Law

Law / Most Commented

Managing (in)Security Through Regulation: A Key Phase for Nation States

Not so long ago, the notion of introducing laws and other regulatory responses to address cyber security issues was regarded with significant hesitation by governments and policy makers. To some extent, this hesitation may well have stemmed from a general perception by those who do not work directly in the field that the world of cyber security is somewhat of a 'dark art'. More recently, however, there has been a substantial shift in this attitude, with proposals to regulate a range of cyber security related matters becoming increasingly numerous. more

Is Sharing the Answer to .BRAND Top Level Domain Disputes?

In opening up for the .BRAND top level domain, ICANN has artificially created a scarce resource of great commercial value. Indeed, the values of the .BRAND TLDs may be astronomical due to the investments made by the companies that own the trademarks represented in the .BRAND TLD. While the above is interesting in its own right, I will here focus specifically on how we deal with situations where more than one company has a legitimate trademark interest in a particular .BRAND TLD. more

Live Streaming Apps: Piracy Trends Are-A-Changing

Until recently, digital pirates have used both P2P sites and cyberlockers to upload and share pirated content. But as Internet connection speeds have increased, the piracy landscape has changed, and the appearance of streaming content has proliferated. In fact, 38% of online sporting fans are watching live streaming of their favorite events. However, the recent introduction of live streaming apps is further compounding issues surrounding online piracy... more

ICANN Asks U.S. Federal Trade Commission Whether .SUCK is Violating Any Laws

Allen Grogan, ICANN's Chief Contract Compliance Officer, has written a blog post today concerning a formal letter it has received asking the agency to halt the rollout of .SUCKS, a new gTLD operated by Vox Populi Registry Inc. As it stands, a ruling against Vox Populi by ICANN could result in federal prosecution or other legal action, according to ICANN officials. more

Is ICANN’s .IR Response at Odds with the ACPA and ICE Domain Seizures?

An initial review of ICANN's response to litigation seeking it to turn over control of the ccTLDs of Iran, Syria and North Korea led to the conclusion that it had opened a "legal can of worms". A few more just wriggled out, and they threaten the basic assumption that underlies the U.S. statute governing cybersquatting and the practices engaged in by Federal officials seizing domain names engaged in intellectual property infringement. more

Inter Mundos: ICANN’s Accountability is a Matter of Human Rights

The debate over the IANA Functions transitions has captivated the minds of all stakeholders. The U.S. Commerce Department's National Telecommunications and Information Administration (NTIA) has announced that they intend to transition key Internet domain name functions to the global multistakeholder community. Thus, we find ourselves in the midst of a transition between worlds. All stakeholders are pondering the following questions: what should be the appropriate transition? What should be our goal? more

UDRP Failure Endangers Consumers

Yesterday I participated in a panel at the International Consumer Product Safety Conference sponsored by the International Consumer Product Health and Safety Organization (ICPHSO) held at the European Commission in Brussels Belgium. This conference brings together the global community of product safety engineers, manufacturers, retailers, regulators, inspectors, and counterfeiting investigators. The role of online fraud and illicit product traffic is clearly one of the conference priorities. more

Net Neutrality’s Legal Binary: An Either/Or With No “Third Way”

People working on net neutrality wish for a "third way" — a clever compromise giving us both network neutrality and no blowback from AT&T;, Verizon, Comcast and others. That dream is delusional because the carriers will oppose network neutrality in any real form; they want paid fast lanes. They have expressed particular opposition to "Title II" of the Communications Act — something telecom lawyers mention the same way normal people might reference the First or Second Amendments. Title II is the one essential law to ban paid fast lanes. more

Outcome from NETMundial Meeting in Brazil Largely Seen as Positive for Business

Last Month at the NETMundial meeting in Brazil, representatives from governments, private sector, civil society, the technical community and academia met to debate the key principles on which the Internet should evolve. The meeting culminated in a supporting the principles of a decentralized and multistakeholder (ie: non-governmental) driven Internet ecosystem, committed to principles of openness, fairness, accessibility, security and safety. more

Domains Locked in London Police Takedown Ordered to Be Transferred

The National Arbitration Forum has just handed down its decision in respect to the three domain names locked down at Public Domain Registry in response to the City of London Police Intellectual Property Crime Unit takedown requests. The decision is in favour of easyDNS and orders the three names to be transferred to us. more

Anti-Consumer ICANN Can Not be Trusted To Protect Domain Registrants’ Property Interests

Domain name registrants who purchase a name in any of the present or pending generic (gTLD) top level domains should think twice before entrusting a domain name property interest to ICANN, even though ICANN levies a money tariff on each domain registration. ICANN has no policy language that indemnifies domain name registrants. ICANN language does not even contemplate the possibility of domain theft by an ICANN registrar. more

In Which We Consider the Meaning of ‘Authorized’: GIVAUDAN FRAGRANCES CORPORATION v. Krivda

What does authorized access mean? If an employee with authorized access to a computer system goes into that system, downloads company secrets, and hands that information over to the company's competitor, did that alleged misappropriation of company information constitute unauthorized access? This is no small question. If the access is unauthorized, the employee potentially violated the Computer Fraud and Abuse Act (CFAA) (the CFAA contains both criminal and civil causes of action). But courts get uncomfortable here. more

Bruce Schneier: Government and Industry Have Betrayed the Internet, and Us

Bruce Schneier in an op-ed piece published in the Guardian on Thursday writes: "Government and industry have betrayed the internet, and us. By subverting the internet at every level to make it a vast, multi-layered and robust surveillance platform, the NSA has undermined a fundamental social contract..." more

Time for Outrage! (continued)

When the scale of global surveillance carried out by the NSA (USA) and by the GCHQ (UK) was exposed by Edward Snowden through The Guardian, people around the world were shocked to discover how two established democracies routinely resort to methods that they have long deplored -- and rightly so -- in dictatorships, theocracies and other single-party arrangements. In a previous article, I lamented the fact that by carrying out this surveillance on an unprecedented scale, the US and the UK are, in fact, converging with the very regimes they criticize. more

Renowned Security Expert Bruce Schneier Joins EFF Board of Directors

Schneier's insight is considered particularly important according to EFF, as more and more is learnt "about the unconstitutional surveillance programs from the National Security Agency and the depth and breadth of data the NSA is collecting on the public." more