<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>LetsLaw</title>
	<atom:link href="https://letslaw.es/en/feed/" rel="self" type="application/rss+xml" />
	<link>https://letslaw.es/en/</link>
	<description>Letslaw es una firma de abogados fundada por José María Baños y  especializada en el derecho de empresa, derecho fiscal y derecho digital (protección de datos y comercio  electrónico, contratos de desarrollo de software, propiedad intelectual e industrial, derechos de imagen, derechos de autor, marcas y nombres comerciales)</description>
	<lastBuildDate>Tue, 24 Mar 2026 07:54:45 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>
	<item>
		<title>Duty of diligence and loyalty in corporate management</title>
		<link>https://letslaw.es/en/duty-diligence-and-loyalty-corporate-management/</link>
					<comments>https://letslaw.es/en/duty-diligence-and-loyalty-corporate-management/#respond</comments>
		
		<dc:creator><![CDATA[LetsLaw]]></dc:creator>
		<pubDate>Mon, 30 Mar 2026 08:00:37 +0000</pubDate>
				<category><![CDATA[Commercial Law]]></category>
		<guid isPermaLink="false">https://letslaw.es/?p=20226</guid>

					<description><![CDATA[The Spanish Companies Act establishes clear mechanisms to ensure that directors fulfill their obligations and are accountable for potential damages.]]></description>
										<content:encoded><![CDATA[<p>Managing a company entails responsibilities that go beyond mere decision-making. Directors have a duty of diligence and loyalty, which requires them to act always in the best interest of the company and its shareholders, avoiding any actions that could harm collective interests. This principle is not only ethical but also legal: the <strong>Spanish Companies Act</strong> establishes clear mechanisms to ensure that directors fulfill their obligations and are accountable for potential damages.</p>
<p>The <strong>duty of diligence</strong> means that directors must act with care, sufficient information, and prudence in both daily management and strategic decisions of the company. Meanwhile, the <strong>duty of loyalty</strong> requires that all actions be carried out with honesty and transparency, avoiding conflicts of interest and situations where personal gain outweighs the company’s interest. Failure to comply with these duties can have economic consequences and may even result in personal liability for the director.</p>
<h2>When does a director become personally liable?</h2>
<p>Spanish law establishes that directors may be held personally liable when they fail to fulfill the legal or statutory duties inherent to their role. In general terms, liability actions can be either social or individual. A social action allows the company to claim damages resulting from a director’s negligent or disloyal conduct. According to <strong>Articles 239 to 241 bis of the Spanish Companies Act</strong>, minority shareholders may also bring a liability action when directors fail to act in accordance with the law, including cases of breach of the duty of loyalty, without the need to submit the decision to the general meeting.</p>
<p>Creditors may also intervene in cases where the company’s assets are insufficient to satisfy their claims, exercising the social action subsidiarily. On the other hand, <strong>an individual action directly protects the interests of shareholders or third parties</strong> who have suffered a specific loss due to the directors’ actions. It is important to remember that all these actions prescribe after four years from the moment they could have been exercised, according to Article 241 bis, establishing a clear time limit for claims.</p>
<p>A particularly relevant case is regulated by Article 367, which addresses the joint <strong><a title="liability of corporate directors" href="https://letslaw.es/en/liability-of-corporate-directors/">liability of directors</a> in dissolution scenarios</strong>. If directors fail to call a general meeting within the legal deadlines to adopt the necessary dissolution agreements or to remedy causes that could lead to dissolution, or if they fail to request judicial dissolution, they are jointly liable with their personal assets for obligations arising after the event that triggered the cause of dissolution.</p>
<p>This presumption of liability applies unless proven otherwise and protects legitimate creditors by ensuring that obligations arising after the cause of dissolution are assumed by those who should have acted. However, directors may be exonerated if they demonstrate that they communicated negotiations with creditors or requested the bankruptcy declaration within a two-month period.</p>
<p>In practice, this means that <strong>directors must maintain active, diligent and transparent management</strong>, reporting any situation that may compromise the company’s stability, strictly complying with legal deadlines, and avoiding any action that could cause economic harm. Direct personal liability is precisely intended to encourage prudence and strategic planning, ensuring that directors make decisions based on proper information and guided by the company’s best interests.</p>
<h2>Protection of directors against third-party claims</h2>
<p>While the law establishes clear mechanisms for liability, there are also tools to protect directors against third-party claims, especially when they act lawfully and within the scope of their duties. These protections include <strong>directors’ liability insurance</strong>, internal indemnification agreements, and policies covering damages arising from professional actions in the exercise of their functions. The purpose of these protections is to prevent directors from having to answer with their personal assets for situations that do not arise from negligence or disloyalty.</p>
<p>In practical terms, directors should adequately document their decisions, obtain technical and legal reports, and have the company’s backing for any significant action. This combination of legal duties and protective mechanisms allows for safer management, encouraging strategic decision-making without fear of unfounded claims.</p>
<h2>Complying with duty of diligence and loyalty</h2>
<p>Complying with the duty of diligence and loyalty is far from a mere formality: it is a fundamental pillar of corporate trust and economic stability. <strong>Directors must always act in the best interest of the company and its shareholders</strong>, avoiding conflicts of interest, making informed decisions, and strictly adhering to legal deadlines and procedures.</p>
<p>Direct personal liability, particularly in cases of dissolution or failure to fulfill essential duties, protects both the company and its creditors, encouraging prudence in management. At the same time, <strong>mechanisms designed to safeguard directors against third-party</strong> claims allow them to perform their roles with legal certainty, promoting effective and responsible management.</p>
<p>The combination of clearly defined duties and adequate protections ensures a balance between accountability and security, strengthening confidence in corporate governance and supporting the long-term sustainability of the business.</p>
<div class="cyp_post_formulario"><h2>Contact Us</h2>[contact-form-7]<div>]]></content:encoded>
					
					<wfw:commentRss>https://letslaw.es/en/duty-diligence-and-loyalty-corporate-management/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Digital evidence in judicial proceedings: issues of validity and authenticity</title>
		<link>https://letslaw.es/en/digital-evidence-judicial-proceedings/</link>
					<comments>https://letslaw.es/en/digital-evidence-judicial-proceedings/#respond</comments>
		
		<dc:creator><![CDATA[LetsLaw]]></dc:creator>
		<pubDate>Fri, 27 Mar 2026 08:00:46 +0000</pubDate>
				<category><![CDATA[Digital Law]]></category>
		<guid isPermaLink="false">https://letslaw.es/?p=20214</guid>

