MIRLN --- 10-31 Dec 2017 (v20.18) --- by Vince Polley and KnowConnect PLLC (supplemented by related Tweets: @vpolley #mirln)
NEWS | RESOURCES | LOOKING BACK | NOTES
- 20,000 artworks available for free download on LACMA's robust digital archive
- Vicarious liability for data breach by rogue [UK] employee
- Almost one-third of US businesses had a data breach
- Governors and federal agencies are blocking nearly 1,300 accounts on Facebook and Twitter
- How Google Fiber turned 2017 into its comeback year
- How email open tracking quietly took over the web
- Most companies fail to disclose cybersecurity as a risk factor in SEC filings
- 4 in 5 physicians had a cyberattack in their practices, says survey
- Model publishing contract features author-friendly terms for open access scholarship
- Tips for capturing social media evidence
- DLA Piper had planned a cyberbreach response before major malware attack in June
- Prepare, practice, protect: A strategy for defeating cyberthreats to lawyers
- Rep. Blackburn introduces fake net neutrality legislation
- Bucking President Trump's FCC, New York introduces its own net neutrality bill
- Facial scans at US airports violate Americans' privacy, report says
- Russian submarines are prowling around vital undersea cables. It's making NATO nervous.
- Codified US laws from 1925 now available, searchable on loc.gov
- Library of Congress gives up collecting all tweets because Twitter is garbage
- That game on your phone may be tracking what you're watching on TV
20,000 artworks available for free download on LACMA's robust digital archive (My Modern Met, 4 Dec 2017) - You don't have to travel the world to see great art. As museums continue to digitize their collections, you can view paintings, sculptures, and other artwork that spans thousands of years and geographical locations. The Los Angeles County Museum of Art (LACMA) has worked for the past two years to make their acquisitions viewable online . There are 20,000 images available and in the public domain, making them also free downloadable art for anyone. Altogether, the museum has uploaded 80,000 works on their website with both restricted and unrestricted use-a quarter of the art that's in their physical collection. It's easy to find an image that will inspire you. The robust online search is sorted via highlights, chronology, curatorial area, and more; it's a great place to start. If you're looking for something more specific, however, they've tagged individual works with their defining attributes. Typing in the word "cactus", for instance, will bring up photographs, paintings, and objects having to do with the plant. You can even choose the option to filter only images that are in the public domain. top
Vicarious liability for data breach by rogue [UK] employee (Clyde & Co, 5 Dec 2017) - In the first group litigation of its kind, Morrisons Supermarkets was found to be vicariously liable for the actions of a rogue employee who, driven by a grudge against the supermarket chain, took payroll data relating to 100,000 employees and published it online. This was despite the fact that Morrisons was found to be entirely innocent of any misuse, that the employee had acted deliberately to harm his employer, had been convicted and imprisoned for his actions and that disclosure of the data had been done at home, on a Sunday outside office hours. In principle, the decision could mean that Morrisons will be liable to compensate all 5,500 employees involved in the claim. Permission has already been given for Morrisons to appeal the decision to the Court of Appeal. top
Almost one-third of US businesses had a data breach (Sys-Con Media, 7 Dec 2017) - Almost one-third of U.S. businesses (29 percent) experienced a data breach in the previous year, a survey for The Hartford Steam Boiler Inspection and Insurance Company (HSB), part of Munich Re, reported today, and eight in ten spent at least $5,000 to respond. The HSB survey conducted by Zogby Analytics also found that almost half of the breaches (47 percent) were caused by a vendor or contractor working for a business, followed by employee negligence (21 percent) and lost or stolen mobile devices or storage media (20 percent). In two-thirds of the data breaches, the businesses reported their reputation was negatively affected. When asked what the biggest hurdle would be for their organization to respond to a data breach, 51 percent said lack of knowledge and 41 percent a lack of resources. The financial impact of a data breach was considerable: 27 percent of the businesses spent between $5,000 and $50,000 to respond and 30 percent spent between $50,000 and $100,000. top
