<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><feed xmlns='http://www.w3.org/2005/Atom' xmlns:openSearch='http://a9.com/-/spec/opensearchrss/1.0/' xmlns:blogger='http://schemas.google.com/blogger/2008' xmlns:georss='http://www.georss.org/georss' xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr='http://purl.org/syndication/thread/1.0'><id>tag:blogger.com,1999:blog-5786180</id><updated>2024-08-31T20:29:22.905+08:00</updated><title type='text'>ByteLawyer Briefings</title><subtitle type='html'>&lt;strong&gt;Welcome to Harry SK Tan&#39;s ByteLawyer Briefings.&lt;/strong&gt; &lt;br&gt;This is a personal blawg and commentary covering the current developments of the law and technology affecting business and society.</subtitle><link rel='http://schemas.google.com/g/2005#feed' type='application/atom+xml' href='http://bytelawyer.blogspot.com/feeds/posts/default'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5786180/posts/default?alt=atom'/><link rel='alternate' type='text/html' href='http://bytelawyer.blogspot.com/'/><link rel='hub' href='http://pubsubhubbub.appspot.com/'/><link rel='next' type='application/atom+xml' href='http://www.blogger.com/feeds/5786180/posts/default?alt=atom&amp;start-index=26&amp;max-results=25'/><author><name>Harry SK Tan</name><uri>http://www.blogger.com/profile/05175119332452691961</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='26' src='http://i3.photobucket.com/albums/y57/cyberlawprof/HTSketch2.jpg'/></author><generator version='7.00' uri='http://www.blogger.com'>Blogger</generator><openSearch:totalResults>70</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><entry><id>tag:blogger.com,1999:blog-5786180.post-6486475776566189566</id><published>2007-08-25T13:34:00.000+08:00</published><updated>2007-08-25T14:02:07.644+08:00</updated><title type='text'>Odex fails action against PacNet for disclosure of identity of downloaders</title><content type='html'>&lt;div align=&quot;left&quot;&gt;In what appears to be a straightforward case of licensors of Animeware - ODEX - for illegal downloading of pirated copies by thousands, Odex filed suits against all the local commercial ISPs to obtain the identities of those who downloaded the pirated Anime. Odex was able to obtain orders against Singnet and Starhub but not against Pacific Internet. &lt;/div&gt;&lt;div align=&quot;left&quot;&gt; &lt;/div&gt;&lt;div align=&quot;left&quot;&gt;According to the Straits Times report, District Judge Ernest Lau gave a 14 page judgment explaining his grounds for his refusal to allow for the application by Odex against PacNet. Odex has in his view failed to prove its case against PacNet to the required level to prove that the ISP must be compelled to divulge the identities of the alleged wrongdoers. Judge Law likened their demand for the identities from the ISPs as an Anton Piller order. As AP orders are viewed as draconian and damaging, such ofrders should only be granted if the Plaintiff is able to prove that it has an extremely strong prima facie case. This high standard should be applied in the case of Odex case as to protect the public interest element. ISPs owe a duty to its subscribers to keep their identities confidential. &lt;/div&gt;&lt;div align=&quot;left&quot;&gt; &lt;/div&gt;&lt;div align=&quot;left&quot;&gt;As for the Odex case itself, it was not able to prove that it was the copyright owner as it did not have the exclusive license from the copyright owners as required by the Singapore Copyright Act. As it was neither the copyright owner nor exclusive licensee, it did not have the locus standi to bring the action. &lt;/div&gt;&lt;div align=&quot;left&quot;&gt; &lt;/div&gt;&lt;div align=&quot;left&quot;&gt;Further, the Judge also mentions that he was not satisfied with how Odex was able to arrive at it identified the alleged downloaders. As such, Odex did not fulfil its standard of proof to obtain the order. &lt;/div&gt;&lt;div align=&quot;left&quot;&gt; &lt;/div&gt;&lt;div align=&quot;left&quot;&gt;The impact of this decision will be felt in more than IP suits against downloaders and ISPs. Other suits such as defamation, fraud or even commercial transactions will have to prove to a high standard to obtain the identities of account holders before they can commence the substantive action itself. &lt;/div&gt;&lt;div align=&quot;left&quot;&gt; &lt;/div&gt;&lt;div align=&quot;left&quot;&gt;For more information as reported by &lt;a href=&quot;http://www.straitstimes.com/Latest%2BNews/Courts%2Band%2BCrime/STIStory_151108.html?vgnmr=1&quot;&gt;&lt;strong&gt;Straits Times, CLICK HERE&lt;/strong&gt;&lt;/a&gt;.&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://bytelawyer.blogspot.com/feeds/6486475776566189566/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/5786180/6486475776566189566?isPopup=true' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5786180/posts/default/6486475776566189566'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5786180/posts/default/6486475776566189566'/><link rel='alternate' type='text/html' href='http://bytelawyer.blogspot.com/2007/08/odex-fails-action-against-pacnet-for.html' title='Odex fails action against PacNet for disclosure of identity of downloaders'/><author><name>Harry SK Tan</name><uri>http://www.blogger.com/profile/05175119332452691961</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='26' src='http://i3.photobucket.com/albums/y57/cyberlawprof/HTSketch2.jpg'/></author><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5786180.post-6724359555790041564</id><published>2007-08-20T12:04:00.000+08:00</published><updated>2007-08-20T14:42:40.845+08:00</updated><title type='text'>How would the Singapore regulatory framework treat Eros LLC?</title><content type='html'>&lt;strong&gt;Day 1 of State of Play Conference. &lt;/strong&gt;&lt;br /&gt;&lt;br /&gt;Interestingly the latest case reported of the synthetic worlds is the case of EROS LLC suing Volkov Catteneo” who broke the sex program’s copy protection and sold unauthorized copies. So naturally Alderman (owner of ErosLLC) filed a civil lawsuit in U.S. District Court (real court not Second Life court) in Tampa, Fla., last month for the alleged copyright breach.&lt;br /&gt;&lt;br /&gt;For me, the interesting question is not about copyrightability of the software but whether national regulatory controls over pornography would treat the Eros programme itself as prohibited material. In the Singapore Films Act, Films includes videos games. Question is - whether this is a game?&lt;br /&gt;&lt;br /&gt;Please be aware that the YouTube video may offend as it has images of nude avatars.