					<description><![CDATA[What types of digital evidence exist, how they should be preserved, and how their authenticity is assessed in court proceedings.]]></description>
										<content:encoded><![CDATA[<p>Digital evidence has become a central element in most modern disputes. An email, a WhatsApp message, a system access log, or a social media post can be decisive in proving facts, intent, or breaches. However, the mere existence of an electronic trace does not mean it will automatically qualify as <strong>strong evidence in court</strong>.</p>
<p>In judicial proceedings, digital evidence often faces two major challenges: its validity, understood as admissibility and lawfulness, and its authenticity, which requires proving that the content is genuine, has not been altered, and can be attributed to a specific person or source. For this reason, understanding what types of digital evidence exist, how they should be preserved and <strong>how authenticity is assessed</strong> is essential to avoid challenges and strengthen evidentiary value.</p>
<h2>Types of digital evidence</h2>
<p>First, it is useful to distinguish the main types of digital evidence:</p>
<ul>
<li>The most common are<strong> electronic communications</strong>, such as emails, instant messaging, and social media messages, which are often submitted to prove agreements, warnings, claims, or conduct.</li>
<li><strong>Digital documents and files</strong> are also frequently used, including electronically signed contracts, PDFs, spreadsheets, or cloud-stored documents, whose evidentiary weight is reinforced when they are submitted in their original format and with metadata preserved.</li>
<li>Another important category is <strong>web and social media content</strong>, such as posts, advertisements, reviews, or web pages, where the main issue is volatility, since content can be easily modified or deleted.</li>
<li>Added to this are <strong>technical records or logs</strong>, which include server traces, system audits, access records, IP addresses, and activity logs, particularly useful in cybersecurity matters or technology-related contractual breaches.</li>
<li><strong>Audio, video and digital images</strong> are also commonly produced as evidence, including recordings, CCTV footage, screenshots, or photographs, whose assessment is often more delicate due to the possibility of cuts, edits, or lack of continuity.</li>
<li>Finally, there are more advanced forms of evidence, such as <strong>time stamping, digital custody systems or records linked to connected devices</strong>, which can provide additional guarantees when they have been properly obtained and documented.</li>
</ul>
<h2>Preservation and custody of evidence</h2>
<p>However, the factor that most strongly determines the strength of any digital evidence is its preservation and custody. In the electronic context, custody involves <strong>maintaining the integrity and traceability of the evidence</strong> from the moment it is obtained until it is presented in court. If it cannot be coherently explained who obtained it, when, from which device or account, how it was preserved, and what measures were taken to prevent alterations, the opposing party will often question its reliability.</p>
<p>Many problems arise when only screenshots are submitted without further support, when a device or file is manipulated without documentation, or when the origin trail is lost. For example, a screenshot of a conversation may be enough to frame the dispute, but it is more vulnerable if it is not accompanied by a complete export, the original file, or technical verification.</p>
<p>Proper custody, by contrast, aims to <strong>preserve the original or a faithful copy</strong>, minimize interventions on the evidence, document the collection and preservation process, and, when the case requires it, apply technical safeguards such as generating digital fingerprints (hash values) or time stamping.</p>
<p>In practice, the higher the risk of challenge or the greater the importance of the fact to be proven, the more advisable it is to adopt measures that demonstrate the evidence remained intact and that there were no reasonable opportunities for manipulation.</p>
<h2>How is the authenticity of electronic evidence assessed?</h2>
<p>The authenticity of electronic evidence is typically assessed on the basis of three essential issues:</p>
<ol>
<li>The first is <strong>attribution</strong>, meaning whether the evidence can be linked to the person who allegedly created or sent it. It is not enough for a name to appear on a screen; what matters is proving the relationship between the account or device and the individual, relying on contextual data, the coherence of the conversation, email header information, authentication records, or other elements that consistently identify the user.</li>
<li>The second issue is <strong>integrity</strong>: the court must be able to trust that the content has not been modified since its creation. For this purpose, the original formats, metadata, the absence of signs of editing, and technical and chronological consistency are particularly important, as well as, where available, verification through hash values, time stamping, or third-party custody.</li>
<li>The third issue is the <strong>reliability of the method of collection and presentation</strong>. If the procedure used to capture or extract the evidence is weak or insufficiently transparent, authenticity is undermined. Conversely, when evidence is provided in full, the method of collection is explained, and a forensic IT expert report is submitted in complex cases, the evidence tends to become more robust and better able to withstand adversarial scrutiny.</li>
</ol>
<p>&nbsp;</p>
<p>Ultimately, digital evidence is extremely useful, but also fragile. Its success in court depends not only on what the document or message “shows,” but on the ability to prove that it is <strong>lawful, intact and attributable</strong>.</p>
<p>Anyone preparing proceedings with a technological component should anticipate the usual risks by preserving evidence early, ensuring proper custody, and, where the dispute requires it, relying on technical verification and expert evidence. This reduces challenges and increases the credibility of the evidence before the court.</p>
<div class="cyp_post_formulario"><h2>Contact Us</h2>[contact-form-7]<div>]]></content:encoded>
					
					<wfw:commentRss>https://letslaw.es/en/digital-evidence-judicial-proceedings/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Who owns the prompt?</title>
		<link>https://letslaw.es/en/who-owns-the-prompt/</link>
					<comments>https://letslaw.es/en/who-owns-the-prompt/#respond</comments>
		
		<dc:creator><![CDATA[LetsLaw]]></dc:creator>
		<pubDate>Wed, 25 Mar 2026 08:00:30 +0000</pubDate>
				<category><![CDATA[Digital Law]]></category>
		<guid isPermaLink="false">https://letslaw.es/?p=20148</guid>

					<description><![CDATA[Copyright in prompts and the threshold of originality. Confidentiality and operational risks in AI data processing.]]></description>
										<content:encoded><![CDATA[<p>The rapid advance of generative artificial intelligence has shifted the center of gravity of legal debate away from the output produced by the machine and toward the human instruction that triggers it. In professional practice, the so called prompt has ceased to be a simple technical command and has become a <strong>first rate strategic asset</strong>.</p>
<p>This new reality makes it necessary to examine whether these instructions have enough substance to be protected by the legal system or whether, on the contrary, they remain in a regulatory limbo where information security and <a title="intellectual property" href="https://letslaw.es/en/intellectual-property/">intellectual property</a> are under constant risk.</p>
<h2>Copyright in the prompt and the originality threshold</h2>
<p>Determining whether a prompt qualifies as a work that can be protected under the <strong>Intellectual Property Act</strong> requires a rigorous analysis of the concept of originality. For a creation to be covered by copyright, it must be an <strong>individual intellectual expression that reflects the author’s personality through free and creative choices</strong>.</p>
<p>In this sense, most functional instructions or simple requests for information lack the creative height needed to be considered literary works. However, where we find complex structures that combine a specific data architecture with carefully built logical constraints, the prompt could reach the category of a technical work.</p>
<p>Current case law, in line with international positions such as those of the <strong>United States Copyright Office</strong>, tends to deny authorship over the machine generated result, but it leaves the door open to <strong>protecting the human instruction provided it clears certain levels of complexity</strong>.</p>
<p>Pinpointing where the technical instruction ends and where the protectable work begins is a blurred boundary that calls for an individualized assessment of each interaction protocol.</p>
<h2>Confidentiality and operational risks in handling data through artificial intelligence</h2>
<p>Beyond ownership of the content, the main compliance concern lies in the integrity and confidentiality of the information. The prompt operates as a data entry space that, in open computing environments, can compromise professional secrecy and business confidentiality in an irreversible way.</p>
<p>Most commercial language models use user inputs for retraining processes, which involves a <strong>transfer of information beyond the control of the original sender</strong>.</p>
<p>This practice clashes with the obligations arising from the General Data Protection Regulation and the new requirements of the <strong>European Union Artificial Intelligence Act</strong>. The risk does not lie only in the possibility that the platform stores sensitive information, but also in the chance that such information is later reproduced in response to third party queries through data extraction techniques. Managing these risks requires the implementation of security protocols and usage policies that are not always obvious to corporate users.</p>
<h2>Protection through trade secrets and contractual architecture</h2>
<p>Given the uncertainties of relying on copyright to protect instructions that are often utilitarian in nature, the most solid legal strategy for organizations lies in <strong>trade secret protection</strong>.</p>
<p>An optimized prompt that delivers a real competitive advantage is an economic asset that should be safeguarded through a specific legal structure. If the organization implements technical and organizational measures to keep these instruction libraries confidential, they may be protected as industrial secrets.</p>
<p>In this scenario, legal protection does not stem from linguistic aesthetics, but from commercial value and exclusivity of access. However, the mere existence of secrecy does not guarantee successful enforcement if <strong>intellectual property clauses and appropriate confidentiality agreements</strong> have not been put in place beforehand in employment and commercial settings.</p>
<p>Only through tailored contractual architecture is it possible to ensure that the professional’s talent and specialized knowledge remain within the creator’s assets.</p>
<div class="cyp_post_formulario"><h2>Contact Us</h2>[contact-form-7]<div>]]></content:encoded>
					
