many cases where the conflict is high, you have to start slower, and you work on a month at a time. You work on calendars of who’s going to spend what time with the children, again, always focusing on what’s best for the children considering their age, considering their activities, their school, their social engagements. Once the parties are comfortable with their mediator and know that the mediator and the other side are listening to their concerns, it’s much easier to get to the next step of actually coming up with a schedule for parenting time. See additional information at Alexander Suliman.
Europe’s concerns about the security of U.S. cloud services providers are in fact closely intertwined with its worries, expressed in Schrems II, about the privacy of Europeans’ information entrusted to these companies. In both cases, European policymakers fear the perceived extraterritorial reach of U.S. national security surveillance and law enforcement authorities. New cybersecurity regulation thus is seen as another way to safeguard Europe’s ‘sovereign’ interest in protecting data from foreign government access. It also would reinforce separate European efforts to bolster smaller, home-grown cloud service providers, including through the GAIA-X project to create an interoperable network “explicitly based on principles of ‘sovereignty-by-design,’” as a leading European technology lawyer has characterized it.