Articles Posted in Technology

The internet and social media have allowed people, businesses, and brands to communicate and interact more than ever before. As much benefit as that brings, it also brings significant risks to the reputation of both people and brands. The internet allows people to post using a pseudonym, or to appropriate someone else’s name. The appropriated name could be that of a prominent individual or (“public figure”), but online “persona hijacking” can affect anyone.

Generally, the motive of most persona hijacking is profit or fraud. Someone may appropriate the name or likeness of a famous person to profit from public goodwill towards that person. It could include setting up social media accounts, e-mail addresses, or websites using the person’s name, or some other effort to spoof the person’s identity. For a person who is not famous, persona hijacking may serve a function much like identity theft, using that person’s credentials to obtain, for example, fraudulent credit.

In some cases, the purpose of persona hijacking is to submit a person’s name to criticism or parody. The line between legitimate commentary and unlawful harassment, however, can be very fine, and parody can easily become a “false light” portrayal of a person. Use of a person’s name or likeness for the purpose of criticism or parody may, in certain limited circumstances, be protected by the First Amendment. In other cases, it may constitute unlawful infringement of a person’s trademark rights or right of publicity.

A person who uses their own name in commerce, usually someone prominent in business or entertainment, may obtain trademark protection. This generally prohibits others from using the name commercially. For most people, the right of publicity prohibits use of their name or likeness without their consent, especially for commercial purposes. The Fair Use doctrine, however, may allow use of a name or likeness for legitimate criticism or parody, where it is clear that the work is not originating from the person being appropriated.

You can take several steps to protect yourself from online persona hijacking:

Continue Reading ›

We have submitted a petition to ask Congress to review and modify section 230 of the Communications Decency Act in order to limit the protection granted to interactive online services, such as news websites, blogs, forums, and listservs. Also, Congress should set new policies and procedures for interactive online services to confirm the true identity of their users and members. This confirmation of a user’s or member’s true identity promotes protection against bogus statements made against innocent individuals and prevents the victimization of businesses.

This petition should be signed because consumers and businesses are facing various problems such as defamation, harassment, or retaliation by anonymous users on interactive online services without recourse and protection. Unfortunately, section 230 of the Communications Decency Act grants broad immunity to interactive online services. By doing so, such immunity tilts the scale of justice and creates an unreasonable result for innocent individuals who are being targeted by anonymous users and have no remedy for protection.

Please visit this link, review and sign it if you are willing to support our request for change in legislation.

Copyright law, which protects a person’s rights to his or her own creative works, dates back nearly to the invention of the printing press. It protects a creator’s ownership of a creative work and the rights to use the work publicly. It also gives a creator remedies against anyone who infringes those rights. Where trademark law protects brand names, logos, and other “marks” representing a product or service, copyright law protects creative works like novels, songs, photographs, designs, or software. Computer technology, particularly the internet, has made copyright infringement quite easy and created new challenges for copyright owners.

Nearly any original creative work has copyright protection. Online, this can include graphics and designs, text, photo or video files, music, or code. A website created for a business most likely contains content subject to the protections of U.S. copyright laws. Technically speaking, copyright protection applies the moment a work is created in a physical form, which includes creation as a digital file. While copyright laws apply to a work upon its creation, enforcement is very difficult unless the creator takes additional steps to document the work’s creation and ownership with the government.

The U.S. Copyright Office allows copyright owners to formally register their works in a central location. Registration may deter others from infringing on a work, and it allows a copyright owner to effectively defend a work through the litigation process. Evidence of registration with the Copyright Office serves as prima facie evidence of ownership in a legal dispute. Most importantly, registering a work in a timely manner allows the owner to claim statutory damages in an infringement suit. Courts can award damages of up to $150,000 per act of intentional infringement, but only if the copyright owner follows the registration procedures.

Continue Reading ›

Companies cannot survive, let alone thrive, in today’s business environment without an Internet presence. Businesses and brands maintain websites and social media profiles in order to advertise and market products and services, but also to interact with customers. Social media in particular has given businesses an unprecedented ability to reach out to customers and to respond to their concerns. With this ability, however, comes the risk that unauthorized third parties will register an Internet domain with a company’s or brand’s name, or a deceptively similar name, and create a misleading or even harmful website. The practice of registering an Internet domain using the name of a trademarked brand is often known as “cyber-squatting.” Businesses and people who are the victim of cyber-squatting have remedies through a process established by several organizations that oversee and regulate Internet domain names.

