Currently viewing the tag: "internet"

Monday Morning JETLawg

On September 16, 2013 By Bradlee Edmondson

Was that bribery? There’s an app for that! Latham & Watkins releases an app detailing anti-corruption and bribery statutes across many countries. [H/T Law Technology News] False advertising claims (some of them, anyway) against Frito-Lay, based on an “All-Natural” label applied to GMO products, survive. [H/T @rtushnet] After [...]

Continue Reading

The Future of TV-over-Internet Services

On September 13, 2013 By Brenan Salgado

As people look for more and more ways to control their consumption of broadcast television, new avenues open up for companies that do not create their own content. One such avenue, TV-over-internet, capitalizes on free, over-the-air television by capturing and relaying it to users over the internet. This provides users with more control over how [...]

Continue Reading

Verizon Seeks to Close Down FCC’s Open Internet

On September 11, 2013 By Lizzie Maratea

“Does the US government have any role in ensuring ubiquitous, open, world-class, interconnected, reasonably-priced Internet access?” For Susan Crawford, co-director of the Berkman Center for Internet & Society at Harvard and a professor at Yeshiva University’s Cardozo School of Law, the question is rhetorical. Obviously, yes. It [...]

Continue Reading

California Seeks to Criminalize “Revenge Porn”

On September 10, 2013 By Thomas McFarland

In today’s digital world it has become quite common for jilted lovers to publish intimate photos and videos of their ex-significant other on the web in the aftermath of a contentious breakup. The growth in popularity of so-called “revenge porn” has led to the emergence of pornographic websites wholly dedicated to the material. These [...]

Continue Reading

Monday Morning JETLawg

On September 9, 2013 By Bradlee Edmondson

The New York Times breaks a story alleging that the Drug Enforcement Agency has been working very closely with AT&T to access a database of phone records going as far back as 1987. According to the story, the DEA pays AT&T to station several of the company’s employees inside DEA investigative units to [...]

Continue Reading

Silicon Valley Strikes Back

On September 3, 2013 By Richard Saunders

As more information regarding the NSA’s surveillance program, dubbed X-Keyscore, trickles into the public domain, technology industry titans continue their battle with the government for increased transparency of national security requests.

Until recently, the full extent of domestic surveillance was largely unknown due to a closely guarded, secret surveillance request process. All surveillance requests [...]

Continue Reading

Monday Morning JETLawg

On September 2, 2013 By Bradlee Edmondson

A bill passed in New Zealand effectively bans software patents by labeling them ‘not inventions.’ A newly invented process, implemented in software, would still be patentable, but the software that implements it would not itself be patentable. Will this square New Zealand’s goal with the TRIPS Agreement’s requirement that patents be available [...]

Continue Reading

Hacking the Legal Profession

On August 29, 2013 By Zac Parsons

Hackers are coming after the legal profession. Run! Hide! Or join them?

The term ‘hacker’ is being used in a growing numbers of circles, and not in reference to some sort of scene from a movie about a coder (or group of coders) accessing data without authorization. This new connotation of [...]

Continue Reading

Wednesday Morning JETLawg

On August 28, 2013 By Bradlee Edmondson

There were a lot of items this week, so we are publishing an additional JETLawg:

Confirming that we have one foot in the utopian and one foot in the dystopian future, credit card thieves in Australia are apparently using 3D printers to make virtually undetectable ATM skimmers. These devices “skim” copies of the magnetic [...]

Continue Reading

Proxy servers, like other technologies that facilitate anonymity, serve both good and bad interests. On the one hand, they have helped people living under oppressive regimes view otherwise-censored content. On the other hand, they are used to facilitate criminal activity, including terrorist attacks. The function of a proxy server is not complicated: you [...]

Continue Reading