
An Educational Not for Profit focused on Federal Internet and Telecommunications Policy
Thursday, March 01, 2012
The Wayward ACPA Part 11: “The Courts Do Not Apply a Mechanistic Scorecard”

Workshop :: FTC Will Host Public Workshop to Explore Advertising Disclosures in Online and Mobile Media on May 30, 2012
- How can effective disclosures be made on social media platforms and mobile devices – including when they are used in commercial texting – that limit the space available for disclosure? For example, when consumers are paid or receive other benefits for providing an endorsement, how can they effectively disclose on platforms that allow only short messages or a simple sign of approval?
- When can disclosures provided separately from an initial advertisement be considered adequate? For example, if a consumer receives a location-based ad for a discounted cup of coffee on her mobile device because she is near a particular coffee shop, what terms must be disclosed in the mobile ad and what terms, if any, do not have to be disclosed until the consumer enters the coffee shop to make her purchase?
- What are the options when using devices that do not allow downloading or printing the terms of an agreement? For example, is providing consumers a means to send a copy of the agreement to themselves to read later an effective way to provide this information?
- How can disclosures that are made in the original advertisement be retained when the advertisement is aggregated (for example, on dashboards) or re-transmitted (through, for example, re-tweeting)?
- What are the disclosure opportunities and limitations of hyperlinks, jump links, hashtags, click-throughs, layered disclosures, icons, and other similar options? How should these options be evaluated in terms of placement and proximity?
- How can short, effective, and accessible privacy disclosures be made on mobile devices?
- What does the research show about how consumers’ use of mobile and other devices can affect the effectiveness of disclosures on particular devices or platforms? And what does it show about the relationship between how consumers use mobile devices and their understanding of disclosures and advertising displayed on mobile devices? What does the research show about how consumers make decisions based on that information? Is there specific research on the effectiveness of disclosures on mobile devices, including layered disclosures and icons, and, if so, what are the implications of that research for disclosures such as offer terms and privacy practices?
Wednesday, February 29, 2012
RFC :: NTIA :: #privacy :: Multistakeholder Process to Develop Consumer Data Privacy Codes of Conduct :: Comments Due TBD
"NTIA is requesting comment on substantive consumer data privacy issues that warrant the development of legally enforceable codes of conduct, as well as procedures to foster the development of these codes. NTIA invites public comment on these issues from all stakeholders with an interest in consumer data privacy, including the commercial, academic and civil society sectors, and from federal and state enforcement agencies. Written comments may be submitted by e-mail to privacyrfc2012@ntia.doc.gov.
RFC :: NIST :: #FISMA SP 800-53 Security and Privacy Controls for Federal Info Systems and Orgs :: Comments Due Apr 6
"To handle insider threats, supply chain risk, mobile and cloud computing technologies, and other cybersecurity issues and challenges, NIST has released Security and Privacy Controls for Federal Information Systems and Organizations, Special Publication (SP) 800-53, Revision 4 (Initial Public Draft). The document is considered a principal catalog of security standards and guidelines used by federal government agencies that NIST is required to publish by law.
“The changes we propose in Revision 4 are directly linked to the current state of the threat space—the capabilities, intentions and targeting activities of adversaries—and analysis of attack data over time,” explained Ron Ross, FISMA Implementation Project Leader and NIST fellow.
"The revision also adds a new privacy appendix to the publication that provides privacy controls and associated implementation guidance. “Privacy and security are complementary, so we decided to combine them in SP 800-53," said Ross.
"Other areas addressed in the update in addition to those mentioned above include application security, firmware integrity, distributed systems and advanced persistent threat. “Many organizations are concerned about advanced persistent threats, so we added new controls that will allow organizations to use different strategies to combat those types of threats,” Ross added.
"NIST also modified its guidance on security assurance Appendix E, which outlines how agencies can establish measures of confidence that the security controls put in place are providing the necessary security capability to protect critical missions and business operations. Ross explains, “Having security functionality in your information systems without the appropriate assurance is like skydiving without a backup parachute—you don’t need it until you need it. And without it, the outcome is very predictable.”
"As part of the update to SP 800-53, NIST addressed potential gaps in coverage, added new security controls and control enhancements, provided additional supplemental guidance for these controls, and clarified security control requirements and specification language. Keeping the potential threats in mind, the security control baselines were updated and minimum assurance requirements revised.
This document, when finalized, will be used by the entire federal government. The project was conducted as part of the Joint Task Force Transformation Initiative, which is composed of security experts from NIST, the Department of Defense, the Intelligence Community, the Committee on National Security Systems, and the Department of Homeland Security.
The public draft of Security and Privacy Controls for Federal Information Systems and Organizations, Special Publication (SP) 800-53, Revision 4 may be found at http://csrc.nist.gov/publications/PubsDrafts.html#SP-800-53-Rev.%204. Comments on SP 800-53, Revision 4 are requested by April 6, 2012. Email should be sent to sec-cert@nist.gov.
