Legal updates and opinions
News / News
Can you copy a product of someone else?
By Janine Hollesen, Director
This question was all over social media and media reports when the owner of Ubuntu Baba used the power of social media to bring to the attention of the South African public, its copying allegations against Woolworths in relation to a baby carrier. This again illustrates the legs which social media has to carry a story of this nature.
The bottom line is that it is not unlawful to copy another person’s product or idea, provided that it is not protected by a form of intellectual property, such as patents, designs, copyright, trade marks or in the get-up of the product.
This issue has been more fully dealt with in our Legal Werks article which can be found here.
Latest News
Can language proficiency policies be used to exclude individuals who lack the required language skills from employment?
Our Constitution recognises 12 official languages and commits to promoting their development and use. Viewed through the lens of language, [...]
Hey POPIA, is the publication of a person’s HIV status, positive or negative?
The right to privacy and the rights of public figures came before the court in the case of Tshabalala-Msimang versus [...]
Error 404 – when facial recognition does not see you – a tale of how R1, R2 and R7 wages were paid for a week’s work
Since its inception, facial recognition technology has been regarded as the future for security, safety, technology and innovation.[1] Indeed, the [...]
Cybersecurity Breaches vs The SABS Breach of “Standards”
Issues of maladministration and mismanagement at the South African Bureau of Standards ("SABS") have been the subject of much contestation [...]
No, you cannot do and say whatever you feel like! Even if you are the scorned lover or wife
The internet and digital platforms have significantly impacted privacy rights and the legal landscape. Social media, blogs, and other online [...]
A tale of cybersecurity blame, who bears responsibility?
Who is responsible for the payment of loss arising from cyber fraud, specifically when an email correspondence is intercepted by [...]