Governors and federal agencies are blocking nearly 1,300 accounts on Facebook and Twitter (ProPublica, 8 Dec 2017) - Amanda Farber still doesn't know why Maryland Gov. Larry Hogan blocked her from his Facebook group. A resident of Bethesda and full-time parent and volunteer, Farber identifies as a Democrat but voted for the Republican Hogan in 2014. Farber says she doesn't post on her representatives' pages often. But earlier this year, she said she wrote on the governor's Facebook page, asking him to oppose the Trump administration's travel ban and health care proposal. She never received a response. When she later returned to the page, she noticed her comment had been deleted. She also noticed she had been blocked from commenting. (She is still allowed to share the governor's posts and messages.) According to documents ProPublica obtained through an open-records request this summer, hers is one of 494 accounts that Hogan blocks. Blocked accounts include a schoolteacher who criticized the governor's education policies and a pastor who stance against accepting Syrian refugees. They even have their own Facebook group: Marylanders Blocked by Larry Hogan on Facebook . In August, ProPublica filed public-records requests with every governor and 22 federal agencies, asking for lists of everyone blocked on their official Facebook and Twitter accounts. The responses we've received so far show that governors and agencies across the country are blocking at least 1,298 accounts. More than half of those - 652 accounts - are blocked by Kentucky Gov. Matt Bevin, a Republican. Four other Republican governors and four Democrats, as well as five federal agencies, block hundreds of others, according to their responses to our requests. Five Republican governors and three Democrats responded that they are not blocking any accounts at all. Many agencies and more than half of governors' offices have not yet responded to our requests. When the administrator of a public Facebook page or Twitter handle blocks an account, the blocked user can no longer comment on posts. That can create an inaccurate public image of support for government policies. ( Here's how you can dig into whether your elected officials are blocking constituents. ) top
How Google Fiber turned 2017 into its comeback year (TechRepublic, 11 Dec 2017) - Google Fiber showed new life in 2017, after a near death experience in late 2016. The fiber internet pioneer launched in three new cities-Huntsville, AL, Louisville, KY, and San Antonio, TX-this year. It also began to heavily rely on shallow trenching , a new method of laying cables, to expedite the construction process. "We're very pleased with the response from residents in these markets-along with our other existing Google Fiber cities, where we worked hard throughout the year to bring Fiber service to even more people in many more neighborhoods," a Google Fiber spokesperson told TechRepublic. The comeback happened after a construction halt and the CEO stepping down in October 2016, which left some wondering if Fiber was on its last breath. But 2017 wasn't entirely a year of redemption. In February, hundreds of Fiber employees were moved to new jobs at Google. And Gregory McCray left the role of CEO in July after only holding the position for five months. And internet experts still have their doubts. Chris Antlitz, a senior analyst at Technology Business Research, labelled Fiber's year as "not very good." Jim Hayes, president of the Fiber Optic Association, called Google Fiber a "very distant player" in the fiber market. Fiber set a new bar for broadband by showing incumbent internet service providers (ISPs) that it is economically feasible to bring 1 gigabit internet to consumers, Antlitz said. Since Google Fiber led a connectivity renaissance in 2011 when it launched in its first city, Kansas City, KS, top telecom providers have been in an arms race to upgrade their broadband pipes to accommodate 1 gigabit, Antlitz said. Google Fiber's presence in the market has caused competition that has forced other fiber providers like Verizon and AT&T Fiber to offer cheaper, faster service . Adding a second provider to a market can reduce prices by around one-third, according to a study by the Fiber to the Home Council . top
How email open tracking quietly took over the web (Wired, 11 Dec 2017) - "I just came across this email," began the message, a long overdue reply. But I knew the sender was lying. He'd opened my email nearly six months ago. On a Mac. In Palo Alto. At night. I knew this because I was running the email tracking service Streak , which notified me as soon as my message had been opened. It told me where, when, and on what kind of device it was read. With Streak enabled, I felt like an inside trader whenever I glanced at my inbox, privy to details that gave me maybe a little too much information. And I certainly wasn't alone. There are some 269 billion emails sent and received daily. That's roughly 35 emails for every person on the planet, every day. Over 40 percent of those emails are tracked, according to a study published last June by OMC, an "email intelligence" company that also builds anti-tracking tools. The tech is pretty simple. Tracking clients embed a line of code in the body of an email-usually in a 1x1 pixel image, so tiny it's invisible, but also in elements like hyperlinks and custom fonts. When a recipient opens the email, the tracking client recognizes that pixel has been downloaded, as well as where and on what device. Newsletter services, marketers, and advertisers have used the technique for years, to collect data about their open rates; major tech companies like Facebook and Twitter followed suit in their ongoing quest to profile and predict our behavior online. But lately, a surprising-and growing-number of tracked emails are being sent not from corporations, but acquaintances. "We have been in touch with users that were tracked by their spouses, business partners, competitors," says Florian Seroussi, the founder of OMC. "It's the wild, wild west out there." According to OMC's data, a full 19 percent of all "conversational" email is now tracked. That's one in five of the emails you get from your friends. And you probably never noticed. "Surprisingly, while there is a vast literature on web tracking, email tracking has seen little research," noted an October 2017 paper published by three Princeton computer scientists. All of this means that billions of emails are sent every day to millions of people who have never consented in any way to be tracked, but are being tracked nonetheless. And Seroussi believes that some, at least, are in serious danger as a result. * * * top