The Internet Corporation for Assigned Names and Numbers (ICANN) is a private nonprofit corporation based in Los Angeles, California. It represents a collaboration between government agencies and several private organizations. ICANN has final responsibility for assignment of domain names, IP addresses, and other identifying information used by machines on the Internet.

In order to effectively handle disputes or complaints relating to domain name registrations, ICANN enacted the Uniform Domain Name Dispute Resolution Policy (UDRP). Anyone who owns or registers a domain name with a “.com,” “.org,” or “.net” top-level domain has agreed to abide by the terms of the UDRP by virtue of their agreement with their domain name registrar.

Continue Reading ›

U.S. News recently reported that since mid-2010 over 220,000 individuals have been sued in mass copyright lawsuits regarding the sharing of files over bittorrent. However, with the growth of these types of lawsuits, courts are concerned because of the possibility that subpoenas to obtain internet subscriber information may bring in innocent parties in litigation and improper joinder of parties.

Generally, Bittorrent is a peer-to-peer internet file-sharing protocol that allows a “swarm” of users to download and upload content from each other simultaneously. A user who supplies an entire copy of a file is called a “seeder,” while users in the process of downloading a file who have not yet completed their downloads are called “peers.” Peers download portions of the file at random, and upload those portions to other members of the swarm. Peers do not choose which pieces are downloaded and they do not choose who to share those portions with. Nevertheless, a peer is able to see the IP addresses of the other swarm members. Accordingly, it is possible for a copyright owner to join a swarm and obtain the IP addresses of the users sharing a given file.

It seems that bittorrent litigation will not be slowing down. Thus, courts are now more resistant to mass-joinder cases clogging up their dockets especially when the plaintiffs have no intention of litigation, but rather are merely seeking identifying information and authorization to pursue discovery in the interest of gaining settlement leverage. As more defendants file motions to quash suggesting that that they did not participate in the alleged activity, courts are also becoming sensitive to the idea that IP addresses may not be as likely to identify defendants as previously suspected. Plaintiffs, on the other hand, continue to refine their practices and theories of liability. See Liberty Media Holdings LLC v. Hawaii Members of Swarm…, Case No. 11-CV-00262-DAE-RLP, (Jan. 30, 2012 Order, denying motion to dismiss as to direct and indirect infringement and civil conspiracy, but dismissing allegation that failure to secure WiFi amounts to actionable negligence).

When hackers breached the e-commerce firm Zappos in January, they may have compromised the personal information of as many as 24 million users. Legislatures in several states, including California, have responded to attacks such as this one by passing laws enhancing cybersecurity investigation and enforcement, and increasing requirements for disclosure of cyberattacks. The U.S. Securities and Exchange Commission (SEC) has also issued new guidelines for businesses and individuals under attack. The key issue to consider, in light of these new laws and regulations, is how much disclosure is not enough, and how much is too much.

The SEC is recommending disclosure of cyberattacks to an unprecedented degree. A new set of guidelines issued in October 2011 advises publicly-traded companies to disclose details of cybersecurity breaches as part of the quarterly 10-K report. Companies should disclose any and all cyberattacks, regardless of whether they caused a loss. The SEC even encourages companies to disclose “cyberrisks,” even in the absence of a breach. This potentially benefits investors, the SEC says, by providing comprehensive information about both actual and potential losses due to hacking and other cyberattacks. At the same time, extensive disclosure could put companies at greater risk by exposing weaknesses to hackers. Companies must carefully consider how much, or how little, to disclose. Too much disclosure could make them vulnerable to attack. Too little disclosure could make them vulnerable to lawsuits by investors.

State laws regarding cybersecurity disclosures are typically not as stringent as the SEC’s guidelines. California passed the first such law a decade ago. That law applies to any person or business that owns or licenses computer data containing a California resident’s “personal information,” such as social security number, home address, driver’s license number, and so forth. In the event of a breach that would reasonably lead to an unauthorized person obtaining the personal information, an owner or licensor of personal data must notify the person whose personal information may have been breached.

