Articles Posted in Technology

In general, both copyright and patent laws provide different levels of protection for computer software. Additionally, depending on the aspects of software that an owner wants to protect, these two areas of law will apply differently. Furthermore, securing a patent is a more rigorous process. However, a patent does provide a greater degree of protection. On the other hand, obtaining a copyright is less difficult, but it also provides a thinner veil of protection.

What Protection Does Copyright Law Provide For Computer Software?

The Copyright Act of 1976 is codified under 17 U.S.C. sections 101 et seq. Traditionally, copyright has been the common form of protection for computer software. However, copyrights only protect the expression of a work, and not its underlying idea. Copyrights have been instrumental in preventing software piracy and infringement of related works. The protection applies to software because the underlying computer code is similar to the types of writings the law protects. So, copyright holders can protect their software much like other literary works (e.g., books, scripts). Copyright protection essentially provides broad protections for software. It grants the typical copyright authority depending on the nature of the software. The courts have grouped software with other literary works and provided copyright protection accordingly. There also exist inconsistencies in court decisions applying the Copyright Act to software. This difficulty arises because the legal community often lacks the technical expertise necessary to properly classify software. For instance, where a judge cannot understand the program’s code, he or she cannot determine whether another infringing program’s code is substantially similar. It is necessary to establish substantial similarity to find copyright infringement. Therefore, the lack in technical background has led to unclear definitions as to what constitutes software copyright infringement.

On September 23, 2013, Governor Jerry Brown signed Senate Bill 568 (“SB 568”) into law, which requires social media sites to permit children to permanently erase online posts. These websites, including, but not limited to, Facebook, Twitter, and Tumblr, will have to provide options for users under the age of 18 to delete texts, photos, and videos. However, this option will not extend to content that a third party uploads regarding the minor. Hence, as California works to implement this new law, public debate circles around its effects and whether it will actually be helpful in protecting children online.

What Are The Provisions Of California’s New Digital Erase Law?

The law addresses websites that are directed to minors and have actual knowledge that a user is a minor. The websites include ones created specifically for the purpose of targeting minors rather than adults. These websites must provide a method for underage users to remove public posts about them. Alternatively, these users may ask the website to remove the content. However, if a minor received any compensation (i.e., marketing benefits, rewards) for a post, then the post is not subject to this law. In theory, websites may provide minimal compensation to minors to circumvent this law and avoid having to take down any posts. Furthermore, the law is ambiguous in some areas. For example, it is unclear whether minors are required to erase the content while they are still minors or whether they retain the right to erase any content they posted as minors. These details will need to be clarified to ensure proper enforcement.

In a recent case, Petronas v. Godaddy.com, the Ninth Circuit held that “contributory cybersquatting” was not a valid theory for relief. This case addressed the issue of whether the Anti-Cybersquatting Consumer Protection Act (“ACPA”) allows for secondary liability.

What Are the Facts?

Plaintiff, Petroliam Nasional Berhad (aka “Petronas”) is a Malaysian government-owned entity. Petronas holds the American trademark “PETRONAS.” The entity also owns the Petronas Towers in Malaysia. Defendant, Godaddy.com, is the world’s largest domain name registrar. The case revolves around a third party who registered the domain names petronastower.net and petronastowers.net in 2003. In 2007, the party began using Godaddy’s domain forwarding services to direct the domain names to an adult website. Petronas sued Godaddy for cybersquatting and contributory cybersquatting. In general, cybersquatting is the act of holding a trademark hostage in the form of a domain name and forcing the trademark owner to negotiate an unreasonable price for the domain. Although Godaddy did investigate the alleged cybersquatting, ultimately, they did not take any action.