The Wayward ACPA Part 10: “More Reasoned Decisions Mean Domain Name Owner Wins”
Monday, February 27, 2012
2.27 :: Study Confirms What U Already Knew :: Unprecedented Powers Over the Internet :: This Isnt a Hoax :: Threatens the Internet :: More Excuses? ::
CyberTelecom News
Federal Internet Law and Policy
============================================
"Where a calculator on the ENIAC is equipped with 18,000 vacuum tubes
and weighs 30 tons, computers in the future may have only 1,000 vacuum
tubes and perhaps weigh 1 ½ tons." Popular Mechanics (March 1949)
Study Confirms What You Already Knew: Mobile Data Throttling About The
Money, Not Stopping Data Hogs, Techdirt
Of the four national mobile operators, only Sprint still offers an
"unlimited" data plan -- and most industry watchers expect that to go
away soon. When the operators talk about this stuff, they complain
about how unlimited plans are abused and the amount of data being used
by so-called "data hogs" is crippling network bandwidth. Of course,
the alternative story is that they just want to charge people higher
rates, and putting a toll
http://www.techdirt.com/blog/wireless/articles/20120224/10500217867/study-confirms-what-you-already-knew-mobile-data-throttling-about-money-not-stopping-data-hogs.shtml
Stop the Cycle of Bullying: danah boyd and John Palfrey in the
Huffington Post, Berkman
no description
http://cyber.law.harvard.edu/node/7498
IN RE INDIANA NEWSPAPERS INC. v. JUNIOR ACHIEVEMENT OF CENTRAL
INDIANA, INC., Ind: Court of Appeals, Indiana Court
At issue is identity of anonymous commentor to news site and
application of the Dendrite Test
http://scholar.google.com/scholar_case?case=665491991043061948
CONOCOPHILLIPS COMPANY v. Gonzalez, Dist. Court, ND California 2012, Fed Court
Plaintiff's ACPA ex parte application is DENIED without prejudice.
http://scholar.google.com/scholar_case?case=1202001311501080797
BEVERLY HILLS ESCROW v. Nazarian, Cal: Court of Appeal, 2nd Appellate
Dist., 7th Div. 2012, CA Court
Affirming Temporary Restraining Order for Defendant's registration of
domain name BeverlyHillsEscrow.com
scholar.google.com/scholar_case?case=15998714418736431472
City of Carlsbad v. Shah, Dist. Court, SD California 2012, Fed. Court
Registration of multiple domain names including
thecrossingsatcarlsbad.com constituted bad faith under ACPA
scholar.google.com/scholar_case?case=5083764740092613286
Robert McDowell: The U.N. Threat to Internet Freedom – WSJ.com, ISOC-DC
On Feb. 27, a diplomatic process will begin in Geneva that could
result in a new treaty giving the United Nations unprecedented powers
over the Internet. Dozens of countries, including Russia and China,
are pushing hard to reach this goal by year's end. As Russian Prime
Minister Vladimir Putin said last June, his goal and that of his
allies is to establish "international control over the Internet"
through the International Telecommunication Union (ITU), a
treaty-based organization under U.N. auspices.
http://www.isoc-dc.org/2012/02/robert-mcdowell-the-u-n-threat-to-internet-freedom-wsj-com/
36 state AGs blast Google's privacy policy change, CW
Attorneys General from 36 states are concerned over the potential
implications of Google's new privacy policy, especially for users of
Android-powered smartphones.
http://rss.computerworld.com/~r/computerworld/news/feed/~3/HNP_2BAv-x8/36_state_AGs_blast_Google_s_privacy_policy_change
Pakistan plans system to filter and block websites, CW
Pakistan has floated a request for proposal for a system to filter and
block websites, some months after banning the use of encryption on the
Internet, and toying with the idea of filtering and blocking SMS
(short message service) messages in the country.
http://rss.computerworld.com/~r/computerworld/news/feed/~3/R_ll8sNUMkw/Pakistan_plans_system_to_filter_and_block_websites
This Isn't a Hoax: Pakistan Requests Proposals for a National
Filtering and Blocking System, EFF
The Pakistani government is looking for new ways to censor the Internet.
https://www.eff.org/deeplinks/2012/02/not-a-hoax-pakistan-requests-proposals-national-filtering-and-blocking-system
An Astounding Week In PIPA/SOPA Comes To A Close, Tales From the Sausage Factory
Today brought a dramatic conclusion to an extraordinary week and the
culmination of months of amazing activism on PIPA/SOPA. A month ago,
hardly anyone had heard of PIPA and a few more had heard of SOPA and
its passage was …
http://tales-of-the-sausage-factory.wetmachine.com/an-astounding-week-in-pipasopa-comes-to-a-close/
CLOUD COMPUTING AND THE REGULATORY FRAMEWORK FOR TELECOMMUNICATIONS
AND INFORMATION SOCIETY SERVICES, VP BURLOIU - 2012
In the context of the Lisbon agenda for growth and jobs, research and
innovation are at the core of the Europe 2020 strategy. As part of
this strategy, the ambitious Digital Agenda of the
http://arno.uvt.nl/show.cgi?fid=121935
Google's Goggles: Is The Future Right Before Our Eyes?, NPR
Eye glasses with computing power have long been sci-fi fantasy,
relegated to Terminator movies and the like. But now it appears Google
may be a few months from selling a beta version of their own.
http://www.npr.org/blogs/alltechconsidered/2012/02/24/147364732/googles-goggles-is-the-future-right-before-our-eyes?ft=1&f=1019
How The "Right To Be Forgotten" Threatens The Internet, Forbes
A friend of a friend -- let's call her Andrea -- allowed herself to be
photographed in a "compromising position." The pics were posted on the
Internet with her approval, but were later found online by coworkers.
