Robert Cannon

Robert Cannon

Cybertelecom
Joined on August 8, 2007
Total Post Views: 239,364

About

Bio Info found at Cybertelecom .

Except where otherwise noted, all postings by Robert Cannon on CircleID are licensed under a Creative Commons License.

Featured Blogs

Is Call Forwarding an “Information Service” and Why It Matters for FTC Jurisdiction

Time to brush the dust off your Computer II notebooks. Are voicemail, electronic fax, and call forwarding enhanced services or telecom services? Today's case: FTC v. American eVoice, Ltd... The FTC brought an action against Defendants claiming that they were engaged in cramming, adding unwanted voicemail, electronic fax, and call forwarding services to consumers bills to the tune of $70 million. more

How a Plaintiff Was Undeceived and Lost at Spam Litigation - What Nobody Told You About!

Back in 2003, there was a race to pass spam legislation. California was on the verge of passing legislation that marketers disdained. Thus marketers pressed for federal spam legislation which would preempt state spam legislation. The Can Spam Act of 2003 did just that... mostly. "Mostly" is where litigation lives. According to the Can Spam Act preemption-exception... more

You Cannot Tell Your Customers to ‘Shut Up’ Anymore - Consumer Review Fairness Act Signed Into Law

Bad idea: Set up a business and provide poor goods or services; receive bad reviews online for your poor goods or services. Worse idea: Instead of treating your customers' feedback as free expert advice and listening to their suggestions on how to improve your business, sue your customers -- experience the Streisand Effect -- resulting in increased media coverage highlighting your lousy goods, service, and treatment of customers. Ensure that negatives reviews of your business get the widest exposure possible. more

The Sharing Economy and Sec. 230(c) of the Communications Decency Act

The sharing economy is a challenge for local communities. On the good, it creates economic opportunity and reduces the price. On the bad, it circumvents public safety and welfare protection. Such is the clash between Airbnb and local jurisdictions. San Francisco implemented a local ordinance that permits short-term rentals on the condition that the rental property is registered. In order to register the property, the resident must provide proof of liability insurance... more

When CDA Immunity is Not CDA Immunity

Here's a question: If 47 USC 230(c) (the Good Samaritan provision of the Communications Decency Act) says that online services are not liable for third party content, then can you even sue the online service? Shouldn't the online service be immune from lawsuit? Because, after all, what would be the point of being sued for something for which you cannot be liable? more

Is 47 USC 230(c) an Immunity or an Affirmative Defense (Does it Matter?)

Procedure matters. It matters whether a defendant can dispose of a litigation right out of the gate, or whether the defendant must suffer the slings and arrows of discovery, motions, and trial before presenting a successful defense. Procedurally, once a litigation has been initiated, defendant has a chance to say, "hey, wait a minute, there isn't actually a cause of action here." It's like someone suing me for being tall. Well, yeah, but there is no recognized cause of action against being tall. more

The Boundary Between Sec. 230 Immunity and Liability: Jones v. Dirty World Entertainment Recordings

Out in the wilderness of cyberspace is a boundary, marking the limits of Sec. 230 immunity. On the one side roams interactive services hosting third party content immune from liability for that third party content. On the other sides is the frontier, where interactive content hosts and creators meet, merge, and become one. Here host and author blend, collaborating to give rise to new creations. more

In Which We Consider the Meaning of ‘Authorized’: GIVAUDAN FRAGRANCES CORPORATION v. Krivda

What does authorized access mean? If an employee with authorized access to a computer system goes into that system, downloads company secrets, and hands that information over to the company's competitor, did that alleged misappropriation of company information constitute unauthorized access? This is no small question. If the access is unauthorized, the employee potentially violated the Computer Fraud and Abuse Act (CFAA) (the CFAA contains both criminal and civil causes of action). But courts get uncomfortable here. more

NJ Content Liability Law Ruled Inconsistent with Sec. 230 (just like in Washington and Tennesse)

Back in a time before most members of Congress or prosecutors knew that there was an Internet, there was Prodigy. Prodigy, as part of its service, ran family-friendly chat rooms that it moderated in an effort to keep kids protected from unfortunate content. In a different Prodigy chat room, some unknown third party said something apparently bad about an investment firm Stratton-Oakmont. Stratton-Oakmont didn't like that very much, and sued. more

When an IP Address Does Not Equal Individual Culpability - Breaking Glass Pictures v Does, DAZ 2013

Something bad happens online. I can tie that something-bad back to an IP address. Do I know who did the bad thing? According to the Federal District Court in Arizona, I don't. An IP address may identify the owner of an Internet access account; it does not identify who was online at that particular time and who may be responsible for the actions in question. In Breaking Glass Pictures v Does, DAZ 2013, Plaintiff brought a claim for copyright infringement, wants early discovery, but the court is refusing. more

Dial “L” for Liability - Sec. 230 Protects Online Service for Errant Phone Number

The Communications Decency Act has been described as the greatest Internet law. The first major Internet law designed to censor the Internet actually enabled the interactive Internet. While the censorship provisions of the Communications Decency Act went down in unanimous supreme court flames, a separate provision remains standing. The Good Samaritan provision of the CDA (47 U.S.C. ยง 230) declared that networks and online services are not publishers and therefore are not liable for the content of third parties. more