In 2013, Edward Snowden, a former CIA employee, and National Security Agency (“NSA”) contractor, leaked top secret documents to the public. These documents detailed the NSA’s controversial electronic surveillance practices and procedures, sparking a debate about wiretapping and privacy laws. Snowden revealed that the government employed questionable electronic surveillance programs. The controversy circles around the potential privacy violations surrounding government agency practices to monitor communications. Since then, the Obama Administration has been under pressure to address individual privacy concerns. Last month, President Obama addressed the nation and introduced proposed changes to current electronic surveillance practices.

What Are the Current Wiretapping Laws, Before President Obama’s Proposed Amendments?

Wiretapping has been possible since the invention of the telephone. The procedure gets its name from earlier methods, which required officials to physically place electrical taps on telephone lines. Wiretapping is a constitutional and legal practice. In most cases, officials must secure a warrant from a judge beforehand. However, federal intelligence agencies can apply to the Foreign Intelligence Surveillance Court (“FISA”), under secret proceedings, for court approval. In some circumstances, these agencies can proceed with approval from the United States Attorney General, without court approval. In the event that the agency does need to secure a warrant before wiretapping, courts typically apply a very strict standard of review before granting approval. For instance, the judge will look to ensure there are no other less intrusive methods to gather information. In general, the courts look at wiretapping as a last resort. Alternatively, if a party who is participating in a call, records the call and produces it to a government agency, the agency does not need prior court approval. The agency is then at liberty to use the contents of the recorded phone call for its purposes.

In general, the federal government enforces privacy rights at the federal level and state governments regulate privacy standards at the state level. Depending on the area of privacy laws at issue, different government agencies have enforcement authority. For example, Office of the Attorney General, Federal Trade Commission, and Department of Health and Human Services have certain enforcement authority.

What are federal privacy rights?

The federal Privacy Act of 1974 applies privacy standards for the information that federal executives and agencies can access and disclose. However, these requirements apply only to information about U.S. citizens and legal alien residents. They do not apply to illegal immigrants or corporations.

Class action lawsuits are a staple in the American court system. The notion that there is strength in numbers is shown in the extraordinarily large settlements that come from these cases. In recent years, there has been a significant increase in class action suits involving internet-based companies (e.g., Facebook, Google, Tumblr, Instagram, or MySpace).

As consumers spend more time on the Internet, sharing their work, preferences, and private information, there is a growing potential for internet law violations. Since numerous consumers engage in same or similar activities, e.g., use email to send/receive information, a single violation implicates the rights of a large group of consumers. In turn, this sparks a class action suit.

How Are Class Action Lawsuits Different From Other Suits?

On December 19, 2013, Target issued a statement confirming a major security breach. According to the statement, approximately 40 million customers were at risk for identity theft because of the breach. Hackers had gained access to customer information, including their names, credit card numbers, debit card numbers, card expiration dates, and security codes. This incident brought light to the ongoing threat of identify theft for customers who use credit or debit cards to make purchases, either in stores or online. With this growing threat, consumers need to take care to protect themselves against potential attacks.

What Is the Extent of the Target Security Breach?

According to Target’s investigations, the hackers began accessing customer information from before Thanksgiving until mid-December. With the information they stole, which is stored on a card’s magnetic strip, the hackers could have made purchases all around the world. Indeed, hackers can also use this information to create new credit or debit cards. Although, there is no evidence the hackers also stole pin numbers, but if they had, they could have withdrawn money from customers’ bank accounts. The United States Secret Service is looking into this massive security breach. In the past, federal and state authorities have held companies liable, even issuing fines, if investigations reveal that a company did not take adequate steps to protect customer information. Analysts predict that here Target may have to spend over $100 million in legal costs to fix the security breach. Costs will increase even more if it’s forced to reimburse credit card companies for fraudulent purchases. However, in the meantime, Target’s first priority has been to act quickly to secure and protect customer information. Although, they have not reached any conclusions, initial investigations suggest the breach could have come entirely from outside hackers, or it could have been achieved with help from its employees. Either way, this level of a security breach suggests that it reached deep within the corporation.

