Law

Law / Featured Blogs

Proving and Rebutting Respondent Lacks Rights or Legitimate Interests in Accused Domain Names

Paragraph 4(a)(ii) of the Uniform Domain Name Dispute Resolution Policy requires complainants to offer evidence conclusive by itself or sufficient from which to infer that respondents lack rights or legitimate interests in the accused domain names. As I've pointed out in earlier essays (here and here) the standard of proof is low and relies on inference, for good reason; beyond the visual proof and what may be obtainable from on- and offline research, respondents control evidence of their choices. more

Overreaching Trademark Owners and the Misguided Better Right Theory of Domain Name Ownership

In Blogs devoted to news from the domain name industry and domainers, there is great glee in reporting about overreaching trademark owners. The reason for the glee, I think, is that it's a form of collective sigh from domainers and the domain industry that the UDRP is working as it should, which means that Panels are careful in their assessments of parties' rights. more

Three Reasons Why Apple Didn’t Have to Unlock a Phone

The US government is demanding Apple unlock iPhones in about a dozen cases beside the San Bernardino one. In a strikingly similar case, Judge James Orenstein in Brooklyn rejected the government's request for three separate reasons. In the decision the judge refers several times to the San Bernardino case, and it is clear he expects this decision to be an important precedent for that one. more

Apple vs FBI: Apple and Others to Argue on the Hill

Tomorrow afternoon at 1pm EST Apple will be giving testimony to the House Judiciary Committee. The session that Apple and others will be taking part in is aptly named, The Encryption Tightrope: Balancing Americans' Security and Privacy In common with other hearings the various witnesses called to speak have already submitted their written testimony, so we can already look at it and analyse it. more

Is the DMCA an Effective Way to Take Down Infringing Content?

As promised at an end-of-the-year (2015) announcement, the U.S. Copyright Office has now launched a comment submission process about the "safe harbor provisions" of the Digital Millennium Copyright Act (DMCA). The DMCA is often used by copyright owners to get infringing content - images, text, videos, music, even software - removed from problematic websites. more

Federal Data Crisis: Unreliable Federal Databases are Destroying Opportunities for Small Businesses

Databases are the infrastructure of the modern administrative state and data is its lifeblood. When the data is contaminated with errors, federal agencies have difficulty performing even the most basic administrative functions such as managing its inventory of office space and protecting the personally identifiable information (PII) of social security number holders. The federal dissemination of unreliable data doesn't just waste money; it undermines public trust in government and leaves it unmanageable. more

Which Way Does Your Data Flow?

Data may be moving to the cloud, but understanding the physical geography underlying the cloud is becoming increasingly critical. October's decision by the European Court of Justice, striking down key portions of the Safe Harbor rules that some companies had relied on to legally transfer personal data between Europe and the U.S., was only the latest example of the regulatory uncertainty involved in cross-border data flows. While Internet companies have begun to address challenges at the static geographic points where data is resident, understanding the actual paths that data travels is an important and sometimes overlooked part of the compliance analysis. more

Cheers! Registries and Registrars Doing the Right Thing by Patients

Domain name registration is a hot industry. Registrars represent a growing multi-billion dollar industry with the keys to the Internet for any organization hoping to have a web presence. Further, because of their role as one of the gatekeepers to the Internet, registrars have the unique ability and are often asked to take action against illegal activity online. This fact was highlighted in the report released this week by the Office of the U.S. Trade Representative, the 2015 Out-of-Cycle Notorious Markets List. more

Encryption = good : Backdoor = bad

Every time there is a tragic attack on people or property, there is a cry from various authorities or politicians for law enforcement to get unfettered access to all kinds of communication tools. But that would cause far more harm than good, and is a really bad idea. The argument goes something like this: 'These bad actors hide behind encrypted communications to plan their evil deeds...' more

Zero Rating, a Poisoned Chalice for the Developing World

A very Interesting meeting The Internet Governance Forum (IGF) with an ambitious theme of connecting the worlds next billion people to the Internet took place in early November 2015 in a beautiful resort city of João Pessoa in Brazil under the auspice of the United Nations. Few citizens of the world paid attention to it yet the repercussions of the policy issues discussed affect us all. more