A student-run resource for reliable reports on the latest law and technology news

Unwanted Exposure: Civil and Criminal Liability for Revenge Porn Hosts and Posters

Written by: Susanna Lichter
Edited by: Suzanne Van Arsdale

Hollie Toups, the first named plaintiff in Toups v. GoDaddy, was harassed for weeks after nude pictures of her appeared on the website Texxxan.com alongside her real name and a link to her Facebook profile. When Toups requested that Texxxan.com remove the pictures, she was told by the website that they could help in exchange for her credit card information.[i] Texxxan.com is a “revenge porn” or “involuntary porn” website.[ii]

Read More...

Posted On May - 28 - 2013 2 Comments READ FULL POST
By Susanna Lichter FTC Proposes Stricter Rules for Web Sites Visited by Children The Federal Trade Commission recently proposed new regulations that would require third party advertising applications to comply with the Children’s Online Privacy Protection Act (COPPA), the New York Times reports. COPPA, which took effect in 2000, currently requires web site operators, but not website add-ons, to notify parents and obtain consent when personal information is collected from children under 13 years of age. In addition to extending ... Read More...
Posted On Aug - 7 - 2012 Comments Off READ FULL POST
California District Court Dismisses Oracle’s Copyright Infringement Claims Against Google, Finds APIs not Copyrightable By Susanna Lichter – Edited by Jennifer Wong Oracle America, Inc., v. Google Inc., No. C 10-0361 WHA (N.D. Cal. May 31, 2012) (hosted by Groklaw) The U.S. District Court of Northern California in San Francisco dismissed Oracle’s claims that Google had infringed Oracle’s copyright in 37 application programming interfaces (“APIs”), holding that the particular elements duplicated in Google’s Android operating system were free for all ... Read More...
Posted On Jun - 10 - 2012 Comments Off READ FULL POST
Written by Susanna Lichter Edited by Laura Fishwick Editorial Policy “CyberPatrol, ” “SniperSpy,” and “IamBigbrother” are the names of keyloggers that might be installed on your office computer. These easy to use and inexpensive hardware or software devices record keystrokes and allow a monitor to access email, and other password-protected accounts of an unsuspecting typist. Employers are using keyloggers more often in the workplace to oversee employees without their knowledge. Managers argue that computer surveillance is important to ensure productivity, ... Read More...
Posted On Jan - 30 - 2012 Comments Off READ FULL POST
By Susanna Lichter New Cyberweapon Duqu Possibly Spawned from Stuxnet Worm Computer security analysts warn that Stuxnet, the sophisticated worm that wreaked havoc on Iran’s nuclear program, could be a precursor to more cyber attacks on industrial control systems, according to The Washington Post. There is definite evidence that Duqu, a dangerous new weapon that appears to borrow some of the Stuxnet original source code, was used in an attack last month. The New York Times reports that authorities are divided ... Read More...
Posted On Nov - 3 - 2011 Comments Off READ FULL POST
  • RSS
  • Facebook
  • Twitter
  • GooglePlay
Photo By: archie4oz - CC BY 2.0

Silk Road 2.0 Takedo

  [caption id="attachment_4363" align="alignleft" width="150"] Photo By: archie4oz - CC BY ...

Unknown

Federal Circuit Flas

By Ken Winterbottom Motion to Dismiss in Hulu Patent Infringement Suit ...

GOOGLE_APTHDVR_1268416f

Spain Passes a “Go

By Michael Shammas — Edited by Yixuan Long Amendments to the ...

radio-wireless-tower-clip-art_resized

Federal Circuit Tigh

By Kathleen McGuinness – Edited by Sabreena Khalid Azure Networks, LLC ...

Unknown

Flash Digest: News i

By Viviana Ruiz Russia’s Intellectual Property Court affirms denial of Ford's ...