&lt;br /&gt;&lt;br /&gt;&lt;embed src=&quot;http://www.youtube.com/v/9Y6yjdQFtrw&quot; width=&quot;425&quot; height=&quot;350&quot; type=&quot;application/x-shockwave-flash&quot; wmode=&quot;transparent&quot;&gt;&lt;/embed&gt;</content><link rel='replies' type='application/atom+xml' href='http://bytelawyer.blogspot.com/feeds/6724359555790041564/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/5786180/6724359555790041564?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5786180/posts/default/6724359555790041564'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5786180/posts/default/6724359555790041564'/><link rel='alternate' type='text/html' href='http://bytelawyer.blogspot.com/2007/08/how-would-singapore-regulatory.html' title='How would the Singapore regulatory framework treat Eros LLC?'/><author><name>Harry SK Tan</name><uri>http://www.blogger.com/profile/05175119332452691961</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='26' src='http://i3.photobucket.com/albums/y57/cyberlawprof/HTSketch2.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5786180.post-1433893799719664323</id><published>2007-08-20T10:44:00.000+08:00</published><updated>2007-08-20T10:48:57.596+08:00</updated><title type='text'>State of Play Conference BEGINS</title><content type='html'>Finally the long awaited conference has begun. Last night at the opening dinner for participants, meeting all the thought leaders, academics and businesses involved in the building and use of synthetic environments is exciting. There was a great presentation by IDA on the INSIGHT 2015 and how Singapore is going to adapt and capitalise the interactive digital technologies. Also there was a great prelaunch viewing of the movie &quot;IdealWorld&quot; that is a documentary of Second Life activities and entities there.&lt;br /&gt;&lt;br /&gt;Check out their site here and have a look at it as a primer for the legal regulatory issues that is beginning to become the centre of focus for tech lawyers and professors.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;&lt;a href=&quot;http://www.idealworldmovie.com/&quot;&gt;IDEALWORLD MOVIE.&lt;/a&gt;&lt;/strong&gt;</content><link rel='replies' type='application/atom+xml' href='http://bytelawyer.blogspot.com/feeds/1433893799719664323/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/5786180/1433893799719664323?isPopup=true' title='2 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5786180/posts/default/1433893799719664323'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5786180/posts/default/1433893799719664323'/><link rel='alternate' type='text/html' href='http://bytelawyer.blogspot.com/2007/08/state-of-play-conference-begins.html' title='State of Play Conference BEGINS'/><author><name>Harry SK Tan</name><uri>http://www.blogger.com/profile/05175119332452691961</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='26' src='http://i3.photobucket.com/albums/y57/cyberlawprof/HTSketch2.jpg'/></author><thr:total>2</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5786180.post-3115512554831739438</id><published>2007-08-11T15:51:00.000+08:00</published><updated>2007-08-11T16:14:28.831+08:00</updated><title type='text'>Is the next generation of portable computing already here?</title><content type='html'>It has been some time since new hardware or software developments excited me to an extent where I can forsee a sea change in the way we do computing. Some time back OLED technologies promised the coming of cheap and maleable screens. A couple of weeks ago I read about 60GB solid state memory now being produced making hard disk drives for portable computers almost a silly option. Much like the robustness of memory cards, these new huge solid state memory storage would promise to make portable computers even more portable in both weight and power usage.&lt;br /&gt;&lt;br /&gt;The most interesting software development I just discovered this week was the company called &lt;a href=&quot;http://portableapps.com/suite&quot;&gt;PortableApps.com&lt;/a&gt;. This company champions portable computing in a manner that would cause an uproar with the portable computer manufacturers if it caught on. In short, the PortableApps software run applications from the ubiquitous Thumbdrive.&lt;br /&gt;&lt;br /&gt;It even provides for free download its PortApps Suite that has an antivirus, web browser, instant messaging,  Openoffice suite, Soduku puzzle game,  and email client and it all runs comfortably on a 512MB thumb drive.&lt;br /&gt;&lt;br /&gt;Just for a moment consider if we put all these technologies together - how would it look like to you? Well, it looks to me that the future computing looks interesting again - if only the mega manufacturers knew how to keep their costs low.</content><link rel='replies' type='application/atom+xml' href='http://bytelawyer.blogspot.com/feeds/3115512554831739438/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/5786180/3115512554831739438?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5786180/posts/default/3115512554831739438'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5786180/posts/default/3115512554831739438'/><link rel='alternate' type='text/html' href='http://bytelawyer.blogspot.com/2007/08/is-next-generation-of-portable.html' title='Is the next generation of portable computing already here?'/><author><name>Harry SK Tan</name><uri>http://www.blogger.com/profile/05175119332452691961</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='26' src='http://i3.photobucket.com/albums/y57/cyberlawprof/HTSketch2.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5786180.post-2775398605770169901</id><published>2007-07-26T16:45:00.000+08:00</published><updated>2007-08-31T16:27:22.326+08:00</updated><title type='text'>What is the Second Life phenomenon?</title><content type='html'>Leading up to the State of Play conference next month in Singapore, I will be putting up some useful or background posts on electronic environments. In this post, this video is a useful introduction to Second Life for new comers.