A student-run resource for reliable reports on the latest law and technology news
http://jolt.law.harvard.edu/digest/wp-content/uploads/2012/12/joltimg.png

Newegg Wins Patent Troll Case After Court Delays

By Kasey Wang – Edited by Yunnan Jiang and Travis West

The District Court for the Eastern District of Texas recently issued a final judgement for online retailer Newegg, twenty months after trial, vacating a $2.3 million jury award for TQP. TQP, a patent assertion entity commonly known as a “patent troll,” collected $45 million in settlements for the patent in question before Newegg’s trial.

Read More...

http://jolt.law.harvard.edu/digest/wp-content/uploads/2012/12/joltimg.png

The Evolution of Internet Service Providers from Partners to Adversaries: Tracking Shifts in Interconnection Goals and Strategies in the Internet’s Fifth Generation

By Robert Frieden – Edited by Marcela Viviana Ruiz Martinez, Olga Slobodyanyuk and Yaping Zhang

In respone to increasing attempts by Internet Service Providers to target customers who trigger higher costs for rate increases, the FCC and other regulatory agencies worldwide have stepped in to prevent market failure and anticompetitive practices. This paper will examine new models for the carriage of Internet traffic that have arisen in the wake of these changes.

Read More...

http://jolt.law.harvard.edu/digest/wp-content/uploads/2012/12/joltimg.png

The Global Corporate Citizen:  Responding to International Law Enforcement Requests for Online User Data 

By Kate Westmoreland – Edited by Yunnan Jiang

This paper analyses the law controlling when U.S.-based providers can provide online user data to foreign governments. The focus is on U.S. law because U.S. dominance of internet providers means that U.S. laws affect a large number of global users. The first half of this paper outlines the legal framework governing these requests. The second half highlights the gaps in the law and how individual companies’ policies fill these gaps.

Read More...

http://jolt.law.harvard.edu/digest/wp-content/uploads/2012/12/joltimg.png

3D Printing, Net Neutrality, and the Internet: Symposium Introduction

By Deborah Beth Medows – Edited by Yaping Zhang

Jurists must widely examine the pervasive challenges among the advents in Internet and computer technology in order to ensure that legal systems protect individuals while  encouraging innovation.  It is precisely due to the legal and societal quagmires that 3D printing and net neutrality pose that ideally position them as springboards from which to delve into broader discussions on technology law.

Read More...

http://jolt.law.harvard.edu/digest/wp-content/uploads/2012/12/joltimg.png

A Victory for Compatibility: the Ninth Circuit Gives Teeth to RAND Terms

By Stacy Ruegilin – Edited by Ken Winterbottom

Microsoft won a victory in the Ninth Circuit last Thursday after the court found that Motorola, a former Google subsidiary, had breached its obligation to offer licenses for standards-essential technologies at reasonable and non-discriminatory rates. The court affirmed a $14.52 million jury verdict against Motorola for the breach.

Read More...

By Yixuan Long – Edited by Travis West

Apple announced that it could no longer access information stored on devices with the iOS 8 system. This means that if law enforcement came to Apple with a seized device and a valid warrant, Apple would be technically incapable of accessing the data. According to a statement in Apple’s privacy policy:

“On devices running iOS 8, your personal data such as photos, messages (including attachments), email, contacts, call history, iTunes content, notes, and reminders is placed under the protection of your passcode. Unlike our competitors, Apple cannot bypass your passcode and therefore cannot access this data. So it’s not technically feasible for us to respond to government warrants for the extraction of this data from devices in their possession running iOS 8.”

iOS 8 introduced default encryption and data protection. “By setting up a device passcode, the user automatically enables Data Protection. . . . The passcode is entangled with the device’s UID, so brute-force attempts must be performed on the device under attack. A large iteration count is used to make each attempt slower. The iteration count is calibrated so that one attempt takes approximately 80 milliseconds. This means it would take more than 5½ years to try all combinations of a six-character alphanumeric passcode with lowercase letters and numbers.” iOS Security Guide September 2014, at 11.

Google announced that its next mobile operating system, Android L, will join iOS 8 in offering default encryption.