					<wfw:commentRss>https://letslaw.es/en/who-owns-the-prompt/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>What is tokenization? Legal implications</title>
		<link>https://letslaw.es/en/tokenization-legal-implications/</link>
					<comments>https://letslaw.es/en/tokenization-legal-implications/#respond</comments>
		
		<dc:creator><![CDATA[Marta Díaz]]></dc:creator>
		<pubDate>Mon, 23 Mar 2026 08:00:02 +0000</pubDate>
				<category><![CDATA[Digital Law]]></category>
		<guid isPermaLink="false">https://letslaw.es/?p=20136</guid>

					<description><![CDATA[Tokenization has emerged as one of the most significant developments within the blockchain ecosystem.]]></description>
										<content:encoded><![CDATA[<p>The digitalization of assets is transforming how value is represented, transferred and managed. In this context, tokenization has emerged as one of the most significant developments within the <strong>blockchain ecosystem</strong>.</p>
<p>Despite its growing presence, the concept still generates confusion. It is frequently associated exclusively with cryptocurrencies, when in reality they represent only a specific application within a much broader phenomenon.</p>
<p>Understanding <strong>what tokenization means, the different types of tokens that exist </strong>and how they fit within the European regulatory framework has become essential for legal practitioners interacting with the digital economy.</p>
<h2>Tokenization is not synonymous with cryptocurrencies</h2>
<p>When blockchain is mentioned, many people immediately think of Bitcoin or financial speculation. However, cryptocurrencies are merely one specific application of a much wider technological development.</p>
<p>From both a legal and technological perspective, tokenization consists of digitally representing an asset, right, or utility through a token recorded on a blockchain network. In other words, <strong>tokenization converts an asset or right into a transferable and programmable digital unit</strong>.</p>
<p>The underlying asset may be virtually anything, including money, corporate shares, real estate, art, access rights to services, <a title="intellectual property" href="https://letslaw.es/en/intellectual-property/">intellectual property</a> or physical assets from the real world.</p>
<p>This leads to a key concept within today’s ecosystem: the <strong>tokenization of real-world assets</strong>.</p>
<p>Blockchain technology does not necessarily create new value. Instead, it digitizes the legal representation of existing value, enabling traceability, fractionalization and transfer without traditional intermediaries.</p>
<p>Cryptocurrencies, therefore, are not the origin of tokenization. They are simply tokens whose value derives from the digital economic systems in which they operate.</p>
<h2>Difference between utility tokens, security tokens and NFTs</h2>
<p>One of the most common misconceptions within the blockchain ecosystem is assuming that all tokens share the same legal nature. From a legal standpoint, however, token classification depends not on the technology used, but on its economic function and the rights it confers.</p>
<p>Consequently, the applicable legal regime is determined not by the fact that an asset is tokenized, but by <strong>what the token actually represents</strong>.</p>
<p>Regulation (EU) 2023/1114, known as <a title="MiCA Regulation" href="https://letslaw.es/en/guide-mica-regulation/">MiCA Regulation</a> (Markets in Crypto-Assets Regulation), establishes a harmonized regulatory framework for certain crypto-assets, introducing three main regulatory categories:</p>
<ul>
<li>Asset-Referenced Tokens.</li>
<li>E-Money Tokens.</li>
<li>Other crypto-assets, a residual category in which utility tokens generally fall.</li>
</ul>
<p>&nbsp;</p>
<p>However, <strong>MiCA does not regulate the entirety of the tokenization phenomenon</strong>. The Regulation expressly recognizes that certain tokens, particularly those representing financial instruments, fall outside its scope.</p>
<p>In particular, security tokens, when they embody rights equivalent to transferable securities or financial instruments, remain subject to the traditional European financial markets framework, primarily <strong>MiFID II</strong> and the corresponding national legislation.</p>
<p>The legal conclusion is clear, the economic function of the token determines its legal regime.</p>
<h3>Utility tokens: access, not investment</h3>
<p>Utility tokens are defined under MiCA as crypto-assets other than asset-referenced tokens or e-money tokens.</p>
<p>These tokens <strong>grant access to a product or service within a digital ecosystem</strong>. They function as a digital mechanism of use or consumption, allowing holders to interact with platforms or benefit from specific functionalities.</p>
<p>Typical examples include:</p>
<ul>
<li>Access to SaaS platforms.</li>
<li>Services within metaverse environments.</li>
<li>Tokenized loyalty or reward programs.</li>
</ul>
<p>&nbsp;</p>
<p>The determining element is that they do not grant financial participation rights or profit expectations. For this reason, they are generally not considered financial instruments.</p>
<p>The main legal challenges surrounding utility tokens typically relate to consumer protection, transparency obligations, contractual terms and technological compliance rather than financial regulation.</p>
<h3>Security tokens: when a token becomes a financial instrument</h3>
<p>Security tokens represent <strong>economic or financial rights linked to an underlying asset</strong> and perform functions equivalent to traditional financial instruments.</p>
<p>They may be equivalent to shares, holdings, debt, investment rights or even profit sharing.</p>
<p>From a legal perspective, <strong>blockchain technology</strong> is irrelevant for regulatory classification. If a token incorporates investment expectations or economic rights characteristic of transferable securities, financial markets regulation applies, including MiFID II, the Prospectus Regulation and supervision by national authorities such as the CNMV.</p>
<p>This reflects the principle of technological neutrality, whereby technology does not alter the legal nature of the asset.<br />
A financial instrument remains a financial instrument, even when represented digitally on a decentralized infrastructure.</p>
<h3>NFTs: digital uniqueness</h3>
<p>NFTs (Non-Fungible Tokens) constitute a distinct category based on non-fungibility, meaning each token possesses <strong>unique characteristics and cannot be exchanged on a one-to-one basis with another</strong>.</p>
<p>They are commonly used to represent digital art, collectibles,gaming assets or digital certifications.</p>
<p>The regulatory focus tends to be on issues of intellectual property, usage licences, digital authenticity, and rights associated with the token vis-à-vis the asset represented.</p>
<p>A frequent misconception must be clarified: purchasing an NFT does not automatically transfer copyright ownership unless an explicit rights assignment exists.</p>
<h2>Tokenization of Real-World Assets</h2>
<p>Beyond purely digital environments, the true potential of blockchain technology lies in the tokenization of real-world assets, understood as the <strong>digital representation of traditional assets through tokens recorded on decentralized networks</strong>.</p>
<p>The underlying asset can be very diverse, ranging from real estate to shares, commodities or works of art.</p>
<p>Tokenisation allows for:</p>
<ul>
<li>The fractionalisation of traditionally illiquid assets.</li>
<li>The facilitation of global secondary markets.</li>
<li>The reduction of intermediation.</li>
<li>The automation of compliance through smart contracts.</li>
<li>Increased transparency and traceability.</li>
</ul>
<p>&nbsp;</p>
<p>Essentially, it does not create a new asset, but rather a new form of legal and technological representation of the existing asset.</p>
<div class="cyp_post_formulario"><h2>Contact Us</h2>[contact-form-7]<div>]]></content:encoded>
					
					<wfw:commentRss>https://letslaw.es/en/tokenization-legal-implications/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Dark patterns and e-commerce: the new legal risk arising from the Digital Fairness Act</title>
		<link>https://letslaw.es/en/dark-patterns-ecommerce/</link>
					<comments>https://letslaw.es/en/dark-patterns-ecommerce/#respond</comments>
		