&lt;br /&gt;&lt;br /&gt;&lt;embed name=&quot;flashObj&quot; pluginspage=&quot;http://www.macromedia.com/shockwave/download/index.cgi?P1_Prod_Version=&quot; src=&quot;http://services.brightcove.com/services/viewer/federated_f8/271557391&quot; width=&quot;360&quot; height=&quot;300&quot; type=&quot;application/x-shockwave-flash&quot; bgcolor=&quot;#FFFFFF&quot; flashvars=&quot;videoId=1076645052&amp;playerId=271557391&amp;amp;viewerSecureGatewayURL=https://services.brightcove.com/services/amfgateway&amp;servicesURL=http://services.brightcove.com/services&amp;amp;cdnURL=http://admin.brightcove.com&amp;domain=embed&amp;amp;autoStart=false&amp;amp;&quot; base=&quot;http://admin.brightcove.com&quot; seamlesstabbing=&quot;false&quot; swliveconnect=&quot;true&quot;&gt;&lt;/embed&gt;</content><link rel='replies' type='application/atom+xml' href='http://bytelawyer.blogspot.com/feeds/2775398605770169901/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/5786180/2775398605770169901?isPopup=true' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5786180/posts/default/2775398605770169901'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5786180/posts/default/2775398605770169901'/><link rel='alternate' type='text/html' href='http://bytelawyer.blogspot.com/2007/07/what-is-second-life-phenomenon.html' title='What is the Second Life phenomenon?'/><author><name>Harry SK Tan</name><uri>http://www.blogger.com/profile/05175119332452691961</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='26' src='http://i3.photobucket.com/albums/y57/cyberlawprof/HTSketch2.jpg'/></author><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5786180.post-7538682291341911743</id><published>2007-07-18T14:44:00.000+08:00</published><updated>2007-07-18T14:49:48.097+08:00</updated><title type='text'>STATE OF PLAY CONFERENCE V : Building the Global Metaverse</title><content type='html'>&lt;div align=&quot;left&quot;&gt;I am very proud to announce that Centre for Asia Pacific Technology Law &amp; Policy at NTU is co-organising an international conference here in Singapore on the impact of Virtual World technologies on education, law and society. The conference is jointly organised by Harvard Law, Yale Law and Trinity and Nanyang Technological Universities. &lt;/div&gt;&lt;div align=&quot;left&quot;&gt; &lt;/div&gt;&lt;div align=&quot;left&quot;&gt;The conference will be held at the Marina Mandarin Singapore from 19th to the 22nd August. In addition to the multidisciplinary tracks in the conference proceedings, CAPTEL will also be conducting a workshop on the last day of the conference on Virtual World&#39;s legal issues on business in particular on Asian businesses and opportunities.&lt;/div&gt;&lt;div align=&quot;left&quot;&gt;&lt;/div&gt;&lt;div align=&quot;left&quot;&gt;Have a look at this site to register for the conference - &lt;strong&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;&lt;a href=&quot;http://www.nyls.edu/pages/2396.asp&quot;&gt;STATE OF PLAY homepage&lt;/a&gt;&lt;/span&gt;&lt;/strong&gt;.&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://bytelawyer.blogspot.com/feeds/7538682291341911743/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/5786180/7538682291341911743?isPopup=true' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5786180/posts/default/7538682291341911743'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5786180/posts/default/7538682291341911743'/><link rel='alternate' type='text/html' href='http://bytelawyer.blogspot.com/2007/07/state-of-play-conference-v-building.html' title='STATE OF PLAY CONFERENCE V : Building the Global Metaverse'/><author><name>Harry SK Tan</name><uri>http://www.blogger.com/profile/05175119332452691961</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='26' src='http://i3.photobucket.com/albums/y57/cyberlawprof/HTSketch2.jpg'/></author><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5786180.post-5141666551798717803</id><published>2007-06-15T19:58:00.000+08:00</published><updated>2007-06-15T20:37:53.476+08:00</updated><title type='text'>Biomedical Data Protection proposed in Singapore</title><content type='html'>&lt;div align=&quot;left&quot;&gt;The Singapore Bioethics Advisory Committee (BAC) is reviewing the need to protect the privacy of personal data of individuals involved in biomedical research. The key proposal is to remove or protect all the personal information that links an individual to the biomed information so that there will not be any tracing back to the individual.&lt;/div&gt;&lt;div align=&quot;left&quot;&gt; &lt;/div&gt;&lt;div align=&quot;left&quot;&gt;It was also proposed that biomed researchers are to specifically request consent from the research participants after explaining the research project, and any possible risks.  Further, the research participants should have the right to withdraw consent at any time without explanation or prejudice. &lt;/div&gt;&lt;div align=&quot;left&quot;&gt; &lt;/div&gt;&lt;div align=&quot;left&quot;&gt;It is also incumbent on the researchers to prevent breaches of privacy by employing safeguards against loss, unauthorised access, or copying of data. &lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://bytelawyer.blogspot.com/feeds/5141666551798717803/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/5786180/5141666551798717803?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5786180/posts/default/5141666551798717803'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5786180/posts/default/5141666551798717803'/><link rel='alternate' type='text/html' href='http://bytelawyer.blogspot.com/2007/06/biomedical-data-protection-proposed-in.html' title='Biomedical Data Protection proposed in Singapore'/><author><name>Harry SK Tan</name><uri>http://www.blogger.com/profile/05175119332452691961</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='26' src='http://i3.photobucket.com/albums/y57/cyberlawprof/HTSketch2.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5786180.post-1443932198810620195</id><published>2007-04-26T22:56:00.000+08:00</published><updated>2007-06-06T22:41:42.592+08:00</updated><title type='text'>Singapore Spam Control Act 2007 passed into Law</title><content type='html'>&lt;img src=&quot;http://www.blawg.com/claimscript.aspx?userid=cyberlawprof&amp;LinksID=2944&quot;&gt;&lt;br /&gt;&lt;br /&gt;The Spam Control Act 2007, passed in Parliament on 12 April 2007, will provide the means to address the still-growing and global phenomenon. The law was developed by the Infocomm Development Authority of Singapore (IDA) and the Attorney-General’s Chambers of Singapore (AGC), with inputs from the public, people and private sectors, over the last three years.&lt;br /&gt;&lt;br /&gt;The press report from the IDA is &lt;a href=&quot;http://www.ida.gov.sg/News%20and%20Events/20060919202026.aspx?getPagetype=20&quot;&gt;&lt;strong&gt;viewable here&lt;/strong&gt;&lt;/a&gt;. The SPAM Bill itself can be &lt;strong&gt;&lt;a href=&quot;http://www.parliament.gov.sg/Publications/070006.pdf&quot;&gt;downloaded here&lt;/a&gt;&lt;/strong&gt;.