A student-run resource for reliable reports on the latest law and technology news
http://jolt.law.harvard.edu/digest/wp-content/uploads/2012/12/joltimg.png

District Court Holds that Internet-Based Television Provider, FilmOn X is Entitled to a Compulsory License

By Anne Woodworth – Edited by Henry Thomas

The U.S. District court for the Central District of California ruled that an online streaming service that rebroadcasted network television fit the definition of a cable company, and was entitled to compulsory licensing under § 111 of the Copyright Act.  The order relied on the Supreme Court’s Aereo decision, which held that internet streaming was fundamentally the same as cable. The ruling conflicts with a Second Circuit case decided on similar facts, and is immediately appealable.

Read More...

http://jolt.law.harvard.edu/digest/wp-content/uploads/2012/12/joltimg.png

Data Breach Victims, Rejoice: Seventh Circuit Finds that Threat of Injury is Sufficient for Article III Standing in Data Breach Class Actions

By Brittany Doyle – Edited by Ariane Moss

Last Monday, the Seventh Circuit Courto of Appeals ruled that victims of a data breach had standing to pursue a class action even when they had not suffered direct financial harm as a result of the breach or when they had already been compensated for financial harm resulting from the breach. The opinion reversed a contrary district court decision, which the Seventh Circuit said had incorrectly read the Supreme Court’s 2013 decision in Clapper v. Amnesty International USA.

Read More...

http://jolt.law.harvard.edu/digest/wp-content/uploads/2012/12/joltimg.png

How Far Can Law Enforcement Go When Gathering Email Evidence? Former Gov. Scott Walker Employee Files Petition for Writ of Certiorari

By Kasey Wang – Edited by Ariane Moss

Kelly Rindfleisch is serving a six-month sentence for misconduct in public office while working for then-County Executive Scott Walker. Rindfleisch appeals to the U.S. Supreme Court, claiming that the government violated her Fourth Amendment rights while searching her emails for evidence for a different case.

Read More...

http://jolt.law.harvard.edu/digest/wp-content/uploads/2012/12/joltimg.png

Russia’s “Right To Be Forgotten” and China’s Right To Be Protected: New Privacy and Security Legislation

By Brittany Doyle – Edited by Ken Winterbottom

The legislatures in Russia and China took steps this month to tighten regulations over Internet companies with access to user data. In Russia, President Vladmir Putin signed a law ensuring a “right to be forgotten” reminiscent of the European Court of Justice’s right to be forgotten ruling of May 2014. And in China, the National People’s Congress released a draft cybersecurity bill that would formalize and strengthen the State’s long-standing regulation of websites and network operators.

Read More...

http://jolt.law.harvard.edu/digest/wp-content/uploads/2012/12/joltimg.png

Washington Appeals Court Refuses to Compel Unmasking of Anonymous Avvo Critic Absent Evidence of Defamation

By Leonidas Angelakos – Edited by Olga Slobodyanyuk

The Washington Court of Appeals held that—absent evidence of defamation—a third party website is not required to unmask an anonymous defendant. The court adopted an analysis similar to the widely cited Dendrite test for the showing a defamation plaintiff must make on a motion to compel disclosure of an anonymous defendant’s identity.

Read More...

By Andrew Spore – Edited by Travis West

Case C-435/12, ACI Adam BV v. Stichting de Thuiskopie (E.C.J. Apr. 10, 2014)
Slip Opinion

In response to an order issued by the European Court of Justice (“ECJ”) on April 10, 2014, the Netherlands has banned the unauthorized downloading of copyrighted material, effective immediately. According to Techdirt, the Dutch government previously had allowed such downloading for personal use because it believed that such a policy was consistent with European Union copyright law. The ECJ held that the Dutch legislation, “which makes no distinction between private copies made from lawful sources and those made from counterfeited or pirated sources cannot be tolerated.” ACI, slip op. at ¶ 37. (more…)

Posted On Apr - 20 - 2014 1 Comment READ FULL POST

By Olga Slobodyanyuk

Icon-newsAmici urge the Ninth Circuit to reconsider its ruling in the “Innocence of Muslims” case

