Currently viewing the tag: "government"

Can the FCC Create Net Neutrality?

On April 16, 2015 By Allison Laubach

Statutory regulation of the telecommunications industry is outdated and unworkable in today’s increasingly tech-driven society.  The most recent legislation regarding the framework for telecommunications regulation, The Telecommunications Act of 1996, was passed nearly twenty years ago. The Telecommunications Act amended the Communications Act of 1934, which created the Federal Communications Commission (FCC) and authorized it [...]

Continue Reading

The Lisbon Agreement for the Protection of Appellations of Origin and their International Registration was established in 1958 with the purpose of providing international protection for appellations of origin.  The Agreement sets up an international register and ensures that registered appellations receive the same protection in all member countries as they do in [...]

Continue Reading

Universal, free access to the law is a prerequisite to open participation in government. Without an opportunity to access the law, citizens have no way to comprehend the rules that bind them. However, the relatively unknown practice of incorporation by reference (IBR) allows private organizations to charge for access to [...]

Continue Reading

Proposed legislation in China–under the guise of counter terrorism–has US analysts on edge about potential protectionism or infringement on trade secrets of US tech firms. The proposed legislation is the latest development in the Chinese government’s attempts to regulate high tech companies, after regulators have enacted rules that will require firms that provide banking [...]

Continue Reading

Cyberspace is the new “Wild West,” according to President Obama, but the government can’t be the only sheriff in town. President Obama addressed these remarks to a crowd of tech industry leaders at a White House cybersecurity summit last week. He also signed an executive order on February 13, outlining a path for [...]

Continue Reading

China’s anti-trust investigation of the American chip maker Qualcomm came to an end when the chip giant agreed to pay a record fine of about $975 million last Monday. According to the decision issued by China’s National Development and Reform Commission, the royalties Qualcomm collected from Chinese smartphone manufactures were “unfair” and “excessively [...]

Continue Reading

On January 12, 2015 the White House announced its intention to press for new legislation that would increase consumers’ protection on the web. The Personal Data Notification & Protection Act is intended to “clarif[y] and strengthen[] the obligations companies have to notify customers when their personal information has been exposed . . . .” [...]

Continue Reading

Obama Weighs in on Net Neutrality

On November 19, 2014 By Elizabeth Mulkey

President Obama wants the internet to be regulated as a utility…mostly. In a November 10th video statement, Obama laid out a new plan for addressing net neutrality. He proposed that FCC reclassify broadband providers as utilities under Title II of the Telecommunications Act, like traditional phone service providers. However, Obama also wants the agency [...]

Continue Reading

Online Impersonation

On November 7, 2014 By Allison Laubach

Earlier this week, ACLU analyst Christopher Soghoian discovered that in 2007, the FBI impersonated the Seattle Times while investigating bomb threats made to a school in Lacey, Washington. The bureau was using a technique commonly referred to as “phishing” to monitor a juvenile after receiving tips that he was behind the threats. The FBI obtained [...]

Continue Reading

EMV Cards Finally Coming to the US

On October 30, 2014 By Sara Hunter

On October 17, 2014, just days before Staples announced that it was investigating a “potential [security] issue,” President Obama signed an executive order to accelerate EMV adoption in the United States.

The hacking trend first began in November of 2013 when—a few days before Thanksgiving—Target’s security and payments system was hacked. In the first [...]

Continue Reading