		<dc:creator><![CDATA[Abogada Maria Barbero]]></dc:creator>
		<pubDate>Wed, 18 Mar 2026 08:00:15 +0000</pubDate>
				<category><![CDATA[Delitos Informáticos]]></category>
		<guid isPermaLink="false">https://letslaw.es/?p=20124</guid>

					<description><![CDATA[The new legal risk that comes with the Digital Fairness Act to regulate manipulative practices known as dark patterns in e-commerce.]]></description>
										<content:encoded><![CDATA[<p>E-commerce has evolved into highly sophisticated environments designed to increase conversion rates and optimize commercial performance. However, certain persuasive design techniques have crossed the line, becoming manipulative practices known as <strong>dark patterns</strong>.</p>
<p>With the forthcoming approval of the <strong>Digital Fairness Act</strong> (hereinafter, the “DFA”), these practices will move from being merely a reputational issue to constituting a <strong>legal risk for any e-commerce operator</strong>, reinforcing the protection of digital consumers and expanding the scope of obligations already established under current legislation.</p>
<h2>Key developments introduced by the Digital Fairness Act</h2>
<p>The purpose of this new regulation is to respond to the growing sophistication of digital manipulation techniques. Although European legislation already <strong>prohibited misleading commercial practices and material omissions</strong>, the DFA introduces three major enhancements:</p>
<ul>
<li><strong>Explicit regulation of interface design</strong>, by directly addressing the manipulation of user behavior through the design of digital interfaces. The regulation acknowledges that digital architecture can shape and influence economic decisions.</li>
<li><strong>Enhanced protection against the exploitation of vulnerabilities</strong>, with particular attention to vulnerable consumers, such as minors and elderly individuals.</li>
<li><strong>Coordination with other digital regulations</strong>, integrating the DFA into a broader regulatory ecosystem that includes the Digital Markets Act and the General Data Protection Regulation. A single interface design may simultaneously generate risks in the areas of data protection, competition law, and consumer protection.</li>
</ul>
<h2>What types of practices are considered dark patterns?</h2>
<p>Dark patterns are design techniques that induce users to make decisions they would not have made under conditions of transparency and informational balance.</p>
<p>However, not all forms of persuasion are unlawful. The legal threshold lies in the <strong>manipulation or significant distortion of the consumer’s economic behavior</strong>.</p>
<p>Among the most relevant practices are the following:</p>
<ol>
<li><strong>Confirm shaming</strong>, which involves the use of messages designed to embarrass or pressure users into accepting an option that they would likely reject under neutral conditions. This mechanism relies on emotionally charged language that introduces an affective bias into the decision-making process. By associating the rejection option with a negative or socially undesirable connotation, it subtly undermines the consumer’s freedom of choice.</li>
<li><strong>Cancellation obstruction</strong>, which occurs when subscription or sign-up processes can be completed in one or two clicks, while cancellation requires multiple steps, opaque forms, complex navigation paths, or even mandatory telephone contact.</li>
<li><strong>Artificial scarcity and time pressure</strong>, through messages such as “Only 2 items left” when such statements are not supported by real or verifiable data. These practices accelerate purchasing decisions by exploiting urgency bias and fear of missing out, thereby limiting the time available for rational evaluation.</li>
<li><strong>Visual interference</strong>, consisting of interface designs that disproportionately highlight the option most favorable to the company while minimizing the consumer’s alternative. This may be achieved through large buttons, striking colors, prominent placement, or high visual contrast.</li>
</ol>
<h2>Sanctions for engaging in prohibited practices</h2>
<p>Furthermore, the entry into force of the Digital Fairness Act increases enforcement risk. In line with other European digital regulations, sanctions may be calculated as a <strong>percentage of total annual global turnover</strong>, meaning that large platforms may face multi-million-euro fines for engaging in such practices.</p>
<p>In addition, national consumer authorities may require the <strong>withdrawal or modification of interfaces within short timeframes</strong>, which entails a direct operational impact, such as urgent redesign, suspension of campaigns, and possible effects on conversion rates.</p>
<p>In addition, The strengthening of the regulatory framework facilitates the initiation of collective actions by consumer associations, thereby increasing companies’ exposure to both judicial and reputational consequences. In this context, businesses may face not only investigations by the competent authorities but also coordinated litigation strategies aimed at challenging and contesting manipulative digital practices.</p>
<div class="cyp_post_formulario"><h2>Contact Us</h2>[contact-form-7]<div>]]></content:encoded>
					
					<wfw:commentRss>https://letslaw.es/en/dark-patterns-ecommerce/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>AI and health data</title>
		<link>https://letslaw.es/en/ai-health-data/</link>
		
		<dc:creator><![CDATA[Abogada Paula Ferrandiz]]></dc:creator>
		<pubDate>Mon, 16 Mar 2026 08:00:22 +0000</pubDate>
				<category><![CDATA[Data Protection]]></category>
		<guid isPermaLink="false">https://letslaw.es/?p=20111</guid>

					<description><![CDATA[Artificial intelligence is rapidly becoming embedded in hospitals, clinics, laboratories, and mobile applications that monitor our daily lives.]]></description>
										<content:encoded><![CDATA[<p>Artificial intelligence is no longer a futuristic promise: it is rapidly becoming embedded in hospitals, clinics, laboratories, and mobile applications that monitor our daily lives. From systems that help detect tumors in medical images to algorithms that predict cardiovascular risks or personalize treatments, <strong>AI relies on a key resource: data</strong>. And when that data relates to our health—diagnoses, medical records, genetics, habits, or biometrics, the potential is enormous, but so are the implications.</p>
<p>This article explores the relationship, as powerful as it is delicate, between AI and health data. We will analyze why this <strong>information is considered particularly sensitive</strong>, the challenges it raises in terms of privacy, security, and bias, and how the regulatory framework (<a title="data protection" href="https://letslaw.es/en/privacy-data-protection-lawyers/">data protection</a> and AI regulation) shapes its use. Because innovation in healthcare is essential, but doing it properly is not optional—it is the only way technology can advance without putting fundamental rights at risk.</p>
<h2>Risks of bias when using AI in healthcare</h2>
<p>The use of artificial intelligence in healthcare raises a particularly significant risk: <strong>algorithmic bias</strong>. AI systems learn from large volumes of data, and if those datasets are not representative or contain existing inequalities, the system may reproduce them or even amplify them. In healthcare, where decisions can directly affect diagnosis, access to treatments, or the prioritization of patients, this issue becomes <strong>critically important</strong>.</p>
<p>A common example is diagnostic systems trained on medical datasets that do not adequately reflect the diversity of the population. If an algorithm has been trained primarily on data from certain demographic groups, for example, patients of a predominant sex, age group, or ethnic background, t may produce less accurate results when applied to other populations. This can lead to delayed diagnoses, less effective treatments, or poorer risk assessments for certain groups.</p>
<p>Moreover, biases do not always originate solely from the data used to train the system. They can also arise during the <strong>algorithm design phase, in the selection of relevant variables, or even in the way results are interpreted</strong>. In the healthcare sector, where professionals increasingly rely on AI-based decision-support tools, there is a risk that automated or semi-automated decisions may introduce errors that are difficult to detect without adequate human oversight.</p>
<h2>Compliance with the GDPR and the AI Regulation</h2>
<p>In healthcare, the use of AI almost always involves processing particularly sensitive data, which means that the GDPR requires a solid legal basis and reinforced safeguards. It is not enough to claim that data are “anonymous” if they are in fact pseudonymized, nor is it sufficient to rely on a generic legitimate interest. Organizations must justify the legal basis for processing and the specific exception that allows the use of health data, while ensuring compliance with principles such as data <strong>minimization, purpose limitation, transparency, security and access control</strong>. In practice, many projects also require a data protection impact assessment because they involve special category data, new technologies, and potentially significant effects on individuals.</p>
<p>At the same time, the European AI Regulation (AI Act) classifies many healthcare-related AI uses as “high risk”, which introduces additional obligations aimed at ensuring the safety and reliability of AI systems. These include requirements relating to data quality and governance, technical documentation and traceability, risk management, human oversight, robustness, and cybersecurity. In simple terms, the <strong>GDPR primarily protects individuals’ rights with respect to personal data, while the AI Act focuses on the risks associated with the AI system itself</strong>. Complying with one without considering the other often leaves important regulatory gaps.</p>
<h2>How to ensure legal compliance when processing data with AI</h2>
<p>Proper compliance begins with clearly defining the purpose of the AI system and identifying who actually determines the purposes and means of processing, since this determines responsibilities, contractual arrangements, and legal obligations. It is also necessary to identify what types of data are processed—including health-related inferences—select the appropriate legal basis and specific authorization for processing health data, and provide clear information to individuals about the use of AI, its purposes, and its limitations. From an operational perspective, compliance largely depends on <strong>security, governance and proper documentation</strong>, including real technical safeguards, oversight of service providers, limited retention periods, and evidence that the system has been validated and is subject to ongoing monitoring.</p>
<p>Finally, it is essential to recognize that AI systems are not static. Models that are retrained, updated, or that drift over time require continuous review. For this reason, compliance is not limited to documentation but must involve an ongoing cycle of evaluation and improvement, including <strong>bias and accuracy checks, effective human oversight, and the ability to detect and manage incidents</strong>. Only in this way can innovation in healthcare progress without compromising privacy, security, and fairness.</p>
<div class="cyp_post_formulario"><h2>Contact Us</h2>[contact-form-7]<div>]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>How to minimise the risk of trademark opposition</title>
		<link>https://letslaw.es/en/risk-trademark-opposition/</link>
		
