Masonry Full Width 100%

Check out our Latest News!

Is Moonlighting Legal?

Moonlighting is the act and/or practice of holding a second job or engaging in additional work outside of your regular employment, without informing your employer. With the prevailing cost of living crisis in South Africa attributed to, inter alia, inflation, it is common practice for individuals to have more than one source of income to survive. However, as an employee...

New Year’s Resolutions for IP

New Year’s resolutions are common practice as we embrace the new year, and as such, many businesses set goals and make resolutions. An aspect that is often overlooked but is important to consider is intellectual property (IP). Properly managing and protecting your business’ IP can assist in maintaining a competitive edge, safeguarding your brand and reputation, and maximising the...

Taylor Swift’s IP Strategy

Oh, it's so sad to think about the good times. You and I…'Cause, baby, now we got bad blood. You know it used to be mad love. So take a look what you've done. 'Cause, baby, now we got bad blood, hey! Without having to even wonder where the words from the above paragraph come from, you already know that...

Know your rights as a consumer this Black Friday

Black Friday deals are upon us, and the festive shopping season is around the corner, therefore it is important that all businesses which market, distribute, manufacture, or sell goods and services in South Africa, comply with the Consumer Protection Act 68 of 2008 (CPA). Below are a few noteworthy regulations that one should be aware of when buying or...

Parallel Imports

Parallel importation can be defined as the act of importing and trading in genuine goods that are sold without the original manufacturer’s knowledge or consent. These goods are also referred to as “grey goods”. An example of how parallel importation typically takes place is when an individual travels to a foreign country, and purchases an item in said country at...

Clickwrap Agreements

Have you also done it? Briskly skimming through the terms and conditions or not bothering to read them at all before blindly clicking "I agree". This is not uncommon, however, we put ourselves at risk by signing away various rights over what happens to our personal data; namely, how platforms collect, use, store and share our personal information. In...

Cybersecurity: Whose Responsibility Is It?

The world has changed drastically in the past three years; with the COVID-19 pandemic speeding up the process. The number of people working from home has increased significantly, in fact, the ability to work remotely is now used by some companies as an incentive to attract talent.1 With remote work being at an all-time high, people communicate a lot via...

Combating Data Breaches in South Africa

Artificial intelligence (AI) systems collect an unimaginable amount of data for the use of training algorithms and improving performance. This data also includes personal information (names, addresses, and financial information), and sensitive information (medical records and identification numbers).1 There are concerns regarding the collection and processing of this data and how it is used as well as who has...

The AI Conundrum: AI and Cybersecurity

A lot of experts are talking about the Artificial Intelligence (AI) conundrum. Is it a blessing or a curse? AI is a blessing in that it makes certain jobs easier and more efficient. As an example, AI can increase productivity. An AI algorithm can predict and prevent catastrophic events like disease outbreaks and market crashes. On the other side...

Gone Phishing

We would be remise if we highlighted cybersecurity awareness without delving deeper into phishing. We have all received notifications from our banks or even employers warning us against phishing attacks. What is phishing exactly? “Phishing is a cybercrime in which a target or targets are contacted by email, telephone or text message by someone posing as a legitimate institution to lure individuals...