Articles Posted in Technology

With the ever-increasing dominance of cameras in our society, we might never think to ask “can someone find me from a picture?”  How futuristic would it be, to snap a picture of someone’s face and see their social media? To use a face like a business card? While technology may not be at that point, the law seems to be ahead of the curve. Currently, there are two lawsuits regarding the “tagging” of a person’s image online through social media due to one state’s law protecting biometric privacy, and how that affects us in interstate commerce. So, what is this law? What are the details of the lawsuits? How might this affect interstate commerce in general?

What are the lawsuits about?

The law itself comes out of Illinois, prompted by biometric additions to payment systems. Biometric data itself is quite common. It could include an individuals’ face, voice, fingerprint, retina scan, or blood type.  Anything that comes from the individual’s body that is recorded could qualify. This would then be used to determine the person’s identity or recorded for their own use, like in a health-monitoring app. The law requires any entity that is collecting this type of information, both tell the individuals, and explicitly obtain their consent.

In the future, drones may be a commonplace since businesses are using drones for commercial purposes, and individuals are flying drones as a hobby. You may wonder about your privacy with all those eyes in the sky. Drones that can go about, without giving you a way to stop them. As shooting a drone out of the sky is generally frowned upon, what could you do to protect your privacy and your legal rights? With all that information on drones, what you can do, where you can fly, what about the laws that protect you from drones? What protects your privacy? What protects your business?

How to protect your privacy from drones?

In protecting privacy, there are a few aspects that have been mentioned earlier.  Namely the FAA requirements to register and display a drone’s registration. Following that, it is encouraged to report any improper use of a drone. Given that a drone’s registration number must be on the drone, it does mean if a drone is infringing on your privacy, then you can report it to local law enforcement agencies.

So far, we have discussed what licenses are necessary and how you will be using your drone. Surely, there can’t be more issues.  Well, not quite. Following the issuance of drone licenses, there are restrictions on where and when these drones can fly.  Be it for safety or for general security concerns, drones are not allowed in all national airspace. So, where can you fly? What sort of events and situations would cause the airspace to become restricted? Is there any way to fly without licensing or airspace restrictions?

Where can you fly?

This first aspect is an interesting one. When you fly, you are generally flying in the National Airspace. Be it from a blade of grass to the wild blue sky, that space is regulated by the Federal Aviation Administration.  However, not all of that space is available for drones. First, is the restriction on altitude, ranging your navigation to approximately 400 feet, and restrictions on piloting drones in certain areas, like sporting arenas, restricted airspace (e.g., Disneyland), heavily populated areas and airports. This is mainly due to security concerns, as it is measured by what damage a drone can do in those areas. For example, it is generally prohibited to fly model aircrafts within five miles of an airport without notifying the tower, to prevent any difficulties with takeoffs and landings.  In those cases, where a drone may be piloted, it’s generally with a letter of agreement with the airport, detailing the operator’s authorization.

In our ever-evolving world, there are always new technologies and new opportunities.  Why invest in a person when a machine can do the work for its useful life? Why hire a taxi driver when the car can drive itself? How could you pay for a helicopter or carrier fees when a drone can deliver the goods on its own?  However, as with all things, life is not that easy. If you plan on using drones or Unmanned Aircraft Systems (UAS), then there are some facts you need to know, as the Federal Aviation Administration (FAA) has set forth restrictions. So, what do you need to fly? How do you register a drone? Who can fly a drone?

Who can fly a drone?

In order to fly for commercial purposes it is required that the business have: (1) a Section 333 grant of exemption; (2) a Certificate of Waiver or Authorization; (3) a registered drone; and (4) a pilot with an FAA airman certification. This is a unique qualification for businesses only and hobbyists or recreational drone use would be allowed without having to jump through these requirements.

Where are the limits of copyright?  Copyright in general is limited to those new and original works, fixed in a tangible medium.  In regards to computer programs, they are also considered literary works for the purposes of copyright law, and so, it could be argued that the language of a system could be granted copyright protections.  However, what happens when it is not simply a computer program, but the language the programs use that is subject to copyright? Can a language be subject to copyright protection?  Does it matter what the language is used for?

Oracle v. Google: API as a Copyrightable Language

Our first example is the ongoing Oracle v. Google case.  As it stands currently, Google has lost, pending the results of the remanded decision later this month regarding any fair use defenses.  This has resulted in the copyright being granted to Oracle for Java’s API (i.e., Application Programming Interface), which is a computer code that allows programs to talk to one another, like the share button on this blog post’s page, allowing a person to link this post to Twitter or Facebook.  Those codes were provided by Twitter/Facebook, and allow the browser to “talk” to another application.

A new economy has been developing for a while, opening a unique market, with new opportunities. This is what’s called the new “sharing” economy with an entrepreneur presenting a way to connect willing participants for an economic transaction.  This has evolved from something like Craigslist, to a more user-friendly and app-based operation.  Namely, this includes businesses like Uber, Lyft, and AirBnB.