		<dc:creator><![CDATA[Abogada Claudia Somovilla]]></dc:creator>
		<pubDate>Wed, 11 Mar 2026 08:00:36 +0000</pubDate>
				<category><![CDATA[Domains and brands]]></category>
		<guid isPermaLink="false">https://letslaw.es/riesgo-oposicion-marca/</guid>

					<description><![CDATA[Registering a trademark is a strategic decision that directly affects the value and protection of any business project.]]></description>
										<content:encoded><![CDATA[<p>Registering a trademark is a strategic decision that directly affects the value and protection of any business project. However, one of the main obstacles in this process is a <strong>trademark opposition</strong> — a situation that may delay or even block registration if prior rights conflict with the application.</p>
<p>Reducing the risk of <a title="trademark opposition" href="https://letslaw.es/en/trademark-registration/opposition-registration-brand-lawyers/">trademark opposition</a> is not a matter of chance, but of proper legal planning. Below, we analyse the key measures to minimise contingencies before and after filing a <a title="trademark registration" href="https://letslaw.es/en/trademark-registration/">trademark registration</a>.</p>
<h2>Preliminary steps before registering a trademark</h2>
<p>Most conflicts can be avoided through a rigorous prior assessment. Before filing an application with the Oficina Española de Patentes y Marcas (OEPM) or the Oficina de Propiedad Intelectual de la Unión Europea (EUIPO), three fundamental aspects should be addressed:</p>
<h3>Clearance search</h3>
<p>A trademark clearance search is the most effective filter to detect potential conflicts. It is not enough to verify whether the exact name is already registered; <strong>phonetic, visual and conceptual similarities</strong> must also be assessed.</p>
<p>A sign may give rise to a likelihood of confusion even if it is not identical to a previously registered mark. The analysis should include:</p>
<ul>
<li>Similar word and figurative marks.</li>
<li>Related goods or services in the same or connected classes.</li>
<li>Well-known or reputed trademarks with extended protection.</li>
</ul>
<p>&nbsp;</p>
<p>A superficial search significantly increases the probability of facing an opposition.</p>
<h3>Strategic Definition of Classes</h3>
<p>Selecting the appropriate classes under the <strong>Nice Classification</strong> is a technical decision. Filing in too many classes may unnecessarily increase exposure to oppositions. Filing in too few may leave the actual business activity insufficiently protected.</p>
<p>It is advisable to precisely define current goods and services as well as those planned in the short term. A broad but justified specification reduces friction without compromising protection.</p>
<h3>Assessment of distinctiveness</h3>
<p>One of the most common mistakes is attempting to <strong>register descriptive or generic terms</strong>. Weak trademarks not only have limited enforcement capacity but also tend to generate more conflicts because their scope of protection is narrow.</p>
<p>A strong trademark is distinctive, does not directly describe the goods or services, and does not contain elements commonly used in the sector. The more distinctive the sign, the lower the likelihood of opposition and the greater its future enforceability.</p>
<h2>Risk of conflict with larger brands</h2>
<p>One of the most sensitive scenarios involves coexistence with established or reputed trademarks. In such cases, the analysis must be particularly cautious.</p>
<h3>Enhanced protection of reputed trademarks</h3>
<p>Trademarks with recognised reputation do not require identity of goods or services to oppose a later application. It is sufficient to demonstrate <strong>unfair advantage or dilution of their distinctive character</strong>.</p>
<p>In practice, this means that a smaller brand may face opposition even if it operates in a different sector, provided that the sign creates an association with a highly recognised trademark.</p>
<h3>Indirect similarity and reputational risk</h3>
<p>The risk is not limited to obvious copying. Minor variations in pronunciation, visual structure, suffixes or prefixes may be considered infringing if they clearly evoke a strong prior trademark.</p>
<p>Beyond administrative opposition proceedings, the owner of the earlier mark may initiate infringement or unfair competition actions, increasing both financial and reputational exposure.</p>
<p>If a business project is inspired — even indirectly — by an established brand, it is advisable to <strong>reconsider the naming strategy before investing in branding, domain names or marketing materials</strong>. Adjusting a trademark at an early stage is manageable; doing so after receiving a formal opposition often entails sunk costs and delays in commercial strategy.</p>
<h2>What should I do if I receive a trademark opposition?</h2>
<p>Receiving an opposition does not mean that registration is automatically lost. It does mean that a third party considers your trademark to encroach upon its scope of protection. The first step is not to react impulsively, but to analyse the situation.</p>
<p>A detailed assessment is required of the actual similarity between the signs, the overlap of goods or services, and the strength of the earlier trademark. Facing a weak mark is not the same as confronting one with a consolidated market position. <strong>Likewise, not every similarity automatically creates a legal likelihood of confusion</strong>.</p>
<p>Once a clear diagnosis has been made, the appropriate strategy can be defined. In some cases, negotiation is the most efficient route, particularly where it is possible to delimit fields of use and reach a coexistence agreement. In others, a formal response before the OEPM or EUIPO will be necessary, setting out technical arguments to demonstrate the absence of relevant conflict.</p>
<p><strong>Cost-benefit analysis</strong> should always be part of the decision-making process. If investment in the trademark is still limited and the legal risk is high, redefining the sign may be more strategic than pursuing a lengthy and uncertain proceeding.</p>
<p>Minimising the risk of opposition begins long before filing the application. A thorough clearance search, a genuinely distinctive sign, and a properly defined specification of goods and services significantly reduce exposure to conflict.</p>
<p>When an opposition arises, the key is to address it with legal rigour and business perspective rather than urgency. A trademark that is strategically designed from the outset not only has greater chances of registration, but also stronger enforcement capacity and long-term stability.</p>
<div class="cyp_post_formulario"><h2>Contact Us</h2>[contact-form-7]<div>]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>“Cuidado con lo que le confIAs”, the new AEPD ten-point guide</title>
		<link>https://letslaw.es/en/commandments-aepd/</link>
		
