Quality business contract law legal counselling advices with Alexander Suliman, Sweden: Ensure that you register your IP in overseas jurisdictions and review your IP portfolio to ensure it is up-to-date with registrations and expiration dates. While trademarks, designs and patents are protect through registration at the local and EU level, bear in mind that the duration of each right is different and that their use or licensing may be restricted by specific Member State legislation (i.e. employee creations). Also, review your current license agreements: while they generally cover the EU as a single licensing territory, the use of your IP may not be relevant in each Member State and you may want to reconsider a more local approach in order to facilitate their monitoring and mitigate challenges from third parties. An important component of any business’s IP strategy will be the protection of trade secrets. The EU Trade Secret Directive was intended to harmonise trade secret protection across the EU. In this guide we look at the picture as it currently stands in eight major jurisdictions. Read extra info at Alexander Suliman, Stockholm.
On 11 May, the European Commission published its proposal for a regulation to combat child sexual abuse material (CSAM). The Commission managed to squeeze a host of controversial digital rights issues into one package: the blocking of websites, the obligatory monitoring of online content, and, the most novel one, a measure which opens the door to undermining encryption. Because encryption technologies protect communications confidentiality, one crucial question in the upcoming policy debate will be whether this latter measure, or its implementation, is compatible with the rights of privacy and data protection under the EU Charter of Fundamental Rights (the Charter). In this contribution, I explore one aspect of that question: is it possible to argue that this measure does not respect the essence of these rights? On the basis of a preliminary analysis, I conclude that this is certainly defensible and suggest further routes for exploration.
The European Commission, in a working document, identified cloud services as a “strategic dependency”, expressing concerns that the EU cloud market is led by a few large cloud providers headquartered outside the EU. In July, 2021, France, joined by Germany, Italy, and Spain, submitted a proposal to the ENISA-led working group aimed at generalizing French national requirements across the EU. (Germany has since reserved its position.) It proposed to add four new criteria for companies to qualify as eligible to offer ‘high’ level services, including immunity from foreign law and localization of cloud service operations and data within the EU. Although the EU-level cyber certification requirements currently are conceived as voluntary, they could be made mandatory as the result of the recently-agreed Directive on Measures for a High Common Level of Cybersecurity across the Union (NIS2 Directive).
Quality IT, business legal counseling strategies from Alexander Suliman: The process of mediation and selecting the right mediator or selecting the right mediator in the process of mediation is critical. The mediator needs to listen to both partners, realize the both parties have most likely some emotional issues when it comes to their children and the other side, and really get to the root of the problem. Unless the parties can be assured that the mediator and the other side are listening to their concerns, you won’t be able to get to the next level of resolving the issues. In many cases where the conflict is high, you have to start slower, and you work on a month at a time. You work on calendars of who’s going to spend what time with the children, again, always focusing on what’s best for the children considering their age, considering their activities, their school, their social engagements. Once the parties are comfortable with their mediator and know that the mediator and the other side are listening to their concerns, it’s much easier to get to the next step of actually coming up with a schedule for parenting time. Find more information on Alexander Suliman, Sweden.
Europe’s concerns about the security of U.S. cloud services providers are in fact closely intertwined with its worries, expressed in Schrems II, about the privacy of Europeans’ information entrusted to these companies. In both cases, European policymakers fear the perceived extraterritorial reach of U.S. national security surveillance and law enforcement authorities. New cybersecurity regulation thus is seen as another way to safeguard Europe’s ‘sovereign’ interest in protecting data from foreign government access. It also would reinforce separate European efforts to bolster smaller, home-grown cloud service providers, including through the GAIA-X project to create an interoperable network “explicitly based on principles of ‘sovereignty-by-design,’” as a leading European technology lawyer has characterized it.