Oops.
http://www.forbes.com/sites/davidcoursey/2012/02/24/how-the-right-to-be-forgotten-threatens-the-internet/
Administration's White Paper OnPrivacy Strikes Positive Tone, AT&T
Collaboration, consensus and consistency are key design principles in
developing good public policy. And we're encouraged that a white
paper issued yesterday by President Obama's Administration embraces
those principles.
http://attpublicpolicy.com/government-policy/administration%e2%80%99s-white-paper-onprivacy-strikes-positive-tone/
Internet Privacy: Protecting Consumers, Building Trust, Creating Jobs,
White House
Yesterday, the White House announced two important steps to promote
consumer privacy rights online and to give users more control over how
their personal information is handled. First, the White House
released a comprehensive roadmap for online privacy protection
centered on a Consumer Privacy Bill of Rights and robust enforcement
by the Federal Trade Commission. Second, industry has stepped up to
the plate by
http://feeds.whitehouse.gov/~r/whitehouse/ostp/~3/cloLwvimnRY/internet-privacy-protecting-consumers-building-trust-creating-jobs
More Privacy, or More Excuses?, VOA
Examining the Obama Administration's Proposed Privacy Bill of Rights
http://blogs.voanews.com/digital-frontiers/2012/02/24/more-privacy-or-more-excuses/
Protecting Online Privacy: A Live Web Chat with Allan Friedman, Brookings
Aiming to protect online privacy without stifling innovation,
President Obama has proposed a "Consumer Privacy Bill of Rights" to
help users exercise more control over the data they share when
accessing the internet through their web browsers, smart phones and
tablets. Although its
http://webfeeds.brookings.edu/~r/BrookingsRSS/topics/internetpolicy/~3/3HwrLk-_5CA/0229_internet_privacy_chat.aspx
We Can't Wait: Obama Administration Calls for A Consumer Privacy Bill
of Rights for the Digital Age, White House
Today at the White House, the Obama Administration unveiled a
blueprint for a Consumer Privacy Bill of Rights to protect consumers
online. As the President wrote in his cover letter to the report:
http://www.whitehouse.gov/blog/2012/02/23/we-can-t-wait-obama-administration-calls-consumer-privacy-bill-rights-digital-age
FTC Approves Safe Harbor Program for Aristotle International, Inc., FTC
Program Will Promote Compliance With Children's Online Privacy Protection Act
http://www.ftc.gov/opa/2012/02/aristotle.shtm
Why Genachowski's Cybersecurity Initiative Is So Radical (In A Good
Way), Tales From the Sausage Factory
When people think of "cybersecurity," they usually think about the big
stuff like Iranian hackers bringing down the power grid or master
criminals hacking Bank of America. We associate it with the Department
of Homeland Security (DHS) and institutions generally …
http://tales-of-the-sausage-factory.wetmachine.com/why-genachowskis-cybersecurity-initiative-is-so-radical-in-a-good-way/
Microsoft Testifies on U.S. Senate Cybersecurity Legislation, Microsoft
Last week, Scott Charney testified at a hearing of the Senate
Committee on Homeland Security and Government Affairs. The hearing was
about the Cybersecurity Act of 2012, which is Congress's first
comprehensive legislation aimed at improving cybersecurity across the
United States. His full testimony is available here.
http://blogs.technet.com/b/microsoft_on_the_issues/archive/2012/02/24/microsoft-testifies-on-u-s-senate-cybersecurity-legislation.aspx
US-NL Cybercrime Treaty Signed, CircleID
On Wednesday 22 February the United States and The Netherlands signed
a "declaration of intent" on the cooperation on fighting cybercrime.
This event was reported by the press as a treaty. At least that is
what all Dutch postings I read wrote, with exception of the official
website of the Dutch government. So what was actually signed? Reading
the news reports some thoughts struck me.
http://www.circleid.com/posts/20120224_us_nl_cyber_crime_treaty_signed/
FBI turns off 3,000 GPS trackers after Supreme Court ruling, Ars Technica
Andrew Weissmann, general counsel for the FBI, has announced that his
agency is switching off thousands of Global Positioning System-based
tracking devices used for surveillance after a Supreme Court decision
last month. Weissmann made the statement during a University of San
Francisco
http://arstechnica.com/tech-policy/news/2012/02/fbi-turns-off-3000-gps-trackers-after-supreme-court-ruling.ars?utm_source=rss&utm_medium=rss&utm_campaign=rss
FACEBOOK, INC. v. POWER VENTURES, INC., Dist. Court, ND California
2012, Fed Court
Facebook, Inc. ("Plaintiff") brings this action against Defendants[1]
alleging violations of the Controlling the Assault of Non-Solicited
Pornography and Marketing Act ("CAN-SPAM Act"), 15 U.S.C. §§ 7701 et
seq., the Computer Fraud and Abuse Act ("CFAA"), 18 U.S.C. § 1030, and
California Penal Code § 502.
http://scholar.google.com/scholar_case?case=5315224623229214625
Interconnecting with the Future, Verizon
The FCC made tremendous progress with its order reforming the
Universal Service Fund (USF) and the system for Intercarrier
Compensation (ICC). The FCC's reform plan correctly recognizes the
dramatic changes that have occurred in the marketplace and begins the
difficult process of transforming regulatory structures put in place
decades ago that no longer make sense.
http://policyblog.verizon.com/BlogPost/853/InterconnectingwiththeFuture.aspx
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
"If there are no dogs in Heaven, then when I die I want to go where
they went."-Will Rogers
:: Adopt a Rescue Dog or Cat :: http://www.petfinder.com ::
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Website :: www.cybertelecom.org
Blog :: cybertelecom.blogspot.com
Delicious :: http://del.icio.us/rcannon100/zxc
Twitter & Facebook :: Cybertelecom
Google Group :: cybertelecom-l
AUP :: www.cybertelecom.org/cybert.htm#aup
Cybertelecom is Off-the-Record. Otherwise play nicely.
