IT

We introduced Initial Coin Offerings (ICOs) in this post. Unsurprisingly, billions of dollars being poured into ICOs over the past few years, and concerns over scams and consumer protection, have been the impetus for increased government attention and calls for regulation of ICOs and cryptocurrency. One difficulty with the regulation of ICOs is the unique, […]

Read More

Initial Coin Offerings (ICOs), or ‘token offerings’, are cryptocurrency’s equivalent of Initial Public Offerings (IPOs). In 2017, 873 ICOs raised around USD$6 billion in investment funds. In just the first half of 2018, around USD$6.7 billion had been raised – 108% of all funds raised in 2017. ICOs are a means for blockchain companies to […]

Read More

If you’re interested in computer games, or know someone that is, you’ve probably heard of loot boxes, an increasingly common feature of computer games which has also been drawing increasing criticism and regulatory attention of late. What are loot boxes? Loot boxes are digital items which may be purchased in computer and mobile games. Each […]

Read More

Much has been written about computational law and blockchain recently. In short, computational law has been described as systems that can make automatic legal reasoning which can determine the outcome of a case. We have written about blockchain in our blog here http://www.tglaw.com.au/ip-blog/2018/03/01/unravelling-blockchain-guide-blockchain-ip/. We would all be burying our heads in the sand if we ignored […]

Read More

Drones1 are rapidly becoming a part of everyday life. Revolutionising new methods of data acquisition, their use in agriculture, mining, energy, telecommunications, research, environmental management, news gathering, criminal investigation and cinematography is now widespread. The latest advance in drone technology, that is so appealing, is their use in food aid. In remote and difficult areas […]

Read More

Every year an untold number of organisations are affected by data breaches. These can be accidental or inadvertent (eg leaving an external hard drive of sensitive information on the train), but are more frequently malicious attempts by external parties to obtain sensitive information (eg hacking). From 22 February 2018, organisations affected by an “eligible data […]

Read More

With emojis now an inseparable part of modern communication, it was inevitable that they would be used by a person in the course of contractual negotiations. As recently found by an Israeli court, the use of certain emojis could, in context, evidence intention to enter into contractual relations, as a consequence of which a prospective […]

Read More

Many users download new software, and without a moment’s hesitation when that little box ‘Terms and Conditions’ pops up, click “accept”, rather than scrolling through those terms and conditions.  These types of licences where a user can indicate acceptance of the licence terms by clicking an “accept” button are called “clickwrap” licences.   Nowadays, they are […]

Read More