&lt;br /&gt;&lt;br /&gt;This piece of legislation is not without controversy and detractors. The effort to prevent or control spam has often been described as a lost cause. Its been recorded that in Singapore more than 80% of the spam received here are from overseas and as such the local legitimate businesses has registered their views that they are being targetted while the real abusers are out of reach of the new law. While there is some degree of truth in that issue, this new law has some value for the creation of a trusted infrastructure. The provisions of how acceptable commercial information emails can be sent is critical to Singapore becoming a recognised place where business communication are regulated.</content><link rel='replies' type='application/atom+xml' href='http://bytelawyer.blogspot.com/feeds/1443932198810620195/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/5786180/1443932198810620195?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5786180/posts/default/1443932198810620195'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5786180/posts/default/1443932198810620195'/><link rel='alternate' type='text/html' href='http://bytelawyer.blogspot.com/2007/04/singapore-spam-control-act-2007-passed.html' title='Singapore Spam Control Act 2007 passed into Law'/><author><name>Harry SK Tan</name><uri>http://www.blogger.com/profile/05175119332452691961</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='26' src='http://i3.photobucket.com/albums/y57/cyberlawprof/HTSketch2.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5786180.post-116833785447553317</id><published>2007-01-09T18:17:00.000+08:00</published><updated>2007-01-09T18:17:39.443+08:00</updated><title type='text'>Cybercrime does not pay</title><content type='html'>Mr Song Yick Biau was reported by CNA as having pleaded guilty to nine charges under the Computer Misuse Act at the Singapore Subordinate Courts yesterday.&lt;br /&gt;&lt;br /&gt;His modus operandi was to chat with the victim and send them a program which would allow him control and access to the victim&#39;s computer. He then stole the person&#39;s identity, adopted her persona and changed the password so that the person could not access her own MSN account. He successfully usd this ploy more than once. He also gained access to the accounts of three young women, aged between 18 and 21. He then threatened to post edited &quot;naked&quot; pictures of one of them unless she sent him photos of her breasts. The victim of this threat reported the matter to the police which resulted in the investigation and charges made.&lt;br /&gt;&lt;br /&gt;Song pleaded guilty to nine charges under the Computer Misuse Act - each of which carries a fine of up to $50,000 and jail terms not exceeding two to 10 years. He can also be jailed up to two years on a charge of criminal intimidation. The judge will pass sentence on the charges on Monday 15th Jan 2007.&lt;br /&gt;&lt;br /&gt;It is worth noting that the accused is an intelligent undergraduate, made the mistake of believing that such activities online will not be reported nor prosecuted. It would be very unusual if the accused will not be given a stiff custodial sentence. Update on the sentencing when it is reported.&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://www.channelnewsasia.com/stories/singaporelocalnews/view/251375/1/.html&quot;&gt;NTU student stole MSN IDs, chatted and threatened blackmail [Channelnewsasia.com&lt;/a&gt;]</content><link rel='replies' type='application/atom+xml' href='http://bytelawyer.blogspot.com/feeds/116833785447553317/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/5786180/116833785447553317?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5786180/posts/default/116833785447553317'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5786180/posts/default/116833785447553317'/><link rel='alternate' type='text/html' href='http://bytelawyer.blogspot.com/2007/01/cybercrime-does-not-pay.html' title='Cybercrime does not pay'/><author><name>Harry SK Tan</name><uri>http://www.blogger.com/profile/05175119332452691961</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='26' src='http://i3.photobucket.com/albums/y57/cyberlawprof/HTSketch2.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5786180.post-116357855282958579</id><published>2006-11-15T16:15:00.000+08:00</published><updated>2006-11-15T16:15:53.793+08:00</updated><title type='text'>3 years&#39; jail for WiFi tapping</title><content type='html'>On November 10 it was reported in the local papers that a teen Mr Garyl Tan Jia Luo (17) was charged in court for having committed an offence under the Computer Misuse Act. Apparently the act that he committed was to use his notebook computer to access the WiFi network belonging to his neighbour without authority on May 13th. Under the CMA as long as there had been unauthorised access - whether there had been security firewalls or passwords being used - an offence would have been committed by the mere access of the network. Details of the case has not been published and the trial is to be heard today - 15th Nov. It would be interesting to learn whether this was a one off incident or whether Mr Tan had carried on this unauthorised access for some time. &lt;br /&gt;&lt;br /&gt;To read about the first report - click here: &lt;a href=&quot;http://www.iht.com/articles/ap/2006/11/11/asia/AS_GEN_Singapore_Internet_Charges.php&quot;&gt;Report: Singapore teen faces 3 years&#39; jail for tapping into another&#39;s wireless Internet - iht,asia,Singapore Internet Charges - Asia - Pacific - International Herald Tribune&lt;/a&gt;</content><link rel='replies' type='application/atom+xml' href='http://bytelawyer.blogspot.com/feeds/116357855282958579/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/5786180/116357855282958579?isPopup=true' title='2 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5786180/posts/default/116357855282958579'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5786180/posts/default/116357855282958579'/><link rel='alternate' type='text/html' href='http://bytelawyer.blogspot.com/2006/11/3-years-jail-for-wifi-tapping.html' title='3 years&#39; jail for WiFi tapping'/><author><name>Harry SK Tan</name><uri>http://www.blogger.com/profile/05175119332452691961</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='26' src='http://i3.photobucket.com/albums/y57/cyberlawprof/HTSketch2.jpg'/></author><thr:total>2</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5786180.post-115104569407166606</id><published>2006-06-23T14:54:00.000+08:00</published><updated>2006-06-23T14:54:54.120+08:00</updated><title type='text'>Singapore&#39;s push to become the secure and safe haven for E-Business</title><content type='html'>Singapore will be launching its new &lt;strong&gt;National Cyber-threat Monitoring Centre&lt;/strong&gt; early next year (see the report from CNA thru the link below). It will work with other similar centres all over the world to deal with the threats from viruses, hackers and terrorists in cyberspace as well as to protect the interests of businesses, individuals and the government online.