Link to us! www.cybertelecom.org
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Saturday, February 25, 2012
RFC :: LOC :: DMCA :: Copyright Office Accepting Reply Comments in #DMCA Anticircumvention Rulemaking
Thursday, February 23, 2012
2.23 :: Privacy :: Privacy :: Privacy :: What Do CDNs Do??? :: Failed Conspiracies :: Wrong Question ::
============================================
CyberTelecom News
Federal Internet Law and Policy
============================================
New Report Highlights Wireless Broadband Benefits for Public Safety and Job Creation, White House
oday, Vice President Biden met with law enforcement officials, firefighters and public safety groups in the Roosevelt Room and spoke to a couple hundred more first responders by telephone to thank them for their service and to discuss the new nationwide public-safety broadband network included in the Payroll Tax Extension legislation.
FCC Still Hooked on Speed, CommLawBlog
The FCC has announced plans for yet another effort to determine people's broadband speeds.
http://feeds.lexblog.com/~r/CommLawBlog/~3/ZFKTZEpkvXw/
What Does a CDN Really Do?, Level3
A CDN (Content Delivery network) means different things to different people. The word is used in many different contexts in a way that can confuse. That confusion is partly understandable because most CDNs utilise many different types of technology. So I thought I'd try and explain what a comprehensive CDN, like ours, does. What follows concentrates on the word delivery.
http://feedproxy.google.com/~r/BeyondBandwidth/~3/-m12mfNLK8I/
LightSquared defaults on $56M payment to spectrum owner Inmarsat, CW
LightSquared has defaulted on a US$56.25 million payment due under a 2007 wireless spectrum cooperation agreement with Inmarsat, the U.K. satellite communications operator said Monday, adding that it could terminate the agreement if LightSquared doesn't make payment within 60 days.
LightSquared: Going from bad to worse, CNET
There's been a string of bad news recently for the wireless broadband startup after the FCC pulled its conditional waiver to build its nationwide network. The latest? Job cuts.
http://feedproxy.google.com/~r/cnet/tcoc/~3/hjVBBE9Ff94/
Unlicensed TV Band Spectrum: Creating a Nimble Framework for Our Economic Future, Microsoft
All of us have experienced the "spectrum crunch" when using our wireless devices. Dropped voice calls and slow data transfers are symptoms. The crunch is a consequence of both rising demand and spectrum management techniques and wireless radio technologies dating back almost one hundred years. We can't manufacture more spectrum – it's a finite natural resource – but we can manage it more nimbly and share it more efficiently than we have in the past, stimulating economic growth, business innovation and increased competition.
FCC Seeks Comment on Interference into Unlicensed Devices, CommLawBlog
The FCC has asked for comment on whether the licensed Location and Monitoring Service (LMS) at 902-928 MHz will cause interference to unlicensed devices in that band.
http://feeds.lexblog.com/~r/CommLawBlog/~3/C3Brw8gNS6Q/
PROTECTING CHILDREN ONLINE: Internet risks faced by minors and policies to protect them, OECD
As the Internet permeates every aspect of our economy and society, it is also a daily reality in our children's lives. While it brings considerable benefits to their education and development, it also exposes them to online risks such as access to inappropriate content, abusive interaction with others, exposure to aggressive marketing practices and privacy risks. The OECD has just released recommendations aiming to protect minors online.
http://www.oecd.org/topic/0,3699,en_2649_37441_1_1_1_1_37441,00.html?rssChId=37441#49724812
Youth and Digital Media: From Credibility to Information Quality - New Report from the Berkman Center, Berkman
The Berkman Center for Internet & Society at Harvard University is pleased to share a substantial new report from the Youth and Media project: "Youth and Digital Media: From Credibility to Information Quality" by Urs Gasser, Sandra Cortesi, Momin Malik, & Ashley Lee.
http://cyber.law.harvard.edu/node/7486
Pew Internet: Mobile, Pew
Highlights of the Pew Internet Project's research related to mobile technology.
http://www.pewinternet.org/Commentary/2012/February/Pew-Internet-Mobile.aspx
ACPA Part 9: Failed Conspiracies: "It's All About Trademark", Cybertelecom
In reviewing 11 years of AntiCybersquatting Consumer Protection Act (ACPA) cases, I came up with a number of conspiracy theories that could be tested but did not pan out. The next few posts are my failed conspiracy theories. The first theory, which assumes that ACPA decisions have gone astray, is that when the courts conduct their ACPA analysis, they always consider the Good Faith (aka
IPv6: Childhood's End?, CircleID
A few weeks ago, when I was lurking around IPv6, I found that my own www.ipv6.tk was my first ever IPv6 domain. A "whois" on the domain says that it was registered in 2005, but something told me that I actually started this earlier
http://www.circleid.com/posts/ipv6_childhoods_end/
Former factory workers add pleas to sign Apple labor petition, CNET
Two former factory workers in China who suffered health problems as part of a 2009 incident are urging the public to sign an Internet petition being delivered to Apple tomorrow.
http://feedproxy.google.com/~r/cnet/tcoc/~3/-TXw3Ctu1Vc/
AT&T CEO gets $2 million pay cut following T-Mobile defeat, CNET
CEO Randall Stephenson will see his total pay for 2011 drop by more than $2 million over his role in the failed bid to buy T-Mobile.
http://feedproxy.google.com/~r/cnet/tcoc/~3/a3Ik2vEeywc/
State AGs Target Google Privacy Policy, WSJ
A group of dozens of state attorneys general have raised concerns with Google over the Internet giant's new privacy policy, marking the latest public flare-up over the planned changes.
http://online.wsj.com/article/SB10001424052970203918304577239793006074440.html?mod=rss_Technology
Level 3: Morgan Stanley Ups To Overweight; Shares Rally, Forbes
Shares of telecom services provider Level 3 are trading higher Thursday morning after Morgan Stanley analyst Simon Flannery lifted his rating on the stock to Overweight from Equal Weight, setting a price target of $31. The stock closed yesterday at $20.89,
A View of the Iranian "Internet Blockade" from Akamai's Intelligent Platform, Akamai
The latest Internet blockade affected the most common form of secure connections, including all encrypted international websites outside of Iran that depend on the Secure Sockets Layer protocol, which display addresses beginning with "https."