		<dc:creator><![CDATA[LetsLaw]]></dc:creator>
		<pubDate>Mon, 09 Mar 2026 08:00:45 +0000</pubDate>
				<category><![CDATA[Data Protection]]></category>
		<guid isPermaLink="false">https://letslaw.es/cuidado-con-lo-que-le-confias-aepd/</guid>

					<description><![CDATA[We analyse the AEPD's ten-point guide, ‘Cuidado con lo que le confIAs’ with recommendations for reducing privacy risks in AI systems.]]></description>
										<content:encoded><![CDATA[<p>On 27 January 2026, the day before International Data Protection Day (28 January), the Spanish Data Protection Agency (AEPD) published the “<a title="Cuidado con lo que le confIAs" href="https://www.aepd.es/guias/recomendaciones-ia-aepd.pdf" target="_blank" rel="noopener">Cuidado con lo que le confIAs</a>” ten-point guide, with practical recommendations to reduce privacy risks when we interact with AI systems.</p>
<h2>Objectives of the AEPD ten-point guide</h2>
<p>Aware of the growing use ofand the already tangible potential of Artificial Intelligence systems, the Agency considers it important to provide a set of <strong>tips to help people understand and prevent privacy risks</strong> arising from the improper use of these tools.</p>
<p>In the Agency’s own words, this ten-point guide “aims to offer the public key pointers to promote a safe, responsible and informed use of artificial intelligence and to foster a digital environment that respects people’s fundamental rights.”</p>
<p>In addition, this initiative follows the direction set out by the AEPD in its <a title="2025-2030 Strategic Plan" href="https://www.aepd.es/documento/plan-estrategico-aepd-2025-2030.pdf" target="_blank" rel="noopener">2025-2030 Strategic Plan</a> on <strong>Responsible Innovation and the defence of dignity in the digital era</strong>, where it reaffirmed its commitment to promoting a culture of privacy and <a title="data protection" href="https://letslaw.es/en/privacy-data-protection-lawyers/">data protection</a> among both citizens and organisations, as well as supporting technological innovation with safeguards.</p>
<h2>Responsible use of artificial intelligence</h2>
<p>Talking about “responsible use” is not only an ethical matter; it is also a practical one. In day-to-day use of generative AI, there are four ideas worth keeping in mind:</p>
<h3>1. Your prompt is not always “just text”</h3>
<p>When you write a query, it is not only the content of the message that travels. In many services, use may involve technical and contextual data (browsing data, identifiers, metadata, etc.). In other words, even if your question is harmless, the surrounding ecosystem might not be.</p>
<h3>2. Privacy is not breached only by sharing your name and surname</h3>
<p>Some data may not look personal at first, but can become personal through accumulation: habits, frequent locations, routines, concerns, or preferences. With enough repetition, small clues add up to a profile.</p>
<h3>3.AI doesn’t “understand” like a professional</h3>
<p>These tools can sound convincing even when they are wrong. And in sensitive matters (health, legal advice, psychological support), the risk is not only privacy-related: it can also lead to poorly informed decisions.</p>
<h3>4. It’s not only your privacy: you are also responsible for other people’s data</h3>
<p>A common mistake is to think “this isn’t mine” and let your guard down: a client’s data, a candidate’s details, a supplier’s information, a colleague, a minor, a screenshot with names, a forwarded email… If you input these into an AI tool, you are processing personal data and may be exposing third-party information without a legal basis, without necessity, and without control.</p>
<h2>The good practices recommended by the AEPD</h2>
<p>The value of the ten-point guide lies precisely in the fact that it does not stay at generalities: it proposes concrete habits. These are the 10 recommendations set out by the Agency:</p>
<h3>1. Don’t upload your personal information to AI</h3>
<p>Avoid including information that directly identifies you (e.g., contact details, documents, personal images). If you need to describe a case, anonymise it or use a fictional scenario.</p>
<h3>2. Be especially careful not to upload sensitive or delicate information</h3>
<p>Some categories are best kept out by default: health data, financial information, contractual matters, locations or stays. These are high-impact data if exposed.</p>
<h3>3. Respect the privacy of third parties</h3>
<p>If your query involves other people, remove any element that could identify them. And as a rule of thumb: don’t upload images of third parties to generate new content, especially when minors are involved.</p>
<h3>4. Don’t include professional information</h3>
<p>If you use AI in a professional context, apply the “as if you were going to paste it into a public channel” standard (because, in practice, the risk of exposure exists). No contracts, reports, strategies, client data, or employee information.</p>
<h3>5. Review the AI service’s terms before using it and choose the safest options</h3>
<p>Before using a tool, check what happens to your information (retention, use for improvement, privacy settings, permissions). Prioritise solutions that collect only what is strictly necessary and provide clear controls.</p>
<h3>6. If you need specialised professional advice, emotional support or psychological help, go to a professional rather than AI</h3>
<p>If you need a diagnosis, clinical guidance, legal advice, or psychological support, don’t replace it with a conversation with AI. You can use AI as support, but not as “the professional”.</p>
<h3>7. Don’t believe everything an AI says: keep a critical stance towards its answers</h3>
<p>Maintain a critical mindset. Don’t delegate important decisions without verification, and cross-check against reliable sources (especially for matters with legal, financial, or personal impact).</p>
<h3>8. Advise and guide the minors in your care</h3>
<p>Explain what risks exist, what types of data should not be shared, and encourage critical thinking. Here, prevention means practical digital education.</p>
<h3>9. Use different accounts and delete your history</h3>
<p>If you are “testing” tools, avoid mixing them with your personal or professional email. Use separate accounts, review deletion options, and remove conversations regularly when the service allows it.</p>
<h3>10. Your questions can define you</h3>
<p>You don’t need to type “my ID number” to leave a trail. Repeated questions about habits, fears, likes or routines can build a very precise profile. Practise the “minimum necessary” principle in what you ask as well.</p>
<div class="cyp_post_formulario"><h2>Contact Us</h2>[contact-form-7]<div>]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Legal and commercial errors that can block an investment round</title>
		<link>https://letslaw.es/en/errors-block-investment-round/</link>
		
		<dc:creator><![CDATA[Abogado Alberto Zuñiga]]></dc:creator>
		<pubDate>Wed, 04 Mar 2026 08:00:16 +0000</pubDate>
				<category><![CDATA[Commercial Law]]></category>
		<guid isPermaLink="false">https://letslaw.es/errores-bloquear-ronda-de-inversion/</guid>

