A student-run resource for reliable reports on the latest law and technology news
http://jolt.law.harvard.edu/digest/wp-content/uploads/2012/12/joltimg.pngBy: Chris Crawford and Joshua Vittor This article assumes a base level of knowledge about Bitcoin, bitcoin (BTC), blockchain technology, the Silk Road seizure, and the collapse of MtGox. For a helpful summary of how this technology works, see the first portion of this article, written by Matthew Ly of the Journal of Law and Technology. Bitcoin, and crypto-currency more generally, has risen in the five years since its launch from an academic exercise to what is today a multi-billion dollar ... Read More...
http://jolt.law.harvard.edu/digest/wp-content/uploads/2012/12/joltimg.pngWritten by: Michelle Sohn Edited by: Olga Slobodyanyuk Emulsion: A mixture of two or more liquids that are normally immiscible (nonmixable or unblendable). -Wikipedia  I.               UberX D.C. as Case Study in the Local Sharing Economy If states are laboratories of democracy, then cities are the experiments. A new experiment has bubbled up in cities across the world, reaching a boiling point. The experiment? The local sharing economy. In May, amidst accusations that many of its users were violating New York’s ... Read More...
http://jolt.law.harvard.edu/digest/wp-content/uploads/2012/12/joltimg.png

Flash Digest: News in Brief

By Olga Slobodyanyuk

ICANN responds to terrorism victims by claiming domain names are not property

D.C. District Court rules that FOIA requests apply to officials’ personal email accounts

Class-action lawsuit brought against ExamSoft  in Illinois

Read More...

http://jolt.law.harvard.edu/digest/wp-content/uploads/2012/12/joltimg.png

Federal Circuit Applies Alice to Deny Subject Matter Eligibility of Digital Imaging Patent

By Amanda Liverzani – Edited by Mengyi Wang

In Digitech Image Technologies, the Federal Circuit embraced the opportunity to apply the Supreme Court’s recent decision in Alice to resolve a question of subject matter eligibility under 35 U.S.C. §101. The Federal Circuit affirmed summary judgment on appeal, invalidating Digitech’s patent claims because they were directed to intangible information and abstract ideas.

Read More...

http://jolt.law.harvard.edu/digest/wp-content/uploads/2012/12/joltimg.png

Unlocking Cell Phones Made Legal through Unlocking Consumer Choice and Wireless Competition Act

By Kellen Wittkop – Edited by Insue Kim

Unlocking Consumer Choice and Wireless Competition Act allows consumers to unlock their cell phones when changing service providers, but the underlying issue of “circumvention” may have broader implications for other consumer devices and industries that increasingly rely on software.

Read More...

Sixth Circuit Approves Warrantless Tracking of Cell Phone Location
By Michael Hoven – Edited by Andrew Crocker

United States v. Skinner, No. 09-6497 (6th Cir. Aug. 14, 2012)

Slip opinion
The Court of Appeals for the Sixth Circuit upheld a jury’s conviction of Melvin Skinner on two counts related to drug trafficking and one count of conspiracy to commit money laundering, rejecting Skinner’s argument on appeal that the district court had wrongly denied his motion to suppress evidence on the grounds that it was obtained through an unlawful search.

The Sixth Circuit held that law enforcement did not need a warrant to track Skinner through cell-site information, GPS location, and “ping” data. Because Skinner had “no reasonable expectation of privacy in the data given off” by his phone, the police were free to collect and use that data, and there was no violation of the Fourth Amendment. Skinner, No. 09-6497, slip op. at 6. In so holding, the court distinguished its case from United States v. Jones, 132 S. Ct. 945 (2012) (previously covered by the Digest), in which the Supreme Court held that placing a GPS tracking device on a car violated the Fourth Amendment. Unlike Jones, in which police trespassed onto private property, Skinner purchased the phone himself and the phone freely emitted signals that revealed his location, which eliminated any reasonable expectation of privacy on Skinner’s part.

Bloomberg Businessweek provides an overview of the case. Several commentators, including Orin Kerr at the Volokh Conspiracy, Jennifer Granick at the Center for Internet and Society, and Julian Sanchez at Cato @ Liberty, criticize the court’s discussion of cell phone technology, noting that pinging a cell phone is a request for the cell phone to return a signal, and therefore ping data is not “given off” in the way the court appears to conceive.
(more…)

Posted On Aug - 17 - 2012 1 Comment READ FULL POST

JOLT Digest would like to thank our summer contributors, editors, and comment authors, whose names can be found on our Summer 2012 staff page, for their hard work over the past two months.

 

Posted On Aug - 15 - 2012 Comments Off READ FULL POST

Written By: Yana Welinder
Edited By: Molly Jennings
Editorial Policy

When Judge Robert Bork was nominated for the U.S. Supreme Court in 1987, a reporter politely asked his local video store assistant for a Xerox copy of handwritten entries of Judge Bork’s 146 prior rentals. Having convinced the editor of the Washington City Paper that this was perfectly legal, the reporter then published these records under the heading “The BORK Tapes.” The issue featured a suggestive cartoon of Judge Bork on the cover—beer in hand, slouching in an armchair in front of the television. You can imagine people flocked to buy copies of the paper hoping for juicy tidbits about the Supreme Court nominee’s secret watching habits. But to their disappointment, Judge Bork’s rental records listed only garden-variety films. This incident nevertheless spurred a privacy outrage. Within months, the Video and Library Privacy Protection Act was debated in Congress and California Congressman McCandless spoke in favor of the bill:

There’s a gut feeling that people ought to be able to read books and watch films without the whole world knowing. Books and films are the intellectual vitamins that fuel the growth of individual thought. The whole process of intellectual growth is one of privacy—of quiet, and reflection. This intimate process should be protected from the disruptive intrusion of a roving public eye. What we’re trying to protect with this legislation are usage records of content-based materials—books, records, videos, and the like.  . . . [T]here is an element of common decency in this legislation. It is really nobody else’s business what people read, watch, or listen to.