Yet now, it has opened a question with Uber via a proposed settlement about whether the service providers are employees or independent contractors.  So, what happens when you begin to question the standards of a business operation?  To what end can you control the product to ensure that there is a strong method to your brand?  How long can a settlement keep service providers from claiming they are employees and not independent contractors?

The Business Model

This one isn’t an April Fools’ prank.  On April 1, 2016, the Federal Communications Commission (“FCC”) announced its proposed rulemaking to create regulation that would bind Broadband Internet Access Service (“BIAS”) providers in the interest of enhancing privacy towards consumers.  This proposal has raised objections from AT&T, Comcast, USTelecom, and the Application Developer’s Alliance, claiming that the ensuing regulations would create a morass of regulation in the privacy sphere.  Yet, the FCC’s regulations are to prohibit the monetization of the information that these providers would have due to the use of their services.  So, what is a BIAS and how could these rules possibly protect privacy?

What is a BIAS provider?

The BIAS providers provide internet service through wire or radio.  The FCC even expands this to any functional equivalents to BIAS providers. Of some note is which entities are not BIAS entities.  For example, companies like Facebook, Apple, and to some extent, Google, would not be bound by the terms here and could use the information that is collected through their services.  This is because none of them actually provide the internet service that their consumers use.  There is some room for Google to be prohibited as it provides internet service in some locations through Google Fiber, but the regulations would only prohibit the information that was gained through the use of its internet services, but not services that it provides towards online consumers.  Thus, Google’s Fiber service would likely be prohibited from using consumer’s personal information, while Google’s YouTube service would not.

As we discussed in part one of this issue, during the late morning of December 2, 2015, a couple armed with weapons walked into a banquet room filled with people.  At first, the attack was categorized as another mass shooting that ended in a large number of fatalities. As the investigation continued, however, more details emerged surrounding the couple.  The FBI concluded that they were “homegrown violent extremists” that had no connection to foreign terrorist organizations. They were merely inspired by such organizations and committed the attack by their own volition.

During the investigation, the FBI obtained Syed Rizwan Farook, one of the shooters, cell phone. The FBI was attempting to gain access to the information stored on the phone, but the method they employed locked them out. As a result, the FBI asked Apple if they were willing to create a program that would create a backdoor. This backdoor would disable certain security features and allow investigators to access Farook’s phone. Apple, however, refused to do so, citing consumer privacy. The FBI then successfully applied for a court order. The judge ordered Apple to create the software, but Apple filed an opposition. In response to the opposition, the Department of Justice applied its own court order, requesting the judge to require Apple to comply with the first order. The federal judge has yet to rule on the request.

Apple’s Argument

On December 2, 2015, Syed Rizwan Farook and Tashfeen Malik, walked into a banquet room at the Inland Regional Center in San Bernardino, California, armed with semi-automatic weapons. At the time, the San Bernardino County Department of Public Health was holding a training event and holiday party.  Approximately 75-80 people were in attendance. The couple opened fire, and in a matter of several minutes, killed 14 people and seriously injuring 22 others. The couple left the scene before the police arrived at the crime scene.

Immediately thereafter, law enforcement officials started a search for the couple who left in a black SUV. Based on a tip from one of Farook’s neighbors, officers went to his home and a car chase ensued. The SUV eventually stopped and there was an exchange of gunfire between the couple and officers. The couple was killed in the five-minute exchange.

While investigating the case, investigators found a possible link to a foreign terrorist group thereby ruling it a terrorist attack. However, after FBI investigations, it was concluded the couple were “homegrown violent extremists” inspired by foreign terrorist groups. The investigation stated they were not directed by a particular foreign terrorist group or part of any terrorist cell.

The Internet has become an important aspect in our lives. With the Internet, people can pay bills, make appointments, and buy or sell products.  For example, websites like Amazon, Craigslist, and eBay allow the public to buy and sell products.  So, due to the ease of e-commerce transactions, counterfeiters have found a new medium to sell products.  E-commerce transactions do not require a physical meeting of the seller and buyer, so it becomes easier for counterfeiters to falsely claim they are selling authentic products.

Not only do online counterfeiters affect the public, but they affect businesses as well. Counterfeit items can affect a business’s bottom line. Counterfeit items can cause loss of sales, bad reputation, and loss of goodwill.

A way a business can address online counterfeiting problems is by hiring investigators to locate and identify the online counterfeiters. These investigators are skilled at online fraudulent transactions and can become valuable assets. The investigators create a list of sellers that are known to sell counterfeit items or have the typical characteristics of online counterfeit sellers. These characteristics include selling designer items for an extremely low price on low quality websites. The list is then sent to the business and the business determines whether or not it wants to conduct a sting operation to confirm the counterfeit nature of the seller. If the business decides to conduct the sting operation, then the investigator will set up a purchase, make an inspection, and determine if the goods are actually counterfeit.