Ethics in Social Media 2017

Total Page:16

File Type:pdf, Size:1020Kb

Ethics in Social Media 2017 © Practising Law Institute CORPORATE LAW AND PRACTICE Course Handbook Series Number B-2308 Ethics in Social Media 2017 Chair Richard Raysman To order this book, call (800) 260-4PLI or fax us at (800) 321-0093. Ask our Customer Service Department for PLI Order Number 186237, Dept. BAV5. Practising Law Institute 1177 Avenue of the Americas New York, New York 10036 © Practising Law Institute 1 Technology Law in the Digital Age: A Regularly-Updated Digest of Notable Developments (April 2016) Submitted by: Richard Raysman Holland & Knight LLP If you find this article helpful, you can learn more about the subject by going to www.pli.edu to view the on demand program or segment for which it was written. 31 © Practising Law Institute 32 © Practising Law Institute Table of Contents COPYRIGHT AND DIGITAL CONTENT .............................................................. 7 Modern Distribution of Digital Content .................................................. 7 Contributory and Vicarious Copyright Infringement ............................ 17 Copyright, Hot News, and News Aggregation..................................... 22 INFRINGEMENT AND MISAPPROPRIATION OF SOFTWARE AND TECHNOLOGY ......................................................................................... 26 Open Source Software ........................................................................ 31 Digital Millennium Copyright Act ......................................................... 35 Trade Secret and Other Misappropriation ........................................... 49 ONLINE DEFAMATION ..................................................................................... 51 CDA Section 230 Immunity ................................................................. 58 SOCIAL NETWORKS AND ONLINE ADVERTISING ....................................... 70 TRADEMARK INFRINGEMENT IN THE ONLINE ENVIRONMENT .................. 80 Keyword Advertising and Website Metatags ...................................... 84 Domain Name Litigation & Cybersquatting ......................................... 89 PRIVACY RIGHTS AND DATA SECURITY ...................................................... 94 Privacy-Related Enforcement Actions .............................................. 102 Computer Fraud and Abuse Act ....................................................... 105 Commercial Email and Spam ........................................................... 114 Telephone Consumer Protection Act ................................................ 117 First Amendment Issues in Digital Content ....................................... 120 TECHNOLOGY-RELATED PATENT LITIGATION .......................................... 124 ELECTRONIC CONTRACTING ....................................................................... 133 JURISDICTION AND PROCEDURE ................................................................ 138 3 33 © Practising Law Institute 34 © Practising Law Institute The secure establishment, in business and personal use, of the Internet and other modes of accessing information in digital form has raised novel and complex legal issues for today’s technology and intellectual property lawyers. The fast pace of this “information highway” stands in stark con- trast to the traditional landscape of commercial transactional and intel- lectual property law. Many existing laws were not designed to deal with a technology that disseminates information at the speed, with the con- venience, and to the mass audience now possible in the modern information age. Just as the number of Internet and wireless device users continues to multiply, the number of legal issues of first impression continues to make technology law an exciting and engaging area of practice. The information technology industry is constantly changing, and its evolution continues apace. New data and media formats, new applications and services, and new methods to access and store data are constantly introduced into the business and consumer markets. It is not only important for the technology law attorney to keep abreast of these changes, but also to the changes in the law. As such, this white paper provides a concise resource of some of the latest legal developments in technology law, data security and privacy, and e-commerce and licensing. For a more thorough discussion and consideration of these issues, please refer to Computer Law: Drafting and Negotiating Forms and Agreements, co-authored by Richard Raysman and Peter Brown (Law Journal Press 1984-2014), Intel- lectual Property Licensing: Forms and Analysis (Law Journal Press 1999- 2014), co-authored by Richard Raysman, Edward A. Pisacreta, Kenneth A. Adler and Seth H. Ostrow, and Emerging Technologies and the Law: Forms & Analysis (Law Journal Press 1994-2014), co-authored