Here are this week’s links from Twitter (@Cyberlaw): Supreme Court denies cert in Authors Guild v. Google. https://t.co/zrV7sYy7Lk #fatladysings — James Grimmelmann (@grimmelm) April 18, 2016 An analysis of the Burr-Feinstein anti-Encryption bill pending in congress by @iainthomson at The Register – https://t.co/D5ktujGKSw — Kevin Thompson (@cyberlaw) April 14, 2016 Nice article by @gigalaw via…
Category: Security
News and @cyberlaw Links
For those of you who are interested, I’ll be presenting on “Common Trademark Application Problems” on November 2, 2011 as part of my firm’s IP Webinar series. For more information and links to the free registration, click here. Some recent links I found particularly interesting on Twitter include: Net Neutrality Case Heads to D.C. Circuit…
This Week’s @cyberlaw Links
As a new feature on the blog, I will try to regularly look at articles I tweeted the links for on Twitter (@cyberlaw), and discuss them briefly. Here are some I found interesting this week: HP Touchpad’s Fate Jonathan Ezor’s review of the HP Touchpad I linked to last week became more timely after HP’s…
Securing Your Wireless Network
As I’ve discussed previously on the blog, there are many cases currently pending involving the filesharing of copyright-protected videos involving BitTorrent. Many of the potential defendants in these cases first receive notice of the lawsuit when they receive a letter from their ISP that their identity will be disclosed to the Plaintiff by a certain…
ACLU challenges Suspicionless Laptop Border Searches
Today, the ACLU and related parties filed a class-action lawsuit challenging the U.S. Government’s policy of allowing suspicionless searches and seizures of laptops and other electronic devices at the border. The allegations include violations of the First and Fourth amendments. It is seeking a declaration that the Department of Homeland Security policies, which are restatements…
What does “search incident to arrest” mean today?
A good article over at the Wall Street Journal on the recent controversy over warrantless searches of laptops was pointed out to me by Venkat Balasubramani. Thanks, Venkat! The article is worth reading as it discusses the recent cases involving searches of electronic items at the border (based upon a “reasonable suspicion” test), and contrasts…
So why is it difficult to properly legislate for Cyberspace?
Ryan Blitstein asks this question in a great article at the Mercury News, here is the link. To summarize, the difficulties include legislators who don’t understand the technology, as well as companies that fight good laws because the proposed law hurts their bottom line. Special interests, as usual, appear to have more sway than implementing…
Detecting government spyware
Here’s an interesting article, written by Declan McCullagh and Anne Broache, entitled “Will security firms detect policy spyware?” There are currently no rules that specifically require companies to comply with requests for government spyware to be installed on users’ machines. There similarly is no current requirement for anti-spyware vendors to write software that doesn’t detect…
Be Proactive: Know Your Systems and People Before Facing a Lawsuit
The following is an article I wrote about the recent changes to the Federal Rules of Civil Procedure and its impact on record keeping responsibilities and issues. —- As of December 1, 2006, the Federal Courts have adopted new Federal Rules of Civil Procedure that explicitly acknowledge the fact that information that may be relevant…
Arrogant hacker tracked down through Metadata
Here’s a funny development I’ll be watching closely. This week, a hacker who claimed to operate a remote ‘bot network of thousands of computers was interviewed in the Washington Post. That in itself wasn’t newsworthy enough for me to blog about it, as sadly there are many users who allow this to happen to their…