Are aggregation and curation journalism? Wrong question, Gigaom
The battle between traditional media and the blogosphere over aggregation (or "curation," if you prefer) continues to rage. In the latest skirmish, Forbes blogger Kashmir Hill got thrown under the bus by many for a recent blog post in which she summarized a New York Times piece about data-mining practices and privacy. According to her critics, Hill "stole" the story from the NYT, along with a lot of web traffic that rightfully belonged to the newspaper. Some argue that this doesn't deserve to be called
http://feedproxy.google.com/~r/OmMalik/~3/hrhbCBA4Ky4/
Google: Please Don't Kill Video on the Web, Microsoft
Earlier today, Microsoft filed a formal competition law complaint with the European Commission (EC) against Motorola Mobility and Google. We have taken this step because Motorola is attempting to block sales of Windows PCs, our Xbox game console and other products. Their offense? These products enable people to view videos on the Web and to connect wirelessly to the Internet using industry standards.
State & Local Government Cloud Commission (SLG-CC), TechAmerica
On February 16, the TechAmerica Foundation released the final report and recommendations from the State and Local Government Cloud Commission (SLG-CC).
http://www.techamerica.org/state-local-government-cloud-commission-slg-cc
Gov Agency Pressuring Facebook To Collect More Info About Users Should Read White House's Privacy Report, Forbes
Today the White House is calling for greater online privacy for consumers. One of seven new "privacy rights" Obama proposes for Americans is the "right to focused collection" -- essentially saying that companies should only collect "the kinds of data they need... to accomplish specific purposes."
Web privacy fears spur US plans, BBC
The White House unveils a "bill of rights" for web users, calling for stronger privacy protections amid fears that online browsing habits are not secure.
http://www.bbc.co.uk/go/rss/int/news/-/news/world-us-canada-17144760
Statement from Time Warner Cable Regarding the "Consumer Privacy Bill of Rights" Announced Today by The White House, TWC
"Time Warner Cable commends the Administration for its announcement today of a 'Consumer Privacy Bill of Rights' and a multistakeholder process to foster a consistent and uniform federal framework to protect consumers' privacy online. Protecting consumers' privacy is a bedrock principle for Time Warner Cable and we are pleased that the Administration is undertaking this important initiative through the Department of Commerce. By ensuring that personal
http://www.timewarnercable.com/corporate/about/inthenews.ashx?PRID=3469&MarketID=0
White House Announcement Sets Course for Privacy, Microsoft
Consumer trust is vital to the growth of a vibrant Internet, and respect for privacy – putting people first – is essential to earning and maintaining that trust. Today's release by the White House of their framework signifies an important milestone in the evolution of privacy interests of Americans and individuals around the world.
Rockefeller Supports Administration's Online Privacy Proposal, Senate Commerce
Chairman John D. (Jay) Rockefeller IV made the following statement in support of the White House online privacy proposals announced today and reiterated his commitment to making sure consumers' personal information is protected:
White House Unveils New Comprehensive Privacy Blueprint, NTIA
The Obama Administration today unveiled a "Consumer Privacy Bill of Rights" as part of a comprehensive blueprint to improve consumers' privacy protections and ensure that the Internet remains an engine for innovation and economic growth.
http://www.ntia.doc.gov/blog/2012/white-house-unveils-new-comprehensive-privacy-blueprint
Obama Administration Unveils Promising Consumer Privacy Plan, but the Devil Will Be in the Details, EFF
Today the White House proposed a framework for protecting privacy in the digital age. The plan, laid out in detail in a white paper (pdf), includes a Consumer Privacy Bill of Rights based on well-established fair information practice principles. EFF, which has previously proposed a Bill of Privacy Rights for Social Network Users, believes this user-centered approach to privacy protection is a solid one.
Did Google Defeat People's Privacy Preferences?, TLF
Given the importance of privacy self-help—that is, setting your browser to control what it reveals about you when you surf the Web—I was concerned to hear that Google, among others, had circumvented third-party cookie blocking that is a default setting of Apple's Safari browser. Jonathan Mayer of Stanford's Center for Internet and Society published a thorough and highly technical explanation of the problem on Thursday.
http://feedproxy.google.com/~r/techliberation/~3/ri5Vcw-kui0/
Google Under Fire: Tech Giant Bypassed Safari Users' Privacy Settings, Center for Internet and Society
no description
Are Librarians Encouraging Public Libraries to Abide by COPPA?, apophenia
The Children's Online Privacy Protection Act (COPPA) was created to prevent corporations from collecting data about children without parental permission. This law explicitly does not apply to public institutions, non-profits, and government agencies. Yet, many public institutions not only choose not to collect data about children; they forbid children from accessing information without parental permission. Much to my surprise, this includes many public libraries
http://feedproxy.google.com/~r/zephoria/thoughts/~3/N8agcOKfthA/libraries-coppa.html
FCC chairman calls on ISPs to adopt new security measures, CW
U.S. Internet service providers should take new steps to protect subscribers against cyberattacks, including notifying customers when their computers are compromised, the chairman of the U.S. Federal Communications Commission said Wednesday.