by Richard Raysman, Peter Brown, Jeffrey D. Neuburger and William E. Bandon, III. For a compendium of recent articles and alerts that discuss technology law issues in greater depth, please visit the firm’s website at www.hklaw. com and the Digital Technology & E-Commerce Blog. 5 35 © Practising Law Institute 36 © Practising Law Institute COPYRIGHT AND DIGITAL CONTENT Information technology has revolutionized the methods for creating, reproducing, and disseminating copyrighted works and has consequently opened the door to instances of wide-scale copyright infringement. Com- bined with powerful software applications, the Internet is an ideal medium, in terms of its ease of use and wide audience, for replicating copyrighted works. With the simple push of a button or a click of a mouse, a user can upload information, making it available to a worldwide audience, or extract and download information posted on the Web. Services or products that facilitate access to websites throughout the world can significantly magnify the effects of otherwise immaterial infringing activities. When copyrighted information is made available online without the permission of the copyright holder, two questions may arise: Who is liable? Under what legal theory (e.g., copyright infringement, DMCA violation, etc.)? A party who makes or distributes unauthorized copies of copyrighted works may be a direct infringer, but other participants, such as electronic bulletin board operators, website operators, bloggers, social network sites, peer-to-peer networks, video sharing sites, and ISPs, can potentially be liable as contributory or vicarious infringers. Modern Distribution of Digital Content ○ American Broadcasting Companies, Inc. v. Aereo, Inc. – Aereo, Inc. sold a service that allowed its subscribers to watch television programs over the Internet at about the same time as the programs are broadcast over the air. When a subscriber wants to watch a show that is currently airing, he selects the show from a menu on Aereo’s website. Aereo’s system, which consists of thousands of small antennas and other equipment housed in a centralized ware- house, responds roughly as follows: A server tunes an antenna, which is dedicated to the use of one subscriber alone, to the broad- cast carrying the selected show. A transcoder translates the signals received by the antenna into data that can be transmitted over the Internet. A server saves the data in a subscriber-specific folder on Aereo’s hard drive and begins streaming the show to the sub- scriber’s screen once several seconds of programming have been saved. The streaming continues, a few seconds behind the over- the-air broadcast, until the subscriber has received the entire show. In the 2014 term, the Supreme Court held that Aereo’s service both (a) “performed” the copyrighted works within the meaning of the Copyright Act, and (b) “performed” the works “publicly” 7 37 © Practising Law Institute within the meaning of the Transmit Clause of the Act.1 Accord- ingly, Aereo was committing copyright infringement by retrans- mitting the signals of the broadcaster’s without consent. After two Supreme Court cases holding that the rechanneling of broad- caster signals rendered the entities doing the rechanneling as “view- ers” and not “performers” the Act was amended to “completely overturn[]” the “narrow construction” employed in those cases.2 In relevant part, the Act was amended so that both the broadcaster and the viewer “perform” the work because they both show the program’s images and make audible the program’s sounds. The court likewise held that Aereo performed the works publicly under the meaning of the Transmit Clause. Among other reasons for holding that Aereo performed the copyrighted works publicly, the court held that: (1) the stated objectives of the Act amendments should not yield to the unique nature of the Aereo transmission system given that Aereo has a commercial objective and its service does not deliver programming to its viewers in any way so as to alter the viewing experience (2) the statutory language of the Act indicates that the Transmit Clause refers to multiple, discrete transmissions (as Aereo would do any time any 2 or more of its subscribers were watching the same program) and not a single transmission; (3) and that Aereo facilitates the performance of the works publicly because its subscribers may receive the same pro- grams at different times and locations, and under the Transmit Clause “the public” need not to be situated together, spatially or temporally. Rather, a work is transmitted publicly under this clause “whether the members capable of receiving the performance … receive it in the same place or in separate places and at the same 1. American Broadcasting Companies,
Recommended publications
  • Nominative Fair Use: Legitimate Advertising Or Trademark Infringement?
