Articles Posted in Technology

If you have ever been involved in a federal civil lawsuit, you may be familiar with the Federal Rules of Civil Procedure (FRCP).  The FRCP are a set of rules that regulate federal civil lawsuits. The rules address issues from court and party obligations to enforcement of remedies. The FRCP was first adopted by order of the Supreme Court in 1937 and placed into effect in 1938.

On December 1, 2015, these rules were amended. Many of the changes affect electronic discovery (e-discovery). Prior to the internet age, discovery and discoverable evidence were primarily based upon paper transactions.  With the rapid rise of the web, many started to turn to electronic storage of information.  As the data and information-storage landscapes began to change, the rules had to change.

The amendments brought changes to Rules 1, 4, 16, 26, 30, 31, 33, 34, 37, and 55.  The amendments also brought on the abrogation of Rule 85 and the Appendix of Forms. The changes that affect e-discovery are as follows:

The internet has become the home to many advances in the world. With one click of a button, a person can communicate with another person located on the other side of the world. With another click of a button, a person can buy a shirt and have it delivered right to his/her doorstep in a matter of days. Not only has the internet made things more convenient, it has become a tool in starting a business. Besides finding a tutorial to create a website, inventors can now fund their projects to bring their ideas to reality through crowdfunding. The inventor simply places his idea on a crowdfunding website, e.g., Kickstarter or Indiegogo, and sends the link to a large group. Depending on the invention’s popularity, the entrepreneur can raise a high amount of money with little effort.

Crowdfunding is starting to become a viable source of funding for startups. According to Forbes, crowdfunding is predicted to overcome venture capitalists next year.  Although, crowdfunding has made it easier to create a business, it does not come without legal problems. One of the biggest issues is intellectual property. From patent trolls, to patent infringement, crowdfunding websites have found themselves under attack by businesses.

In late 2012, 3D Systems brought a patent infringement lawsuit against Formlabs.  3D Systems alleged both direct and indirect patent infringement for its three-dimensional printing technology. This lawsuit came after Formlabs collected over $2 million from its crowdfunding campaign to put its three-dimensional printer into production. Formlabs was planning on selling the printer for less than 3D Systems’ printer, leading to the filing of the complaint. No answer was ever filed in the original suit, but a series of time extensions indicated that the companies were looking for a settlement. In late 2013, a notice of voluntary dismissal was filed and a settlement looked imminent.

ZeniMax Media, Inc. (“ZeniMax”) is a company that develops and publishes video games. These games include Fallout and Elder Scrolls. ZeniMax publishes the video games through its subsidiaries and has found widespread success in the gaming market. With that widespread success, ZeniMax was able to allocate funds for the development of virtual reality gaming.

In April 2012, a ZeniMax employee started communicating with Palmer Luckey. At the time, Luckey was a college student working on a virtual reality headset prototype named Rift. The ZeniMax employee took interest in Luckey’s creation and offered some help in its development. Luckey then sent the ZeniMax employee a copy of his prototype where the employee and other ZeniMax personnel added their own improvements. After their improvements, ZeniMax entered into a Non-Disclosure Agreement with Luckey to share the enhancements made on the prototype, including its use in a game ZeniMax developed.

After the prototype became a working model, ZeniMax performed demonstrations at the Electronic Entertainment Exposition. The demonstrations were only done by appointment. After adding his own modifications and merely days after the exposition, Luckey started to commercialize the headset under a newly-formed company called Oculus VR.

The term RFID is everywhere these days. Consumers are seeing RFID blocking wallets, credit card holders, and passport covers as the holidays approach. However, many still do not know what it is and how it is used in their every day life.

What is RFID?