&lt;br /&gt;&lt;br /&gt;Under the masterplan, IDA is also studying the possibility of a &lt;strong&gt;Cybersecurity Act&lt;/strong&gt; to protect data and privacy, and is also pushing for &lt;strong&gt;Anti-Spam Act&lt;/strong&gt; (draft has been in discussion for some time - check IDA.gov.sg for more information).&lt;br /&gt;&lt;br /&gt;This strategic move to develop such a centre as well as establishing a slew of new laws and regulation dealing with cyber threats is continuing the efforts to make Singapore as an attractive location for companies planning to move their operations and data systems into the region.&lt;br /&gt;&lt;br /&gt;While the national cyber-threat monitoring centre will be one of the first in the region, it will be likely that our neighbours will be following suit which can only mean that it will make the region much less attractive for hackers and e-terrorists.  The centre is expected to provide early warnings about impending cyberthreats as well as establish processes to mitigate such threats.&lt;br /&gt;&lt;br /&gt;Will this centre be duplicating the CERT team that is in place? While I have no official response to that question, technically it would appear that the new centre would compliment the CERT functions. It would however make sense for the consolidation of these two entities to have both a means to monitor and respond effectively to all kinds of online threats.&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://www.channelnewsasia.com/stories/singaporelocalnews/view/214912/1/.html&quot;&gt;Channelnewsasia.com&lt;/a&gt;</content><link rel='replies' type='application/atom+xml' href='http://bytelawyer.blogspot.com/feeds/115104569407166606/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/5786180/115104569407166606?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5786180/posts/default/115104569407166606'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5786180/posts/default/115104569407166606'/><link rel='alternate' type='text/html' href='http://bytelawyer.blogspot.com/2006/06/singapores-push-to-become-secure-and.html' title='Singapore&#39;s push to become the secure and safe haven for E-Business'/><author><name>Harry SK Tan</name><uri>http://www.blogger.com/profile/05175119332452691961</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='26' src='http://i3.photobucket.com/albums/y57/cyberlawprof/HTSketch2.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5786180.post-115091140531947229</id><published>2006-06-22T01:36:00.000+08:00</published><updated>2006-06-22T01:36:45.393+08:00</updated><title type='text'>Australian families to get free Internet porn filters</title><content type='html'>The Australian government has decided to equip Aussie families with software filters for free to deal with the flood of porn coming into the home via the home PC. The idea is to help families let their children surf the net safely and free from Porn - if it is possible.&lt;br /&gt;&lt;br /&gt;It looks like the authorities has stepped up in their war against porn but its commonly known that filters have limited success against the ever virulent porn that seems to be able to ingeniously find new ways to insidously enter into the home PC. Nevertheless, this concerted effort will be a public step in the right direction in the global fight to keep porn away from children.&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://www.channelnewsasia.com/stories/afp_asiapacific/view/214934/1/.html&quot;&gt;Channelnewsasia.com&lt;/a&gt;</content><link rel='replies' type='application/atom+xml' href='http://bytelawyer.blogspot.com/feeds/115091140531947229/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/5786180/115091140531947229?isPopup=true' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5786180/posts/default/115091140531947229'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5786180/posts/default/115091140531947229'/><link rel='alternate' type='text/html' href='http://bytelawyer.blogspot.com/2006/06/australian-families-to-get-free.html' title='Australian families to get free Internet porn filters'/><author><name>Harry SK Tan</name><uri>http://www.blogger.com/profile/05175119332452691961</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='26' src='http://i3.photobucket.com/albums/y57/cyberlawprof/HTSketch2.jpg'/></author><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5786180.post-114726448071936847</id><published>2006-05-10T20:34:00.000+08:00</published><updated>2006-05-10T20:34:40.833+08:00</updated><title type='text'>Forum Operators CAN be liable afterall</title><content type='html'>In many jurisdictions including Singapore there are statutory defences for forum owners/providers for action to make them liable for statements and actions made by their users on their servers. In essence the carrier defence - that they are merely telephone service providers and thus not able nor have the capacity to monitor or manage the content being published on the servers. The defence in most countries is  restricted by the condition that they neverthelss are required to act when informed of the offending material. Also, forum owners are not under a duty to actively search or moderate offending material.&lt;br /&gt;&lt;br /&gt;In an surprising result in Hamburg, judges had thrown out that view of defence available to Forum owners. According to the judge at the first instance, providing Internet forums is, a type of business operation. Accordingly, operators are considered to be able to hire staff with legal training to be able to handle such operations.&lt;br /&gt;&lt;br /&gt;According to the district court of Hamburg - &quot;If the number of forums and comments in them is so great that the opposing party does not have the staff or technical means to review comments before they are published, they either have to expand their in-house resources or [...] reduce the scope of their business operations.&quot; &lt;br /&gt;&lt;br /&gt;Unfortunately the Hamburg court did not clearly state its opinion on whether every Web forum could be held liable or only restricted to the services of the press.  The court did however stated that the decision also applied to companies that disseminate content via the Internet.  Consequently, every Internet forum probably falls under this category because the judges did not make any further distinctions.