    Nominative Fair Use: Legitimate Advertising or Trademark Infringement? Louis S. Ederer Arnold & Porter LLP 399 Park Avenue New York, New York 10022 [email protected] Classic Statutory Fair Use: Defense to Trademark Infringement Under The Lanham Act Under the Lanham Act, the Fair Use Doctrine protects certain uses of registered trademarks from infringement claims when the use of the name, term, or device is “a use, otherwise than as a mark, of a term or device that is descriptive of and used fairly and in good faith only to describe goods or services of [a] party, or their geographic origin.” 15 U.S.C. § 1115(b)(5)(A)-(C) (2006) (emphasis added). In other words. TARGET PRACTICE! v. = No infringement Saturday, April 23 10:30AM At Charles Cove Field 1 Nominative Fair Use: Nominative Fair Use versus Classic Fair Use • Classic fair use is where the junior user (e.g., the Target Practice advertiser) uses someone else’s mark not as a trademark (e.g., not to refer to the mega- brand Target), but merely to describe its own goods or services. • Nominative Fair Use, on the other hand, is where the junior user uses another’s trademark deliberately to refer to that party, for purposes such as: • News Reporting • Commentary • Parody • Advertising (particularly comparative advertising) 2 Nominative Fair Use: Limitations So, what happens when a party seeks to advertise its goods or services by referring to another party’s mark? Is it trademark infringement? Or legitimate advertising? 3 Nominative Fair Use: Early & Seminal Case Law New Kids on the Block v.
    [Show full text]
  • Intellectual Property Law in Cyberspace
    Intellectual Property Law in Cyberspace Second Edition CHAPTER 7 UNIQUE ONLINE TRADEMARK ISSUES Howard S. Hogan Stephen W. Feingold Gibson, Dunn & Crutcher Kilpatrick, Townsend & Stockton Washington, D.C. New York, NY CHAPTER 8 DOMAIN NAME REGISTRATION, MAINTENANCE AND PROTECTION Howard S. Hogan Stephen W. Feingold Gibson, Dunn & Crutcher Kilpatrick, Townsend & Stockton Washington, D.C. New York, NY Intellectual Property Law in Cyberspace Second Edition G. Peter Albert, Jr. and American Intellectual Property Law Association CHAPTER 7 UNIQUE ONLINE TRADEMARK ISSUES CHAPTER 8 DOMAIN NAME REGISTRATION, MAINTENANCE AND PROTECTION American Intellectual Property Law Association A Arlington, VA Reprinted with permission For more information contact: bna.com/bnabooks or call 1-800-960-1220 Copyright © 2011 The Bureau of National Affairs, Inc. Library of Congress Cataloging-in-Publication Data Albert, G. Peter, 1964– Intellectual property law in cyberspace / G. Peter Albert, Jr. -- 2nd ed. p. cm. Includes bibliographical references and index. ISBN 978-1-57018-753-7 (alk. paper) 1. Industrial property--United States. 2. Computer networks--Law and legislation--United States. 3. Internet 4. Copyright and electronic data processing--United States. I. Title. KF3095.A77 2011 346.7304’8--dc23 2011040494 All rights reserved. Photocopying any portion of this publication is strictly prohibited unless express written authorization is first obtained from BNA Books, 1231 25th St., NW, Washington, DC 20037, bna.com/bnabooks. Authorization to photocopy items for internal or personal use, or the internal or personal use of specific clients, is granted by BNA Books for libraries and other users registered with the Copyright Clearance Center (CCC) Transactional Reporting Service, provided that $1.00 per page is paid directly to CCC, 222 Rosewood Dr., Danvers, MA 01923, copyright.com, Telephone: 978-750-8400, Fax: 978-646-8600.
