Trademark Digital Security and Reproductive Rights: Lessons for Feminist Cyberlaw Section 230
Category: Security
Links for Week of November 4, 2022
Cybersecurity Privacy Encryption
Links for week of July 29, 2022
Here are the links of interest for this week, broken down by general topic: Internet https://arstechnica.com/information-technology/2022/07/russia-is-quietly-ramping-up-its-internet-censorship-machine/ Security https://www.schneier.com/blog/archives/2022/07/apples-lockdown-mode-2.html Trademark & Copyright https://scoutingwire.org/girl-scouts-of-the-united-states-of-america-gsusa-and-boy-scouts-of-america-bsa-have-entered-into-an-agreement-to-end-trademark-infringement-litigation/ https://circleid.com/posts/20220726-calculating-the-return-on-investment-of-online-brand-protection-projects https://blog.ericgoldman.org/archives/2022/07/the-ninth-circuit-reaffirms-the-discovery-rule-for-the-copyright-acts-statute-of-limitations-starz-v-mgm-guest-blog-post.htm https://blogs.loc.gov/copyright/2022/07/the-copyright-claims-board-is-here-find-out-if-its-right-for-you/
Links of Note – April 22 2016
Here are this week’s links from Twitter (@Cyberlaw): Supreme Court denies cert in Authors Guild v. Google. https://t.co/zrV7sYy7Lk #fatladysings — James Grimmelmann (@grimmelm) April 18, 2016 An analysis of the Burr-Feinstein anti-Encryption bill pending in congress by @iainthomson at The Register – https://t.co/D5ktujGKSw — Kevin Thompson (@cyberlaw) April 14, 2016 Nice article by @gigalaw via…
News and @cyberlaw Links
For those of you who are interested, I’ll be presenting on “Common Trademark Application Problems” on November 2, 2011 as part of my firm’s IP Webinar series. For more information and links to the free registration, click here. Some recent links I found particularly interesting on Twitter include: Net Neutrality Case Heads to D.C. Circuit…
This Week’s @cyberlaw Links
As a new feature on the blog, I will try to regularly look at articles I tweeted the links for on Twitter (@cyberlaw), and discuss them briefly. Here are some I found interesting this week: HP Touchpad’s Fate Jonathan Ezor’s review of the HP Touchpad I linked to last week became more timely after HP’s…
Securing Your Wireless Network
As I’ve discussed previously on the blog, there are many cases currently pending involving the filesharing of copyright-protected videos involving BitTorrent. Many of the potential defendants in these cases first receive notice of the lawsuit when they receive a letter from their ISP that their identity will be disclosed to the Plaintiff by a certain…
ACLU challenges Suspicionless Laptop Border Searches
Today, the ACLU and related parties filed a class-action lawsuit challenging the U.S. Government’s policy of allowing suspicionless searches and seizures of laptops and other electronic devices at the border. The allegations include violations of the First and Fourth amendments. It is seeking a declaration that the Department of Homeland Security policies, which are restatements…
What does “search incident to arrest” mean today?
A good article over at the Wall Street Journal on the recent controversy over warrantless searches of laptops was pointed out to me by Venkat Balasubramani. Thanks, Venkat! The article is worth reading as it discusses the recent cases involving searches of electronic items at the border (based upon a “reasonable suspicion” test), and contrasts…
So why is it difficult to properly legislate for Cyberspace?
Ryan Blitstein asks this question in a great article at the Mercury News, here is the link. To summarize, the difficulties include legislators who don’t understand the technology, as well as companies that fight good laws because the proposed law hurts their bottom line. Special interests, as usual, appear to have more sway than implementing…