Law

Law / Most Commented

How to Stop the Spread of Malware? A Call for Action

On Webwereld an article was published following a new Kaspersky malware report Q1-2013. Nothing new was mentioned here. The Netherlands remains the number 3 as far as sending malware from Dutch servers is concerned. At the same time Kaspersky writes that The Netherlands is one of the most safe countries as far as infections go. So what is going on here? more

ICANN at the Inflection Point: Implications and Effects Of the GAC Beijing Communique

Although this article was first published just a few days ago, on May 8th, there have been several important intervening developments. First, on May 10th ICANN released a News Alert on "NGPC Progress on GAC Advice" that provides a timetable for how the New gTLD program Committee will deal with the GAC Communique. Of particular note is that, as the last action in an initial phase consisting of "actions for soliciting input from Applicants and from the Community', the NGPC will begin to "Review and consider Applicant responses to GAC Advice and Public Comments on how Board should respond to GAC Advice... more

Much Ado About Nothing

With much fanfare last month, Uniregistry announced that proposals for dispute resolution between New TLD applicants in lieu of ICANN's so-called "Auction of Last Resort" posed significant antitrust risks. Their claim of concern was not based on any critical antitrust analysis, but rather on the fact that they had sought a "Business Review" letter from the Antitrust Division of the U.S. Department of Justice (DOJ), and, according to Uniregistry, the DOJ failed to provide them a positive response and discussed the issue with them. more

Thinking Carefully About New gTLD Objections: Community (3 of 4)

My third installment regarding gTLD objections - and understanding exactly what's required for an objector to prevail - moves to the more complex community-based objections. For those getting their first exposure to this unwieldy beast, pull up a chair and get comfortable. The community objection involves multifaceted elements, each having its own set of defining factors and often using similar terminology in different contexts. As such, it can be very confusing and one can easily lose track of the bigger picture. more

Pandora’s Box - New US Cyber Security Bills Create a Worm Hole in the Internet Galaxy

There are two Bills that are floating through the corridors of power on the Hill that could potentially change the course of civil and political rights within the United States and the world. One was introduced through the House of Representatives and the other through the Senate. The two Bills touch on a common thread that are premised on "national security" however there are interesting challenges that will surface should the Bills be passed that affect global public interest that require further examination, introspection and discussion. more

Why the Republican Policy Brief on Copyright Should Have Been Withdrawn

On November 16, the Republican Study Committee, a caucus of conservative Republican members of the U.S. House of Representatives, inadvertently released a policy brief entitled "Three Myths About Copyright Law" which was quickly withdrawn. Of course, as a work of the U.S. government, this document does not itself enjoy copyright protection, so it is widely available on the internet through groups like The Internet Archive project. more

FISMA Failings: Could EPA’s IT Defense Deficiencies Silence the Agency?

The possibility of unauthorized access to EPA information raises an array of concerns since EPA-held data includes various types of Confidential Business Information, scientific research data, environmental databases, agency plans for responding to "incidents of national significance" and other security-related matters, and environmental monitoring data used in regulatory enforcement actions. more

Report On National Online Cybercrime and Online Threats Reporting Centres

Today I released a report on 'National cyber crime and online threats reporting centres. A study into national and international cooperation'. Mitigating online threats and the subsequent enforcing of violations of laws often involves many different organisations and countries. Many countries are presently engaged in erecting national centres aimed at reporting cyber crime, spam or botnet mitigation. more

Problems With Defining Jurisdiction on the Internet

The term "jurisdiction" has various definitions in law, but for our purposes here we can say it is the power of some legal body to exercise its authority over a person or subject matter or territory. In the Internet today, it is territory that gives rise to many major issues. As in real estate, what matters in jurisdiction is "location, location, location". When the Internet and trademark rights began to intersect, it quickly became apparent that traditional concepts of the jurisdiction of courts and legislatures would be seriously strained by situations where a registrant in one country could use a registrar in a second country to register a domain name in yet a third country. more

2011 UDRP Filings Up at WIPO, Down at NAF - And Still Infinitesimal

The World Intellectual Property Organization (WIPO) recently issued a detailed press release regarding Uniform Dispute Resolution Policy (UDRP) cases for which it provided arbitration services in 2011 and, once again, the number of WIPO filings was up. According to WIPO: "In 2011, trademark holders filed a record 2,764 cybersquatting cases covering 4,781 domain names with the WIPO Arbitration and Mediation Center (WIPO Center) under procedures based on the Uniform Domain Name Dispute Resolution Policy (UDRP), an increase of 2.5% and 9.4% over the previous highest levels in 2010 and 2009, respectively." Yet that's an incomplete picture. more

News International Caught Deleting Email Evidence

Knowing how long to store your company email can be confusing. For some industries and public companies there are laws dictating how long emails should be kept, but for other companies it is more discretionary. A document retention policy can help with this. Deciding which emails to keep and for how long - and then most importantly, sticking to your policy - will be looked on more favourably should you find yourself justifying missing email evidence to a judge. more

All Quiet on the Virtual Front: Why Domain Investors’ Fear of the Feds is Irrational

When a sniper ends the life of soldier Paul Bäumer in Remarque's "All Quiet on the Western Front," a laconic situation report from the frontlines recounts an unusually quiet day. In the grand scheme of things, nothing worth reporting has happened. Reading David Kravets' recent article in Wired brought this upsetting ending to mind. U.S. authorities taking down individual domains based on copyright infringement charges is the online equivalent of Remarque's allied snipers: picking off the occasional domain - for better or worse - has little effect on the overall situation. more

MegaBust’s MegaQuestions Cloud the Net’s Future

Mid-January 2012 marked a major inflection point for digital copyright policy in the United States... Yet no one involved with Congressional interaction on either side of the issue believes it has been sidetracked for long, and "Hollywood" and "Silicon Valley" are both plotting their next moves in this high-stakes game to further define the responsibilities and potential liabilities... The resolution of this dispute will determine the ability of Internet services to move to "the cloud"... more

DNS Policy is Hop by Hop; DNS Security is End to End

The debate continues as to whether ISP's can effectively filter DNS results in order to protect brand and copyright holders from online infringement. It's noteworthy that there is no argument as to whether these rights holders and their properties deserve protection - nobody is saying "content wants to be free" and there is general agreement that it is harder to protect rights in the Internet era where perfect copies of can be made and distributed instantaneously. What we're debating now is just whether controlling DNS at the ISP level would work at all and whether the attempt to insert such controls would damage Secure DNS (sometimes called DNSSEC). more

Court OKs Private Seizure of Domain Names That Allegedly Sold Counterfeit Goods

Luxury brand Chanel has engaged in a fierce campaign against counterfeit websites in federal court in Nevada. It has seized approximately six hundred domain names in the last few months, reports Venkat Balasubramani. "I'm sympathetic to the "whack-a-mole" problem rights owners face, but this relief is just extraordinarily broad and is on shaky procedural grounds." more