    [Show full text]
  • Public Citizen Copyright © 2016 by Public Citizen Foundation All Rights Reserved
    Public Citizen Copyright © 2016 by Public Citizen Foundation All rights reserved. Public Citizen Foundation 1600 20th St. NW Washington, D.C. 20009 www.citizen.org ISBN: 978-1-58231-099-2 Doyle Printing, 2016 Printed in the United States of America PUBLIC CITIZEN THE SENTINEL OF DEMOCRACY CONTENTS Preface: The Biggest Get ...................................................................7 Introduction ....................................................................................11 1 Nader’s Raiders for the Lost Democracy....................................... 15 2 Tools for Attack on All Fronts.......................................................29 3 Creating a Healthy Democracy .....................................................43 4 Seeking Justice, Setting Precedents ..............................................61 5 The Race for Auto Safety ..............................................................89 6 Money and Politics: Making Government Accountable ..............113 7 Citizen Safeguards Under Siege: Regulatory Backlash ................155 8 The Phony “Lawsuit Crisis” .........................................................173 9 Saving Your Energy .................................................................... 197 10 Going Global ...............................................................................231 11 The Fifth Branch of Government................................................ 261 Appendix ......................................................................................271 Acknowledgments ........................................................................289
    [Show full text]
  • Celebrity in Cyberspace: a Personality Rights Paradigm for Personal Domain Name Disputes
    Celebrity in Cyberspace: A Personality Rights Paradigm for Personal Domain Name Disputes Jacqueline D. Lipton* Abstract When the Oscar-winning actress Julia Roberts fought for control of the <juliaroberts.com> domain name, what was her aim? Did she want to reap economic benefits from the name? Probably not, as she has not used the name since it was transferred to her. Or did she want to prevent others from using it on either an unjust enrichment or a privacy basis? Was she, in fact, protecting a trademark interest in her name? Personal domain name disputes, particularly those in the <name.com> space, implicate unique aspects of an individual’s persona in cyberspace. Nevertheless, most of the legal rules developed for these disputes are based on trademark law. Although a number of individuals have successfully used these rules in practice, the focus on trademark law has led to inconsistent and often arbitrary results. This Article suggests that if personal names merit legal protection in cyberspace, it should be under an appropriate set of legal rules, rather than through further expansion of trademarks. This Article develops a new framework for personal domain name disputes based on the theories underlying the right of publicity * Professor, Co-Director, Center for Law, Technology and the Arts, Associate Director, Frederick K. Cox International Law Center, Case Western Reserve University School of Law. The author would particularly like to thank Professor Mark Janis whose comments on a previous paper proved to be the inspiration for this one. The author would also like to thank Professor Diane Zimmerman, Professor Mark Lemley, Professor Cynthia Ho, Professor Mark McKenna, Professor Brett Frischmann, Professor Lawrence Solum, Professor Amitai Aviram, Professor Ann Bartow, Professor Paul Heald, Professor Ilhyung Lee, and Professor B.
    [Show full text]
  • The Future According to Google
    Travis: THE FUTURE ACCORDING TO GOOGLE THE FUTURE ACCORDING TO GOOGLE: TECHNOLOGY POLICY FROM THE STANDPOINT OF AMERICA'S FASTEST-GROWING TECHNOLOGY COMPANY By Hannibal Travis* 11 YALE J.L. & TECH. 209 (2009) As the fastest-growing technology company in the United States,' Google has been at the center of some of the most contentious technology policy disputes of recent years. In the federal courts, these disputes focus on the fair or noncommercial use of copyrighted work and trademarks on the Internet. In Congress, Google is leading the charge in favor of laws protecting innovative Internet companies from discriminatory or exorbitant charges by broadband and wireless infrastructure providers. It has also been a vocal opponent of excessive governmental control over Internet content. Copyright lawsuits arising out of search engines and user- generated content sites such as Google Video and YouTube have the potential to change the rules governing communication over the Internet. Similarly, trademark litigation alleging that comparative and Internet keyword-based advertising are infringing may limit the ability of technology companies and their customers to compete online. Many technology companies also believe that injunctive relief obtained by the owners of patents in comparatively minor components of complex software-enabled products may chill innovation and divert capital away from applied research. But it seems that the power of infrastructure providers to favor allied content providers has truly spooked technology leaders like Google. Meanwhile, Google, other technology and Internet companies, and members of Congress have demanded action to limit foreign governments' ability to block U.S.-based Web content from being accessed by persons present in their territory.
    [Show full text]
  • The Power of Internet Gripe Sites Managing the Destructive Potential of “Brandsucks.Com”
    Perspectives Volume 3, Issue 6 Gripe Sites The Power of Internet Gripe Sites Managing the Destructive Potential of “BrandSucks.com” Background on Direct Navigation For any consumer, navigating the Internet can be challenging task. Given the omnipresence of search engine portals such as Google and Yahoo!, one might assume that Internet users primarily use search engines to reach their intended destinations online. However, WebSideStory’s StatMarket division (now a part of Omniture) estimated that more than 67 percent of global Internet users arrive at Web sites by direct navigation.1 This type of navigation, also known as type-in or direct search, is defined as traffic derived from a visitor arriving at a Web site by keying a word or phrase into the browser address bar rather than following a link, a bookmark, or a search engine’s results. Typically, direct navigation users type in generic terms or brand names plus generic terms. For example, a direct navigation user may type in realestate.com when looking for information on purchasing a home or may type in remaxagent.com when looking for a RE/MAX real estate agent. Even the most savvy of users can miss a keystroke and unintentionally stumble upon an unexpected site. They can be unwittingly exposed to overt schemes involving spyware, phishing or at the very least, a poor experience while searching for a product or brand site. Unfortunately, this reality often prompts brand owners to focus primarily on FairWinds Partners, LLC | Internet Strategy Consulting Page 1 of 17 2122 P Street, NW | Suite 300 Washington, D.C.