No Virginia, You Have No Duty to Secure Your WiFi Access Point

Every now and again a report flies across the network about the police breaking down someone's door and attempting to arrest the home owner for bad things online - assuming that whatever happened from that person's Internet connection is their fault. Now there are lots of problems with this - lots of problems. But one of the big ones is that anyone can access an open access point... more

NTIA Request for Comments on the Internet Assigned Numbers Authority (IANA) Functions

On Feb. 25, 2011, the National Telecommunications and Information Administration released the following request for comments concerning the USG's contract for the IANA function. As indicated, the USG's contract for the IANA function with ICANN expires later this year. Interested parties can file comments with NTIA by March 31, 2011. more

The Wayward AntiCybersquatting Consumer Protection Act

The Anti-Cybersquatting Consumer Protection Act (ACPA) has lost its way. The ACPA was passed in an era of domain name land grabs, where nefarious individuals would register and warehouse oodles of valuable domain names, and then extract ransom from bewildered-trademark owners. These nefarious individuals are known as "cybersquatters", and, according to the ACPA, they are bad. The Ninth Circuit, in an early reading of the ACPA, stated... more

US Government Releases Two IPv6 Papers

During the last week of December, two US Government agencies released papers on IPv6. NIST released Special Publication 800-119, Guidelines for the Secure Deployment of IPv6. This comprehensive 188 page paper provides guidelines for federal agencies (and anyone else who might want to take advantage of it) to securely deploy IPv6. more

The Threat from Within - US v. Fowler, SDFL 2010

The security vendor-phobe at the head of the conference bangs on the podium with his shoe declaring that "The greatest threat comes from within! (buy our product for your network's salvation)." Fear as a marketing strategy can never be underestimated. Particular when the fear is of the misunderstood. Media helps stoke the flames of fear-marketing with stories of fired or disgruntled IT staff who reportedly effectuate their revenge on former employers by bricking systems. more

Virtual Banishment and the First Amendment: Estavillo v. Sony Computer Entertainment of America

I saw this case in the excellent National Association of Attorneys General publication Cyber Crime e-newsletter. Many of us host or sponsor online communities of one form or another. On occasion, this means we must engage in moderation of the discourse in that community, and, as chance may arise, on occasion, we must give some chap the boot from the community for violating the AUP or the TOS. Inevitable, the booted chap screams "First Amendment Violation," to which we must respond, "The First Amendment restrains government actors -- we are not government actors." more

Gripe Site Triumphant Over AntiCybersquatting Consumer Protect Act Complaint

Today's case involves the classic alleged scenario of a gripe site which used a Plaintiff's trademark in Defendant's web site domain name -- and whether this might be a violation of the Anti Cybersquatting Consumer Protection Act (ACPA). more

It’s Safe to Be a Dog on the Internet Again: Lori Drew Prosecution Terminated

"On the Internet, no one knows whether you're a dog." Of course, if you are a dog, and you are fibbing about it, according to the US Attorneys Office out in California you're a felon and should be sent to the dog pound. Fortunately, there's a new dog in town who seems to be howling a different tune. Bad facts make for bad law. The unfortunate alleged facts of this case involved fibbing about actual identities, playing with a young girl's emotions, and the girl's eventual suicide. more

FCC Requests Comments on Definition of “Broadband”  - Comments Due Aug 31; Replies Due Sept 8

The FCC is engaged in researching and preparing a National Broadband Plan which is due to Congress in February 2010. The FCC has released a Notice of Inquiry soliciting comments for the plan and is currently actively holding a lengthy series of workshops exploring the different aspects of what might go into the plan. more

NTIA Seeks Nominations to Serve on the Online Safety and Technology Working Group

In the midst of the election season, Congress passed a plethora of Internet related laws. Most involved child protection. One involved webcaster protection. Wasting no time, the impact of the new laws is already being felt through federal agency implementation. On Friday, the National Telecommunications and Information Administration (NTIA) in the Department of Commerce released the following notice... more

In Which We Explore the Federal Laws that Apply to Cyberstalking

Tragedies frequently result in flurries of legal activity. Last years witnessed the Myspace tragedy in which a 13 year old girl committing suicide. Unfortunately stalking laws have been clumsy tools that are difficult if not impossible for law enforcement officials to wield. Where existing laws respond poorly to tragedies, the option behind Door Number One is to enact a new law, and the option behind Door Number Two is to argue for a reinterpretation of current law that would somehow miraculously shoehorn the tragedy into the law. Unlike game shows, legal contestants can pick both doors -- which is what happened in this case. more

NIST Releases a Profile for IPv6 in the U.S. Government for Comment - Comments Due Feb. 29

The National Institute for Standards and Technology (NIST) has released a second draft of a proposed standards profile to support the implementation of IPv6 by government agencies. "NIST developed the 'profile' to help ensure that IPv6-enabled federal information systems are interoperable, secure and able to co-exist with the current IPv4 systems." ...The White House's Office of Management and Budget declared in 2005 that all federal agencies shall migrated to IPv6 by June 30, 2008... more