As I read through multiple postings covering the proposed Computer Fraud and Misuse Act, such as the ever-insightful writing of Rob Graham in his Obama's War on Hackers or the EFF's analysis, and the deluge of Facebook discussion threads where dozens of my security-minded friends shriek at the damage passing such an act would bring to our industry, I can't but help myself think that surely it's an early April Fools joke. more
In a landmark ruling, a U.S. federal court has agreed with the Internet Corporation for Assigned Names and Numbers (ICANN) that the country code Top-Level Domains (ccTLDs) are not property subject to attachment and thus overruled an attempt to seize Iran's, Syria's and North Korea's domains as part of a lawsuit against those countries' governments. more
ICANN community has a lot on its plate for 2015, and at this first full meeting of the year, we are all jumping into the work with both feet. Here are some of the main issues for brand owners: Sorting out the long-awaited transition from U.S. Government oversight to a truly multi-stakeholder model of governance; ensuring Registrant data (Whois) accuracy, accessibility and privacy (where appropriate); launching reviews of the new gTLD program; and protecting/preserving the robust business and brand voices in the process. more
Recently I joined my son, who is in his final high school year, to visit the open day of the newly founded Leiden University College in The Hague. The school focuses on Liberal Arts & Science and offers a broad education on (international) politics, philosophy and economy. The idea is to prepare the next generation internationally oriented public servants and leaders of the future. Among others they have former Dutch Minister of Foreign affairs and Secretary General of NATO Jaap de Hoop Scheffer as a college professor. more
What does authorized access mean? If an employee with authorized access to a computer system goes into that system, downloads company secrets, and hands that information over to the company's competitor, did that alleged misappropriation of company information constitute unauthorized access? This is no small question. If the access is unauthorized, the employee potentially violated the Computer Fraud and Abuse Act (CFAA) (the CFAA contains both criminal and civil causes of action). But courts get uncomfortable here. more
Over the past fifty years, participants in what began as the DARPA internet community have been turning out diverse technical specifications for TCP/IP network architectures and services. The first twenty years under government agency sponsorship were marked by rather free-wheeling sharing of ideas and collegial accommodation of divergent views typically found in most professional, academic activities. more
I firmly believe that we need to protect any form of intellectual properties (IP) built by one through hard and honest work. At the same time, I also believe that several of the current methods of protecting IP, such the as the copyright laws, patent systems and legislations, are not evolving fast enough in order to protect IP and avoid hindering the path of creativity and innovation. more
Last week hundreds of privacy regulators, corporate officers, and activists gathered in Jerusalem, Israel for the annual Data Protection and Privacy Commissioner Conference. ... Many acknowledged that longstanding privacy norms are being increasingly challenged by the massive popularity of social networks that encourage users to share information that in a previous generation would have never been made publicly available for all the world to see. more
That is what happens when you base your telecommunications policies on the wrong foundations. The problems with the telecommunications industry in America go back to 1996 when the FCC decided that broadband in America should be classified as internet (being content) and that therefore it would not fall under the normal telecommunication regulations. Suddenly what are known as telecommunications common carriers in other parts of the world became ISPs in the USA. How odd is that? more
Yesterday, as many of you heard, the European Parliament voted to reject the 'net neutrality' fundamentalist amendments to the already flawed proposals they had helped to create. That's the good news. The bad news is that the law that we now have is merely ludicrous, rather than insane. Furthermore, it doesn't properly protect end users, hold ISP feet to the service delivery fire, or truly encourage broadband ecosystem innovation. more
Trademarks and brands are often among a company's most valued assets. Customers associate trademarks and brands with producer integrity. They engender consumer trust. Without TMs and Brands, companies struggle for attention and find it more difficult to link the company's integrity and trustworthiness in the marketing of its goods and services. Representing company promise and customer expectations, they are uniquely positioned to symbolize common values and aspirations. more
A statement released by the Hong Kong Internet Service Providers Association (HKISPA) denouncing any plans that would restrict Hong Kong's open internet network. more
The Electronic Frontier Foundation (EFF) has just told ICANN to drop the notion of applying the Uniform Rapid Suspension (URS) dispute resolution system to .Travel and other legacy gTLDs without undertaking a full Policy Development Process (PDP). In a June 12 letter, EFF stated: ICANN should not apply URS to the .travel domain, or to any additional domains, by the unaccountable means of staff inserting new conditions into the renewal of the registry operator's contract. Rather, the public policy implications of such a move demand that a full PDP be undertaken first. more
US, China and Russia have refused to sign the French-backed agreement, Paris Call for Trust and Security in Cyberspace, announced by French President at the UNESCO Internet Governance Forum (IGF) on Monday. more
The current internet versus telcos debate that is going to be played out at the WCIT conference in Dubai later this year is still following the old confrontational pattern. The telco industry, for all the right reasons, started off as a monopolistic one. With the limited technology and knowledge of that time this system has been able to deliver telephone networks to all the countries in the world, and the industry can be proud of that achievement... However technology and knowledge have progressed... more