A student-run resource for reliable reports on the latest law and technology news

Unwanted Exposure: Civil and Criminal Liability for Revenge Porn Hosts and Posters

Written by: Susanna Lichter
Edited by: Suzanne Van Arsdale

Hollie Toups, the first named plaintiff in Toups v. GoDaddy, was harassed for weeks after nude pictures of her appeared on the website Texxxan.com alongside her real name and a link to her Facebook profile. When Toups requested that Texxxan.com remove the pictures, she was told by the website that they could help in exchange for her credit card information.[i] Texxxan.com is a “revenge porn” or “involuntary porn” website.[ii]

Read More...

Posted On May - 28 - 2013 2 Comments READ FULL POST
By Susanna Lichter FTC Proposes Stricter Rules for Web Sites Visited by Children The Federal Trade Commission recently proposed new regulations that would require third party advertising applications to comply with the Children’s Online Privacy Protection Act (COPPA), the New York Times reports. COPPA, which took effect in 2000, currently requires web site operators, but not website add-ons, to notify parents and obtain consent when personal information is collected from children under 13 years of age. In addition to extending ... Read More...
Posted On Aug - 7 - 2012 Comments Off READ FULL POST
California District Court Dismisses Oracle’s Copyright Infringement Claims Against Google, Finds APIs not Copyrightable By Susanna Lichter – Edited by Jennifer Wong Oracle America, Inc., v. Google Inc., No. C 10-0361 WHA (N.D. Cal. May 31, 2012) (hosted by Groklaw) The U.S. District Court of Northern California in San Francisco dismissed Oracle’s claims that Google had infringed Oracle’s copyright in 37 application programming interfaces (“APIs”), holding that the particular elements duplicated in Google’s Android operating system were free for all ... Read More...
Posted On Jun - 10 - 2012 Comments Off READ FULL POST
Written by Susanna Lichter Edited by Laura Fishwick Editorial Policy “CyberPatrol, ” “SniperSpy,” and “IamBigbrother” are the names of keyloggers that might be installed on your office computer. These easy to use and inexpensive hardware or software devices record keystrokes and allow a monitor to access email, and other password-protected accounts of an unsuspecting typist. Employers are using keyloggers more often in the workplace to oversee employees without their knowledge. Managers argue that computer surveillance is important to ensure productivity, ... Read More...
Posted On Jan - 30 - 2012 Comments Off READ FULL POST
By Susanna Lichter New Cyberweapon Duqu Possibly Spawned from Stuxnet Worm Computer security analysts warn that Stuxnet, the sophisticated worm that wreaked havoc on Iran’s nuclear program, could be a precursor to more cyber attacks on industrial control systems, according to The Washington Post. There is definite evidence that Duqu, a dangerous new weapon that appears to borrow some of the Stuxnet original source code, was used in an attack last month. The New York Times reports that authorities are divided ... Read More...
Posted On Nov - 3 - 2011 Comments Off READ FULL POST
  • RSS
  • Facebook
  • Twitter
  • GooglePlay
91ea09a6535666e18ca3c56f731f67ef_400x400

Privacy Concerns in

By Sabreena Khalid – Edited by Insue Kim Following scandals earlier ...

free-speech

San Francisco Court

By Jens Frankenreiter – Edited by Henry Thomas S. Louis Martin ...

European union concept, digital illustration.

EU Unitary Patent Sy

By Saukshmya Trichi – Edited by Ashish Bakshi Advocate General’s Opinion ...

computer-typing1

California Sex Offen

By Jesse Goodwin – Edited by Michael Shammas Doe v. Harris, ...

nsa-tracking-phone-records-325x337

Congress Fails to Pa

By Henry Thomas – Edited by Paulius Jurcys USA FREEDOM Act ...