A student-run resource for reliable reports on the latest law and technology news
http://jolt.law.harvard.edu/digest/wp-content/uploads/2012/12/joltimg.png

Newegg Wins Patent Troll Case After Court Delays

By Kasey Wang – Edited by Yunnan Jiang and Travis West

The District Court for the Eastern District of Texas recently issued a final judgement for online retailer Newegg, twenty months after trial, vacating a $2.3 million jury award for TQP. TQP, a patent assertion entity commonly known as a “patent troll,” collected $45 million in settlements for the patent in question before Newegg’s trial.

Read More...

http://jolt.law.harvard.edu/digest/wp-content/uploads/2012/12/joltimg.png

The Evolution of Internet Service Providers from Partners to Adversaries: Tracking Shifts in Interconnection Goals and Strategies in the Internet’s Fifth Generation

By Robert Frieden – Edited by Marcela Viviana Ruiz Martinez, Olga Slobodyanyuk and Yaping Zhang

In respone to increasing attempts by Internet Service Providers to target customers who trigger higher costs for rate increases, the FCC and other regulatory agencies worldwide have stepped in to prevent market failure and anticompetitive practices. This paper will examine new models for the carriage of Internet traffic that have arisen in the wake of these changes.

Read More...

http://jolt.law.harvard.edu/digest/wp-content/uploads/2012/12/joltimg.png

The Global Corporate Citizen:  Responding to International Law Enforcement Requests for Online User Data 

By Kate Westmoreland – Edited by Yunnan Jiang

This paper analyses the law controlling when U.S.-based providers can provide online user data to foreign governments. The focus is on U.S. law because U.S. dominance of internet providers means that U.S. laws affect a large number of global users. The first half of this paper outlines the legal framework governing these requests. The second half highlights the gaps in the law and how individual companies’ policies fill these gaps.

Read More...

http://jolt.law.harvard.edu/digest/wp-content/uploads/2012/12/joltimg.png

Symposium Introduction: Legal Issues in Computer and Internet Law and the Quagmire of Appropriate Legal Frameworks in the Modern Era

By Deborah Beth Medows – Edited by Yaping Zhang

Jurists must widely examine the pervasive challenges among the advents in Internet and computer technology in order to ensure that legal systems protect individuals while  encouraging innovation.  It is precisely due to the legal and societal quagmires that 3D printing and net neutrality pose that ideally position them as springboards from which to delve into broader discussions on technology law.

Read More...

http://jolt.law.harvard.edu/digest/wp-content/uploads/2012/12/joltimg.png

A Victory for Compatibility: the Ninth Circuit Gives Teeth to RAND Terms

By Stacy Ruegilin – Edited by Ken Winterbottom

Microsoft won a victory in the Ninth Circuit last Thursday after the court found that Motorola, a former Google subsidiary, had breached its obligation to offer licenses for standards-essential technologies at reasonable and non-discriminatory rates. The court affirmed a $14.52 million jury verdict against Motorola for the breach.

Read More...

Kelly-Brown v. Winfrey
By Alex Shank – Edited by Samantha Rothberg

Photo By: nayrb7CC BY 2.0

Kelly-Brown v. Winfrey, No. 12-1207 (2nd Cir. May 31, 2013)
Slip opinion

The U.S. Court of Appeals for the Second Circuit vacated the District Court for the Southern District of New York’s (S.D.N.Y.) dismissal of trademark infringement claims against Oprah Winfrey, rejecting her fair use defense. Kelly-Brown alleged that Winfrey had used her trademarked phrase “Own Your Power” “as a mark” on the cover of O, The Oprah Magazine, its website, and at a magazine event.

Bloomberg summarizes the case and provides comments from Harpo, Inc. and Hearst Corp., two of Winfrey’s media enterprises. Reuters reports that Kelly-Brown was “ecstatic” about the result. JDSupra praised the court’s recognition of Kelly-Brown’s trademark as a “concept,” while Rebecca Tushnet critiqued the Second Circuit’s further confusing the meaning of “descriptive use.” (more…)

Posted On Jun - 18 - 2013 Comments Off READ FULL POST

By Samantha Rothberg

Icon-newsChinese National Sentenced to 12 Years in U.S. Prison for Selling Pirated Software

Chinese citizen Xiang Li was sentenced to 12 years in a U.S. federal prison for conspiracy to commit wire fraud and criminal copyright infringement, Bloomberg reports. Li operated a website, “Crack 99,” which sold more than $100 million worth of pirated software between 2008 and 2011. He was arrested in Saipan, a U.S. territory, after traveling there to sell software to undercover federal agents. According to prosecutors, Li is the first Chinese national to be “apprehended and prosecuted in the U.S. for cybercrimes he engaged in entirely from China.”