    [Show full text]
  • Insight MFR By
    Manufacturers, Publishers and Suppliers by Product Category 11/6/2017 10/100 Hubs & Switches ASCEND COMMUNICATIONS CIS SECURE COMPUTING INC DIGIUM GEAR HEAD 1 TRIPPLITE ASUS Cisco Press D‐LINK SYSTEMS GEFEN 1VISION SOFTWARE ATEN TECHNOLOGY CISCO SYSTEMS DUALCOMM TECHNOLOGY, INC. GEIST 3COM ATLAS SOUND CLEAR CUBE DYCONN GEOVISION INC. 4XEM CORP. ATLONA CLEARSOUNDS DYNEX PRODUCTS GIGAFAST 8E6 TECHNOLOGIES ATTO TECHNOLOGY CNET TECHNOLOGY EATON GIGAMON SYSTEMS LLC AAXEON TECHNOLOGIES LLC. AUDIOCODES, INC. CODE GREEN NETWORKS E‐CORPORATEGIFTS.COM, INC. GLOBAL MARKETING ACCELL AUDIOVOX CODI INC EDGECORE GOLDENRAM ACCELLION AVAYA COMMAND COMMUNICATIONS EDITSHARE LLC GREAT BAY SOFTWARE INC. ACER AMERICA AVENVIEW CORP COMMUNICATION DEVICES INC. EMC GRIFFIN TECHNOLOGY ACTI CORPORATION AVOCENT COMNET ENDACE USA H3C Technology ADAPTEC AVOCENT‐EMERSON COMPELLENT ENGENIUS HALL RESEARCH ADC KENTROX AVTECH CORPORATION COMPREHENSIVE CABLE ENTERASYS NETWORKS HAVIS SHIELD ADC TELECOMMUNICATIONS AXIOM MEMORY COMPU‐CALL, INC EPIPHAN SYSTEMS HAWKING TECHNOLOGY ADDERTECHNOLOGY AXIS COMMUNICATIONS COMPUTER LAB EQUINOX SYSTEMS HERITAGE TRAVELWARE ADD‐ON COMPUTER PERIPHERALS AZIO CORPORATION COMPUTERLINKS ETHERNET DIRECT HEWLETT PACKARD ENTERPRISE ADDON STORE B & B ELECTRONICS COMTROL ETHERWAN HIKVISION DIGITAL TECHNOLOGY CO. LT ADESSO BELDEN CONNECTGEAR EVANS CONSOLES HITACHI ADTRAN BELKIN COMPONENTS CONNECTPRO EVGA.COM HITACHI DATA SYSTEMS ADVANTECH AUTOMATION CORP. BIDUL & CO CONSTANT TECHNOLOGIES INC Exablaze HOO TOO INC AEROHIVE NETWORKS BLACK BOX COOL GEAR EXACQ TECHNOLOGIES INC HP AJA VIDEO SYSTEMS BLACKMAGIC DESIGN USA CP TECHNOLOGIES EXFO INC HP INC ALCATEL BLADE NETWORK TECHNOLOGIES CPS EXTREME NETWORKS HUAWEI ALCATEL LUCENT BLONDER TONGUE LABORATORIES CREATIVE LABS EXTRON HUAWEI SYMANTEC TECHNOLOGIES ALLIED TELESIS BLUE COAT SYSTEMS CRESTRON ELECTRONICS F5 NETWORKS IBM ALLOY COMPUTER PRODUCTS LLC BOSCH SECURITY CTC UNION TECHNOLOGIES CO FELLOWES ICOMTECH INC ALTINEX, INC.
