Law

Law / Most Viewed

Cost-Effectiveness: The Prerequisite for Cybersecurity Regulation

Cybersecurity regulation is coming. Whether regulations intended to enhance critical infrastructure protection will be based on existing statutory authority, new legislation, an Executive Order or a combination of legal authorities, however, is still unknown. Other aspects of the coming federal oversight of critical infrastructure cybersecurity that remain undetermined include the extent to which governance system will include voluntary characteristics and the time frame for initiation of new cybersecurity regulation. more

ICANN Sends Termination Notice to Registrar

ICANN has sent EstDomains a termination notice: "BBe advised that the Internet Corporation for Assigned Names and Numbers (ICANN) Registrar Accreditation Agreement (RAA) for EstDomains, Inc. (customer No. 919, IANA No. 943) is terminated..." more

Prudential Settlements for Alleged Cybersquatting/Reverse Domain Name Hijacking Under the ACPA

Given the number of awards endlessly arriving from Panels appointed to decide cybersquatting disputes under the Uniform Domain Name Dispute Resolution Policy (UDRP) (ten to fifteen published daily), the sum total of grievants filing de novo challenges under the Anticybersquatting Consumer Protect Act (ACPA) is remarkably small -- one or two at most in any single year; and those rarely proceeding to summary judgment or trial. more

Passive Holding of Domain Names and the Argument for Bad Faith or Forfeiture

There is a misconception among some trademark owners and their counsel that passive holding of domain names alone or combined with lack of rights or legitimate interests supports abusive registration. Thus, Respondent's inactive use of the disputed domain name demonstrates bad faith. Respondent also had actual knowledge of Complainant's YOU ASKED FOR IT mark as Complainant has attempted to buy the domain from Respondent... more

No Free Lunch in Internet Peering or Transit

Like many of you, I am keenly following the Comcast-Level 3 dispute and am trying to make sense of it all. The dispute confirms several universal principles about Internet traffic routing that have passed the test of time. ... Consumers pay Internet Service Providers ("ISPs") a monthly subscription with the expectation that the fee covers access to available content, i.e., the conduit. As the World Wide Web evolves and content options diversify to include full motion video, consumers simply expect their ISPs to make sure the download distribution pipes are sufficiently robust to handle high bandwidth requirements and commensurately large monthly download volume. more

GDPR - Territorial Scope and the Need to Avoid Absurd and Inconsistent Results

There is an urgent need to clarify the GDPR's territorial scope. Of the many changes the GDPR will usher in this May, the expansion of EU privacy law's territorial scope is one of the most important. The GDPR provides for broad application of its provisions both within the EU and globally. But the fact that the GDPR has a broad territorial scope does not mean that every company, or all data processing activities, are subject to it. more

Prediction Methods for Crime

There's a new sheriff in town and he's riding the horse of "predictive policing". Back in July the Santa Cruz Police Department began deploying police officers to places where crime is likely to occur in the future -- making use of new predictive modeling programs that are designed to provide daily forecasts of crime hotspots -- thereby allowing the Department to preempt more serious crimes before they occurred. In essence, this is another physical-world application of machine learning and clustering technologies -- applied to preempting a criminal problem. In the cyber-world we've been applying these techniques for a number of years with great success. more

The Emergence and Consolidation of a Jurisprudence of Domain Names

One of the fallouts of disruptive inventions is the need for new laws to counter their unexpected consequences. As it concerned the Internet, these consequences included a new tort of registering domain names identical or confusingly similar to trademarks and service marks with the intention of taking unlawful advantage of rights owners. Prior to 2000 the only civil remedy for "cybersquatting" or "cyber piracy" was expensive and time-consuming plenary actions in courts of competent jurisdiction under national trademark laws. more

Cybersquatting and Reverse Domain Name Hijacking: UDRP to ACPA

Trademark owners in the U.S. have a choice in suing for alleged cybersquatting: either the Uniform Domain Name Dispute Resolution Policy (UDRP) or the Anticybersquatting Consumer Protection Act (ACPA). Of the two, the UDRP is far and away the forum of choice for a very good reason: it is speedy, efficient, and inexpensive. Complaint to award can be concluded in less than 45 days. more

Cyber Infringement of Trademarks by Typosquatting

A fabled, serial cybersquatter of the early Internet argued that typographical errors in domain names were not cybersquatting at all because they had their own distinct identities. Moreover, "I have" (he argued) "just as much right to own the [misspelled] Domain Names as the person who owns the correct spelling of [a] domain name." That dispute involved and <wallstreet journel.com>. Dow Jones & Company, Inc. and Dow Jones LP v. John Zuccarini, D2000-0578 (WIPO September 10, 2000). more

Plumbing Neutrality

I've been having arguments about Network Neutrality with a lawyer. My position is that you can't adequately regulate ISPs to be neutral, because there's no agreement what "neutral" means in practice. He points out that the courts aren't interested in technical details like what packets are dropped, it's that all traffic has to be treated the same, and ISPs should just figure out how to do that. So I contemplated a city with Plumbing Neutrality with the simple rule that all people must be treated the same... more

Valuing Trademarks in Domain Names

My new essay, "Valuing Trademarks in Domain Names," outlines the various approaches to valuing trademarks, pointing out the approaches’ different strengths and weaknesses, with emphasis on domain names. Using court cases, the essay points out that there is no one right way to value intangible assets but there are wrong ways. more

ICANN’s 11th-Hour Domain Name Trademark Policy Negotiations: The Good, The Bad, and The Ugly

ICANN organized a meeting on 15-16 November 2012 in Los Angeles, the Trademark Clearinghouse policy negotiations... I participated on behalf of noncommercial users in the policy meeting in person in LA on 15 November, and then for part of the discussion on 16 November via telephone. Here is my personal evaluation of the meeting and my initial reactions to the output of the meeting pending further discussion with the NCSG Policy Committee. more

Susan Crawford to the White House on Ada Lovelace Day

Just in time for Ada Lovelace Day comes the news that Susan Crawford (Wikipedia, CircleID) is headed to the White House as special assistant to the president for science, technology, and innovation policy... more

Tips to Protect Your Brand in the New Domain Name Marketplace

Over time, people have grown accustomed to most Web site addresses ending in .com, .edu or .gov. Yet a proposed expansion of the generic top-level domain (gTLD) space by the Internet Corporation for Assigned Names and Numbers (ICANN) will change the way we look at domain names forever... For businesses, this change means that protecting their trademarks and searching for and watching gTLDs will become increasingly complex. more