www.fgks.org   »   [go: up one dir, main page]

 WARNING: JavaScript is either disabled or not supported by your browser. You may encounter problems using various features on CircleID. 
Robert Cannon

Robert Cannon

Cybertelecom
Joined on August 8, 2007 – United States
Total Post Views: 71,782

About

Bio Info found at Cybertelecom .

Except where otherwise noted, all postings by Robert Cannon on CircleID are licensed under a Creative Commons License.

Featured Blogs

Is 47 USC 230(c) an Immunity or an Affirmative Defense (Does it Matter?)

Procedure matters. It matters whether a defendant can dispose of a litigation right out of the gate, or whether the defendant must suffer the slings and arrows of discovery, motions, and trial before presenting a successful defense. Procedurally, once a litigation has been initiated, defendant has a chance to say, "hey, wait a minute, there isn't actually a cause of action here." It's like someone suing me for being tall. Well, yeah, but there is no recognized cause of action against being tall. more»

The Boundary Between Sec. 230 Immunity and Liability: Jones v. Dirty World Entertainment Recordings

Out in the wilderness of cyberspace is a boundary, marking the limits of Sec. 230 immunity. On the one side roams interactive services hosting third party content immune from liability for that third party content. On the other sides is the frontier, where interactive content hosts and creators meet, merge, and become one. Here host and author blend, collaborating to give rise to new creations. more»

In Which We Consider the Meaning of 'Authorized': GIVAUDAN FRAGRANCES CORPORATION v. Krivda

What does authorized access mean? If an employee with authorized access to a computer system goes into that system, downloads company secrets, and hands that information over to the company's competitor, did that alleged misappropriation of company information constitute unauthorized access? This is no small question. If the access is unauthorized, the employee potentially violated the Computer Fraud and Abuse Act (CFAA) (the CFAA contains both criminal and civil causes of action). But courts get uncomfortable here. more»

NJ Content Liability Law Ruled Inconsistent with Sec. 230 (just like in Washington and Tennesse)

Back in a time before most members of Congress or prosecutors knew that there was an Internet, there was Prodigy. Prodigy, as part of its service, ran family-friendly chat rooms that it moderated in an effort to keep kids protected from unfortunate content. In a different Prodigy chat room, some unknown third party said something apparently bad about an investment firm Stratton-Oakmont. Stratton-Oakmont didn't like that very much, and sued. more»

When an IP Address Does Not Equal Individual Culpability - Breaking Glass Pictures v Does, DAZ 2013

Something bad happens online. I can tie that something-bad back to an IP address. Do I know who did the bad thing? According to the Federal District Court in Arizona, I don't. An IP address may identify the owner of an Internet access account; it does not identify who was online at that particular time and who may be responsible for the actions in question. In Breaking Glass Pictures v Does, DAZ 2013, Plaintiff brought a claim for copyright infringement, wants early discovery, but the court is refusing. more»

Dial "L" for Liability - Sec. 230 Protects Online Service for Errant Phone Number

The Communications Decency Act has been described as the greatest Internet law. The first major Internet law designed to censor the Internet actually enabled the interactive Internet. While the censorship provisions of the Communications Decency Act went down in unanimous supreme court flames, a separate provision remains standing. The Good Samaritan provision of the CDA (47 U.S.C. ยง 230) declared that networks and online services are not publishers and therefore are not liable for the content of third parties. more»

No Virginia, You Have No Duty to Secure Your WiFi Access Point

Every now and again a report flies across the network about the police breaking down someone's door and attempting to arrest the home owner for bad things online - assuming that whatever happened from that person's Internet connection is their fault. Now there are lots of problems with this - lots of problems. But one of the big ones is that anyone can access an open access point... more»

NTIA Request for Comments on the Internet Assigned Numbers Authority (IANA) Functions

On Feb. 25, 2011, the National Telecommunications and Information Administration released the following request for comments concerning the USG's contract for the IANA function. As indicated, the USG's contract for the IANA function with ICANN expires later this year. Interested parties can file comments with NTIA by March 31, 2011. more»