Ars Technica provides an overview of Apple’s iOS 8 privacy policy and summarizes the favorable views from privacy advocates. According to the report, Nicole Ozer, an attorney with the American Civil Liberties Union of Northern California, called the privacy upgrade “long overdue.” Catherine Crump, a law professor at the University of California, Berkeley, said that it was “heartening to see a major American company conclude that it’s a business advantage to protect its users’ privacy and security.” The Cato Institute also applauds Apple’s new policy, explaining that many concerns over closing the backdoor to law enforcement are unwarranted. For example, encryption has stymied law enforcement investigations less often than people might think.

(more…)

Posted On Oct - 16 - 2014 Comments Off READ FULL POST

By Paulius Jurcys

CJEU Grants “Causal Event” Jurisdiction for Online Copyright Infringement

Cruz Villalón, Advocate General (“AG”) of the Court of Justice of the European Union (“CJEU”), delivered his Opinion in Pez Hejduk v. EnergieAgentur.NRW GmbH, which dealt with the interpretation of Art. 5(3) of the Brussels I Regulation and the question of jurisdiction over copyright infringements. In that case, Hejduk, an Austrian photographer, sued a German corporation for unauthorized publication of her photographs online. The German defendant contested jurisdiction, arguing that the case should have been brought before a German court. It pointed out that its place of establishment was in Germany and that its website used “.de” domain. Villalón discussed recent cases such as eDate (victim’s “centre of interests” approach) and Pinckney (localization of damage), and proposed to confer jurisdiction to the courts of the state in which the “causal event” occurred. Making content available online may cause damage in those states in which copyright is protected, but given the general/special jurisdiction dichotomy under the Brussels I Regulation (Arts. 2 and 5(3)), it remains for the Court to clarify whether ‘causal event’ jurisdiction is not too narrow for online copyright infringement cases under Art. 5(3).

Creators of the Blue-LED Technology Receive Nobel Prize

On October 7th, 2014, the Royal Swedish Academy of Sciences announced its decision to award the Nobel Prize in Physics to three Japanese scientists for inventing energy-saving LED lights, which “triggered a fundamental transformation of lighting technology.” One of the inventors, Shuji Nakamura, had sued his former employer, Nichia Corporation, four years ago after Nichia gave him an award of $200 for his invention. The meager compensation reflected the long-held notion in Japanese culture that employees should sacrifice for their companies. Nakamura’s battle with Nichia and settlement for $8 million was an important turning point for strengthening employees’ rights as well as for motivating workers  to design innovative products.

California Enacts Open Access Legislation

California has become one of the first jurisdictions to enact Taxpayer Access to Publicly Funded Research Act on September 29, 2014. Prior to enactment, state agencies and departments were only required to share the results of research conducted by state employees. The new law further requires the recipient of state funding to provide public access to any publication, invention or technology on a government-approved and freely accessible database.

Posted On Oct - 14 - 2014 Comments Off READ FULL POST

pic01By: Chris Crawford and Joshua Vittor

This article assumes a base level of knowledge about Bitcoin, bitcoin (BTC), blockchain technology, the Silk Road seizure, and the collapse of MtGox. For a helpful summary of how this technology works, see the first portion of this articlewritten by Matthew Ly of the Journal of Law and Technology.

Bitcoin, and crypto-currency more generally, has risen in the five years since its launch from an academic exercise to what is today a multi-billion dollar system of transacting wealth. Its signature technology is the blockchain, a nearly incorruptible public ledger that replaces many functions traditionally left to trusted intermediaries, such as transaction verification. These trusted intermediaries, like banks and wire transmitters, are highly regulated under our current legal system. The threat of government enforcement or private litigation is meant to ensure that they operate fairly and legally and to provide relief for victims when the intermediaries breach those victims’ trusts.

