Brand Protection |
Sponsored by |
|
A few days ago I wrote about a piece of my intellectual property, an article I wrote and posted on DaileyMuse.com, being stolen, plagiarized, and posted on another web site under a different authors name. I hadn't been looking for my work elsewhere, I was simply browsing the access logs and visiting other websites that stood out. As a result of finding my work posted elsewhere without my permission, I contacted the owner of the website by email and provided 24 hours to remove the content before I pursued legal action. more
ICANN's proposed final applicant guidebook unraveled some new policies that would disqualify applicants from the new TLD program. ICANN states that if you lose 3 UDRP cases, you will be disqualified from being a major shareholder, partner, officer, director of a new top-level domain registry... Has ICANN opened a new can of worms with the 3-strike rule? more
We are all accustomed to purchasing and/or using copyrighted material in one fashion or another. From music, movies-(BluRay), e-books-(Kindle), computers-(software), mobile phones-(iPhone) and games; the umbrella of companies wanting to restrict access to its products continues to grow and become increasingly restrictive. more
It didn't take long for criticism of the Verizon/Google net neutrality proposal to start pouring in. "nterest groups, bloggers, and even Google fanboys [have started] discrediting the plan" according to one trade publication. Although most of the commentary simply echoes various groups' long-held positions, the Electronic Frontier Foundation, the nation's foremost cyber-rights watchdog, provided a crucial insight about the plan that goes to the core of the net neutrality issue. more
There is increasingly heated rhetoric in DC over whether or not the government should begin to "regulate the internet." Such language is neither accurate nor new. This language implies that the government does not currently involve itself in governing the internet -- an implication which is clearly untrue given a myriad of laws like CFAA, ECPA, DMCA, and CALEA (not to mention existing regulation of consumer phone lines used for dialup and "special access" lines used for high speed interconnection). more
In the past few months, a flurry of gift card scams leveraging such high-profile brands as Best Buy, Whole Foods and IKEA have emerged on Facebook. These scams often use the brand's logo, website URL, or general "look and feel" on Facebook "fan" pages to give the impression that these offers are legitimate. Some scams are even bold enough to include bogus, non-interactive fan comments to add a greater sense of authenticity to the gift card offer. To date, these scams have been successful at tricking tens of thousands of consumers. In just one day, for example, a fan page titled "IKEA Get a FREE $1000 IKEA Gift Card! (ONLY AVAILABLE 1 DAY)" registered 40,000 fans before being shut down. more
Google has released a government requests tool. It's highly illuminating and may end up being quite disruptive. That's what surprising data visualizations can do for us. ... The tool allows us to see the number of requests from different countries that Google received during the last six months of 2009. More than 3600 data requests from Brazil during those six months and more than 3500 from the US. But just 40 or so from Canada and 30 from Israel. more
There have been many news stories lately about ebook readers. The New York Times said that they were prominently featured at the Consumer Electronics Show. Amazon is pushing its Kindle; Barnes and Noble has its Nook. There are many other aspirants, either on the market now or waiting in the wings. For now, though, I'm sitting on the sidelines. more
While I like John Ottaviani's perspectives on 2009's top Cyberlaw developments a lot, I independently developed my own top 10 list that has a different emphasis. You might enjoy the contrasts. My list... more
The FCC has posed a number of provocative questions to AT&T regarding the fact that iPhone subscribers cannot download and use the Google Voice application. AT&T should stifle every motivation to play cute or clever with the FCC. Apple adopted such a strategy when it suggested to the Library of Congress and others that it would be curtains for the free world if iPhone owners could hack, jailbreak, tether, and otherwise use their handsets without fear of violating the prohibition on circumventing copyright laws contained in the Digital Millennium Copyright Act. more
A report released today by Public Knowledge points out that their recent analysis indicates filtering Internet content, as advocated by media companies, will not be effective and in fact harmful to the Internet. An accompanying 60-page whitepaper contains the full report including a number of reasons why the user of copyright filters should not be allowed, encouraged or mandated on U.S. Internet Service Provider (ISP) networks. more
A Swedish court on Friday found all four defendants guilty in a copyright test case involving one of the world's biggest free file-sharing websites. "The Stockholm disctrict court has today found guilty the four individuals that were charged with accessory to breaching copyright laws," the court said in a statement. "The court has sentenced each of them to one year in prison." more
Potential trademark Rights Protection Mechanisms (RPM) at the 2nd level can be divided into three main areas -- each defined by their time relative to Top-Level Domain (TLD) launch... Of these, we believe the third, "After Launch," is the most fruitful path to explore. We believe it offers the most potential to protect the rights of trademark holders, the best balance between TM rights and the legitimate rights of others who may want to register names , and the most benefit to the trademark community at the lowest cost to them... more
The Wall Street Journal and others are reporting that the Recording Industry Association of America is adjusting its strategy for combating the massive infringement occasioned by the sharing of music files over the internet. Since 2003, that strategy has been to pursue copyright infringement cases against individual file sharers. The RIAA now says it will focus less on pursuing infringement litigation and more on working with internet service providers to shut down the accounts of individuals suspected of illegally trading files. more
It is ICANN's responsibility to make sure domain names do not infringe on trademarks. To determine infringement, ICANN should rely in the short term on predictive models. Thus, domain name and trademark owners must start putting pressure on ICANN to assume its trademark responsibility. more