The Personal Data Protection Act 2012 (Act) was passed by the Singapore Parliament on 15 October 2012 and came into effect in Singapore on 2 January 2013. A major component of the Act was to put in place general data protection provisions (Data Protection Provisions) that apply to all organisations operating in the private sector in Singapore. Previously, only limited confidentiality obligations existed in Singapore under certain sector specific legislation.
Digital communications and electronically stored data come with inherent vulnerabilities and the potential for employer liability. Harnessing the power of the digital age while controlling workplace risks is a challenge. The notion of electronic communications and social media in the workplace has changed drastically over the past decade, morphing from activities employers often sought to limit to required activities of one’s job in many occupations, including those that will help grow the business. This InfoPAK covers laws impacting privacy and data security and best practices for reducing workplace information risk. It also discusses the particular benefits and risks of the company’s use of social media and social networking technologies. Finally, it looks at the issues in employment litigation arising out of digital information and communications.
This article discusses whether the United States Safe Harbor framework provides an adequate level of protection for European Union businesses that transfer personal data to U.S. companies.
Mexico ardently protects the privacy of its individual citizens' personal data and sensitive personal information. This protection is enforced though the Federal Personal Information Protection Law and its regulations. The Federal Institute for Access to Public Information and Protection of Information (IFAI) is the agency in charge of enforcement. This article reviews the eight main principles of this law.
Article 20 of the new Loi de Programmation Militaire has been described as the “French Patriot Act.” It gives the French administration new surveillance powers, allowing it to request content, data and metadata, including geo-location data. This article provides an overview of the key provisions of this new law.
This checklist highlights some steps we have been helping companies take so that they can be better prepared in the event that a significant incident occurs.
Big Data refers to the collection, organization and analysis of expansive data pools. Conclusions drawn from Big Data are not infallible. The author explains how human bias can influence the interpretation of data sets.
Companies known as “non-practicing entities” (NPEs), patent assertion entities (PAEs) or, more colorfully, patent trolls do not produce patented products or services, but instead are created specifically to own patents and seek licensing fees. Lawsuits brought by NPEs are increasingly pervasive and costly. This article provides a roadmap that will allow corporate counsel to analyze and address the demands of a patent troll.
Panelists will address their efforts in battling counterfeiters and pirates — both online and offline, domestic and international — and the key resources and relationships to a successful global anti-counterfeiting program. The panelists will also address other areas relating to piracy and counterfeiting, such as efforts to support your business in transforming piracy into revenue.
The proliferation of music and movie sharing sites make it easier than ever to add multimedia – motion pictures, television video, and music -- to enhance communication and training for customers and colleagues. Yet questions about permissions and licensing persist. This program will offer an introductory class on music and video public performance law and licensing. From American Society of Composers, Authors and Publishers/Broadcast Music, Inc./Society of European Stage Authors and Composers, to movie and television studios, to public performance licenses, to sync licenses, and more, this program will provide an overview of current laws pertaining to music and video licensing and offer practical approaches on when organizations need to seek permission for reuse. Guidelines on how to go about securing the necessary permissions, clearances and licenses will be offered.