    [Show full text]
  • Apple Remote Desktop Protocol Specification
    Apple Remote Desktop Protocol Specification Demonology and foreknowable Bobby powwows almost dishonorably, though Rolland intoning his repassages aspiring. Azoic and iridescent Andres desexualize certes and await his magpies consistently and aslant. Ungrudged Virgil reacquires ornately. Free Rdp Demo Animals Way SA. Deciphering the Messages of Apple's T2 Coprocessor Duo. Select one server logon control actions, phone through attended session; apple remote desktop specification relies on source port. Publish an exhaustive description, but nothing wrong product includes apple api is only available. Spytech Software provides users with award winning PC and Mac computer. Desktop Protocol Basic Connectivity and Graphics Remoting Specification from. Remote fork and a Desktop ready for your PC Mac and Linux devices. Rdesktop A long Desktop Protocol Client. Nx client linux skarban. Realvnc multiple monitors mac Arte in zucca. For RDP exist for Microsoft Windows Mic04d and Mac OS X Mic04c. The remote desktop feature a compatible with direct mode run the Apple. VMWare Apple Remote Desktop Microsoft Remote Desktop Connection. Enter your machines. CudaLaunch Barracuda Networks. No longer need this is included in using notepad on? Recipe how the Apple Wireless Direct Link Ad hoc Protocol arXiv. Apple remote and free download mac. Ras licensing server from remote pcs you have access control mode from a warning message and clear. Open source vnc Symmetry Scribes. Live video streaming production software Tech Specs. Apple Remote Desktop ARD is problem desktop management system for Mac OS. Record level accessibility api decides what you can! Remote not Software BeyondTrust aka Bomgar Jump. Remote desktop retina display. Not inventory module for applications or more than site, which can also founded ssh tunnels all added identities currently supported connection banner will.
    [Show full text]
  • You Voted See Who You Selected As the Best We’Re Proud to Have Made It to the TOP Thank You for Voting Us BEST TITLE AGENCY in NY!
    You Voted see who You selected as the best We’re proud to have made it to the TOP Thank you for voting us BEST TITLE AGENCY in NY! 2012 National, international, residential and commercial title. • 631.424.6100 • 800.285.1551 • WWW.ADVANTAGETITLE.COM THE ADVANTAGE GROUP: ADVANTAGE TITLE • ADVANTAGE FORECLOSURE • ADVANTAGE LEGAL • ADVANTAGE SETTLEMENT • MORTGAGE ADVANTAGE Copyright ©2011 ALM Properties, Inc., All rights reserved. Table of Contents For subscription information: 888-770-5647 For advertising information: 212-457-9465 or fax: 646-822-5029 Letter from the Editor 2 For reprint information: 877-257-3382 or 347-227-3382 [email protected]. Printed in the U.S.A. Technology 4 Farrell McManus PUBLISHER/EDITOR 12 ADVERTISING SALES Consulting/Outsourcing Peter Hano [email protected] (Consumer/Luxury/Retail/Restaurants) Roseann Agostino [email protected] (Recruiters/Law Schools/Real Estate) Richard Berger [email protected] (Litigation Support & Technology) Research/News 14 Patty Martin [email protected] (Accounting/Consulting/Financial) Indera Singh [email protected] (Law Firms/Law Schools/CLE) GROUP DIRECTOR, AUDIENCE DEVELOPMENT Accounting/Financial Services/Insurance 18 Shane Molloy [email protected] CIRCULATION FULFILLMENT DIRECTOR Michael Cirillo [email protected] Litigation Support 26 ALM SENIOR MANAGEMENT PRESIDENT/CHIEF EXECUTIVE OFFICER Bill Carter Real Estate 36 SENIOR VICE PRESIDENT/CHIEF operating OFFICER Kevin Michielsen SENIOR VICE PRESIDENT/CHIEF FINANCIAL OFFICER Eric F. Lundberg Alternative Dispute Resolution 38 SENIOR
    [Show full text]
  • Technology Law Quarterly Volume 3, Issue 3
    McCarthy Tétrault Co-Counsel: Technology Law Quarterly Volume 3, Issue 3 July – September 2007 Co-Counsel Co-Counsel: Technology Law Quarterly Volume 3, Issue 3 Welcome to Volume 3, Issue 3 of McCarthy Tétrault Co-Counsel: Technology Law Quarterly. In this issue of the TLQ, we highlight a recent Supreme Court of Canada decision on the enforceability of mandatory arbitration clauses in consumer contracts, including in online terms and conditions. Businesses that sell or make goods and services available to consumers in Canada, including over the Internet, and particularly Ontario and Québec, will want to read this article. On the software licensing front, we begin a four-part series on the Open Source Initiative, licensing models of intellectual property and the copyleft regime under the GNU General Public License. On the intellectual property side, our copyright lawyers analyze the important Supreme Court of Canada Euro-Excellence v. Kraft Canada case. Privacy continues to be a hot topic, and we’ve included two interesting pieces in the area. The first discusses the recently released privacy breach guidelines. The Privacy Commissioner of Canada has prepared guidelines on how organizations subject to PIPEDA should respond to privacy breaches. Our privacy experts address the four key steps to consider when responding to a breach or suspected breach, including the contentious notification provision. The second article speaks to the OECD recommendation on cross-border privacy enforcement, which updates the OECD’s guidelines on privacy and trans-border data flows. Our lawyers examine the Canada-specific concerns and provide their insight on the key points of the recommendation.
