A student-run resource for reliable reports on the latest law and technology news

Archive for the ‘Software’ Category

The Northern District of Illinois Denies Motion to Compel for Subpoenas Seeking Non-Party IP Address Information By Dorothy Du – Edited by Julie Dorais Pacific Century International, Ltd. v. John Does 1-37, No. 12 C 1057 (N.D. Ill. March 30, 2012) Slip opinion The U.S. District Court for the Northern District of Illinois granted in part and denied in part plaintiffs’ motion to compel ISPs’ compliance with subpoenas for identifying information associated with IP addresses in a copyright infringement action ... Read More...
Posted On Apr - 9 - 2012 Comments Off READ FULL POST
Federal Circuit Avoids §101 Analysis in Determining Patent Validity By Jacob Rogers – Edited by Lauren Henry MySpace, Inc. v. Graphon Corp., No. 2011-1149 (Fed. Cir. 2012) Slip opinion The Federal Circuit affirmed Northern District of California’s ruling on summary judgment that four of Graphon’s patents were invalid due to either lack of novelty or obviousness under 35 U.S.C. §102 and 35 U.S.C. §103, respectively. The district court found that these patents, which disclose a method for creating and searching ... Read More...
Posted On Mar - 13 - 2012 Comments Off READ FULL POST
By Charlie Stiernberg What Changed in Google’s Privacy Policy Google recently announced changes to its privacy policy and terms of service, prompting concerns by a bipartisan group of congressmen over the future safety of customer data. Reuters reports that Pablo Chavez, Google’s director of public policy, responded directly to the lawmakers’ questions in a letter, stating that “the updated privacy policy does not allow us to collect any new or additional types of information about users.” The Electronic Frontier Foundation ... Read More...
Posted On Feb - 11 - 2012 Comments Off READ FULL POST
Written by Susanna Lichter Edited by Laura Fishwick Editorial Policy “CyberPatrol, ” “SniperSpy,” and “IamBigbrother” are the names of keyloggers that might be installed on your office computer. These easy to use and inexpensive hardware or software devices record keystrokes and allow a monitor to access email, and other password-protected accounts of an unsuspecting typist. Employers are using keyloggers more often in the workplace to oversee employees without their knowledge. Managers argue that computer surveillance is important to ensure productivity, ... Read More...
Posted On Jan - 30 - 2012 Comments Off READ FULL POST
New Information about Carrier IQ Software Sparks Concerns that Wireless Carriers Have Violated Federal Anti-Wiretapping Laws By Abby Lauer – Edited by Michael Hoven Last month, a security researcher from Connecticut published information about a software program installed on some mobile smartphones that may be surreptitiously collecting data about how the phones are used. The software, called Carrier IQ and manufactured by a company of the same name, has been described as hard to detect, hard to remove, and programmed ... Read More...
Posted On Dec - 14 - 2011 Comments Off READ FULL POST
  • RSS
  • Facebook
  • Twitter
Unknown

Insuring Patents

By Yaping Zhang Edited by Jennifer Chung and Ariel Simms Despite its ...

Senate Judiciary Committee

Defend Trade Secrets

By Suyoung Jang – Edited by Mila Owen S.1890 - Defend ...

Flash Digest

Federal Circuit Flas

By Evan Tallmadge – Edited by Olga Slobodyanyuk The Linked Inheritability ...

Illinois Flag

Amicus Brief by EFF

By Yaping Zhang – Edited by Mila Owen On April 6, ...

Fed. Cir. Flash Digest

Flash Digest: News i

By Gia Velasquez – Edited by Ken Winterbottom Federal Court Grants ...