					<description><![CDATA[We will tell you about some of the most common legal and commercial mistakes that can hinder an investment round.]]></description>
										<content:encoded><![CDATA[<p>When a company decides to launch an <a title="investment round" href="https://letslaw.es/en/rondas-de-inversion/">investment round</a>, attention usually focuses on valuation, the equity to be offered, or the growth strategy. However, practice shows that, even before discussing figures, the real filter often lies in the <strong>company’s legal position</strong>.</p>
<p>The economic negotiation may be well structured, but if the legal framework is not properly organized, the transaction may be delayed, become more costly, or ultimately fail to close.</p>
<p>From a systematic perspective, the risks that most frequently affect an investment round can be grouped into three main categories: regulatory non-compliance, deficiencies in the corporate structure, particularly in the <a title="shareholders’ agreement" href="https://letslaw.es/en/shareholders-agreements/">shareholders’ agreement</a>, and contingencies related to the company’s key assets.</p>
<h2>Regulatory non-compliance</h2>
<p>The first level of analysis is regulatory.</p>
<p>Every company must conduct its business in accordance with the <strong>applicable legal and regulatory framework</strong>. However, in early stages it is relatively common for certain obligations to be postponed or interpreted with some flexibility. What may seem manageable in day-to-day operations can become a concrete contingency during a <a title="due diligence" href="https://letslaw.es/en/commercial-lawyers/legal-due-diligence/">due diligence</a> process.</p>
<p>It is common to identify activities subject to administrative authorization carried out without the required license, non-compliance with data protection regulations, contractual terms that do not conform to sector-specific rules, or failure to comply with regulations applicable to regulated industries.</p>
<p>It should be borne in mind that investors assess not only the project’s growth potential, but also the existence of <strong>risks that may jeopardize its continuity</strong>. A significant administrative sanction, operational restriction, or the nullity of certain contractual provisions may substantially alter the investment scenario.</p>
<p>For this reason, before launching a funding round, it is advisable to verify the level of regulatory compliance and, where necessary, regularize any issues identified.</p>
<h2>Corporate structure and shareholders’ agreement</h2>
<p>The second block of risks lies within the internal corporate structure. And it is worth emphasizing that, in many cases, the main source of tension is not the articles of association, but the <strong>shareholders’ agreement</strong>.</p>
<p>The entry of a new investor generally entails a <strong>capital increase and a shift in the balance among shareholders</strong>. At that stage, the shareholders’ agreement ceases to be merely an internal arrangement among founders and becomes the document that ultimately governs corporate governance, decision-making, and future exit scenarios.</p>
<p>It is common to encounter shareholders’ agreements drafted in early stages without anticipating growth scenarios. Imprecisely drafted drag-along or tag-along clauses, overly broad veto rights, reinforced majorities that hinder future capital increases, economic preferences granted without considering subsequent rounds, or the absence of clear provisions regarding new issuances and incentive plans are frequent issues.</p>
<p>Although a shareholders’ agreement has a contractual nature, its practical impact is decisive. If the internal framework is not properly structured, the entry of a new investor will likely require <strong>prior renegotiation</strong>. In some cases, that renegotiation proves more complex than the round itself.</p>
<p>In addition, consistency between the shareholders’ agreement and the articles of association is essential. Any misalignment creates legal uncertainty and requires the corporate framework to be adjusted before closing.</p>
<p>Likewise, basic corporate formalities must be reviewed: filing of annual accounts, proper registration of corporate resolutions, updated bylaws, and accurate maintenance of corporate books. Although these may appear to be formal matters, non-compliance conveys a sense of internal disorder.</p>
<p>In short, a poorly structured shareholders’ agreement is not a minor detail; it can become the main obstacle to raising capital.</p>
<h2>Key assets and intellectual/industrial property</h2>
<p>The third block of analysis concerns the <strong>assets that constitute the core value of the company</strong>.</p>
<p>In many startups, these assets are intangible: technological developments, software, databases, or trademarks. From a legal standpoint, it is essential to demonstrate that the company holds proper title to these assets or has sufficient rights to exploit them.</p>
<p>In practice, it is common to identify developments created by founders without <strong>formal assignment agreements</strong>, trademarks or domain names registered in the name of individuals, or the absence of documentation evidencing the transfer of strategic assets to the company.</p>
<p>If ownership is not properly documented, investors may require its regularization as a condition precedent to the investment. Where discrepancies exist among founders or former collaborators, the situation may become significantly more complex.</p>
<h2>Considerations for preparing for an investment round</h2>
<p>Preparing for an investment round should not be limited to drafting a compelling deck or negotiating valuation. It is advisable to conduct a comprehensive legal review in advance to assess <strong>regulatory compliance</strong>, alignment between corporate documents and shareholders’ agreements, the company’s corporate and registry status, and the adequate protection of its key assets.</p>
<p>A solid legal structure does not guarantee the success of a funding round, but it significantly reduces the risks that may jeopardize it or weaken the shareholders’ negotiating position.</p>
<p>If you are considering initiating a financing process, reviewing these aspects in advance may <strong>facilitate negotiations and strengthen your position vis-à-vis potential investors</strong>.</p>
<p>At LetsLaw, we analyze the legal position of each project with the aim of anticipating contingencies and structuring its growth on a sound legal basis.</p>
<div class="cyp_post_formulario"><h2>Contact Us</h2>[contact-form-7]<div>]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Legal notice and analysis of the Customer Service Act</title>
		<link>https://letslaw.es/en/customer-service-act/</link>
		
		<dc:creator><![CDATA[Abogada Candela Martín]]></dc:creator>
		<pubDate>Mon, 02 Mar 2026 08:00:58 +0000</pubDate>
				<category><![CDATA[Digital Law]]></category>
		<guid isPermaLink="false">https://letslaw.es/ley-atencion-a-la-clientela/</guid>