&lt;br /&gt;&lt;br /&gt;This case in my opinion has wide implications. However, based on the judge&#39;s view of how businesses that goes into providing forum services ought to have the sufficient manpower to manage offensive and liable content there is some fair justification for the outcome of the case. The problem I perceive is whether all countries will follow by policy - agree with the &lt;em&gt;ratio decidendi&lt;/em&gt;. Telco and Web service providers will be up in arms to refute such developments - I am sure.&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://www.heise.de/english/newsticker/news/72085&quot;&gt;heise online - First-instance district court of Hamburg says forum operators are liable for comments&lt;/a&gt;</content><link rel='replies' type='application/atom+xml' href='http://bytelawyer.blogspot.com/feeds/114726448071936847/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/5786180/114726448071936847?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5786180/posts/default/114726448071936847'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5786180/posts/default/114726448071936847'/><link rel='alternate' type='text/html' href='http://bytelawyer.blogspot.com/2006/05/forum-operators-can-be-liable-afterall.html' title='Forum Operators CAN be liable afterall'/><author><name>Harry SK Tan</name><uri>http://www.blogger.com/profile/05175119332452691961</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='26' src='http://i3.photobucket.com/albums/y57/cyberlawprof/HTSketch2.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5786180.post-114596826395953032</id><published>2006-04-25T20:31:00.000+08:00</published><updated>2006-04-25T20:38:11.463+08:00</updated><title type='text'>Worldwide laws still unable to contain cybercrime</title><content type='html'>At this year&#39;s e-Crime Congress in London an interesting survey was carried out on the delegates. It was not surprising that 74% of the participants believe that the current state of international laws is unable to contain cybercriminals from their activites.&lt;br /&gt;&lt;br /&gt;The three main threats being phishing, computer hacking and denial of service attacks. Of the 20 countires, 110 respondents cite the lack of global co-operation and inadequate police resources as the main reasons why internet criminals are not being prosecuted. Worse, even some 61 % seem to believe that the current legislation is unenforceable. Many believe that a stronger legislation, such as the Council of Europe’s cybercrime convention, will improve how hackers, virus writers and extortionists are prosecuted internationally.&lt;br /&gt;&lt;br /&gt;Personally, the results of this report is unsurprising. But I think it takes far more than mere tough legislation to thwart cybercrime. It has to be a strong commitment (which means resources and capital must be put into the effort) by governments to work together to establish strong laws as well as to assist each other in cross jurisdictional investigation and prosecution. International organised cybercrime if left unchecked in the near future will make the mafia and triad organisations look like amateurs in terms of how they can affect the stability of businesses, economies and governments.&lt;br /&gt;&lt;br /&gt;It looks like it may take yet another Sept 11th on the Internet network before the governments wake up to the call.&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://www.computing.co.uk/computing/news/2154350/worldwide-laws-fail-fight-cyber&quot;&gt;Worldwide laws fail to fight cyber crime - Computing&lt;/a&gt;</content><link rel='replies' type='application/atom+xml' href='http://bytelawyer.blogspot.com/feeds/114596826395953032/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/5786180/114596826395953032?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5786180/posts/default/114596826395953032'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5786180/posts/default/114596826395953032'/><link rel='alternate' type='text/html' href='http://bytelawyer.blogspot.com/2006/04/worldwide-laws-still-unable-to-contain.html' title='Worldwide laws still unable to contain cybercrime'/><author><name>Harry SK Tan</name><uri>http://www.blogger.com/profile/05175119332452691961</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='26' src='http://i3.photobucket.com/albums/y57/cyberlawprof/HTSketch2.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5786180.post-114240319678576756</id><published>2006-03-15T14:13:00.001+08:00</published><updated>2006-03-15T14:16:39.026+08:00</updated><title type='text'>Google expected to be ordered to release search data</title><content type='html'>In the continuing struggle online between privacy v. the enforcement of crime and security laws - the latest news is from NewsFactorNetwork regarding the Department of Justice proceedings to force Google to hand over search data records. It was reported that U.S. District Judge James Ware said he will order Google to turn over some of its records to DOJ officials as part of the Bush administration&#39;s effort to revive a law meant to shield children from online pornography. While Yahoo, AOL and MSN had previously complied with the request from the DOJ, Google refused to comply. The refusal amongst other reasons was due to concerns about user privacy.&lt;br /&gt;&lt;br /&gt;This case highlights the potential problem of how large databases with collated information about user behaviour can become controversially used by both unethical advertisers as well as law enforcement - without the knowledge nor approval of the users.&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://news.yahoo.com/s/nf/20060315/bs_nf/42107&quot;&gt;Judge Will Order Google To Release Search Data on Yahoo! News&lt;/a&gt;</content><link rel='replies' type='application/atom+xml' href='http://bytelawyer.blogspot.com/feeds/114240319678576756/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/5786180/114240319678576756?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5786180/posts/default/114240319678576756'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5786180/posts/default/114240319678576756'/><link rel='alternate' type='text/html' href='http://bytelawyer.blogspot.com/2006/03/google-expected-to-be-ordered-to.html' title='Google expected to be ordered to release search data'/><author><name>Harry SK Tan</name><uri>http://www.blogger.com/profile/05175119332452691961</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='26' src='http://i3.photobucket.com/albums/y57/cyberlawprof/HTSketch2.