Law

Law / Most Viewed

Time for Outrage! (continued)

When the scale of global surveillance carried out by the NSA (USA) and by the GCHQ (UK) was exposed by Edward Snowden through The Guardian, people around the world were shocked to discover how two established democracies routinely resort to methods that they have long deplored -- and rightly so -- in dictatorships, theocracies and other single-party arrangements. In a previous article, I lamented the fact that by carrying out this surveillance on an unprecedented scale, the US and the UK are, in fact, converging with the very regimes they criticize. more

ccTLDs Might Be Property

The long-running saga of victims who are pursuing 'state sponsors of terrorism' via ICANN has taken yet another turn. Some time back the Plaintiffs in Rubin & ors -v- Islamic Republic of Iran & ors managed to obtain Writs of Attachment in the Federal court district in Washington (D.C.) courts ordering that the ccTLDs of those respective countries be seized in part-payment of the damages they are owed. ICANN, fairly predictably, became involved at this point. more

Turkish Parliament Approves Internet Bill, Lets Government Block Websites, Seize Personal Data

Turkey's Parliament has passed a bill that includes controversial arrangements concerning the protection of online privacy despite concerns raised by the European Union as well as Turkish NGOs and opposition parties, according to a report today by Turkey's Daily News. more

Benefits and Challenges of Multiple Domain Names in a Single UDRP Complaint

How many domain names can be included in a single complaint under the Uniform Domain Name Dispute Resolution Policy (UDRP)? Neither the UDRP policy nor its corresponding rules directly address this issue, although the rules state that a "complaint may relate to more than one domain name, provided that the domain names are registered by the same domain-name holder." more

The Truth About Supplemental Filings in UDRP Cases

A typical proceeding under the Uniform Domain Name Dispute Resolution Policy (UDRP) consists of a complaint and, sometimes, a response. UDRP Rule 12 makes clear that "further statements or documents from either of the Parties" are appropriate only if "the Panel... request[s], in its sole discretion." In practice, however, such supplemental or additional filings are not uncommon, with the leading UDRP service providers - WIPO and the Forum - issuing guidance about when they may be appropriate. more

Ron Paul Caught in Domain Dispute with Supporters

Former U.S. presidential candidate and congressman Rob Paul has filed a complaint with the World Intellectual Property Organization against the registrants of RonPaul.com and RonPaul.org in order to gain control of the domains. more

Certifying to Merit and Proper Purpose in Alleging and Defending Cybersquatting Claims

Parties to a UDRP proceeding must include a certification similar in U.S. practice to Rule 11 of the Federal Rules of Civil Procedure (and undoubtedly a feature in procedural codes in other judicial jurisdictions) "that the information contained in this [Complaint or Response] is to the best of [Complainant's or Respondent's] knowledge complete and accurate, that this [Complaint or Response] is not being presented for any improper purpose, such as to harass... more

Holding Trump Accountable Under Public International Law

Trump and his enablers are well known to disrespect if not disdain legal systems, including public international law. He has effectively abrogated every treaty instrument relating to international communications at the whim of a tweet. His behavior has dishonoured the USA in a way that will take years to remedy. Trump's actions to ban access to Android Operating System updates on Chinese products have significantly harmed cybersecurity worldwide. more

What is a Security Mechanism?

Orin Kerr recently blogged about a 9th Circuit decision that held that scraping a public web site (probably) doesn't violate the Computer Fraud and Abuse Act (CFAA)... On its surface, it makes sense – you can't steal something that's public – but I think the simplicity of the rule is hiding some profound questions. One, I believe, can most easily be expressed as "what is the cost of the 'attack'"? That is, how much effort must someone expend to get the data? Does that matter? Should it? more

Competing Processes Obfuscate Internet Policy-Making in India

Net Neutrality has become a hot topic in India, following a brief but high-profile national debate instigated by a consultation paper from the Telecom Regulatory Authority of India (TRAI) that solicited views on what net neutrality is, and whether regulations protecting it are needed in India. The paper also hinted at possible regulation of all kinds of online services (like Skype, Uber, or Google) in the future. But no-one could have predicted what happened next... more

ICANN Terminates EstDomains, Seeks Bulk Transfer of Customers

In follow up to reports on ICANN's termination of notorious domain name registrar, EstDomains due to fraudulent activities, the Internet oversight agency is now preparing to transfer domain names of its customers to other registrars... However the question asked by experts is whether any other registrar would have an interest in inheriting EstDomains questionable domain names. more

Privacy Polls v. Real-World Trade-Offs

A recent telephone poll conducted by professors at Berkeley and the University of Pennsylvania concluded, "Contrary to what many marketers claim, most adult Americans (66%) do not want marketers to tailor advertisements to their interest." The study's authors claim that their poll is the "the first nationally representative telephone (wireline and cell phone) survey to explore Americans' opinions about behavioral targeting by marketers." ... But what is most surprising about this poll is not that 66% of users said they do not want tailored online ads, but that 34% of users said they did! more

The Hague to Probe Cyberwarfare Under Existing International Law

In a recent article published by WIRED Magazine, a significant shift in international law regarding cyberwarfare has been brought to light. The International Criminal Court (ICC) at the Hague has signaled its intention to investigate and prosecute hacking crimes that breach existing international law without the need for new regulations. more

GDPR Fine Enough or More Disclosure?

The UK cares about its citizens' privacy to the tune of a $229 million (US) fine of British Airways for a breach that disclosed information of approximately half a million customers. It's exciting -- a significant fine for a significant loss of data. I think GDPR will lead to improved security of information systems as companies scramble to avoid onerous fines and start to demand more from those who provide information security services and products. more

OPTA revokes Diginotar License as TTP

Wout de Natris: "In this decision OPTA revokes the registration of Diginotar as a so called Trusted Third Party. Diginotar issued certified certificates for digital signatures. The security breach by Iranian hackers over the summer, which Diginotar did not report to the authorities, lead to severe credibility issues for all Diginotar certificates issued before. This included Dutch government websites, but also led to severe breaches of privacy for Iranian end users, in multiple countries. As a result of OPTA's decision all certificates issued by Diginotar have to be revoked, while at the same she is forbidden to issue new ones. more