But books, records, and other materials were subsequently removed from the scope of this bill.{{1}}  The final version was adopted to regulate only the “rental, sale, or delivery of prerecorded video cassette tapes or similar audio visual materials” (emphasis added). Given its history, the legislation was dubbed the “Bork Bill.”

This comment argues that recent technological developments warrant an extension of the Bork Bill to protect records of online content consumption. The early view of the Internet as a space where “nobody knows you’re a dog” enabled people to freely browse online content, resulting in more “creativity and innovation.” Professor Eben Moglen has likened this anonymous space to cities as the historic destination for individuals who wanted to “escape the surveillance of the village” and “experiment autonomously in ways of living.” But as online exploration of content is increasingly being logged and those logs are being exposed, the Internet as a source of intellectual vitamins is under threat. More than ever, we now need to prevent the logging of media consumption that is not necessary for making the media available. This applies not only to media that existed in 1988 when the Bork Bill was adopted, such as books and music records, but to any material used for intellectual pursuit of knowledge, including blogs, tweets, podcasts, and other new sources of information. It is further critical that records of our intellectual curiosity not be shared with others without our permission to disclose that particular material.

(more…)

Posted On Aug - 14 - 2012 Comments Off READ FULL POST

By Charlie Stiernberg

Proposed SHIELD Act Would Require Non-Practicing Entities to Pay Legal Costs

The Saving High-Tech Innovators from Egregious Legal Disputes Act of 2012 (“SHIELD Act”) aims to deter non-practicing entities (“NPEs”)—patent holders that do not make, use, or sell their claimed invention—from filing lawsuits by requiring such plaintiffs to pay successful defendants’ attorney fees, if a court determines that the suit did not have a reasonable likelihood of succeeding. Congressman Peter Defazio (D-OR) introduced H.R. 6245 on August 1 to supplement 35 U.S.C. § 285, which provides for attorney fees in “exceptional cases,” with a new section 285A.  The SHIELD Act would only apply to computer software and hardware patents, both defined within the act. According to the Wall Street Journal, Rep. DeFazio intends to target companies that “buy the patents solely to sue the American tech startups that created the products.”

Raytheon Plans to Pursue Trade Secret Misappropriation Claims against Indigo Systems and FLIR

Following a favorable reversal in the Federal Circuit, Raytheon Co. plans to pursue its trade secret misappropriation claims against Indigo Systems Corp. and FLIR Systems Inc., the New York Times reports. In a unanimous opinion by Judge Linn, the Federal Circuit overturned a decision by the United States District Court for the Eastern District of Texas that had dismissed claims involving infrared camera technology because of the statute of limitations. In so holding, the Federal Circuit reasoned that Raytheon had reasonably relied on Indigo/FLIR’s repeated false assurances that Raytheon’s trade secrets were adequately protected.

Proposed Amendments to ECPA Would Require Warrants for Cloud Data

New legislation proposed by Rep. Jerrold Nadler (D-NY) and Rep. John Conyers Jr. (D-MI) would amend the Electronic Communications Privacy Act (ECPA) to require the government to obtain a probable-cause warrant to access data stored in the cloud. The proposal would protect files in Dropbox, Facebook, and Google storage accounts, among others. Under the current ECPA, largely unchanged since the Reagan administration, the government can acquire such content as long as it has been stored on a third-party server for 180 days or more. Senator Patrick Leahy (D-VT) proposed similar legislation last year, but it never got a hearing in the Judiciary Committee. Wired predicts a similar fate for this new proposal.

Posted On Aug - 13 - 2012 Comments Off READ FULL POST

Illinois Prohibits Employers from Requiring Employees to Provide Social Networking Passwords
By Andrew Crocker – Edited by Michael Hoven

H.B. 3782, 97th Gen. Assemb. (Ill. 2012)
Bill

On August 1, Illinois Governor Pat Quinn signed H.B. 3782, which amends Illinois’ Right to Privacy in the Workplace law to prohibit employers from “request[ing] or requir[ing] any employee or prospective employee to provide any password or other related account information in order to gain access to the employee’s or prospective employee’s account or profile on a social networking website or to demand access in any manner to an employee’s or prospective employee’s account or profile on a social networking website.” H.B. 3782, 97th Gen. Assemb. (Ill. 2012) (to be codified at 820 Ill. Comp. Stat 55/10(b)(1)). Illinois is the second state to enact such a provision, following Maryland’s passage of a similar bill in April, according to the ACLU.

The governor’s office issued a press release that describes the legislature’s intent in passing the bill.

(more…)

Posted On Aug - 11 - 2012 Comments Off READ FULL POST
  • RSS
  • Facebook
  • Twitter
  • GooglePlay

The Silk Road and Mt

By: Chris Crawford and Joshua Vittor This article assumes a base ...

Photo By: Tristan Ferne - CC BY 2.0

Emulsification: Uber

Written by: Michelle Sohn Edited by: Olga Slobodyanyuk Emulsion: A mixture of ...

Icon-news

Flash Digest: News i

By Olga Slobodyanyuk ICANN responds to terrorism victims by claiming domain ...

color_profiling1-309884_203x203

Federal Circuit Appl

By Amanda Liverzani – Edited by Mengyi Wang Digitech Image Technologies, ...

unlock_cell_phone

Unlocking Cell Phone

By Kellen Wittkop – Edited by Insue Kim On July 25, ...