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5786180.post-114036863434134303</id><published>2006-02-20T01:03:00.000+08:00</published><updated>2006-02-20T01:04:54.100+08:00</updated><title type='text'>RIAA wants to ban CD ripping - trying to get the genie back in the bottle?</title><content type='html'>In what appears to be a relentless effort on the part of RIAA to take the initiative to recover its perceived loss of rights as a result of the use of technologies that allows music enthusiasts to rip music off CDs and listen in MP3 format - RIAA has applied to the US government to make the claim that the act of ripping a purchased CD itself to be illegal. Their case is argued that the widespread practice of ripping CDs does not make it right nor legal.&lt;br /&gt;&lt;br /&gt;While the law is clear that it is in the copyright owner&#39;s court, what is surprising is that it is a complete reversal of its position when RIAA in last year&#39;s MGM v Grokster case described that ripping a CD is &quot;perfectly lawful&quot;.&lt;br /&gt;&lt;br /&gt;Unfortunately, music enthusiasts have little to turn to for a legal defence of copyright breach as &#39;fair use&#39; here is not available for the act of . If RIAA is able to convince the law makers to agree to its point of view (and the law makers must realise this as a matter of policy) what does it intend to do? Clearly it has two choices (either one or both is open to them) - to go after the people that enables users to rip CDs or go after the users who rip their CDs. Both are unsavoury outcomes for the music enthusiasts. Whatever it may be, it seems inevitable that the RIAA will become very unpopular with the public as well as tech businesses that provides the ripping software.&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://www.pcmag.co.uk/vnunet/news/2150479/riaa-aims-ban-cd-ripping&quot;&gt;RIAA aims to ban CD ripping - PC Magazine&lt;/a&gt;</content><link rel='replies' type='application/atom+xml' href='http://bytelawyer.blogspot.com/feeds/114036863434134303/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/5786180/114036863434134303?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5786180/posts/default/114036863434134303'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5786180/posts/default/114036863434134303'/><link rel='alternate' type='text/html' href='http://bytelawyer.blogspot.com/2006/02/riaa-wants-to-ban-cd-ripping-trying-to.html' title='RIAA wants to ban CD ripping - trying to get the genie back in the bottle?'/><author><name>Harry SK Tan</name><uri>http://www.blogger.com/profile/05175119332452691961</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='26' src='http://i3.photobucket.com/albums/y57/cyberlawprof/HTSketch2.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5786180.post-113816198358731150</id><published>2006-01-25T12:06:00.000+08:00</published><updated>2006-01-25T12:07:29.266+08:00</updated><title type='text'>FBI 2005 Survey on Cybercrime Reflects a New Generation of Abegnales</title><content type='html'>The report reads like there is a growth industry of new Frank Abegnales - the man made famous in the movie &quot;Catch Me If You Can&quot;. The statistics garnered from 2000 surveys taken from the public and private organisations shows alarming responses.&lt;br /&gt;&lt;br /&gt;Here are some of the findings listed on their webpage:&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Frequency of attacks&lt;/strong&gt;. Nearly nine out of 10 organizations experienced computer security incidents in a year&#39;s time; 20% of them indicated they had experienced 20 or more attacks.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Types of attacks&lt;/strong&gt;. Viruses (83.7%) and spyware (79.5%) headed the list. More than one in five organizations said they experienced port scans and network or data sabotage.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Financial impact&lt;/strong&gt;. Over 64% of the respondents incurred a loss. Viruses and worms cost the most, accounting for $12 million of the $32 million in total losses.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Sources of the attacks&lt;/strong&gt;. They came from 36 different countries. The U.S. (26.1%) and China (23.9%) were the source of over half of the intrusion attempts, though masking technologies make it difficult to get an accurate reading.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Defenses&lt;/strong&gt;. Most said they installed new security updates and software following incidents, but advanced security techniques such as biometrics (4%) and smart cards (7%) were used infrequently. In addition, 44% reported intrusions from within their own organizations, suggesting the need for strong internal controls.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Reporting&lt;/strong&gt;. Just 9% said they reported incidents to law enforcement, believing the infractions were not illegal or that there was little law enforcement could or would do. Of those reporting, however, 91% were satisfied with law enforcement&#39;s response. And 81% said they&#39;d report future incidents to the FBI or other law enforcement agencies. Many also said they were unaware of &lt;a href=&quot;http://www.fbi.gov/page2/dec04/infragard121404.htm&quot;&gt;InfraGard&lt;/a&gt;, a joint FBI/private sector initiative that battles computer crimes and other threats through information sharing&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://www.fbi.gov/page2/jan06/computer_crime_survey011806.htm&quot;&gt;&lt;strong&gt;FBI Cybercrime Survey 2005&lt;/strong&gt;&lt;/a&gt;</content><link rel='replies' type='application/atom+xml' href='http://bytelawyer.blogspot.com/feeds/113816198358731150/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/5786180/113816198358731150?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5786180/posts/default/113816198358731150'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5786180/posts/default/113816198358731150'/><link rel='alternate' type='text/html' href='http://bytelawyer.blogspot.com/2006/01/fbi-2005-survey-on-cybercrime-reflects.html' title='FBI 2005 Survey on Cybercrime Reflects a New Generation of Abegnales'/><author><name>Harry SK Tan</name><uri>http://www.blogger.com/profile/05175119332452691961</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='26' src='http://i3.photobucket.com/albums/y57/cyberlawprof/HTSketch2.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5786180.post-113800482992568887</id><published>2006-01-23T16:27:00.000+08:00</published><updated>2006-01-23T16:27:09.970+08:00</updated><title type='text'>Another example of convergence making DMCA outdated?