Songwriters’ Rights Group BMI Sues Pandora Over Fee Dispute

Broadcast Music Inc. (“BMI”), an organization that collects royalties on behalf of music publishers and songwriters when their works are played in public, filed suit in federal court against Pandora, the Internet radio service, the Wall Street Journal reports. Earlier this week, Pandora purchased a small radio station in South Dakota and argued that this move entitles it to pay BMI the reduced royalty fees that traditional radio broadcasters pay. BMI decried Pandora’s move as a “brazen effort to artificially drive down its license fees.” The organization sued for a judicial declaration of the rates that Pandora must pay when it plays an artist’s song.

Google Argues Wi-FI is “Radio Signal” in Street View Case

Google urged the Ninth Circuit to overrule a judge’s 2011 finding that its Street View program had violated the federal Wiretap Act, 18 U.S.C. §§ 2510–2522, by collecting private data over unencrypted wi-fi signals, Bloomberg reports. Google argues that transmissions over an open wi-fi signal are equivalent to public radio transmissions, and the interception of a radio transmission or any “form of electronic communication readily accessible to the general public” is not illegal under the Wiretap Act. Attorney Elizabeth Cabraser, who represents the consumers who won the initial ruling, argued that the Wiretap Act exception was intended to protect ham radios used for communicating over long distances, and not wi-fi networks, which are broadcast over very short distances. She urged the court to reject Google’s “attempt to create a loophole to serve its own purposes.”

New York Aims to Crack Down on 3D Gun Printing

A New York city councilman introduced legislation on Wednesday that would make it illegal for anyone other than a licensed gunsmith to manufacture guns using a 3D printer, reports CNET. The bill would require legal manufacturers to register the guns with police within 72 hours of creation. The New York State Legislature and U.S. Congress have both recently introduced similar legislation, and a California state senator has announced plans to do the same. The surge in legislation stems from the worry that untraceable, undetectable plastic guns could be anonymously printed by anyone with a 3D printer and the necessary software. Last month, that vision took a step closer to reality when the non-profit organization Defense Distributed announced that it had created the world’s first 3D-printed handgun, the “Liberator.”

Posted On Jun - 16 - 2013 Comments Off READ FULL POST

Leaked Surveillance Programs Reveal Large-Scale Data Collection

By Michelle Sohn – Edited by Katie Mullen

Photo By: darkuncleCC BY 2.0

Last week, the Guardian revealed two top-secret U.S. programs—Verizon metadata collection and PRISM—that allow the National Security Agency (“NSA”) to conduct domestic surveillance on a massive and unprecedented scale. The first program was conducted with an order from the U.S. Foreign Intelligence Surveillance Court. The court order required Verizon to provide the NSA with all “telephony metadata” created by Verizon for communications within the U.S. as well as between the U.S. and abroad. The order specified a three month period, but could have been one of several similar orders. Metadata includes the phone numbers, location, and duration of Verizon users’ calls, but not the actual content of conversations. The order also prohibited Verizon from disclosing any information about this program or the order’s existence. The second program, PRISM, allows the government direct access to participating companies’ servers. A wide range of data can be culled from the servers, including email, video and voice chat, and file transfers. Major companies allegedly participating in Prism include Yahoo, Facebook, Skype, and Google. Spokespersons from these companies have denied participation. PRISM can target user communications outside the U.S. and communications involving people outside the U.S.

