Law

Law / Featured Blogs

WCIT Denouement

It is midnight in Dubai and I am listening to the final readings of the International Telecommunication Regulations (ITR). This instrument is the final output of two weeks of negotiations at the World Conference on International Telecommunication (WCIT), a gathering of the world's nations to update the the ITRs. The Chair goes through the document article by article, section by section, and with each passing "thank you", this Conference draws to a close. Many in the room are elated.

Cyber Security: A Duty to Care?

Yesterday, in my post on three new threats in one day, I posed the question whether it was necessary to develop regulations that would set a minimum standard on cyber security for devices that connect to the Internet. I'm having second thoughts here, which I'll explain in this post, but also try to look at a way forward and ask you to engage.

Sovereignty and the Geography of Cyberspace

The cross-border nature of the Internet challenges an international system based on separate national jurisdictions. Unfortunately, discussions among governments on this growing tension easily spiral into ideological infighting about the application of sovereignty. Early November however, 1600 participants from 100 countries gathered for the 7th annual Internet Governance Forum (IGF)... Several sessions showed that it is possible to address the relations between the Internet and sovereignty in a responsible manner.

Why the Republican Policy Brief on Copyright Should Have Been Withdrawn

On November 16, the Republican Study Committee, a caucus of conservative Republican members of the U.S. House of Representatives, inadvertently released a policy brief entitled "Three Myths About Copyright Law" which was quickly withdrawn. Of course, as a work of the U.S. government, this document does not itself enjoy copyright protection, so it is widely available on the internet through groups like The Internet Archive project.

Why Vint Cerf is Wrong

At the Internet Governance Forum in Baku, I made an intervention on behalf of NL IGF, reporting on the recommendations given by the participants of Workshop 87... I concluded that more regulatory and law enforcement bodies need to become part of the IGF discussions, as they are an integral part of governing the Internet from a safety and security perspective. Mr. Cerf responded with a one-liner: "I can't help observing, if we keep the regulatories confused, maybe they will leave us alone".

ICANN’s 11th-Hour Domain Name Trademark Policy Negotiations: The Good, The Bad, and The Ugly

ICANN organized a meeting on 15-16 November 2012 in Los Angeles, the Trademark Clearinghouse policy negotiations... I participated on behalf of noncommercial users in the policy meeting in person in LA on 15 November, and then for part of the discussion on 16 November via telephone. Here is my personal evaluation of the meeting and my initial reactions to the output of the meeting pending further discussion with the NCSG Policy Committee.

... and still we are left wanting: Malta’s White Paper on Digital Rights

Last month, the Government of Malta published a White Paper for public consultation, proposing the introduction of four so-called "digital rights" in the Constitution of Malta. The proposal is indeed a step in the right direction but lacks punch where it matters most. While the government's efforts are commendable, the White Paper is riddled with misconceptions and does not go far enough.

FISMA Failings: Could EPA’s IT Defense Deficiencies Silence the Agency?

The possibility of unauthorized access to EPA information raises an array of concerns since EPA-held data includes various types of Confidential Business Information, scientific research data, environmental databases, agency plans for responding to "incidents of national significance" and other security-related matters, and environmental monitoring data used in regulatory enforcement actions.

INET New York: Open Forum of the Copyright Alert System - Thursday 11/15

The Copyright Alert System, the result of a deal between big content and big ISPs, is a graduated response program - popularly known as the six strikes - that escalates from nastygrams, to copyright school, to Internet throttling. Just like SOPA/PIPA, enforcement targets will be arbitrarily selected by the content owners, but unlike SOPA/PIPA there will be no appeal via the courts - only to an arbitration firm hired by the program.

LegitScript to Release Monthly Data on Rogue Internet Pharmacy Registrar Clustering

One of the most important debates in the realm of Internet governance pertains to when, how and how much voluntary action registrars can and should take to prevent the use of their registration platforms in furtherance of criminal activity. In the Internet pharmacy world, the trend over the past four years has been unmistakable: A growing number of registrars worldwide, large and small, recognize the value of prohibiting the use of their registration services...