					<description><![CDATA[Analysis and legal note on the Customer Service Act: implications and legal strategy of Act 10/2025, of 26 December, SAC Act.]]></description>
										<content:encoded><![CDATA[<p>This legal memorandum is intended to provide a practical legal analysis of <strong>Law 10/2025, of 26 December, regulating customer service activities</strong> (the “Customer Service Act” or the “<strong>CSA</strong>”), highlighting its implications for companies subject to its provisions and offering useful legal criteria for adapting their customer service processes.</p>
<h2>Legal analysis</h2>
<p>For the first time in Spain, the CSA introduces a specific and mandatory regulatory framework governing how companies must provide customer service, establishing clear standards regarding response times, access to human assistance, transparency, accessibility, and traceability of interactions, as well as mechanisms to ensure the efficient resolution of queries, incidents, and complaints. Its purpose is to strengthen consumer protection, enhance market confidence, and prevent practices that may generate legal or reputational risks for companies.</p>
<p>In particular, the CSA has popularly been referred to as the &#8216;<strong>Three-Minute Law</strong>&#8216;, as it requires that customer service calls be answered within an average maximum waiting time of three minutes. This requirement represents only one of several mandatory compliance obligations that companies must consider in order to mitigate legal risks and optimize customer experience.</p>
<p>The effective entry into force is accompanied by a transitional period until 28 December 2026, providing a limited window for companies to adapt their processes, systems, and contractual arrangements under a preventive and strategic approach.</p>
<h2>Preliminary considerations</h2>
<p>The CSA constitutes the first piece of legislation establishing specific and detailed obligations regarding the proper provision of customer service, moving beyond prior sector-specific approaches and consolidating minimum standards applicable to all affected operators.</p>
<p>The CSA pursues two core objectives:</p>
<ol>
<li><strong>Effective consumer protection</strong>: safeguarding users and consumers against practices that commonly generate frustration, such as excessive waiting times, exclusively automated customer service systems, unsolicited commercial calls (spam), hidden charges, and false online reviews.</li>
<li><strong>Standardization of customer service quality</strong>: imposing clear metrics and performance obligations for customer service operations, ensuring that consumer experience translates into legal compliance and reduced reputational risk.</li>
</ol>
<p>&nbsp;</p>
<p>The nickname &#8216;Three-Minute Law&#8217; stems from one of its most emblematic provisions: <strong>companies must ensure that 95% of customer service calls are answered within an average maximum waiting time of three minutes</strong>, without the possibility of terminating calls on the grounds of excessive waiting time. This requirement constitutes an obligation of result rather than a mere best-efforts standard, meaning that the allocation of human and technological resources must be strategically structured to ensure compliance.</p>
<p>The CSA introduces both result-based and organizational obligations directly affecting:</p>
<ul>
<li>Omnichannel service models.</li>
<li>IVR systems and automation architectures.</li>
<li>Complaint management systems.</li>
<li>Outsourced call centers.</li>
<li>Interaction logging and traceability systems.</li>
<li>Commercial policies related to after-sales services.</li>
</ul>
<p>&nbsp;</p>
<p>These are not quality recommendations, but legally enforceable standards whose compliance may be subject to verification in the context of inspections carried out by the competent consumer protection authorities.</p>
<h2>Obligated entities and scope of application</h2>
<p>In general terms, the CSA applies to:</p>
<ul>
<li>Private and public entities <strong>providing customer service</strong>.</li>
<li>Companies serving consumers and users with <strong>more than 250 employees or annual turnover exceeding €50 million</strong>.</li>
<li><strong>Providers of essential services</strong>, including energy, water, gas, telecommunications, transport, financial, and postal services.</li>
</ul>
<p>&nbsp;</p>
<p>Although SMEs are initially excluded, the Act’s impact extends to subcontracting chains, digital service providers, and technology platforms involved in customer service activities of obligated entities. This scenario necessitates a review of agreements with outsourced call centers, CRM providers, automation service providers, and artificial intelligence system suppliers, as ultimate liability vis-à-vis consumers and public authorities remains with the principal operator.</p>
<h2>Minimum service quality standards</h2>
<p>Among the minimum enforceable standards, customer service must be:</p>
<ul>
<li><strong>Free</strong> of charge for users.</li>
<li><strong>Effective and measurable</strong> through clear performance indicators.</li>
<li><strong>Universally accessible</strong>, including to persons with disabilities or language barriers.</li>
<li><strong>Verifiable</strong>, through records and documentation capable of demonstrating compliance during inspections or disputes.</li>
</ul>
<p>&nbsp;</p>
<p>Particular importance is placed on the obligation to ensure that 95% of calls are answered within the average maximum period of three minutes. The key legal aspect is not merely achieving the metric, but being able to document and evidence compliance.</p>
<p>From a practical standpoint, companies must implement internal monitoring protocols, periodic reporting, and audits to ensure alignment with these obligations, transforming regulatory requirements into competitive service advantages.</p>
<h2>Specific consumer rights and practical implications</h2>
<p>The CSA guarantees specific consumer rights with direct legal implications for companies:</p>
<h3>1. Right to human assistance</h3>
<p><strong>Customer service may not be exclusively automated</strong> through bots or AI systems. Users are entitled to request assistance from a qualified human representative.</p>
<p>Companies should implement tiered escalation systems allowing prompt human intervention, particularly in complex or sensitive cases, and review IVR and chatbot architectures to avoid artificial delays in transfer.</p>
<h3>2. Maximum resolution deadlines</h3>
<p>Complaints and incidents must be <strong>resolved within fifteen (15) business days</strong>.</p>
<p>Shorter deadlines apply in specific cases:</p>
<ul>
<li>Undue charges: five (5) business days.</li>
<li>Essential service interruptions: two (2) hours regarding status updates and restoration forecasts.</li>
</ul>
<p>&nbsp;</p>
<p>Clear internal SLAs, tracking systems, and automated alerts are advisable, as failure to comply may constitute an administrative infringement.</p>
<h3>3. Prohibition of abusive practices</h3>
<p><strong>Unsolicited commercial calls are expressly prohibited</strong>, and companies must identify themselves through specific codes.</p>
<p>Commercial campaigns and databases must be audited to ensure lawful consent and traceability.</p>
<h3>4. Price transparency</h3>
<p><strong>Hidden charges or surcharges are prohibited</strong>; advertised prices must match the final payable amount.</p>
<p>Internal billing standards, customer portals, and contractual documentation must be reviewed accordingly.</p>
<h3>5. Online reviews and advertising</h3>
<p><strong>Reviews must be issued by genuine users</strong> within the previous 30 days, subject to verification mechanisms and removal procedures for false reviews.</p>
<p>Proactive verification and moderation systems are recommended.</p>
<h3>6. Accessibility and non-discrimination</h3>
<p>Customer service <strong>must be adapted for vulnerable persons</strong>, including individuals with hearing impairments or language barriers.</p>
<p>Investment in staff training, assistive technologies, and inclusive protocols is advisable.</p>
<h3>7. Documentary evidence</h3>
<p>Companies must provide acknowledgment of receipt and content of communications, including date and time stamps, and allow access to call recordings where applicable.</p>
<p>Robust logging and secure storage systems should be implemented to serve as evidentiary support in inspections or claims.</p>
<h2>Additional key measures: legal implications and strategic opportunities</h2>
<p>The CSA requires the design of integrated internal processes combining <strong>service provision, traceability, performance metrics and risk management</strong>.</p>
<p>Proactive companies that continuously improve these processes may convert regulatory compliance into a competitive advantage by increasing customer satisfaction, reducing disputes and litigation, and optimizing commercial operations.</p>
<p>Opportunities arise for legal advisory services in:</p>
<ul>
<li>Redesigning internal processes.</li>
<li>Conducting periodic audits.</li>
<li>Reviewing service provider contracts.</li>
<li>Establishing preventive compliance protocols.</li>
</ul>
<h2>Sanctioning regime and legal impact</h2>
<p>Non-compliance with the CSA constitutes an <strong>administrative infringement in consumer protection matters</strong>. Sanctions may include significant financial penalties, with increased severity in cases of repeated breaches or harm to vulnerable consumers.</p>
<p>Companies will be subject to <strong>periodic external audits</strong> certifying compliance, requiring integration of regulatory compliance into corporate governance and risk management frameworks.</p>
<h2>Recommended strategy and practical guidance</h2>
<p>From a risk management perspective, adaptation to the CSA cannot be limited to isolated operational adjustments. Each affected operator should begin with a comprehensive internal assessment covering service channels, response times, traceability mechanisms, and accessibility standards.</p>
<p>This diagnosis will enable the <strong>definition of legal compliance KPIs</strong>, such as response times, resolution rates, and percentage of human-assisted interactions.</p>
<p>Subsequently, <strong>internal protocols and mandatory record-keeping systems should be designed</strong> and implemented to evidence compliance during inspections and audits.</p>
<p>Periodic <strong>external audits</strong> should review service provider agreements, subcontracting structures, and digital platforms to ensure full compliance.</p>
<p><strong>Staff training</strong> in consumer rights and internal protocols is essential to ensure efficient, compliant incident resolution.</p>
<p><strong>Commercial and communication strategies must be continuously reviewed</strong> to ensure transparency and prevent abusive practices.</p>
<p>Through this approach, mandatory compliance with the CSA may be <strong>transformed into a strategic advantage</strong>, enhancing customer satisfaction, corporate reputation, and operational efficiency.</p>
<h2>Summary of the Customer Service Act</h2>
<p>The so-called &#8216;<strong>Three-Minute Law</strong>&#8216; represents a structural shift in how companies must conceive customer service: from a purely reputational element to a source of administrative liability exposure.</p>
<p>The transitional period until December 2026 should not be regarded as a period of inaction, but as a strategic opportunity to:</p>
<ul>
<li>Redesign internal processes.</li>
<li>Strengthen corporate governance.</li>
<li>Integrate compliance into daily operations.</li>
<li>Reduce exposure to sanctions.</li>
</ul>
<p>&nbsp;</p>
<p>At LetsLaw, S.L., we assist organizations in conducting specific legal audits concerning customer service operations, designing tailored adaptation plans that integrate regulatory analysis, contractual review and operational alignment. Check out our <a title="legal services in Spain" href="https://letslaw.es/en/digital-lawyer/">legal services in Spain</a>.</p>
<div class="cyp_post_formulario"><h2>Contact Us</h2>[contact-form-7]<div>]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