Bitcoin enthusiasts, however, emphasize that trusted intermediaries often do not operate fairly or legally (e.g. they run off with the money), and that the legal system’s reactive nature is an insufficient deterrent against malpractice and wrongdoing. Blockchain technology, some claim, has the potential to ensure proper transactions in a way that the traditional legal system has never been capable of. With blockchains, so the argument goes, there will be no need for a legal system (including government regulations) to guarantee the success of a transaction because there will be no need for trusted intermediaries to complete a transaction. (more…)

Posted On Sep - 10 - 2014 Comments Off READ FULL POST

Written by: Michelle Sohn

Edited by: Olga Slobodyanyuk

Emulsion: A mixture of two or more liquids that are normally immiscible (nonmixable or unblendable).

-Wikipedia

 I.               UberX D.C. as Case Study in the Local Sharing Economy

If states are laboratories of democracy, then cities are the experiments. A new experiment has bubbled up in cities across the world, reaching a boiling point. The experiment? The local sharing economy. In May, amidst accusations that many of its users were violating New York’s illegal hotels law, Airbnb agreed to release redacted user data to New York’s Attorney General. In early June, the Commonwealth of Virginia Department of Motor Vehicle Services issued cease-and-desist letters to Uber and Lyft, ride-on-demand mobile app services. Weeks later, taxicabs caravanned into Washington, D.C. in protest, bringing traffic to a standstill. They demanded that the D.C. City Council also issue cease-and-desist letters. While Virginia has since lifted the ban on Uber and Lyft, other states and cities have continued to fight.

Heretofore, much of the debate has centered around two competing narratives: According to some, the Uber story (and more broadly, the local sharing economy story) is one that pits ham-handed regulation against innovation, protecting entrenched and outmoded industries. Others argue that the case against Uber is fair, and that to compete all services should play by the same rules. While politics and fears of disruption certainly play large roles in this regulatory drama, this comment points to a larger legal controversy at work—the increased emulsification of commercial and private uses. Although the focus of this comment is on Uber and D.C., the larger goal is to identify major regulatory tensions with the local sharing economy by examining actual and proposed municipal regulations and laws. (more…)

Posted On Aug - 31 - 2014 Comments Off READ FULL POST

By Olga Slobodyanyuk

ICANN responds to terrorism victims by claiming domain names are not property

The Internet Corporation for Assigned Names and Numbers (“ICANN”) has asked a D.C. Circuit Court to prevent the handover of country code top-level domain names (“ccTLD”) to plaintiffs of Ben Haim et al. v Islamic Republic of Iran et al., who have been trying to collect their $109 million damages award from Iran for the 1997 suicide bombing. The plaintiffs have had limited success with seizing Iranian assets located in the U.S., including cultural artifacts held by Harvard University and Chicago’s Field Museum, reports Arstechnica. They have recently obtained writs of attachment against ICANN, ordering it to “hold” the ccTLDs of Iran, Syria and North Korea for seizure, liquidation or transfer. According to the Volokh Conspiracy, ICANN has responded in its motion to quash these writs by claiming that “a ccTLD is not ‘property’; even if you think its property, it’s not property ‘belonging to’ the defendant governments; even if you think it’s property belonging to the defendant governments, it’s not within ICANN’s control; and even if you think it’s property belonging to the defendant governments that is within ICANN’s control, it’s not ‘located in the United States’ and therefore not subject to seizure by a U.S. federal court.” The Volokh Conspiracy notes that, although a ccTLD is like a label to a series of interlocking relationships, the theory that domain names are property has been successfully used by the Department of Homeland Security to seize websites allegedly involved in copyright infringement.

(more…)

Posted On Aug - 6 - 2014 Comments Off READ FULL POST
  • RSS
  • Facebook
  • Twitter
  • GooglePlay
Newegg

Newegg Wins Patent T

By Kasey Wang – Edited by Yunnan Jiang and Travis ...

Photo By: Brian Hawkins - CC BY 2.0

The Evolution of Int

[caption id="attachment_4164" align="alignleft" width="300"] Photo By: Brian Hawkins - CC ...

images

The Global Corporate

By Kate Westmoreland Edited by Yunnan Jiang 1.     Introduction Accessing online records and ...

technology-512210_1280

3D Printing, Net Neu

By Deborah Beth Medows, Symposium Editor When this author first conceived ...

Microsoft Mobile

A Victory for Compat

By Stacy Ruegilin – Edited by Ken Winterbottom Microsoft Corp. v. ...