RFID stands for “Radio Frequency Identification” and is a term used to describe technology that makes identifications via radio waves. It is usually discussed in conversations and articles about the Internet of Things because it is a form of automatic identification. The term automatic identification covers a broad range of identification technologies, from bar codes to retinal scans, used by machines to make identifications. The identification of people or objects occurs through the use of microchips that store electronic information. The microchip has an antenna and the information is picked up through a reader using radio waves. The microchip can be as small as a grain of sand and made out of silicone. Although, this technology has been in use since World War II, it has only become widely used in the past two decades as costs have decreased. RFID technology is now used in certain products and businesses. Walmart and other stores use RFID technology to keep track of products and consumer activities. They use RFID to do anything from detecting an item about to be stolen as it exits the door, or trigger cameras when an item is removed from the shelf. Anyone who has ever used the EZ-Pass toll roads has experienced the use of RFID technology as it is used to identify cars with EZ-Pass. Nonetheless, this is just a limited representation of the use of RFID technology to track consumers and products.

It is common knowledge that travelers have to take their laptop out of their suitcase upon arrival at airports.  However, not all people know the extent to which electronic devices can be confiscated and searched at the borders whether the traveler is a United States citizen or not.

Why and when can customs officials search your electronic device?

Once electronic devices enter the United States, the Fourth Amendment protects against unreasonable searches and seizures.  However, there is an exception to the Fourth Amendment protection at the borders.  In United States v. Ickles, the court confirmed that customs officials are allowed to search any cargo at the borders. In this case, a search of a vehicle’s cargo revealed a videotape focusing excessively on a young ball boy at a tennis match. A more thorough search uncovered drug paraphernalia, pornographic photographs, computer, and computer discs. The computer was confiscated after the defendant was arrested and searched, revealing child pornography. The defendant requested that the electronic evidence be suppressed claiming that the warrantless search of his electronic devices was protected by his First and Fourth Amendment rights. The court ruled that the search was justified because the border search doctrine indicates that reasonable suspicion and probable cause can be justification for searches without a warrant in order to protect against criminal activity. The First Amendment claim was ruled to be invalid as well because the content of a computer may be searched regardless of how expressive the discovered material may be in order to protect national interests.  The most recent case on this topic was United States v. Kim, which was heard and decided this year. This case was about a foreign national leaving the United States whose electronic devices were searched at the border. The search of his computer was found unlawful because although he may have committed a crime in the past, however, the crime had already occurred, and there was no reasonable suspicion or probable cause to search for imminent criminal activity.

The case of Eagle v. Morgan is about an employer’s access to employee’s social media account. This case highlights the importance of companies having social media policies to address the ownership of social media accounts during and after employment.

What is the case about and how does it affect your rights?

In Eagle v. Morgan, the plaintiff (i.e., Linda Eagle) had founded the company Edcomm, Inc. (“Edcomm”) and remained an employee when she sold her shares to Sawabeh Information Services Company (“SISCOM”). While employed at the company as CEO, Eagle’s coworker recommended creating a LinkedIn account for marketing purposes. Although, the business would occasionally become involved in the social media account’s content, and Eagle used her company email address, however, she was individually bound by the User Agreement and had made connections through her own efforts. Edcomm did not require its employees to have social media accounts and had only limited guidelines in place regarding employee use of LinkedIn. When Linda Eagle’s employment was terminated, the question of who owned the social media account became an issue. Edcomm changed Linda Eagle’s password by using her former company email address and replaced her name with that of her new replacement, i.e., Sandy Morgan.  Linda Eagle sued Edcomm and multiple defendants in the United States District Court for the Eastern District of Pennsylvania. She claimed that this was an infringement of the Computer Fraud and Abuse Act and Lanham Act, as well state laws against invasion of privacy by misappropriation of identity, conversion, civil conspiracy, civil aiding and abetting, tortious interference with contract, unauthorized use of name in violation of Pa. C.S. § 8316, misappropriation of publicity, and identity theft under Pa. C.S. § 8316.

