- Journal Archives
- Volume 16
- Volume 15
- Volume 14
- Volume 13
- Volume 12
- Volume 11
- Volume 10
- Volume 9
- Volume 8
- Volume 7
- Volume 6
- Volume 5
- Volume 4
- Volume 3
- Volume 2
- Volume 1
Currently viewing the tag: "information security"
With the highly anticipated release of Apple’s new iPhone comes an unexpected constitutional law question.
Apple’s iPhone 5 allows users to unlock the phone with their fingerprints. Many commentators have been quick to point out the economic and scientific implications of this new technology, but Attorney Marcia Hofmann pointed out that there [...]Continue Reading →
The New York Times breaks a story alleging that the Drug Enforcement Agency has been working very closely with AT&T to access a database of phone records going as far back as 1987. According to the story, the DEA pays AT&T to station several of the company’s employees inside DEA investigative units to facilitate [...]Continue Reading →
As more information regarding the NSA’s surveillance program, dubbed X-Keyscore, trickles into the public domain, technology industry titans continue their battle with the government for increased transparency of national security requests.
Until recently, the full extent of domestic surveillance was largely unknown due to a closely guarded, secret surveillance request process. All surveillance requests [...]Continue Reading →
On September 2, 2013 By Brooke McLeod January 14, 2015
In the past year we have learned that the NSA collects information about our phone calls without using a warrant. We have also discovered that the FBI may be asking phone companies to track our calls, that camera-carrying drones are becoming more popular with businesses–and with teenagers who may use them to peer through each [...]Continue Reading →
A bill passed in New Zealand effectively bans software patents by labeling them ‘not inventions.’ A newly invented process, implemented in software, would still be patentable, but the software that implements it would not itself be patentable. Will this square New Zealand’s goal with the TRIPS Agreement’s requirement that patents be available “without [...]Continue Reading →
On August 27, 2013 By Jacob Schumer August 29, 2013
Proxy servers, like other technologies that facilitate anonymity, serve both good and bad interests. On the one hand, they have helped people living under oppressive regimes view otherwise-censored content. On the other hand, they are used to facilitate criminal activity, including terrorist attacks. The function of a proxy server is not complicated: you [...]Continue Reading →
Lawrence Lessig sued the publisher of Phoenix’s song Lisztomania for declaratory relief, claiming fair use for his inclusion of fans’ response videos (which were set to the the song) in a lecture posted to YouTube. He has some of the four fair use factors in his favor, including effect [...]Continue Reading →
The Electronic Privacy Information Center (EPIC) asks the Supreme Court to stop the NSA’s recently revealed controversial metadata collection program. [H/T SANS] The Times of India claims that the Indian government operates a data collection program that enables it to access intracompany communications on Indian Blackberries. The program had been alluded [...]Continue Reading →
June has been an interesting month for DNA at the Supreme Court and for technology and the law generally. Justice Scalia demonstrated his own signature brand of judicial restraint by declining to sign on to those aspects of last Thursday’s Myriad Genetics decision that explained “fine details of molecular biology.” [...]Continue Reading →
On June 13, 2013 By Thomas McFarland June 12, 2013
By now you’ve undoubtedly heard about the National Security Agency’s collection and monitoring of billions of Americans’ phone records and internet activity from nine of the largest US internet service providers in attempts to root out terrorism. Ever since the story was reported in The Guardian, the program has been met with outrage from legislators [...]Continue Reading →
Recent Blog Posts
- Proposed Chinese Legislation Fuels Fears of Tech Firms
- Is Streaming Speech?
- Does Tweaking Your Car’s Software Constitute Fair Use?
- Controlling the Uncontrollable: UK Taking the Driver’s Seat in Driverless Car Technology
- Obama’s Cybersecurity Executive Order: Private Sector Must Help Police the “Wild West”
- Qualcomm Settlement May Reconfigure the Smartphone Market in China
Tagsadvertising antitrust Apple books career celebrities contracts copyright copyright infringement courts creative content criminal law entertainment Facebook FCC film/television financial First Amendment games Google government intellectual property internet JETLaw journalism lawsuits legislation media medicine Monday Morning JETLawg music NFL patents privacy progress publicity rights radio social networking sports Supreme Court of the United States (SCOTUS) technology telecommunications trademarks Twitter U.S. Constitution