    [Show full text]
  • The Complex Patent Ecosystem and Its Implications for the Patent System
    Chien_62-HLJ-297 (Do Not Delete) 2/4/2011 2:27 PM From Arms Race to Marketplace: The Complex Patent Ecosystem and Its Implications for the Patent System Colleen V. Chien* For years, high-tech companies have amassed patents in order to deter patent litigation. Recently, a secondary market for patents has flourished, making it more likely that patents that would otherwise sit on the shelf will end up in the courtroom. This Article explores the current patent ecosystem, which includes both “arms race” and “marketplace” paradigms, in depth. I distinguish “patent-assertion entities,” entities that use patents primarily to obtain license fees rather than to support the development or transfer of technology, from other types of non-practicing entities. I contrast the patent arms race, whose goal is to provide entities with the freedom to operate, with the marketplace, through which entities have leveraged their freedom to litigate. I detail the participation of product companies as well as non-practicing companies and their intermediaries in the marketplace, and trace the diverse “pathways” traveled by patents from a diversity of sources including failed startups and product companies like Micron, to entities like Round Rock and Intellectual Ventures. Several implications follow. First, the failure of the patent arms race to deter lawsuits from patent assertion entities as well as practicing companies in certain cases means that defensive strategies must be reconceptualized to include new tactics—including prevention, disruption, and coordination—for securing freedom to operate. In addition, if stockpiles of unused patents patent continue to fall into the hands of patent-assertion entities, defensive patenting may ironically have the net effect of increasing, rather than decreasing, litigation risk.
    [Show full text]
  • CSU, Fullerton VCL Implementation
    Virtual Computing Infrastructure Information Technology Academic Tech Day – Feb. 15, 2011 http://titancloud.fullerton.edu CSU Fullerton – VCL Implementation Team • James O’Dell, VCL Project Technical Lead ([email protected]) • Willie Peng, CSUF Infrastructure Architect ([email protected]) • Sepehr Sobhani, VCL Image Deployment ([email protected]) • Sean Atkinson, Virtualization Project Lead ([email protected]) • Amir Dabirian, VPIT / CIO ([email protected]) • Rommel Hidalgo, Infrastructure Services ([email protected]) • University Data Center • Server Infrastructure • Network Infrastructure Integrated Technology Strategies CSUF Information Technology Governance Sustainable Collaborative Visionary Security Information Technology Accessible Accessible CSUF Integrated Technology Strategies “The Integrated Technology Strategies are a set of interrelated information technology strategies that are visionary, collaborative, and sustainable while maintaining compliance and security.” These strategies are designed to meet the missions and goals of the University through campus-wide Information Technology Governance. Cloud Computing The set of disciplines, technologies, and business models used to deliver IT capabilities (software, platforms, hardware) as an on-demand, scalable, elastic service How can I make Look more this... like this? Infrastructure Infrastructure Strategy Virtualization, Cloud Computing, etc. • Cloud Computing – Public and Private Cloud (VCL) Strategy – Cloud Computing planning tool for deployment
    [Show full text]