NPR summarized an interview on the two surveillance programs with former NSA director, General Michael Hayden, who largely praised the program as “an accurate reflection of balancing our security and our privacy.” The New Yorker criticized the court-ordered metadata collection program, declaring, “The problem, then, is not just secrecy, but meta-secrecy. The government let the public think that certain words mean one thing, while operating on the idea that they mean another.” Congress has initiated new oversight proceedings on the programs. (more…)

Posted On Jun - 15 - 2013 Comments Off READ FULL POST

Hart v. Electronic Arts, Inc.
By Samantha Rothberg – Edited by Alex Shank

Hart v. Electronic Arts, Inc., No.  11–3750 (3d Cir. May 21, 2013)
Slip opinion

In a 2-1 opinion authored by Judge Joseph A. Greenaway, Jr., the court held that former college athlete Ryan Hart’s interest in protecting his identity outweighed EA’s First Amendment rights. Hart, slip op. at 61. In determining how to strike the proper balance between the right of publicity and the First Amendment, the court adopted the “transformative use” test, which has its roots in copyright law. Id. at 51.

Reuters provides an overview of the case and discusses the implications for a similar case pending in the Ninth Circuit. The Electronic Frontier Foundation criticizes the decision for failing to protect freedom of speech and for treating the right of publicity as a form of intellectual property rather than as a more limited right to control the commercial use of one’s identity. Marc Edelman of Forbes, however, celebrates the decision as “a big win for athletes and entertainers everywhere” that will make it easier for celebrities to protect against the unlicensed use of their image by video game developers. (more…)

Posted On Jun - 10 - 2013 Comments Off READ FULL POST

Trailblazing Email Privacy Bill Proposed in Texas
Mary Grinman – Edited by Natalie Kim

H.B. No. 2268

Photo By: André NattaCC BY 2.0

On May 27, 2013, the Texas State Senate and House both signed H.B. 2268. The legislation requires state law enforcement agents to secure a warrant before accessing emails and other “electronic customer data” in “electronic storage.” H.B. 2268 at 3–4. It also permits state courts to serve warrants on out-of-state service providers as long as they do “business in [Texas] under a contract . . . with a resident of [Texas], if any part of that contract . . . is to be performed in [Texas].” Id. at 9. With this requirement, the bill closes the loophole of the 1986 Electronic Communications Privacy Act (ECPA), which allows warrantless access to emails opened or older than 180 days. Unless Governor Rick Perry vetoes the bill by June 16, 2013, the bill will pass and go into effect on September 1.

Texas Rep. John Frullo originally authored the bill, with support from civil liberties organizations such as the Texas Electronic Privacy Coalition. Prior to the bill’s passage, the Senate amended it to allow “an authorized peace officer” to “require a provider . . . to disclose . . . information revealing the identity of customers . . . [and] information about a customer’s use of the applicable service[,] without giving subscriber or customer notice” as long as he obtained an administrative subpoena, a grand jury subpoena, a warrant, a court order, or the consent of the customer. See Senate Amendments Printing Analysis, at 5–6. The legislation is designed to “extend[] the jurisdiction of district judges by granting them privileges to issue data search warrants beyond the physical boundaries of the state for computer data searches only.” Senate Committee Report at 1.

Texas Legislature Online provides a summary of the history surrounding the bill. Ars Technica calls the bill “unprecedented,” and describes it as “the nation’s strongest email privacy bill.” RT states that the bill could be “a roadmap to updating the [federal] 1986 Electronic Communications Privacy Act (ECPA),” which only requires a warrant for recent and unopened emails. Pub. L. No. 99-508, 100 Stat. 1848 (Oct. 21, 1986),codified at 18 U.S.C. §§2510-22, 2701-11, 3121-26. However, Bloomberg BNA reminds its readers that the federal government will retain the authority to “access older emails without a warrant.” (more…)

Posted On Jun - 8 - 2013 Comments Off READ FULL POST
  • RSS
  • Facebook
  • Twitter
  • GooglePlay
Newegg

Newegg Wins Patent T

By Kasey Wang – Edited by Yunnan Jiang and Travis ...

Photo By: Brian Hawkins - CC BY 2.0

The Evolution of Int

[caption id="attachment_4164" align="alignleft" width="300"] Photo By: Brian Hawkins - CC ...

images

The Global Corporate

By Kate Westmoreland Edited by Yunnan Jiang 1.     Introduction Accessing online records and ...

technology-512210_1280

Legal Issues in Comp

By Deborah Beth Medows, Symposium Editor When this author first conceived ...

Microsoft Mobile

A Victory for Compat

By Stacy Ruegilin – Edited by Ken Winterbottom Microsoft Corp. v. ...