Most companies fail to disclose cybersecurity as a risk factor in SEC filings (Corporate Counsel, 12 Dec 2017) - In recent years, the number of companies identifying cybersecurity as a risk factor in U.S. Securities and Exchange Commission filings has grown tremendously. But there appears to have been a leveling off in 2017, which may indicate that companies "have blinders on" when it comes to disclosing cybersecurity risks, according to a new report. From 2012 to 2016, the number of companies reporting cybersecurity as a risk factor in SEC filings has grown 277 percent, the report from Intelligize Inc. shows. Despite that increase though, the report, which is based on all public company SEC filings from 2012 to this year, indicates that there's still only a relatively small proportion of all public companies-38 percent-citing cybersecurity as a risk factor in quarterly and annual filings. What's more, the report said, while by 2016, 1,662 public companies reported cybersecurity was a risk factor, as of Oct. 31 of this year, that number had only seen a slight bump to 1,680 companies. The slowdown in disclosing cyber as a risk may indicate one of two things, Todd Hicks, CEO of Intelligize, said in an email. It means companies "either they have blinders on-or they are deliberately not acknowledging the risks because they don't want to tip off potential hackers," he said. But Hicks added that he expects to see more reporting from companies in the coming years. "For the 62 percent of public companies not disclosing, I would expect that number to get smaller over the next few years, especially as the SEC gets stricter on rules around specific risk factor disclosure," Hicks said. top
- and -
4 in 5 physicians had a cyberattack in their practices, says survey (AMA, 12 Dec 2017) - More than four in five U.S. physicians (83 percent) have experienced some form of a cybersecurity attack, according to new research released today by Accenture and the American Medical Association (AMA). This, along with additional findings, signals a call to action for the health care sector to increase cybersecurity support for medical practices in their communities. The findings, which examined the experiences of roughly 1,300 U.S. physicians, underscore the recognition that it is not "if" but "when" a cyberattack will occur. More than half (55 percent) of the physicians were very or extremely concerned about future cyberattacks in their practice. In addition, physicians were most concerned that future attacks could interrupt their clinical practices (cited by 74 percent), compromise the security of patient records (74 percent) or impact patient safety (53 percent). "The important role of information sharing within clinical care makes health care a uniquely attractive target for cyber criminals through computer viruses and phishing scams that, if successful, can threaten care delivery and patient safety," said AMA President David O. Barbe , M.D., M.H.A. "New research shows that most physicians think that securely exchanging electronic data is important to improve health care. More support from the government, technology and medical sectors would help physicians with a proactive cybersecurity defense to better ensure the availability, confidentially and integrity of health care data." The findings show the most common type of cyberattack was phishing-cited by more than half (55 percent) of physicians who experienced an attack-followed by computer viruses (48 percent). Physicians from medium and large practices were twice as likely as those in small practices to experience these types of attacks. Nearly two-thirds (64 percent) of all the physicians who experienced a cyberattack experienced up to four hours of downtime before they resumed operations, and approximately one-third (29 percent) of physicians in medium-sized practices that experienced a cyberattack said they experienced nearly a full day of downtime. top
Model publishing contract features author-friendly terms for open access scholarship (Authors Alliance, 14 Dec 2017) - The University of Michigan and Emory University have teamed up to create a Model Publishing Contract for Digital Scholarship designed to aid in the publication of long-form digital scholarship according to open access principles. Developed by a team of library and university press professionals, the model contract takes into account the needs of a variety of stakeholders. The contract is shorter and easier to understand than typical publishing contracts, and it offers authors more rights in their own work, while still allowing publishers sufficient rights for commercial uses and sales. Associated documents include: * * * top