The Wayward AntiCybersquatting Consumer Protection Act

The Anti-Cybersquatting Consumer Protection Act (ACPA) has lost its way. The ACPA was passed in an era of domain name land grabs, where nefarious individuals would register and warehouse oodles of valuable domain names, and then extract ransom from bewildered-trademark owners. These nefarious individuals are known as "cybersquatters", and, according to the ACPA, they are bad. The Ninth Circuit, in an early reading of the ACPA, stated... more»

US Government Releases Two IPv6 Papers

During the last week of December, two US Government agencies released papers on IPv6. NIST released Special Publication 800-119, Guidelines for the Secure Deployment of IPv6. This comprehensive 188 page paper provides guidelines for federal agencies (and anyone else who might want to take advantage of it) to securely deploy IPv6. more»

The Threat from Within - US v. Fowler, SDFL 2010

The security vendor-phobe at the head of the conference bangs on the podium with his shoe declaring that "The greatest threat comes from within! (buy our product for your network's salvation)." Fear as a marketing strategy can never be underestimated. Particular when the fear is of the misunderstood. Media helps stoke the flames of fear-marketing with stories of fired or disgruntled IT staff who reportedly effectuate their revenge on former employers by bricking systems. more»

Virtual Banishment and the First Amendment: Estavillo v. Sony Computer Entertainment of America

I saw this case in the excellent National Association of Attorneys General publication Cyber Crime e-newsletter. Many of us host or sponsor online communities of one form or another. On occasion, this means we must engage in moderation of the discourse in that community, and, as chance may arise, on occasion, we must give some chap the boot from the community for violating the AUP or the TOS. Inevitable, the booted chap screams "First Amendment Violation," to which we must respond, "The First Amendment restrains government actors -- we are not government actors." more»

Gripe Site Triumphant Over AntiCybersquatting Consumer Protect Act Complaint

Today's case involves the classic alleged scenario of a gripe site which used a Plaintiff's trademark in Defendant's web site domain name -- and whether this might be a violation of the Anti Cybersquatting Consumer Protection Act (ACPA). more»

It's Safe to Be a Dog on the Internet Again: Lori Drew Prosecution Terminated

"On the Internet, no one knows whether you're a dog." Of course, if you are a dog, and you are fibbing about it, according to the US Attorneys Office out in California you're a felon and should be sent to the dog pound. Fortunately, there's a new dog in town who seems to be howling a different tune. Bad facts make for bad law. The unfortunate alleged facts of this case involved fibbing about actual identities, playing with a young girl's emotions, and the girl's eventual suicide. more»

FCC Requests Comments on Definition of "Broadband" - Comments Due Aug 31; Replies Due Sept 8

The FCC is engaged in researching and preparing a National Broadband Plan which is due to Congress in February 2010. The FCC has released a Notice of Inquiry soliciting comments for the plan and is currently actively holding a lengthy series of workshops exploring the different aspects of what might go into the plan. more»

NTIA Seeks Nominations to Serve on the Online Safety and Technology Working Group

In the midst of the election season, Congress passed a plethora of Internet related laws. Most involved child protection. One involved webcaster protection. Wasting no time, the impact of the new laws is already being felt through federal agency implementation. On Friday, the National Telecommunications and Information Administration (NTIA) in the Department of Commerce released the following notice... more»

In Which We Explore the Federal Laws that Apply to Cyberstalking

Tragedies frequently result in flurries of legal activity. Last years witnessed the Myspace tragedy in which a 13 year old girl committing suicide. Unfortunately stalking laws have been clumsy tools that are difficult if not impossible for law enforcement officials to wield. Where existing laws respond poorly to tragedies, the option behind Door Number One is to enact a new law, and the option behind Door Number Two is to argue for a reinterpretation of current law that would somehow miraculously shoehorn the tragedy into the law. Unlike game shows, legal contestants can pick both doors -- which is what happened in this case. more»

NIST Releases a Profile for IPv6 in the U.S. Government for Comment - Comments Due Feb. 29

The National Institute for Standards and Technology (NIST) has released a second draft of a proposed standards profile to support the implementation of IPv6 by government agencies. "NIST developed the 'profile' to help ensure that IPv6-enabled federal information systems are interoperable, secure and able to co-exist with the current IPv4 systems." ...The White House's Office of Management and Budget declared in 2005 that all federal agencies shall migrated to IPv6 by June 30, 2008... more»