NetSecLaw: Dedicated to events, news and trends in technology law. XML Feed


Twitter Sues DOJ Over National Security Letter Disclosures


Federal Court: 'Google' Trademark Isn't a Generic Term from Nicole


Grooveshark lawsuit article from Antoine


Apple Can't Decrypt Data for Law Enforcement; Is It Enough? from Nicole


Yahoo says gov't threatened $250,000 a day fine from Nicole


Decrypting laptop doesn't count as self-incrimination, US federal judge rules (from Sean) - This will eventually make it's way to the SCOTUS and it will be interesting to see the outcome.


The next Digital Forensic Research Workshop (DFRWS) will held from August 6 to 8, 2012 in Washington, D.C. at the Embassy Suites Downtown hotel. The Call for Papers, workshops, and panels is now open; submissions are due February 20, 2012.


Can you be forced by law to decrypt your computer? US v. Fricosu court case rages on


2011 Patent Law Reform Update- The "America Invents Act" from Tarik


Is sharing a log-in a criminal act?


Linux... in Javascript!?!? from Mr. Grundy


An excellent article from the New York Times Magazine titled "The Great Cyberheist" - Details the Shadowcrew case and the eventual takedown of Albert Gonzalez.


Man gets 10 years for VoIP hacking - First person charged by US authorities for VoIP hacking from Rich


Microsoft Suggests Public Health Response for Sick PCs from Clyde - While Microsoft could try to make a better product, there is no incentive for them do so when they can externalize expenses that would otherwise be internal. We see the same issue play out with companies who pollute and companies that sell products that make otherwise healthy people sick. In this case, Microsoft has an even greater advantage as they are able to avoid all liability associated with making an inferior product through the use of an unconscionable End-User License Agreement (EULA). This allows them to avoid the liability and costs associated with making a product that is not fit for the purpose for which it is sold, which is otherwise a common law requirement for making any product. This is unfair to all other business sectors as it gives them a legal advantage that no other sector enjoys, thereby violating the principle of equal protection under the law.


Startup ivi TV goes on offense against broadcasters looking to shut it down from Tracy

What's up with Encryption? from Kathy


Extending The Law Of War To Cyberspace


Funny lawsuit from Tracy

Larry King bagel company sued over 'patented water' - Here's the original complaint


Hot chocolate: Hershey in dispute over iPhone app


Two new cases on Internet Anonymity


House OKs bill to strengthen penalties for 'virtual map' crimes


Judge limits DHS laptop border searches


Copyright and wrong - Why the rules on copyright need to return to their roots


Ruling suggests limits on employer's access to personal e-mail


Court Finds Constitutional Significance in Defendant's Failure to Password-Protect Home Wireless Network


George Washington University Law Professor Daniel Solove's "The Future of Reputation" is now available online.


Mystery co. sues Apple, IBM, Microsoft, Adobe, Oracle... 'Software installation? We own it!' from Bill

U.S. and Russian officials talk cyberissues from Tregg


Judge won't stop student from promoting illegal downloading from Tregg


Daniel Solove's "The Digital Person" is now available online for free but worth buying nonetheless.


Murdoch could block Google searches entirely


Judge Orders Google To Deactivate User's Gmail Account

This is a must read. This could have some very far reaching ramifications.


Mass. could be fifth state to adopt anti-UCITA law

Only two states, Virginia in 2001 and Maryland in 2000, have enacted the UCITA model legislation. Four states have adopted anti-UCITA measures, Iowa, North Carolina, West Virginia and Vermont.  This "bomb-shelter" legislation, intended to prevent a vendor from applying, for instance, Maryland's UCITA law provisions on residents in a bomb-shelter state.