Tips for capturing social media evidence (Attorney at Work, 15 Dec 2017) - It turns out that sometimes you can believe what you see on the internet. Criminal defendants and civil litigants overshare on social media just like the rest of us. But heading into court, that tendency is less an annoying habit and more a potential self-incrimination. In their search for credible evidence against opponents, lawyers are increasingly turning to social media for digital smoking guns. When Facebook first urged its users to "Go Live!" on its new video posting system, it probably imagined videos of blown-out birthday candles or baby's first steps. Disturbingly, the feature began to be used for posting videos bragging to the world about crimes. But self-incriminating evidence includes more than posting videos of possible crimes. For example, spouses often use internet posts against each other in divorce court. Even as early as 2010, 81 percent of divorce attorneys agreed there was an increase in social media evidence. They cited Facebook as the top source for online evidence, with 66 percent of those lawyers finding something useful for their clients on the social site. No area of practice is immune: Bankruptcy lawyers need to worry about posts that indicate hidden assets, and personal injury attorneys should worry that their client's Instagram posts will make the jury skeptical of claims of pain and suffering. You can use social media evidence to great effect, but first, you've got to find it and capture it in an efficient way. Consider these three tips: * * * top
DLA Piper had planned a cyberbreach response before major malware attack in June (ABA Journal, 19 Dec 2017) - DLA Piper had planned its response to a cyberbreach before its systems shut down in response to a major malware attack last June. Don Jaycox, DLA Piper's chief information officer for the Americas, tells the Wall Street Journal (sub. req.) that t he attack began when a malware agent known as NotPetya was downloaded on a finance server in Ukraine. "Our first instinct-because we had planned it out-was to shut everything down once we realized the attack had a fairly broad reach," Jaycox said. "Everything was off the air, along with roughly two-thirds of our end points, laptops, desktops, etc." DLA Piper had already contracted with companies that would assist it in monitoring its network and responding to an attack. Two were tapped the first day of the breach, and a third was called in on the second day. The law firm had registered all of its cellphones to a mass communication texting system, allowing for a blast communication. The firm also had a game plan for quickly recovering a targeted system, such as email, but it couldn't quickly restore every system at once. "People who do backups to the cloud, one of the things that you need to think about is what is the scenario for total recovery if you lose everything," Jaycox said. "Because getting all the data back if you need to get all of it can be a little bit challenging." The top question from clients was whether their data was compromised, Jaycox said. At first, the law firm was able to say it found no indications of compromised information. After additional assessment, that statement can now be made "with a very high degree of certainty," he said. top
- and -
Prepare, practice, protect: A strategy for defeating cyberthreats to lawyers (ABA Journal article, by ODNI's Bob Litt & colleagues, Jan 2018) - Corporate litigator Jane Doe sat down at her desk Monday morning and logged on to her computer. She opened an email appearing to be from a client that read: "Hi. Could you please take a look at this document? It's urgent." Doe clicked on the attachment. Two weeks later, a hacker website published confidential documents that one of her most important clients had given the firm in connection with a lawsuit alleging environmental violations. Doe's client called, furious, to inform her that she was discharged, and that the client was considering a lawsuit against her firm. Every week brings news of major new cyberattacks-the stealing of personal information from Equifax and the federal Office of Personnel Management, the Petya and WannaCry ransomware worms, the Russian hacking of the Democratic National Committee's emails, to name a few. Indeed, the cyberthreat from criminals, hacktivists and state actors is growing. The costs associated with these malicious activities are staggering: Last year, the Commission on the Theft of American Intellectual Property estimated that the annual cost of IP theft in three major categories may be as high as $600 billion and that the low-end total exceeds $225 billion, or 1.25 percent of the U.S. economy. Law firms have not been immune. In fact, they have been a ripe target: * * * [ Polley : This is the first in a year-long 2018 series "Digital Dangers", addressing cybersecurity and the threat faced by lawyers. This is related to the ABA's just-published Cybersecurity Handbook (2nd Ed.). The Journal's series, the Handbook, and other resources showcase work by the ABA's Cybersecurity Legal Task Force , which I have the privilege of co-chairing with Ruth Bro.] top
