Out of the hundreds of articles I’ve written for this blog, one of the most widely read has been 7 Steps to Effectuate International Service of Process under the Hague Service Convention. That’s hardly a surprise given the complex nature of international service of process in general. This post is a logical follow-up to that one because the Inter-American Service … [Read more...]
The World’s First Bitcoin Lawsuit—in the United States?
Have you ever received an email that is so fascinating that you have to read it out loud to make sure you that you read it correctly? I received one of those several days ago. The email asked the following question: “This past summer I purchased [factory equipment] in [Country X] with Bitcoin. I never received the equipment and [the supplier] won’t respond to my messages. … [Read more...]
Japan’s New 24-Hour Advance Manifest Rule Takes Effect on March 10, 2014.
On March 14, 2014, Japan will join the global effort to make things more difficult for exporters secure supply chains against international terrorism with the implementation of it’s own “24-hour rule.” First implemented by the U.S. in 2002, the 24-hour advance manifest rule requires all inbound cargo carriers to submit complete manifests a full 24 hours before leaving their … [Read more...]
Enforcing a Contract in Latin America? Good Luck with That.
I got a call recently from a local manufacturer looking to sue a supplier in a Latin American country for breach of contract. Given Miami’s proximity to the region, I see these types of cases a lot. The first thing I’ll do is take a look at the case to confirm that jurisdiction would be proper in the U.S. And most of the time it is. However, when the jurisdictional … [Read more...]
Codes, Locks and Keys: 35 Industrial Espionage Countermeasures that Will Save Your International Business.
Last week Apple released the Apple iPhone 5s. The most innovative feature of the new phone was the device's fingerprint scanner, which was widely heralded as being the world's first "hack proof" access point. It took only a few days, however, for a German hacking group to bypass the phone's latest security feature and gain access to the device. The incident is the latest … [Read more...]