The spread of social media networks and social profiles has, unfortunately, made the potential for cyber harassment more common today. For instance, the phenomenon of revenge porn has sparked controversy in society, prompting California’s Legislature to enact a new law to help deter future acts of involuntary pornography. If you, or someone you know, has been a victim of cyber harassment, including revenge porn, please contact us today to speak to an attorney who can help explain the legal remedies.

What Laws Apply to Acts of Revenge Porn or Cyberharassment?

In October 2013, California’s governor, Jerry Brown, signed Senate Bill 255 (“SB 255”) a law into effect, which made revenge porn a criminal offense, allowing victims to seek legal remedies from perpetrators. Revenge porn, also known as involuntary pornography or “cyber revenge,” is the act of posting pictures and videos that contain sexually-explicit content of a former significant other without their knowledge or consent. Typically, former significant others will post this kind of content to harass or embarrass previous partners. However, in some cases, hackers can get a hold of this type of content and post the pictures on adult websites. And, often times, the party distributing the images will include personal information about the victim (e.g., name, address, and social media accounts). Posting this type of personal information increases traffic through Google and draws more online visitors. However, this information also poses a serious threat to the victims, some of whom have reported the unwanted attention that comes from strangers.

In September 2013, California’s legislature enacted a new “Do Not Track” law–Assembly Bill 370 (“AB-370”)–that requires websites to disclose their practice of tracking consumers’ personal identification information. The new law may be the first step towards universal anti-tracking standards, which will provide greater protection over the Internet for online users and their personal information. According to the executive director of the Center for Digital Democracy, Jeff Chester, at the very least the new law is a signal to websites that political bodies are mobilizing to protect online consumer privacy.

What Are the Provisions of California’s “Do Not Track” Law?

Under AB-370, any website that collects personal information from online users will have a duty to disclose the specifics of their tracking behavior to consumers. The “Do Not Track” legislation requires that websites inform consumers their protocol for responding to do not track signals (“DNT signals”). For instance, consumers who use Mozilla Firefox have the option to request that the browser not track the users’ personal information. However, Mozilla is still under no legal obligation to follow this request. AB-370 also addresses any practices that allow third parties and sites to access and use consumers’ personal information. Specifically, the new law requires websites to disclose whether they grant third-party access to personal information the website has gathered from online users. This law does not prohibit websites from continuing to track personal information, or grant access to this information to third parties. Instead, the law aims to improve disclosure standards, so that consumers are better informed of how their online activities can affect access to their personal information.

The answer to many questions is an online search away. However, online searches are not free of all consequences. Indeed, search engines can track and store a user’s search history and even sell this personal information to third parties for profit. What someone types into a search bar then becomes part of a permanent link tied to that Internet Protocol (“IP”) address. This certainly raises several concerns regarding online and individual privacy. In a highly digitized era, this affects anyone with Internet access, a computer, and even a cellphone.

What are the Main Concerns of Search Engine Privacy?

Search engines track personal information using users’ search history, including a user’s IP address, search terms, name, and location. Websites, such as Google and Yahoo, can then use this information for their marketing, or they can sell users’ search history to marketing firms. Online search history generates an impression of the user, which the public can then use to its advantage–e.g., for criminal investigations, employment opportunities, and to fuel personal disputes. Public opinion in this area strongly disfavors this level of surveillance. As a result, websites have begun to compete in terms of which search engine provides the greater privacy protection. Efforts to improve search engine privacy consider, among other standards, how long a search engine stores user information, how a search engine deletes such information, whether the search engine engages in behavioral targeting (i.e. whether a site uses search history to provide targeted advertisements), and whether the search engine uses profile information to manipulate advertisements. Based on a recent survey by CNet, only Ask.com does not record search terms. Outside the circle of the large search engines, sites such as ixquick.com allege that they do not record IP addresses when users conduct searches through their website. According to the survey, Google also does not engage in behavioral targeting.