Brand Protection

Sponsored
by

Noteworthy

Brand Protection / Featured Blogs

10 Noteworthy Cyberlaw Developments of 2009

While I like John Ottaviani's perspectives on 2009's top Cyberlaw developments a lot, I independently developed my own top 10 list that has a different emphasis. You might enjoy the contrasts. My list... more

New Zealand Releases Revamped Three Strikes Proposal

The New Zealand government has released a revamped three strikes proposal that incorporates full court hearings and the possibility of financial penalties. A prior proposal, which would have resulted in subscriber access being terminated without court oversight, was dropped earlier this year following public protest. more

How Copyright Violators Are Removed from Search Engine Listings Based on DMCA

It may not be widely-known but the big 3 search engines -- Google, Yahoo! and Bing -- have established procedures for removing natural search results on the basis of the Digital Millennium Copyright Act (DMCA). That's good news for brand owners: if consumers can't find infringing websites via the search engines, they're less likely to come across them at all... more

Some Unsolicited Advice for AT&T re Google Voice

The FCC has posed a number of provocative questions to AT&T regarding the fact that iPhone subscribers cannot download and use the Google Voice application. AT&T should stifle every motivation to play cute or clever with the FCC. Apple adopted such a strategy when it suggested to the Library of Congress and others that it would be curtains for the free world if iPhone owners could hack, jailbreak, tether, and otherwise use their handsets without fear of violating the prohibition on circumventing copyright laws contained in the Digital Millennium Copyright Act. more

No Honor Among Thieves on the Internet

Apple's Wordwide Developers Conference may have just ended, but already, the conference release of Mac's OS X 10.6 — a beta build previewed for developers — has been leaked onto torrent sites. It borders on irony: for years, Mac lovers have touted the superior security of the Mac operating system over Windows, but earlier this year, it was torrent sites — the very sites where OS X 10.6 is now being freely copied — that caused more than 25,000 Mac users to fall victim to the iServices Trojan. Some Macs never learn. more

USC: Solving the Digital Divide?

Like many in the UK communications industry my colleagues and I at Entanet have been eagerly awaiting the Digital Britain report. Darren Farnden, Entanet's Head of Marketing, has posted an interesting assessment of key parts of the report at opinion.enta.net. Given the content of Darren's article I thought it would be useful to post it in full here for CircleID readers... more

Google Book Search Settlement: Another Digital Pandora’s Box

A very good friend of mine is an archivist with the Ontario government, and we share similar views on how technology is impacting modern life. He passed a really interesting item along that ran in yesterday's Washington Post. Some of you may be following this – Google's Book Search Settlement. I can definitely see how this has a direct bearing on the archive space, but also how it touches on a few tangents of my world – emerging communications technologies. more

TLD Rights Protection Mechanisms

Potential trademark Rights Protection Mechanisms (RPM) at the 2nd level can be divided into three main areas -- each defined by their time relative to Top-Level Domain (TLD) launch... Of these, we believe the third, "After Launch," is the most fruitful path to explore. We believe it offers the most potential to protect the rights of trademark holders, the best balance between TM rights and the legitimate rights of others who may want to register names , and the most benefit to the trademark community at the lowest cost to them... more

What Could the RIAA’s Switch in Strategy Mean?

The Wall Street Journal and others are reporting that the Recording Industry Association of America is adjusting its strategy for combating the massive infringement occasioned by the sharing of music files over the internet. Since 2003, that strategy has been to pursue copyright infringement cases against individual file sharers. The RIAA now says it will focus less on pursuing infringement litigation and more on working with internet service providers to shut down the accounts of individuals suspected of illegally trading files. more

ICANN Responsible for Domain Name Trademark Mess

It is ICANN's responsibility to make sure domain names do not infringe on trademarks. To determine infringement, ICANN should rely in the short term on predictive models. Thus, domain name and trademark owners must start putting pressure on ICANN to assume its trademark responsibility. more