Forty-six states have followed California’s lead and passed similar laws. California has actually fallen behind some states that have passed laws with stricter disclosure requirements. A new law that took effect on January 1, 2012, requires an individual or business to notify the state attorney general of a cybersecurity breach if the breach affects more than five hundred California residents. The notice must include specific details of the type and size of the breach, and a toll-free number to allow users to contact credit agencies.

Continue Reading ›

Megaupload.com was among the world’s biggest file-sharing sites with 150 million registered users and about 50 million hits daily. It was big enough that it earned founder Kim Dotcom $42 million in 2011.

The movie industry objected that the site was making money off pirated material; even though, Megaupload is based in Hong Kong and the founder was living in New Zealand, some of the alleged pirated content was hosted on leased servers in Virginia, which was sufficient for U.S. prosecutors to take action.

Thereafter, the site was closed and its founder and three Megaupload employees were arrested in New Zealand on allegations by American prosecutors that they facilitated millions of illegal downloads of films, music and other content, costing copyright holders at least $500 million in lost revenue.

Michelle Obama is officially live on Twitter. The first lady’s Twitter feed went live on Thursday and her link is being managed by the president’s re-election campaign. The first two tweets came from the campaign staff and described the account as “a new way for you to connect with First Lady Michelle Obama and the President’s campaign.” The traffic was high within the first hour with more than 20,000 followers. President Barack Obama also has a Twitter account managed by the campaign. Its first tweet of the day: “It’s not every day we get to welcome the First Lady of the United States to Twitter – happy to have you, Michelle Obama!”
This acknowledges that technology plays a key role in our lives and allows us to communicate with each other through different means and methods. Twitter is an online social networking service and microblogging service that enables its users to send and read text-based posts of up to 140 characters, known as “tweets”. It was created in March 2006 by Jack Dorsey and launched that July. The service rapidly gained worldwide popularity, with over 300 million users as of 2011, generating over 300 million tweets and handling over 1.6 billion search queries per day. It has been described as “the SMS of the Internet.” Twitter Inc. is based in San Francisco, with additional servers and offices in New York City.

In California, a new Facebook feature which permits an advertiser to publish or broadcast a user’s “like” of its product to others in that individual’s circle is under scrutiny.

The United States District Court in San Jose, California refused to grant a motion to dismiss which states that Facebook ads violate its user’s right of publicity by utilizing their names and photographs without authorization. However, the court dismissed an unjust enrichment claim. In the lawsuit, Facebook’s position is that user permission is not required to promote its user’s likes to those in that user’s circle, in a category it terms “sponsored stories.” Facebook contends that such information is newsworthy and exempted under California’s right-of-publicity statute. The company’s position is that its users constitute public figures.

California’s right-of-publicity statute is codified under Civil Code section 3344 which states as follows:

In the recent years, online harassment or cyberharassment has become an important issue. This is because the Internet has changed our lives on so many levels. Generally, the law prohibits harassment and our readers should consider taking certain precautions when being harassed.

Cyberharassment is different from cyberstalking because it does not involve a credible threat. Cyberharassment occurs when someone sends harassing email messages, instant messages, or posts entries simply to torment another person. Different jurisdictions have different approaches in addressing cyberharassment in codifying their laws. For example, some include language addressing electronic communications in general harassment statutes. However, some states have created stand-alone cyberharassment statutes.

California Penal Code section 653.2(a) states that, “[e]very person who, with intent to place another person in reasonable fear for his or her safety, or the safety of the other person’s immediate family, by means of an electronic communication device, and without consent of the other person, and for the purpose of imminently causing that other person unwanted physical contact, injury, or harassment, by a third party, electronically distributes, publishes, e-mails, hyperlinks, or makes available for downloading, personal identifying information, including, but not limited to, a digital image of another person, or an electronic message of a harassing nature about another person, which would be likely to incite or produce that unlawful action, is guilty of a misdemeanor punishable by up to one year in a county jail, by a fine of not more than one thousand dollars ($1,000), or by both that fine and imprisonment.