Numerous news organizations, academics and Internet companies have filed briefs in support of Google’s petition for a rehearing of Garcia v. Google, No. 12-57302 (9th Cir. Feb. 26, 2014), reports Reuters. The Ninth Circuit ruled that Garcia, an actress tricked into appearing for five seconds in an inflammatory anti-Muslim film, was entitled to a preliminary injunction, and it ordered Youtube to take down all copies of “Innocence of Muslims” with Garcia’s performance. Garcia, slip op, at 2. One group of amici support Google’s petition for a rehearing based on the ruling’s unworkability with established business practices and copyright doctrine. This group includes the International Documentary Association; Netflix; technology companies such as Facebook, eBay and Yahoo!; and IP professors, reports Techdirt. According to Reuters, another group of amici focus on Garcia’s exploitation of a copyright “loophole” in the liability shield for online intermediaries. The EFF’s brief, joined by the ACLU, the American Library Association and others, urges for a rehearing “in order to protect free speech in the debate over the film and also to safeguard the future of free expression online.” News organizations such as the Washington Post and NPR raise similar First Amendment concerns in their brief, reports Eric Goldman from The Technology and Marketing Law Blog. He also notes the absence of big entertainment companies from Google’s list of amici and the lack of discussion among the briefs of the fixation issue, “the most obvious legal defect in the panel’s majority opinion.” JOLT Digest and The Washington Post have analyzed the original opinion.

Record companies sue Pandora for royalties on songs made before 1972

In a complaint filed in the New York State Supreme Court last week, major record companies, including Sony, Universal and ABKCO, have alleged that Pandora violated state common law copyright by playing old songs without permission, reports The New York Times. Songs made before 1972 are covered by “a patchwork of state laws,” not by federal copyright law. The lawsuit is similar to the suit filed last year against Sirius XM, another listening service. Songs made after 1972 are covered by federal copyright law – together with Sirius XM, Pandora paid around $656 million in royalties for these songs last year. According to Ars Technica, payment for pre-1972 recordings would earn record companies about $60 million more per year. Pandora acknowledged the possibility of this lawsuit in its annual report to the Securities and Exchange Commission, noting that the company would be significantly liable if it was found to be infringing. However, Pandora told The New York Times that it “was confident in its legal position and looked forward to a quick resolution of the matter.” State copyright laws typically cover misappropriation and unfair competition. These common-law concepts would not traditionally cover Pandora’s performance of the songs, analyzes Techdirt.

Alleged Heartbleed hacker arrested

Stephen Arthuro Solis-Reyes, a 19 year-old Canadian student, was arrested on April 16 for allegedly stealing 900 social security numbers from the Canada Revenue Agency (“CRA”) using the Heartbleed vulnerability, reports The Washington Post. Solis-Reyes is charged with  one count of “Unauthorized Use of Computer” and one count of “Mischief in Relation to Data” per the Canadian criminal code and is scheduled to appear in court in July, according to the Royal Canadian Mounted Police press release. The CRA discovered the cyber theft of social security numbers on April 11 and has delayed the tax collection deadline from April 30 to May 5 in response, reports the DailyTech. Heartbleed is an OpenSSL flaw which “allows a connected Web client or application that sends messages to keep a connection active during a transfer of data,” explains Ars Technica. According to Top Tech News, the bug has been present for over two years in over 500,000 websites. The attack on the CRA is the first to be recorded since Heartbleed’s discovery, but it was soon followed by an attack at Mumsnet, a British website with around 1.5 million users. Although most websites have upgraded to a secure version of OpenSSL, 50 million Android users may still be vulnerable to a Heartbleed attack.

Posted On Apr - 20 - 2014 Comments Off READ FULL POST

By Geng Chen – Edited by Ashish Bakshi

Photo By: Robert Scoble - CC BY 2.0

Photo By: Robert ScobleCC BY 2.0

Microsoft Corp. v. DataTern, Inc., No. 13-1184 (Fed. Cir. Apr. 4, 2014)
Slip Opinion

The United States Court of Appeals for the Federal Circuit affirmed in part and reversed in part the United States District Court for the Southern District of New York’s rulings in a consolidated declaratory judgment action brought by Microsoft and SAP. Slip op. at 3. The two companies sought a judgment of noninfringement and invalidity for two of DataTern’s patents (the ‘402 and ‘502 patents). See id. at 4. DataTern challenged the district court’s finding that it possessed subject matter jurisdiction over the action because there existed a “substantial controversy . . . of sufficient immediacy and reality to warrant the issuance of a declaratory judgment.” Id. at 5 (quoting MedImmune, Inc. v. Genentech, Inc., 549 U.S. 118, 127 (2007)). The Federal Circuit affirmed with respect to most of Microsoft’s and SAP’s claims, as DataTern’s previous infringement suits against those companies’ customers impliedly asserted contributory and induced infringement claims against the companies themselves. See id. at 9–10.

