A student-run resource for reliable reports on the latest law and technology news

Archive for the ‘Software’ Category

The Northern District of Illinois Denies Motion to Compel for Subpoenas Seeking Non-Party IP Address Information By Dorothy Du – Edited by Julie Dorais Pacific Century International, Ltd. v. John Does 1-37, No. 12 C 1057 (N.D. Ill. March 30, 2012) Slip opinion The U.S. District Court for the Northern District of Illinois granted in part and denied in part plaintiffs’ motion to compel ISPs’ compliance with subpoenas for identifying information associated with IP addresses in a copyright infringement action ... Read More...
Posted On Apr - 9 - 2012 Comments Off READ FULL POST
Federal Circuit Avoids §101 Analysis in Determining Patent Validity By Jacob Rogers – Edited by Lauren Henry MySpace, Inc. v. Graphon Corp., No. 2011-1149 (Fed. Cir. 2012) Slip opinion The Federal Circuit affirmed Northern District of California’s ruling on summary judgment that four of Graphon’s patents were invalid due to either lack of novelty or obviousness under 35 U.S.C. §102 and 35 U.S.C. §103, respectively. The district court found that these patents, which disclose a method for creating and searching ... Read More...
Posted On Mar - 13 - 2012 Comments Off READ FULL POST
By Charlie Stiernberg What Changed in Google’s Privacy Policy Google recently announced changes to its privacy policy and terms of service, prompting concerns by a bipartisan group of congressmen over the future safety of customer data. Reuters reports that Pablo Chavez, Google’s director of public policy, responded directly to the lawmakers’ questions in a letter, stating that “the updated privacy policy does not allow us to collect any new or additional types of information about users.” The Electronic Frontier Foundation ... Read More...
Posted On Feb - 11 - 2012 Comments Off READ FULL POST
Written by Susanna Lichter Edited by Laura Fishwick Editorial Policy “CyberPatrol, ” “SniperSpy,” and “IamBigbrother” are the names of keyloggers that might be installed on your office computer. These easy to use and inexpensive hardware or software devices record keystrokes and allow a monitor to access email, and other password-protected accounts of an unsuspecting typist. Employers are using keyloggers more often in the workplace to oversee employees without their knowledge. Managers argue that computer surveillance is important to ensure productivity, ... Read More...
Posted On Jan - 30 - 2012 Comments Off READ FULL POST
New Information about Carrier IQ Software Sparks Concerns that Wireless Carriers Have Violated Federal Anti-Wiretapping Laws By Abby Lauer – Edited by Michael Hoven Last month, a security researcher from Connecticut published information about a software program installed on some mobile smartphones that may be surreptitiously collecting data about how the phones are used. The software, called Carrier IQ and manufactured by a company of the same name, has been described as hard to detect, hard to remove, and programmed ... Read More...
Posted On Dec - 14 - 2011 Comments Off READ FULL POST
  • RSS
  • Facebook
  • Twitter
  • GooglePlay
Photo By: Kyle Nishioka - CC BY 2.0

Google to Supreme Co

By Michael Shammas – Edited by Mary Schnoor [caption id="attachment_4353" align="alignleft" ...

Photo By: Mozilla in Europe - CC BY 2.0

Mozilla Announces Re

By Sheri Pan – Edited by Corey Omer [caption id="attachment_4341" align="alignleft" ...

Icon-news

Flash Digest: News I

By Emma Winer Third Circuit Vacates Hacker Conviction for Improper Venue The ...

Photo By: Yuri Samoilov - CC BY 2.0

Supreme Court Weighs

By Mary Schnoor — Edited by Elise Young [caption id="attachment_4322" align="alignleft" ...

Icon-news

Flash Digest: News I

By Corey Omer Apple v. Samsung — Round 2 Last week in ...