Law

Law / Most Viewed

Spam Filtering and Social Media Moderation Are the Same Thing

CDA Section 230 has been called "The 26 Words that Created the Internet". While it is obvious how Sec 230 protects the World Wide Web, it is equally important for e-mail. A recent Pennsylvania court case emphasizes this point. Dr. Thomas, a professor at the University of Pennsylvania, forwarded an article about another professor Dr. Monge to an online e-mail discussion list. Dr. Monge claimed the article was defamatory and sued Dr. Thomas, the university, and many others. more

FCC’s Genachowski Promises He’s Not Out to Regulate Net, New Media

We learned from The Wall Street Journal yesterday that "Federal Communications Commission Chairman Julius Genachowski gets a little peeved when people suggests that he wants to regulate the Internet." He told a group of Journal reporters and editors today that: "I don't see any circumstances where we'd take steps to regulate the Internet itself," and "I've been clear repeatedly that we're not going to regulate the Internet." We're thankful to hear Chairman Julius Genachowski to make that promise. We'll certainly hold him to it. But you will pardon us if we remain skeptical... more

The Impact of Reverse Domain Name Hijacking on Supplemental Filings in UDRP Cases

In another blog post, I wrote about the sometimes confusing circumstances in which domain name dispute panelists will consider supplemental, or additional, filings from the parties (in addition to a complaint and response) in cases under the Uniform Domain Name Dispute Resolution Policy (UDRP). I quoted the WIPO Overview, which states, in part, that supplemental filings may be appropriate where a party can "show its relevance to the case and why it was unable to provide that information in the complaint or response." more

Closing the Gaps: The Quest for a Secure Internet

Over the last year the world has been virtually buried under news items describing hacks, insecure websites, servers and scada systems, etc. Each and every time people seem to be amazed and exclaim "How is this possible?" Politicians ask questions, there is a short lived uproar and soon after the world continues its business as usual. Till the next incident. In this blog post I take a step back and try to look at the cyber security issue from this angle... more

ICANN Must Release the Single-Character .com Hostages from the IANA Impostor’s Warehouse

Most of the single-character .com labels were initially registered in 1993 by Dr. Jon Postel while performing work pursuant to a contract with, and funded by, the U.S. government and are currently assigned to a "shell registrar" created and controlled by ICANN. This shell - which is the 376th entry on ICANN's list of accredited registrars - is misleadingly identified as the IANA registrar while being engaged in the illicit warehousing of domain names for speculative purposes. more

Balancing Rights: Mark Owners, Emergent Businesses, and Investors

Is there any act more primary than naming? It comes before all else and makes possible what follows. For the most part, names are drawn from cultural assets: collections of words, geographic locations, family names, etc. They can be valuable, which is why they are guarded, protected, and hoarded. The balancing of rights among those competing for names is a deliberate feature of the Uniform Domain Name Dispute Resolution Policy (UDRP). more

I Needed Music ‘cos I Had None…

The latest report on young people's online music-finding habits from consumer research company The Leading Question has attracted a fair amount of coverage for its headline finding that UK teenagers use of filesharing services has dropped by a third... Music industry pollsters will inevitably look for a silver lining in the cloud of consumer behaviour, and a focus on the growth of legal services is to be expected. But even with that caveat in mind, there has clearly been a shift in behaviour as more young people find licensed ways to listen to the music they want, watching YouTube videos, streaming songs through MySpace and Spotify and generally using legal avenues to find and enjoy the music of new bands like Florence and the Machine. more

What is the Intellectual Property Constituency (IPC)?

As a longtime member of ICANN's Intellectual Property Constituency (IPC), I'm impressed by the important work that this group does on behalf of trademark owners worldwide (as I've written before). While some die-hard IPC members spend countless (and, often, thankless) hours working virtually and in-person (at ICANN's global meetings) for the constituency, I find it very educational and worthwhile to participate on an ad-hoc basis. more

Law as Unusual: Quantum Computing’s Five-Dimensional Challenge to the Legal Establishment

Quantum computers are coming, and the American Bar Association's SciTech section is beginning to consider the legal implications. This raises the question, will the legal profession be able to adopt emerging quantum technologies on a tech-business as a usual basis? Or will the developments flowing from quantum mechanical theory present a categorical challenge to the legal-industrial complex? more

Nominet/SOCA Cyber Crime Proposal: Allow Cross Border Reactions

Reading the policy proposal of Nominet, I get the feeling that something is overseen here. Putting all the jurisdictional hassle aside for a moment, cyber crime is international, cross-border. So what happens if a UK domain is used for criminal activity outside the UK only? more

White House on SOPA: Protecting Intellectual Property Must Not Threaten Open, Innovative Internet

The White House today released a response to SOPA and PIPA petitions and the legislative approaches to combat online piracy. The response is prepared by Victoria Espinel, Intellectual Property Enforcement Coordinator at Office of Management and Budget, Aneesh Chopra, U.S. Chief Technology Officer, and Howard Schmidt, Special Assistant to the President and Cybersecurity Coordinator for National Security Staff. more

Masking Identity with Proxy/Privacy Services

No censure attaches to having domain names registered by proxy/privacy services. However, while the practice has become routine for protecting privacy and sensitive information, registering in the name of a proxy is still taken into account in assessing intention, and even circumstantial evidence without contradiction or explanation can tip the scale in complainant's favor. more

EU Ruling on Google Ad Keywords: Implications for Brand Owners

In a landmark judgment issued this past Tuesday, the European Court of Justice (ECJ) ruled that Google is not liable for trademark infringement when an advertiser purchases a keyword based on a competitor's trademark to trigger a search ad, so long as it removes infringing ads promptly when notified by brand owners. However, and this is critical, individual advertisers could be held liable if ads triggered by a keyword involving a competitor's trademark are found to confuse consumers. So, what qualifies as consumer confusion? more

Domains Locked in London Police Takedown Ordered to Be Transferred

The National Arbitration Forum has just handed down its decision in respect to the three domain names locked down at Public Domain Registry in response to the City of London Police Intellectual Property Crime Unit takedown requests. The decision is in favour of easyDNS and orders the three names to be transferred to us. more

U.S. Department of Justice Demands IP Addresses, Other Details on Visitors to Trump Resistance Site

The Los Angeles-based hosting company, DreamHost on Monday revealed that for the past several months it has been dealing with a search warrant from the Department of Justice pertaining to a website used to organize protests against President Trump. more