DSA: how does the European Commission's investigation against Temu impact online product safety?

The Digital Services Act (DSA) represents a major step forward in the regulation of digital platforms, providing a legislative framework to guarantee product safety and consumer protection within the European Union. The recent opening of an investigation by the European Commission against Temu, a very large online platform, highlights the [...]
Domain name or trademark: who wins in the event of a dispute?

Domain names and trademarks, although legally distinct, are often a source of conflict and can come into dispute: who wins? The digital boom has made the domain name essential for any online business, while the trademark remains a central element in the protection of commercial identity. A domain name [...]
Logistics penalties: how to contest them effectively?

How can you effectively contest the logistics penalties applied by distributors to suppliers in the event of contractual breaches? These penalties generally concern delays, errors in quantity or product conformity. Although legitimate in certain situations, these penalties can sometimes be abusive, leading to imbalances in commercial relations. Faced with these [...]
Copyright and video games: the Cour de cassation's decision on the non-exhaustion of distribution rights

Copyright, a fundamental pillar of protection for intellectual creations, is constantly being redefined in the face of technological change, particularly with the rise of video games. The recent decision by the French Supreme Court (Cour de Cassation) in the UFC-Que Choisir v. Valve case raises crucial questions about the non-exhaustion of rights to make works available [...].
Discounts, rebates, commercial cooperation: what are the differences and what's at stake?

What are the issues and differences between discounts, rebates and commercial cooperation? As part of commercial negotiations between suppliers and distributors, the use of discounts, rebates and commercial cooperation is a common practice. These mechanisms make it possible to adjust prices, encourage purchasing volumes or remunerate specific services. However, their implementation [...]
Internal or external DPO: how to make the right choice?

The General Data Protection Regulation (GDPR) has profoundly changed the landscape of personal data protection. At the heart of this transformation, the Data Protection Officer (DPO) has become an unavoidable figure. For organizations subject to this obligation, a crucial choice has arisen: should they integrate this expertise [...]
Does violation of the GNU GPL V2 license constitute infringement?

The GNU GPL V2 open source license is a cornerstone of the free software ecosystem, allowing users to copy, modify and distribute programs while preserving developers' intellectual property rights. In a context where technology is evolving rapidly, it is essential to understand the legal implications of this [...]
TikTok Shop: 5 legal mistakes to avoid?

The emergence of TikTok Shop in France represents a major turning point in the e-commerce landscape. While this innovative feature enables users to make purchases directly via the application, it raises questions about its legal and regulatory implications. This fast-growing phenomenon, which aims to combine social networking and commerce, deserves a [...]
How do you react when you receive confidential information from a competitor?

When a company receives confidential information from a competitor, it finds itself in a delicate situation. How do you react to avoid serious consequences in terms of competition law? These unsolicited exchanges, whether they take place in the context of a meeting, an informal exchange or an accidental mailing, can be interpreted as an agreement [...].
What is the real cost of an external DPO for an SME?

What DPO cost should SMEs assume in order to ensure their company's protection and compliance with the RGPD? In a world where personal data has become the black gold of the 21st century, SMEs face a major challenge: ensuring effective protection of this sensitive information while maintaining [...]