Currently viewing the tag: "International Law"

There was a lot going on this week, so the Monday Morning JETLawg has been broken down into topics. Monday is cybercrime and cybersecurity; Tuesday is copyright, intellectual property (IP) policy generally, government technology, and government IP; Wednesday is surveillance and censorship; Thursday is sports, entertainment, and the arts; and Friday is e-currency, e-discovery, [...]

Continue Reading

There was a lot going on this week, so the Monday Morning JETLawg has been broken down into topics. Monday is cybercrime and cybersecurity; Tuesday is copyright, intellectual property (IP) policy generally, government technology, and government IP; Wednesday is surveillance and censorship; Thursday is sports, entertainment, and the arts; and Friday is e-currency, e-discovery, [...]

Continue Reading

Monday Morning JETLawg

On September 30, 2013 By Bradlee Edmondson

U.S.-Iranian Twitter diplomacy, LexisNexis and Dun & Bradstreet are hacked, NSA employees cyberstalk lovers, and NSA reform bills

Continue Reading

In historic fashion, New Zealand’s Parliament passed a bill stating that computer programs are “not inventions” and thus not patentable. Although the bill carves out an exception for embedded software, it significantly restricts the scope of patentable computer software. The bill’s proponents contend that patent protection [...]

Continue Reading

For the past five years, the World Intellectual Property Organization (WIPO)’s Standing Committee on Copyright and Related Rights (SCCR) has been discussing proposed exceptions to the copyright reproductions rights that would help the visually impaired and those with other print disabilities. The problem is obvious: there are millions of individuals across [...]

Continue Reading

Monday Morning JETLawg

On June 24, 2013 By Bradlee Edmondson

The United States and Russia agree to establish a cyber hotline aimed at reducing the risk of cyber conflict and misunderstandings. Many are drawing analogies to the Cold War-era nuclear hotline, and in fact the new cyber hotline will be built on top of that communications framework. NSA leaker Snowden is [...]

Continue Reading

In an effort to face the new threats of modern warfare, the Pentagon ultimately concluded the old ways were the best ways in threatening to use conventional forces in response to any cyber attack on the U.S in order to deter any such attacks. While several administrative figures have suggested in the [...]

Continue Reading