PatentlyO features a thorough analysis of the decision. Mondaq provides additional analysis. (more…)

Posted On Apr - 19 - 2014 Comments Off READ FULL POST

By Emma Winer – Edited by Sheri Pan

Photo By: Images MoneyCC BY 2.0

United States v. Penchukov, No. 11-03074 (D. Neb. July 13, 2012)
First Superseding Indictment
Complaint

On April 11, 2014, the Department of Justice (“DOJ”) released a previously sealed indictment against nine alleged conspirators in an international malware scheme that stole millions of dollars from online bank accounts. First Superseding Indictment at 6, United States v. Penchukov, No. 11-03074 (D. Neb. Aug. 22, 2012). The indictment alleged that the conspirators infected thousands of business computers with the “Zeus” malware, which captured passwords, bank account numbers, and other information required to log into online banking systems. Two of the defendants, Yuriy Konovalenko and Yevhen Kulibaba, were arraigned in Nebraska federal court on Friday, after being extradited from the United Kingdom.

Ars Technica provides an overview of the case. PC Magazine, The Register, and Reuters offer additional commentary. (more…)

Posted On Apr - 18 - 2014 Comments Off READ FULL POST

By Paul Klein – Edited by Alex Shank

Photo By: archie4ozCC BY 2.0

Joined Cases C-292/12 and C-594/12, Digital Rights Ireland Ltd v. Minister for Commc’ns, Marine, and Natural Res., (E.C.J. Apr. 8, 2014)
Slip Opinion hosted by Scribd

In a preliminary ruling last week, the European Court of Justice (“ECJ”) found to be invalid Directive 2006/24/EC (the “Directive”), which the European Parliament and of the Council had previously adopted. Slip op., at I-26. The Directive required EU members to enact laws mandating that electronic communications service providers retain user data for as long as two years. Id. at I-13. EU lawmakers created the Directive to facilitate the “investigation, detection and prosecution of serious crime,” id. at I-8, particularly organized crime and terrorism. Id. at I-7. The High Court (Ireland) and the Verfassungsgerichtshof (Austria) requested that the ECJ preliminarily rule on the Directive’s validity. Id. at I-3. Both courts have actions before them challenging the legality of national proceedings that accord with the Directive. Id.

The ECJ held that “by adopting Directive 2006/24, the EU legislature has exceeded the limits imposed by compliance with the principle of proportionality in the light of Articles 7, 8 and 52(1) of the Charter [of Fundamental Rights of the European Union].” Id. at I-26. In so holding, the court stated that Directive 2006/24 clashes “with the rights guaranteed by Articles 7 and 8 of the Charter,” and that “the fact that data are retained and subsequently used without the subscriber or registered user being informed is likely to generate in the minds of the persons concerned the feeling that their private lives are the subject of constant surveillance” Id. at I-20. The court identified three major problems with the Directive: 1) the extensive scope of data it would cause to be retained, 2) its failure to sufficiently limit authorities’ access to retained data, and 3) its failure to categorize the retained data in order to distinguish its usefulness and relevance. Id. at I-23–25. Accordingly, the Grand Chamber stated, “Directive 2006/24 entails a wide-ranging and particularly serious interference with those fundamental rights in the legal order of the EU, without such an interference being precisely circumscribed by provisions to ensure that it is actually limited to what is strictly necessary.” Id. at I-25.

Bloomberg provides an overview of and contextualizes the case, noting that the Directive was “drafted in the wake of terrorist attacks in London and Madrid . . . .” Voice of America reports that “some observers consider [the ruling] a nod to the Snowden leaks . . . .” It further notes that the court’s decision could affect trans-Atlantic commerce, as well as “the future of President Barack Obama’s proposed [National Security Agency] reforms on surveillance and data collection.” (more…)

Posted On Apr - 16 - 2014 Comments Off READ FULL POST
  • RSS
  • Facebook
  • Twitter
  • GooglePlay
Television

District Court Holds

By Anne Woodworth – Edited by Henry Thomas Order: Fox Television ...

Neiman Marcus

Data Breach Victims,

By Brittany Doyle – Edited by Ariane Moss Remijas v. Neiman ...

Magnifying Glass

How Far Can Law Enfo

By Kasey Wang – Edited by Ariane Moss State v. Rindfleisch, ...

Russia & China Cropped

Russia’s “Right

By Brittany Doyle - Edited by Ken Winterbottom The legislatures in ...

Avvo Logo Cropped

Washington Appeals C

By Leonidas Angelakos – Edited by Olga Slobodyanyuk Thomson v. Doe, ...