e360 initially filed suit against Comcast early in 2008. They asserted a number of things, including that Comcast was fraudulently returning "user unknown" notices and that they were certified by ReturnPath. Comcast filed a countersuit alleging violations of CAN SPAM, violations of the computer fraud and abuse act, as well as a number of other things including abuse of process. In April of 2008 the judge ruled in favor of Comcast and dismissed e360's case, while allowing the countersuit to proceed. more
For those who follow the issue of blocking illegal content from the Internet, there is an interesting development in relation to this issue here in Germany, and I will tell you a little about it. One way to make it difficult to access illegal content is to block it directly in the DNS. But what is DNS for? Basically, it serves to translate the domain name into the IP of the server that is hosting the content. By blocking directly at the DNS level, a query to a domain will no longer bring the server's IP number, and with that, the user no longer accesses that content. more
In June, I attended the St. Petersburg International Economic Forum ("SPIEF"), organized by the Russian government's Ministry of Economic Development. This was a major event drawing thousands of participants to St. Petersburg... I participated on a panel entitled "Can IP Be Protected in the Internet Age?" Right away, I trust many of you find the titling odd... more
Schneier's insight is considered particularly important according to EFF, as more and more is learnt "about the unconstitutional surveillance programs from the National Security Agency and the depth and breadth of data the NSA is collecting on the public." more
Something bad happens online. I can tie that something-bad back to an IP address. Do I know who did the bad thing? According to the Federal District Court in Arizona, I don't. An IP address may identify the owner of an Internet access account; it does not identify who was online at that particular time and who may be responsible for the actions in question. In Breaking Glass Pictures v Does, DAZ 2013, Plaintiff brought a claim for copyright infringement, wants early discovery, but the court is refusing. more
Cybersecurity regulation is coming. Whether regulations intended to enhance critical infrastructure protection will be based on existing statutory authority, new legislation, an Executive Order or a combination of legal authorities, however, is still unknown. Other aspects of the coming federal oversight of critical infrastructure cybersecurity that remain undetermined include the extent to which governance system will include voluntary characteristics and the time frame for initiation of new cybersecurity regulation. more
In 2019 under the aegis of the Internet Governance Forum, a pilot project was conducted into the causes of and solutions for the, in general, slow deployment of internet security standards. Standards that on mass deployment make the Internet and all its users safer, indiscriminately, immediately... Recently the report 'Setting the standard. For a more Secure and Trustworthy Internet. The Identification of Pressure Points in Society to Speed up Internet Standards Deployment', was published on the IGF website. more
There is a misconception among some trademark owners and their counsel that passive holding of domain names alone or combined with lack of rights or legitimate interests supports abusive registration. Thus, Respondent's inactive use of the disputed domain name demonstrates bad faith. Respondent also had actual knowledge of Complainant's YOU ASKED FOR IT mark as Complainant has attempted to buy the domain from Respondent... more
This case had a bit of a weird result -- even though the brand owner had a mark that was 20 years old, and the alleged cybersquatter, in the meantime, acquired a domain name on the open market identical to that mark, because the domain name was first registered (by an unrelated party) before the brand owner's trademark rights arose, there was no relief under federal trademark law. more
Given the number of awards endlessly arriving from Panels appointed to decide cybersquatting disputes under the Uniform Domain Name Dispute Resolution Policy (UDRP) (ten to fifteen published daily), the sum total of grievants filing de novo challenges under the Anticybersquatting Consumer Protect Act (ACPA) is remarkably small -- one or two at most in any single year; and those rarely proceeding to summary judgment or trial. more
Like many of you, I am keenly following the Comcast-Level 3 dispute and am trying to make sense of it all. The dispute confirms several universal principles about Internet traffic routing that have passed the test of time. ... Consumers pay Internet Service Providers ("ISPs") a monthly subscription with the expectation that the fee covers access to available content, i.e., the conduit. As the World Wide Web evolves and content options diversify to include full motion video, consumers simply expect their ISPs to make sure the download distribution pipes are sufficiently robust to handle high bandwidth requirements and commensurately large monthly download volume. more
Trademark owners in the U.S. have a choice in suing for alleged cybersquatting: either the Uniform Domain Name Dispute Resolution Policy (UDRP) or the Anticybersquatting Consumer Protection Act (ACPA). Of the two, the UDRP is far and away the forum of choice for a very good reason: it is speedy, efficient, and inexpensive. Complaint to award can be concluded in less than 45 days. more
I've been having arguments about Network Neutrality with a lawyer. My position is that you can't adequately regulate ISPs to be neutral, because there's no agreement what "neutral" means in practice. He points out that the courts aren't interested in technical details like what packets are dropped, it's that all traffic has to be treated the same, and ISPs should just figure out how to do that. So I contemplated a city with Plumbing Neutrality with the simple rule that all people must be treated the same... more
A fabled, serial cybersquatter of the early Internet argued that typographical errors in domain names were not cybersquatting at all because they had their own distinct identities. Moreover, "I have" (he argued) "just as much right to own the [misspelled] Domain Names as the person who owns the correct spelling of [a] domain name." That dispute involved and <wallstreet journel.com>. Dow Jones & Company, Inc. and Dow Jones LP v. John Zuccarini, D2000-0578 (WIPO September 10, 2000). more
There is an urgent need to clarify the GDPR's territorial scope. Of the many changes the GDPR will usher in this May, the expansion of EU privacy law's territorial scope is one of the most important. The GDPR provides for broad application of its provisions both within the EU and globally. But the fact that the GDPR has a broad territorial scope does not mean that every company, or all data processing activities, are subject to it. more