Rep. Blackburn introduces fake net neutrality legislation (Free Press, 19 Dec 2017) - On Tuesday, Rep. Marsha Blackburn (R-Tennessee) introduced anti-Net Neutrality legislation that she dubbed the "Open Internet Preservation Act." The bill lacks many of the fundamental guarantees that prevent internet access providers from interfering with online traffic. Rep. Blackburn, who is among the top recipients of campaign contributions from the phone and cable lobby, said on Twitter that she hopes to rush the legislation to President Donald Trump's desk for signing. The bill reportedly includes prohibitions on blocking or throttling of internet traffic, but would not prevent pay-to-play prioritization schemes. It would also constrain FCC authority to contend with future abuses and prevent states from enacting their own Net Neutrality protections. Free Press Action Fund President and CEO Craig Aaron made the following statement: "Having lost their fight against Net Neutrality in the court of public opinion, companies like AT&T, Comcast and Verizon are trying to use fake Net Neutrality bills like this to end all effective oversight of their anti-competitive, anti-consumer practices. Blackburn's legislation fails at the very thing it claims to accomplish. It prohibits a few open-internet violations, but opens the door to rampant abuse through paid-prioritization schemes that split the internet into fast lanes for the richest companies and slow lanes for everyone else. This bill's true goal is to let a few unregulated monopolies and duopolies stifle competition and control the future of communications. This cynical attempt to offer something the tiniest bit better than what the FCC did and pretend it's a compromise is an insult to the millions who are calling on Congress to restore real Net Neutrality." top
- and -
Bucking President Trump's FCC, New York introduces its own net neutrality bill (Fast Company, 19 Dec 2017) - Since the FCC voted last week to abolish net neutrality regulations, California, Washington, and New York State have vowed to take up the cause. New York is one of the first out the gate. State Assembly member Patricia Fahy -a Democrat whose district includes the capital, Albany-has drafted a short piece of legislation to introduce this week. It requires the state government, state agencies, and local governments (including New York City) to do business only with ISPs that adhere to net neutrality principles of no blocking or slowing down access to any legal content. Nor can they allow paid prioritization, or offer content providers premium-priced "fast lanes" for better service. "If you are going to be a contractor and want to work with New York, then you must meet the principles," Fahy tells Fast Company . She hopes that this approach will get around a roadblock known as preemption. The Constitution generally gives the federal government final authority over commercial activities that cross state lines. But while New York can't require ISPs to uphold net neutrality, it can use its "power of the purse" to punish ISPs that don't. "There's a decent amount of precedent for saying, if you want a state contract, you have to meet such and such requirements," she says, noting construction contracts contingent on certain labor practices or the use of U.S.-made steel. top
Facial scans at US airports violate Americans' privacy, report says (NYT, 21 Dec 2017) - A new report concludes that a Department of Homeland Security pilot program improperly gathers data on Americans when it requires passengers embarking on foreign flights to undergo facial recognition scans to ensure they haven't overstayed visas. The report , released on Thursday by researchers at the Center on Privacy and Technology at Georgetown University's law school, called the system an invasive surveillance tool that the department has installed at nearly a dozen airports without going through a required federal rule-making process. The report's authors examined dozens of Department of Homeland Security documents and raised questions about the accuracy of facial recognition scans. They said the technology had high error rates and are subject to bias, because the scans often fail to properly identify women and African-Americans. "It's telling that D.H.S. cannot identify a single benefit actually resulting from airport face scans at the departure gate," said Harrison Rudolph, an associate at the center and one of the report's co-authors. * * * top
Russian submarines are prowling around vital undersea cables. It's making NATO nervous. (WaPo, 22 Dec 2017) - Russian submarines have dramatically stepped up activity around undersea data cables in the North Atlantic, part of a more aggressive naval posture that has driven NATO to revive a Cold War-era command, according to senior military officials. The apparent Russian focus on the cables, which provide Internet and other communications connections to North America and Europe, could give the Kremlin the power to sever or tap into vital data lines, the officials said. Russian submarine activity has increased to levels unseen since the Cold War, they said, sparking hunts in recent months for the elusive watercraft. "We are now seeing Russian underwater activity in the vicinity of undersea cables that I don't believe we have ever seen," said U.S. Navy Rear Adm. Andrew Lennon, the commander of NATO's submarine forces. "Russia is clearly taking an interest in NATO and NATO nations' undersea infrastructure." NATO has responded with plans to reestablish a command post , shuttered after the Cold War, to help secure the North Atlantic. NATO allies are also rushing to boost anti-submarine warfare capabilities and to develop advanced submarine-detecting planes. top