From a practical perspective, transactions that occur over the Internet can face similar issues that regular business transactions may encounter in their daily operations.  However, e-commerce transactions have the added problems associated with cyberspace laws.  It is nearly impossible for a business to be successful these days without having a website. Although, not all websites actively conduct business over the Internet, however, e-commerce related issues and disputes may arise from having an online presence.

What issues and disputes face e-commerce transactions?

E-commerce transactions have created a new environment for companies that conduct their business on the Internet.  For example, contractual and non-contractual issues, such as free speech, consumer protection, and competition laws now face businesses that ship products, provide online goods/services, and use the Internet for marketing.  Therefore, conducting business online involves unique legal concerns that is distinct from traditional business models.  In sum, the concerns are centered on privacy, security, and regulation.

The phrase “e-commerce transactions” invokes thoughts of a complicated and technical phenomenon.  In fact, many people partake in e-commerce transactions every day.

What is an e-commerce transaction?

An electronic commerce (a/k/a “e-commerce”) transaction involves a commercial transaction that takes place over the Internet. So, any trading of products or services over any electronic network, including, but not limited to, the Internet, is considered a part of e-commerce. The e-commerce transactions covered by the term include, business-to-business, business-to-consumer, consumer-to-consumer, and consumer-to-business.  There are three categories of e-commerce transactions. There are agreements with: (1) Shrinkwrap terms—when a tangible product is delivered to a physical address usually in shrinkwrap or clear packaging; (2) Clickwrap terms—in which a digital product is delivered over a network (e.g., e-book); and (3) Browsewrap terms—when terms are agreed to in order for a consumer to access and use a website.  However, e-commerce does not always involve actual money.   The transaction can involve e-cash, digital currencies (e.g., Bitcoin), or services.

The Internet of Things (“IoT”) is the network of electronic devices that communicate with each other via the Internet without human intervention.  It has caused concerns regarding security since vast amounts of unsecure electronic devices are being used to send and receive information. Furthermore, the data breaches that lead to the loss of privacy have become more common as the Internet is used to connect electronic devices via private and public networks.

What is the proper security level for electronic devices?

Electronic devices that connect to each other over the Internet were created to transfer information, but were not originally designed with proper security features. What is the proper security level when electronic devices are interconnected? In order to avoid unauthorized access, security precautions should be implemented within the electronic devices and computer networks. For example, firewalls, encryptions, intrusion detection systems, and multi-factor authentications should be implemented as preventive and reactive measures. The electronic devices—which are accessed via the Internet—should be segmented into their own network and include network access restrictions.  Also, consumers should change the default passwords on smart devices and implement strong passwords.

A quantum computer is a highly-advanced computer system that works exponentially faster than today’s conventional computers. Quantum computing is the practice of studying quantum computers and their potential. This practice is growing and has caused the rapid decrease in the size of computers at the same time as these systems are rapidly increasing in their capability. However, quantum computers are still being developed and have not yet become accessible.

What is a quantum computer?

A quantum computer is an advanced computer system. Quantum computing studies theoretical computation systems which use quantum-mechanical phenomena (e.g., superposition, entanglement) to perform data operations.  While the average computer’s memory is made up of bits, a quantum computer’s memory is made up of qubits.  A regular computer saves information in binary form using zeroes and ones, which are called bits. These strings of numbers, which are comprised of 0s and 1s, create codes that instruct the computer on how to proceed. However, a qubit in a quantum computer is a particle (e.g., atom, electron, photon) which is manipulated to store information. It is a two-state quantum-mechanical system, such as the polarization of a single photon, which can be vertical and horizontal polarization.  So, the particle is manipulated in its quantum properties, like its spin or polarization, and can have multiple properties. Because of the flexibility and variation of qubits, more information can be stored on a quantum computer. Most importantly, information can be processed at an exponentially faster rate. For example, a problem that would take a conventional computer several minutes to solve due it its complexity, could be solved in less than a second by a quantum computer. This is because today’s conventional computers must go through each problem one step at a time, where a quantum computer has the ability to solve multiple problems instantaneously.