Results for "consumer data right"
401-410 of 857 results for 'consumer data right'
In the danger zone? Unpacking the Top Gun: Maverick copyright lawsuit
The long-awaited sequel to 1986's Top Gun, in which Tom Cruise reprises his role as US navy pilot Pete 'Maverick' Mitchell, has taken the global box office by storm. However, whether the studio behind the film had the necessary rights to make it is now the subject of a lawsuit. ...
InIP: What's happening in intellectual property - February 2024
Your regular wrap-up of some of the world's leading and intriguing IP stories. ...
Strengthening protection of Indigenous Culture and Intellectual Property
Recent attention surrounding use of the Aboriginal flag, and the ACCC's limited success against Birubi Art, highlight the importance of strengthening protection of Indigenous Culture and Intellectual Property. ...
Ambush marketing: traders beware!
Everyone knows the famous adage that 'the enemy of my enemy is my friend'. But can the friend of my friend be my enemy? In the context of ambush marketing, the answer can be yes. ...
Yahoo continues to pay the price for its 2014 data breach
Yahoo has recently come under fire from both the United States Securities and Exchange Commission and the United Kingdom Information Commissioners Office for delays in the disclosure to investors of its 2014 data breach. ...
The Federal Court rules that bossy letters to Boss' customers are misleading but not threatening
The long-awaited sequel to 1986's Top Gun, in which Tom Cruise reprises his role as US navy pilot Pete 'Maverick' Mitchell, has taken the global box office by storm. However, whether the studio behind the film had the necessary rights to make it is now the subject of a lawsuit. ...
Thriving in an era of scrutiny: Culture and conduct
Legal and compliance leaders should act now to combat serious and increasing legal and reputational risk ...
Why every company should have a structured cyber simulation program
The single most determinative factor in how an organisation emerges from a cyberattack is how it conducts itself during the crisis. And the biggest determinant of how an organisation conducts itself during a crisis is how prepared it is. Here are five tips to keep in mind. ...
Using third party brands in video games: issues and opportunities
One of the emerging battlegrounds for brand owners is video games, particularly with the growth of virtual reality applications. A recent claim made in the US illustrates how having your brand featured in a video game can be a problem - but depending on the circumstances, it could also present a com ...
Captive to no one: Australian Government releases its Ransomware Action Plan
The Department for Home Affairs has released the Australian Government's Ransomware Action Plan (the Plan). This development forms part of the Government's Cyber Strategy and is the latest in a series of actions taken by the Government to combat the escalating threat of ransomware and extortion. ...