Codified US laws from 1925 now available, searchable on loc.gov (Sierra Sun Times, 26 Dec 2017) - More than 60 years of U.S. laws are now published online and accessible for free for the first time after being acquired by the Library of Congress. The Library has made available the main editions and supplements of the United States Code from 1925 through the 1988 edition. The U.S. Code is a compilation of federal laws arranged by subject by the Office of the Law Revision Counsel of the House of Representatives. The Library's U.S. Code Collection is fully searchable. Filters allow users to narrow their searches by date, title and/or subject. PDF versions of each chapter can be viewed and downloaded. The collection is online at loc.gov/collections/united-states-code/ . This provides access to editions of the U.S. Code that previously were not available to the public online for free. "For the first time these historical materials will be available online for free in a searchable format," Law Librarian of Congress Jane Sanchez said. "The U.S. Code provides a convenient tool for locating the law in force at a particular point in time. These historical editions will help students, historians and other researchers delving into the primary sources of our government and democracy." top
Library of Congress gives up collecting all tweets because Twitter is garbage (Gizmodo, 26 Dec 2017) - In 2010, the Library of Congress started archiving every single public tweet that was published on Twitter. It even retroactively acquired all tweets dating back to 2006. But the Library of Congress will stop archiving every tweet on December 31, 2017. Why is it stopping? Because tweets are trash now. The Library of Congress issued a white paper this month saying that it was proud of its comprehensive collection of tweets from the first 12 years of Twitter, but that it's completely unnecessary for it to continue. Instead, the organization will only collect tweets that it deems historically significant. For instance, President Trump's tweets are almost certainly still going to be saved for future generations. One reason that the Library is stopping the comprehensive archive? The social media company's controversial change to allow 280 character tweets. The Library's halt on collection of all tweets puts Twitter more in line with the way that other digital collections are archived, including websites. The Library of Congress only archives websites on a selective basis, unlike the nonprofit, non-governmental organization the Internet Archive, which has a much broader goal of archiving everything online with its Wayback Machine . The Library of Congress also noted that many tweets include photos and video and that it has only been collecting text, making some of its collection worthless. top
That game on your phone may be tracking what you're watching on TV (NYT, 28 Dec 2017) - At first glance, the gaming apps - with names like "Pool 3D," "Beer Pong: Trickshot" and "Real Bowling Strike 10 Pin" - seem innocuous. One called "Honey Quest" features Jumbo, an animated bear. Yet these apps, once downloaded onto a smartphone, have the ability to keep tabs on the viewing habits of their users - some of whom may be children - even when the games aren't being played. The apps use software from Alphonso, a start-up that collects TV-viewing data for advertisers. Using a smartphone's microphone, Alphonso's software can detail what people watch by identifying audio signals in TV ads and shows, sometimes even matching that information with the places people visit and the movies they see. The information can then be used to target ads more precisely and to try to analyze things like which ads prompted a person to go to a car dealership. More than 250 games that use Alphonso software are available in the Google Play store; some are also available in Apple's app store. Some of the tracking is taking place through gaming apps that do not otherwise involve a smartphone's microphone, including some apps that are geared toward children. The software can also detect sounds even when a phone is in a pocket if the apps are running in the background. Alphonso said that its software, which does not record human speech, is clearly explained in app descriptions and privacy policies and that the company cannot gain access to users' microphones and locations unless they agree. Alphonso declined to say how many people it is collecting data from, and Mr. Chordia said that he could not disclose the names of the roughly 1,000 games and the messaging and social apps with Alphonso software because a rival was trying to hurt its relationships with developers. (The New York Times identified many of the apps in question by searching "Alphonso automated" and "Alphonso software" in the Google Play store.)
