Status: Clearance Acquirer: TELUS International (Cda) Inc. (Canada) Acquired: Lionbridge AI business of Lionbridge Technologies, Inc. (U.S.) Value: US$939 million Industry: Artificial Intelligence; Information Services… Continue Reading
On 29 April 2020, the French Treasury announced additional emergency measures undertaken to strengthen its national foreign direct investment (FDI) screening mechanism.… Continue Reading
Status: Clearance Acquirer: ARRIS International plc (England and Wales) Acquired: Brocade Communications Systems, Inc. (US); Broadcom Ltd. (Singapore) Value: US$800 million Industry: Telecommunications; Network and Data Solutions; Semiconductors… Continue Reading
Status: Clearance Acquirer: MacDonald Dettwiler and Associates Ltd. (Canada) Acquired: DigitalGlobe, Inc. (US) Value: US$3.6 billion (C$4.7 billion) Industry: Telecommunications; Aerospace UPDATE: On September 28, 2017, MacDonald, Dettwiler and Associates Ltd., the Canadian global communications and information company, and DigitalGlobe, Inc., a US based satellite imagery company, “announced that the Committee on Foreign Investment … Continue Reading
In the past two weeks, the ITC has made patent invalidity determinations in two Section 337 investigations, each of which is noteworthy in its own right. In Certain Activity Tracking Devices, Systems, and Components Thereof, Inv. No. 337-TA-963, the Commission affirmed ALJ Lord’s summary determination that the asserted claims of two of the patents-in-suit are invalid … Continue Reading
In a case much-watched by the entertainment and software industries for its potential impact on the internet, the U.S. Court of Appeals for the Federal Circuit has held that the U.S. International Trade Commission’s authority to regulate imported “articles that infringe” U.S. intellectual property rights does not extend to the “electronic transmission of digital data.” By … Continue Reading
The UK Export Control Organisation issued a guidance note explaining the intrusion software controls. To fall within the definition of intrusion software, the software must be specifically designed or modified to avoid detection or defeat protective countermeasures and has to be able to steal or modify data or the execution path to run externally provided … Continue Reading