Does The Cybersecurity Act Of 2012 Mark The Beginning Of The War On Cyber-terrorism?, Forbes
The Cybersecurity Act of 2012 is the latest effort by Congress to do something about the threat of cyber attacks and cyber crime. Fortunately, and perhaps thanks to the efforts to quash SOPA and PIPA, the Act is quite a bit more restrained in scope than its predecessors.
FCC chairman calls on ISPs to help fight cyber attacks, CNET
Cyber security is a growing problem that threatens the U.S. economy, and FCC Chairman Julius Genachowski says broadband providers can help protect the public.
http://feedproxy.google.com/~r/cnet/tcoc/~3/YPQecAcmaOk/
FCC Chairman Embraces Industry Solutions for Cyber Security, Comcast
Today, FCC Chairman Julius Genachowski spoke about the growing threat of cyber attacks to our national economy and security, and embraced the need for real-time, industry-led solutions, rather than government mandates, as the best approach to address this problem.
http://blog.comcast.com/2012/02/fcc-chairman-embraces-industry-solutions-for-cyber-security.html
NIST Establishes National Cybersecurity Center of Excellence, NIST
State of Maryland and Montgomery County Join PartnershipThe State of Maryland and Montgomery County, Md., partner with NIST in the New National Cybersecurity Center of Excellence. At the Memorandum of Understanding Signing Feb. 21, from ...
http://www.nist.gov/itl/csd/nccoe-022112.cfm
Keeping the Internet Safe, AT&T
"Keeping the Internet safe for consumers to browse, transact business and communicate is an important objective not only for AT&T but any other business that operates online.
http://attpublicpolicy.com/cybersecurity/keeping-the-internet-safe/
The Death of SMS? Maybe So With Mountain Lion, Forbes
no description
http://www.forbes.com/sites/erikamorphy/2012/02/20/the-death-of-sms-maybe-so-with-mountain-lion/
How The Guy Who Didn't Invent Email Got Memorialized In The Press & The Smithsonian As The Inventor Of Email, Techdirt
Late last week, the Washington Post reported that The Smithsonian had acquired "tapes, documentation, copyrights, and over 50,000 lines of code from V.A. Shiva Ayyadurai, who both the Smithsonian and the Washington Post insisted was the "inventor of e-mail." There's just one problem with this: It's not actually true. Lots of
US Telecom Says FCC Broadband Order Would Be Better if a Few Rules Were Clarified, USTelecom
no description
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
"If there are no dogs in Heaven, then when I die I want to go where they went."-Will Rogers
:: Adopt a Rescue Dog or Cat :: http://www.petfinder.com ::
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Website :: www.cybertelecom.org
Blog :: cybertelecom.blogspot.com
Delicious :: http://del.icio.us/rcannon100/zxc
Twitter & Facebook :: Cybertelecom
Google Group :: cybertelecom-l
AUP :: www.cybertelecom.org/cybert.htm#aup
Cybertelecom is Off-the-Record. Otherwise play nicely.
Link to us! www.cybertelecom.org
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Monday, February 20, 2012
ACPA Part 9: Failed Conspiracies: "It's All About Trademark"
- the average percentage of Good Faith Factors considered is 59%; and
- the average percentage of Bad Faith Factors considered is 60%.
Next: Another Failed Conspiracy
Saturday, February 18, 2012
2.15 :: 67 Cases :: Crowded :: Linus' Law :: Depressing :: That Must Be Illegal :: Smartphone, Dumb Regs :: Fear-mongering Surveillance
CyberTelecom News
Federal Internet Law and Policy
============================================
>> This was cued up early this week and I never got it out. Sorry.
Got Open WiFi? Get a lawyer., Forbes
Sometime ago I wrote about how your WiFi might be hacked due to a
technical SNAFU in something that is a standard feature of WiFi access
http://www.forbes.com/sites/markgibbs/2012/02/13/got-open-wifi-get-a-lawyer/
Would a "right of reply" f ix Section 230 of the Communications
Decency Act?, Intl J of Law and Info Tech
Section 230 of the Communications Decency Act provides immunity from
defamation claims to ISPs and website owners for materials posted by
third parties. However, the statute also imposes a hardship on the
victims of that defamation, since they are often left without a remedy
against an anonymous
http://ijlit.oxfordjournals.org/content/20/1/73.short
"Network Neutrality": the meme, its cost, its future, CAIDA
k. claffy, "'Network Neutrality': the meme, its cost, its future", ACM
SIGCOMM Computer Communication Review (CCR), vol. 41, no. 1, pp.
44--45, Sep 2011.
http://www.caida.org/publications/papers/2011/network_neutrality/
Net neutrality and the EU electronic communications regulatory
framework, Intl J of Law and Info Tech
For the most part, the current Internet is open, the whole Internet is
available to anyone who connects to it. The reason for this openness
is that the network
http://ijlit.oxfordjournals.org/content/20/1/48.short
AT&T Throttles Customers, Comes Under Fire, Forbes
AT&T is under fire for throttling its top data users, as the spectrum
crunch gradually renders unlimited data plans a thing of the past.
http://www.forbes.com/sites/mobiledia/2012/02/14/att-throttles-customers-comes-under-fire/
ACPA Part 8: Sixty Seven Cases, Cybertelecom
These posts review the first 11 years of AntiCybersquatting Consumer
Protective Act (ACPA) dispositive federal caselaw. Decisions were
found by searching Google Scholar for the term "cybersquatting,"
reviewing cases cited by uncovered cases and literature, and tracking
new cases
http://feedproxy.google.com/~r/CybertelecomBlog/~3/D2cgoJS6PN8/acpa-part-8-sixty-seven-cases.html
Will the UN take over Net governance?, TLF
Over at TIME.com I write that we should keep a close eye on moves by
Russia, China and other countries to move Internet governance to the
UN:
http://feedproxy.google.com/~r/techliberation/~3/uZfI--Ndh90/
The World Of Open Textbooks Just Became A Little More Crowded -- And A
Little More Open, Techdirt
Open e-textbooks are hardly new: Techdirt has been reporting on the
pioneer in this market, Flat World Knowledge, for several years now.
