“Economics of Privacy” Conference Recap
…• Pranav Mistry’s Sixth Sense. Berin Szoka. Lessig outlined a dystopian view that code will become a perfect form of control. In contrast, the Supreme Court has said that technology…
The Cookie Crumbles for Amazon Privacy Plaintiffs – Del Vecchio v. Amazon
…to personal information. There was an element of plaintiffs’ allegations which did not receive as much attention as I expected. Plaintiffs alleged that Amazon used a piece of code, or…
Employers Demanding the Right to Remotely Wipe Employees’ Phones?
…how enforceable that might be….Since I work with a lot of source code for my profession, this doesn’t seem that unreasonable to me. UPDATE 5: Another response: Such policies and…
Q3 2011 Quick Links, Part 3
…service that enables too much sharing by default is engaged in unfair practices? If so, it will be taking quite an active role in telling software developers how to code,…
In Facebook’s Lawsuit Against Alleged Spammer, Court Denies MaxBounty’s Motion to Dismiss
…by inducing Facebook users to execute malicious computer code that cause[d] messages to be sent automatically to all of their Facebook ‘friends’.” Computer Fraud and Abuse Act claims: The court…
Web Vendor Dispute Gets Ugly–Ground Zero Museum v. Wilson
…of his authorization. The court rejects this claim, saying “using a password or security code to access a copyrighted work, even without authorization, does not constitute ‘circumvention’ under the DMCA”…
Second Circuit Says No First Sale Doctrine for Works Manufactured Outside the U.S. — Wiley & Sons v. Kirtsaeng
…to goods that are “legally made and sold in the United States.” Wiley argued in the Second Circuit that, because the Copyright Act (Chapter 17 of the US Code) did…
Another Lawsuit over Flash Cookies Fails — Bose v. Interclick
…or consent of the user…. “history sniffing” code, which [contains] a list of web page hyperlinks . . . [uses] the computer’s browser to determine whether the computer had previously…
Catching Up on 4 Months of Online Copyright Cases–Myxer, Hotfile, Megaupload, Flava Works, Zediva, Blue Nile, Perfect 10, Rojadirecta
…Sigh. As usual, Perfect 10 apparently failed to send a proper 512(c)(3) takedown notice. They sent 22 notices in all, but allegedly 21 related to stuff that wasn’t theirs. (Huh?)…
Sixth Circuit: Email and Phone Advocacy Campaign Can Violate the Computer Fraud & Abuse Act — Pulte Homes v. LIUNA
…under the CFAA, one for unauthorized access which causes damage and the other for transmission of information, code, or a program which caused damage. Access claim: The CFAA creates a…