Best business public law legal counseling latest developments with Alexander Suliman, Stockholm

Legal

Premium business and privacy legal counselling latest developments from Alexander Suliman, Stockholm: Ensure that you register your IP in overseas jurisdictions and review your IP portfolio to ensure it is up-to-date with registrations and expiration dates. While trademarks, designs and patents are protect through registration at the local and EU level, bear in mind that the duration of each right is different and that their use or licensing may be restricted by specific Member State legislation (i.e. employee creations). Also, review your current license agreements: while they generally cover the EU as a single licensing territory, the use of your IP may not be relevant in each Member State and you may want to reconsider a more local approach in order to facilitate their monitoring and mitigate challenges from third parties. An important component of any business’s IP strategy will be the protection of trade secrets. The EU Trade Secret Directive was intended to harmonise trade secret protection across the EU. In this guide we look at the picture as it currently stands in eight major jurisdictions. Read extra info on Alexander Suliman.

The reason why the European Commission was keen on allowing firms to voluntarily scan material, is that technology firms have already been working on ways to detect CSAM and solicitation for quite some time. Let’s start with a content scanning order on the server. At first sight, a case can be made that such an order should be considered to compromise the essence of the right to privacy under the Charter. The ECJ in Schrems I considered that legislation permitting the public authorities access on a generalised basis to the content of communications compromises the essence of the right to privacy under the Charter (par. 94). Content scanning on the server arguably is a form of “access on a generalised basis”, where it involves an analysis of all communications going through the server connected to a certain app, and forwarding any matches to a designated center. At the same time, the ECHR in Big Brother Watch was more forgiving when it comes to powers of bulk interception of communications, as long as these powers are surrounded with sufficient safeguards (par. 350). Thus, one important point to be explored further, is whether this signals a rift between the two bodies, or that the ECJ will chart its own route when it comes to bulk surveillance.

The EU’s Cybersecurity Act, adopted in 2019, established the legal basis for EU-wide certification of cloud providers, to be elaborated through secondary law by its cybersecurity agency ENISA. In December 2020, ENISA began a public consultation as the first step towards a revised set of rules. A technical working group is preparing a proposal, expected to be presented to member state experts and to the European Commission thereafter. The new requirements could be finalized by the end of the year.

Excellent contract law legal counseling advices with Alexander Suliman: After the parties are comfortable with the mediator and can express their concerns, and they can express proposals knowing that everything you do in mediation is confidential and can’t be used in a court, I find this is the best alternative. Sometimes in cases that are in a divorce, the court will refer the parties to what we call in-house custody, parenting time mediation, and they do a great job, and sometimes that settles the custody and parenting time issues, but sometimes they need more than what the court can offer, and sometimes there’s just no court case. The parties aren’t in a divorce, or it’s a post-divorce issue, so these types of cases are a perfect fit for mediation and a perfect fit to avoid the emotional and financial toll of litigation. Read even more info at https://career.lockerroomtalk.se/people/576644-alex-suliman.

Europe’s concerns about the security of U.S. cloud services providers are in fact closely intertwined with its worries, expressed in Schrems II, about the privacy of Europeans’ information entrusted to these companies. In both cases, European policymakers fear the perceived extraterritorial reach of U.S. national security surveillance and law enforcement authorities. New cybersecurity regulation thus is seen as another way to safeguard Europe’s ‘sovereign’ interest in protecting data from foreign government access. It also would reinforce separate European efforts to bolster smaller, home-grown cloud service providers, including through the GAIA-X project to create an interoperable network “explicitly based on principles of ‘sovereignty-by-design,’” as a leading European technology lawyer has characterized it.