But a new entrant called OpenStax College is noteworthy for a number
of reasons:
http://www.techdirt.com/blog/casestudies/articles/20120209/09331017710/world-open-textbooks-just-became-little-more-crowded-little-more-open.shtml
Justice Department OKs Google's bid for Motorola, CNET
The Justice Department says it doesn't believe that Google's $12.5
billion acquisition of Motorola Mobility will affect competition.
http://feedproxy.google.com/~r/cnet/tcoc/~3/iRxq3xfmLIw/
Iran Starts Blocking All Encrypted Traffic - As Tor Works on Solution
to Bypass Iranian Filters, DSLReports
Late last year Iranian leaders made it a criminal offense to bypass
the country's Internet filters using VPNs or any other technology. The
announcement by Iranian Telecommunications Minister Reza Taghipour
insisted the move was made to combat a "soft war being waged by
http://www.dslreports.com/shownews/Iran-Starts-Blocking-All-Encrypted-Traffic-118323
Canada wants warrantless Internet spying, says critics support child
porn, Ars Technica
Canada's conservative government has re-introduced an Internet
surveillance bill that would allow the government to obtain
information about Internet subscribers—without a warrant.
http://arstechnica.com/tech-policy/news/2012/02/canadian-government-proposes-warrantless-internet-spying-bill.ars?utm_source=rss&utm_medium=rss&utm_campaign=rss
The Curious Case of the D.C. District's Anonymity Orders, Citizens
Media Law Project
Just before Christmas 2011, a federal magistrate working under D.C.
District Court issued a… curious ruling. The case is Hard Drive v.
Does 1-1,495, another one of these mass-joinder copyright-infringement
cases. I recommend hitting that link for the full story, but here's
the basic sketch:
http://feedproxy.google.com/~r/CitizenMediaLawProject/~3/cgpWSoEMZ3I/curious-case-dc-districts-anonymity-orders
EU Official Who Resigned Over ACTA Details Why ACTA Is Dangerous;
While His Replacement Seems Unlikely To Care, Techdirt
Last month, we noted that, Kader Arif, the ACTA rapporteur -- or the
guy in charge of "investigating" ACTA for the EU Parliament -- had
resigned in disgust over the fact that the EU was moving forward with
ACTA. He noted that he was denouncing both the process and the
agreement itself. Arif
http://www.techdirt.com/articles/20120213/01140117739/eu-official-who-resigned-over-acta-details-why-acta-is-dangerous-while-his-replacement-seems-unlikely-to-care.shtml
Jessica Wang, A Brave New Step: Why the Music Industry Should Follow
the Hulu Model, IDEA
The single greatest problem facing the music industry today is its
inability to find an effective response to illegal music downloading.
Approximately ninety-five percent of music was downloaded illegally in
2008,1 and one can
http://nessiteras.piercelaw.edu/assets/pdf/idea-vol51-no3-wang.pdf
Germany Won't Sign ACTA, Forbes
It worked against SOPA, and it seems like the massive mobilization of
internet protests may be derailing the once-inevitable ACTA as well.
http://www.forbes.com/sites/davidthier/2012/02/10/germany-wont-sign-acta/
The range of Linus' Law, Virulent Word of Mouse
After more than a decade of successful growth, Wikipedia continues to
defy easy characterization. It receives more than 400 million viewers
per month. Close to four million articles grace its web pages in
English alone. Volunteers built the entire corpus of text.
http://virulentwordofmouse.wordpress.com/2012/02/13/the-range-of-linus-law/
Depressing: News Sites Are Their Own Biggest Advertisers, Forbes
Broadly speaking, legacy publishers have done a terrible job of
convincing the marketers who advertise with them in print to extend
their relationships to the digital realm. A new report from the Pew
Research Center's Project for Excellence in Journalism shows just how
terrible.
http://www.forbes.com/sites/jeffbercovici/2012/02/13/depressing-news-sites-are-their-own-biggest-advertisers/
EFF Unveils New Project: Bloggers Under Fire, EFF
2011 was by many accounts 'the year of the protester.' From Tunisia
to Oakland, activists took to the streets—and to social networks—to
express themselves and their grievances. But while many were
successful in using online tools in their activism, others faced grave
consequences.
https://www.eff.org/deeplinks/2012/02/eff-unveils-new-project-bloggers-under-fire
Oh No! Car Dealers Might Have To Deal With Informed Customers! That
Must Be Illegal!, Techdirt
A few folks sent over this recent NY Times article about how the
traditional auto sales world was apparently up in arms about a company
called TrueCar that seeks to make the process of buying cars easier by
providing more info to buyers about what cars are actually selling
for, what the
http://www.techdirt.com/blog/innovation/articles/20120213/04002117742/oh-no-car-dealers-might-have-to-deal-with-informed-customers-that-must-be-illegal.shtml
Netflix Cuts Q4 Profits To Reflect Suit Settlement; Shrs Off, Forbes
Netflix has reduced its previously reported Q4 profits to 64 cents a
share from 73 cents.