RESOURCES
Lee on Digital Copyright in the TPP (MLPB, 11 Dec 2017) - Jyh-An Lee, The Chinese University of Hong Kong Faculty of Law, has published Digital Copyright in the TPP, in Paradigm Shift in International Economic Law Rule-Making: TPP As a New Model for Trade Agreements? 371 (Julien Chaisse, Henry Gao & Chang-fa Lo eds., Springer, 2017). Here is the abstract: This chapter focuses on key copyright issues in TPP's IP Chapter, especially those related to the Internet and digital technologies. Those issues include copyright term extension, safe harbor for Internet service providers (ISPs), technological protection measures, criminal liability, and limitations and exceptions. This chapter analyzes whether private and public interests represented by various stakeholders in the copyright ecology are taken into full account and kept balanced under TPP. This chapter also evaluates member states' diverse considerations for implementing those copyright provisions. Furthermore, this chapter uses the IP Chapter as a lens to illustrate the international expansion of copyright facilitated by trade negotiations. top
LOOKING BACK - MIRLN TEN YEARS AGO
(note: link-rot has affected about 50% of these original URLs)
The IT law Wiki (launched December 2007) -- This wiki is an encyclopedia of the legal issues, cases, statutes, events, people, organizations and publications that make up the global field of information technology law (often referred to as "computer law"). To learn more about this wiki, click on the "About this Wiki" link. To find an article, simply type the name in the "Search The IT Law Wiki" box in the upper right hand corner of [the referenced] page, click the "Content (A-Z)" button to the right or click the "Random page" button above or to the right. To write a new The IT Law Wiki article, enter the page title in the box. [see also the EFF's similar wiki: http://ilt.eff.org/index.php/Table_of_Contents ] top
Get your own XO laptop: OLPC Give 1 Get 1 project underway (ArsTechnica, 12 Nov 2007) - The One Laptop Per Child (OLPC) initiative announced today the official launch of the Give 1 Get 1 (G1G1) program, which allows individual donors in the United States and Canada to acquire their very own shiny OLPC XO laptop by donating $399 to the project. Designed specifically to be used by schoolchildren in developing countries, the XO laptop was originally only going to be sold in bulk quantity to governments. OLPC had to change those plans earlier this year in order to compensate for slow sales. The G1G1 program, which opens today and ends on November 26, allows individual donors to purchase XO laptops for personal use when also buying one for a child in a developing nation. Ponying up $399 will get donors an XO laptop, and $200 of that donation is tax-deductible. OLPC has also partnered with T-Mobile, which is offering free T-Mobile HotSpot access to all US donors who participate in the G1G1 program. top
NOTES
MIRLN (Misc. IT Related Legal News) is a free e-newsletter published every three weeks by Vince Polley at KnowConnect PLLC. You can subscribe to the MIRLN distribution list by sending email to Vince Polley ( mailto:vpolley@knowconnect.com?subject=MIRLN ) with the word "MIRLN" in the subject line. Unsubscribe by sending email to Vince with the words "MIRLN REMOVAL" in the subject line.
Recent MIRLN issues are archived at www.knowconnect.com/mirln . Get supplemental information through Twitter: http://twitter.com/vpolley #mirln.
SOURCES (inter alia):
1. The Filter, a publication of the Berkman Klein Center for Internet & Society at Harvard Law School, http://cyber.law.harvard.edu
2. InsideHigherEd - http://www.insidehighered.com/
3. SANS Newsbites, http://www.sans.org/newsletters/newsbites/
4. Aon's Technology & Professional Risks Newsletter
5. Crypto-Gram, http://www.schneier.com/crypto-gram.html
6. Eric Goldman's Technology and Marketing Law Blog, http://blog.ericgoldman.org/
7. The Benton Foundation's Communications Headlines
8. Gate15 Situational Update Notifications, http://www.gate15.us/services.html
9. Readers' submissions, and the editor's discoveries
This work is licensed under the Creative Commons Attribution-Share Alike 3.0 United States License. To view a copy of this license, visit or send a letter to Creative Commons, 543 Howard Street, 5th Floor, San Francisco, California, 94105, USA.
PRIVACY NOTICE: Addresses and other personal information provided during the subscription process will be kept confidential, and will not be used for any other purpose. top
No comments:
Post a Comment