-
- أبو ظبي+971 2 644 43 30
- دبي +971 4 368 97 27
- الشارقة +971 6 526 41 28
- من نحن
- الخبرة
- مجالات التخصص
- تأسيس الشركات
- أخبار قانونية
- المنشورات
- مقالاتنا
Singapore’s Cybersecurity (Amendment) Bill 2024 On 7 May 2024, Singapore’s Parliament passed the Cybersecurity (Amendment) Bill No. 15/2024, introducing pivotal amendments to the Singapore Cybersecurity Act 2018. The Act previously provided the legislative framework for the management of cybersecurity threats, focusing predominantly on Critical Information Infrastructure (CII) essential computer systems…
Read moreLaw of Criminal Procedure in Saudi Arabia The Law of Criminal Procedure in Saudi Arabia is a complex system that combines traditional Islamic legal principles with contemporary statutory laws. The system is deeply influenced by Sharia, specifically the Hanbali school of Sunni Islam, and it has evolved to incorporate formal…
Read moreEvolution and Provisions of the Bharatiya Sakshya Adhiniyam (BSA), 2023 The Bharatiya Sakshya Adhiniyam (BSA), 2023, represents a significant legislative milestone in India's legal framework, updating and modernizing the Indian Evidence Act (IEA) of 1872. While retaining the core principles of the IEA, the BSA introduces crucial changes to address…
Read moreCyberlaw in the United Arab Emirates In recent years, the United Arab Emirates (UAE) has experienced rapid digital transformation, with advancements in technology influencing various aspects of daily life, business, and governance. As the nation embraces the opportunities presented by the digital age, the importance of establishing a robust legal…
Read moreIndian’s New Criminal Law Bills In a landmark move, Union Home Minister Amit Shah introduced three revised Bills on December 12, aiming to replace archaic British-era criminal laws that have governed India for decades. The proposed legislation includes the Bharatiya Nyaya (Second) Sanhita Bill, 2023; Bharatiya Nagarik Suraksha (Second) Sanhita,…
Read moreThe Crypto-Asset Exchange System in Bahrain Bahrain's forward-thinking fintech regulations, coupled with a commitment to fostering young tech talent, have successfully lured some of the globe's most inventive financial entities to the region. Notably, cryptocurrency exchange Binance recently secured its inaugural license as a crypto-asset provider within the Gulf Cooperation…
Read moreEconomic and Fraud Provisions in the Middle East “There is one and only one social responsibility of business – to use its resources and engage in activities designed to increase its profits so long as it stays within the rules of the game, which is to say, engages in open…
Read moreElectronic Contracting Law in E-commerce Introduction to Contract Law A contract is a legally binding force between two entities, companies, or parties that link the parties in a contract protected by law. An agreement between the parties may be made orally, in writing, in action, or any of these ways.…
Read moreTrending type of Violation in Today's World: Using the Competitor’s Trademark as Keyword Zeynep Yağmur Kutlu Öncü Uçum ABSTRACT In today's world, where competition between companies is intense on the Internet, as well, new protective norms are needed pertaining to trademark rights violations. Accordingly, lawmaker has included the use of…
Read moreLegislation Number Federal Law Number 5 of 2012 Concerning Combating Information Technology Crimes (Cyber Crimes Law) Date of publication in the Official Gazette 13 August 2012 Jurisdiction The United Arab Emirates Related Legislation Federal Law Number 12 of 2016 amending Federal Law Number 5 of 2012 on Combating…
Read moreCybercrimes and their Punishment in the UAE Any illicit use of the internet, computer network, electronic website or any other information technology means is prohibited and shall constitute as a cybercrime. The use of the internet for the invasion of privacy, for provoking another to commit a crime or for…
Read moreعملة الكريبتو الرقمية - فقاعة سحرية أو مستقبل العملة؟ كانت الضوضاء والوسائط المحيطة بمفهوم عملة الكريبتو تزيد من الفضول بسرعة. قبل أن يقتل الفضول القط ، دعنا نتجول في قصة عملة الكريبتو. عملة الكريبتوهي عملة إبداعية و افتراضية تستخدم التشفير للأمن و هذا الأمر من الصعب تزييفه. وصف مميزات عملة…
Read moreتنظيم حماية البيانات العامة مجدي أم لا؟ المقدمة في 25 مايو 2018 ، سوف تدخل لائحة حماية البيانات العامة )GDPR(حيز التنفيذ في الاتحاد الأوروبي. هذا هو التحول الأكثر أهمية إلى المناظر الطبيعية لحماية البيانات الأوروبية في السنوات العشرين الماضية. عند سن قانون إجمالي الناتج المحلي الجديد ، سيتم تنظيم…
Read moreمقبولية الأدلة الإلكترونية في دولة الإمارات العربية المتحدة والمملكة العربية السعودية (الجزء 1 من 2( لقد غيرت التكنولوجيا العالم في مجمله خلال مدة قصيرة. لقد أصبحت بالفعل جزءاً لا يتجزأ من الحياة اليومية للكثيرين. اليوم نرى أنها تدخل في كل ما نقوم به. منذ حوالي 60 عامًا، كانت أجهزة الكمبيوتر…
Read more