http://www.forbes.com/sites/ericsavitz/2012/02/13/netflix-cuts-q4-profits-to-reflect-suit-settlement-shrs-off/
Netflix pays $9 million to settle privacy violation lawsuit, CNET
After a higher-than-expected fourth quarter, the video subscription
service unburdens itself of a pending yearlong class action suit and
settles for $9 million.
http://feedproxy.google.com/~r/cnet/tcoc/~3/qXEcnsegWcs/
Take that, Netflix: Hulu premieres Battleground series, Gigaom
Hulu launched its first original scripted series Battleground Monday
night, just one week after Netflix started its foray into original
programming with Lilyhammer.
http://feedproxy.google.com/~r/OmMalik/~3/kTrogUxnGYQ/
Tidbits from the FCC's Proposed Budget, Telecom Law Monitor
Yesterday, the FCC released its proposed budget for fiscal year 2103
(beginning in October 2012). The budget offers a few interesting
insights into the balance of the FCC's functions. It also offers a
preview of what to expect with the FCC's regulatory fees, which are
due in September of each year. See below for more.
http://feeds.lexblog.com/~r/TelecomLawMonitor/~3/n6eaBo72ag8/
VIDEO: Who owns your online personal data?, BBC
David Reid reports on the new European Commission directive that aims
to put you back in charge of your data.
http://news.bbc.co.uk/go/rss/int/news/-/2/hi/programmes/click_online/9695021.stm
NIST Proposes Governance Structure for Internet Identity, EPIC
The National Institute of Standards and Technology has released a
report detailing the governance structure for the White House's
National Strategy for Trusted Identities in Cyberspace. EPIC, joined
by the Liberty Coalition, submitted comments on the original proposal,
emphasizing
http://epic.org/2012/02/nist-proposes-governance-struc.html
Smartphone, Dumb Regulations: Mixed Signals in Mobile Privacy, Fordham
IP Media & Ent LJ
If you happen to use one of the 200 million1 iPhone, iPad, and iPod
touch devices on the planet, Apple knows where you are.
http://iplj.net/blog/wp-content/uploads/2012/01/C06_Levis.pdf
Anonymous Hacks CIA Website, Forbes
"CIA TANGO DOWN" reads an Anonymous-affiliated Twitter account. It's
military-speak for eliminating a hostile force that has infilitrated
hacker circles as an announcement of a successful attack.
http://www.forbes.com/sites/davidthier/2012/02/10/cia-website-hacked/
Staff-led Background Briefing on Cybersecurity Act of 2012, Senate Commerce
The Senate Committees on Commerce, Science, and Transportation and
Homeland Security and Governmental Affairs will host a staff-led
background briefing on bipartisan cybersecurity legislation, the
Cybersecurity Act of 2012.
http://commerce.senate.gov/public/index.cfm?p=special-events&ContentRecord_id=4cdd9f63-a420-4ada-888c-4abdbc7fda6d
FDA defends its monitoring of whistle-blowers' email, CW
The FDA Friday said it monitored the private email accounts of nine
agency whistle-blowers starting in 2010 to determine whether any of
them leaked confidential information to the public.
http://rss.computerworld.com/~r/computerworld/news/feed/~3/kXdctROTnSQ/FDA_defends_its_monitoring_of_whistle_blowers_email
FBI seeks social media monitoring tool, CW
In a move that's unlikely to sit well with privacy advocates, the FBI
has begun scouting for a tool that will allow it to gather and mine
data from social networks like Facebook, Twitter and blogs.
http://rss.computerworld.com/~r/computerworld/news/feed/~3/bIULC48K83A/FBI_seeks_social_media_monitoring_tool
15 Years On, President Clinton's 5 Principles for Internet Policy
Remain the Perfect Paradigm, Forbes
What principles should guide Internet policy? Fifteen years ago, the
Clinton Administration proposed a paradigm for how cyberspace should
be governed that remains the most succinct articulation of a
pro-liberty, market-oriented vision for cyberspace ever penned. It
recommended that we
http://www.forbes.com/sites/adamthierer/2012/02/12/15-years-on-president-clintons-5-principles-for-internet-policy-remain-the-perfect-paradigm/
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
"If there are no dogs in Heaven, then when I die I want to go where
they went."-Will Rogers
:: Adopt a Rescue Dog or Cat :: http://www.petfinder.com ::
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Website :: www.cybertelecom.org
Blog :: cybertelecom.blogspot.com
Delicious :: http://del.icio.us/rcannon100/zxc
Twitter & Facebook :: Cybertelecom
Google Group :: cybertelecom-l
AUP :: www.cybertelecom.org/cybert.htm#aup
Cybertelecom is Off-the-Record. Otherwise play nicely.
Link to us! www.cybertelecom.org
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
NYU Privacy Research Fellowship Available for 2012-13 Academic Year
Monday, February 13, 2012
ACPA Part 8: Sixty Seven Cases
- Total number of cases reviewed: 67
- Percentage of cases where Trademark Owner (TMO) prevailed: 66%
- Percentage of cases where Domain Name Owner (DNO) prevailed: 34%
- Total factors considered all cases: 364
- Average number of factors considered in a case: 5.4
- Total factors in favor of DNO: 93 (26%)
- Total factors in favor of TMO: 261 (72%)
- The number of cases that considered 9 or more factors: 22
- Fewest factors considered in a TMO winning case: 1