</title><content type='html'>A small company in Mass., US, has begun selling IPODs with movies from the DVDs purchased by their new owners uploaded. On the face of it, such sales of IPODs with copyrighted and tech protected DVD movies have breached the DMCA provisions. However interestingly the business continues to do this despite the legal risk. Apparently the owners of the business argue that the DMCA is outdated law and  claim that moving the content onto the device is a one-way transfer, which since the purchaser gets both the original and the copy it is legal under their fair use provisions of their Copyright law. Will content owners sit by and less this continue? Keep a look out for updates here.&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://news.com.com/TVMyPod+ventures+into+copyright+gray+area/2100-1041_3-6029059.html?tag=html.alert&quot;&gt;TVMyPod ventures into copyright gray area  CNET News.com&lt;/a&gt;</content><link rel='replies' type='application/atom+xml' href='http://bytelawyer.blogspot.com/feeds/113800482992568887/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/5786180/113800482992568887?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5786180/posts/default/113800482992568887'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5786180/posts/default/113800482992568887'/><link rel='alternate' type='text/html' href='http://bytelawyer.blogspot.com/2006/01/another-example-of-convergence-making.html' title='Another example of convergence making DMCA outdated?'/><author><name>Harry SK Tan</name><uri>http://www.blogger.com/profile/05175119332452691961</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='26' src='http://i3.photobucket.com/albums/y57/cyberlawprof/HTSketch2.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5786180.post-113772972641540480</id><published>2006-01-20T12:02:00.000+08:00</published><updated>2006-01-23T16:31:07.906+08:00</updated><title type='text'>NEWS: Privacy Advocates v. Pornography Prosecutors</title><content type='html'>Google, Yahoo and MSN refused to assist when they were asked by Anti Porn legislator to hand over search statistics. As a result, they had been subpoenaed by the Bush Administration for the information they asked for in their effort to fight Porn online. All three search engines responded differently. The various issues raised in their defence was the protection of the privacy of its users, lack of useable specific data retained and that the information handed over did not include personal information.&lt;br /&gt;&lt;br /&gt;As a bystander observer, is such a process of obtaining data reflective of the Bush Administration&#39;s view of its position regarding privacy protection? Unfortunately the problem with porn appears to far outweigh that concern. Hopefully, the process will in fact not result in the breach of the privacy of the users of these search engines.&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://www.techweb.com/wire/ebiz/177101984&quot;&gt;TechWeb Search Engines, Free Speech Google, Yahoo, MSN Subpoenaed In Anti-Porn Effort&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;UPDATE&lt;/strong&gt;: CNET NEWS.com has published some useful FAQs on the Google subpoena by the US Justice Department on its database statistics. &lt;a href=&quot;http://news.com.com/FAQ+What+does+the+Google+subpoena+mean/2100-1029-6029042.html?part=dht&amp;tag=nl.e703&quot;&gt;&lt;strong&gt;CLICK HERE&lt;/strong&gt;&lt;/a&gt;&lt;strong&gt; &lt;/strong&gt;for the FAQ</content><link rel='replies' type='application/atom+xml' href='http://bytelawyer.blogspot.com/feeds/113772972641540480/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/5786180/113772972641540480?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5786180/posts/default/113772972641540480'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5786180/posts/default/113772972641540480'/><link rel='alternate' type='text/html' href='http://bytelawyer.blogspot.com/2006/01/news-privacy-advocates-v-pornography.html' title='NEWS: Privacy Advocates v. Pornography Prosecutors'/><author><name>Harry SK Tan</name><uri>http://www.blogger.com/profile/05175119332452691961</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='26' src='http://i3.photobucket.com/albums/y57/cyberlawprof/HTSketch2.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5786180.post-113740654271875702</id><published>2006-01-16T18:15:00.000+08:00</published><updated>2006-01-16T18:15:42.793+08:00</updated><title type='text'>Yet another pricing &#39;blunder&#39; at an online store</title><content type='html'>A problem that seems to be reported with some familiarity is the error in pricing on webmalls as to the pricing of their goods. The problem has been around since the boom on online commerce but despite the growth of ever more stable and reliable solutions, the pricing mistakes continue to happen to the displeasure of many customers. The latest reported here is Apple&#39;s Online Education Store that priced an Olympus camera at only 98.70 sterling pounds. The camera normally retails for 600 pounds.&lt;br /&gt;&lt;br /&gt;In the past retailers online succeeded in avoiding concluded electronic contracts on the defence that the buyer had bought the goods in bad faith - usually shown by the purchased of dozens of the mispriced items. The problem for Apple and other retailers is - if a buyer only buys one unit of the goods - is there grounds to allege bad faith?&lt;br /&gt;&lt;br /&gt;With the ever growing outrage of how easy retailers can renege on the agreements made online, is it an impossibility for law makers to raise the retailer&#39;s liability to strict liability for their pricing? While this is a matter of conjecture for now - consumer protection for online transactions - especially for those who legitimately bought the goods believing the price to be right as well as with good faith - should have some recourse and protection.&lt;br /&gt;&lt;br /&gt;Furthermore, the expensive web commerce solutions are nothing like the retail shops and malls where price labels are manually stuck on the goods. The system in many of these retailers have state of the art inventory and pricing systems that work in conjunction with their payment systems. Can they really be able to claim to an honest mistake by their pricing system?&lt;br /&gt;&lt;br /&gt;Consider the Singapore Electronic Transactions Act which provides inter alia that the transactions sytem will be deemed as an agent of the owner. Thus if an &#39;agent&#39; quotes a wrong price - the principal is bound to the agent&#39;s words. Unfortunately this provision has yet to be tested in the courts. But it is clear from this provision that the legislators do not place much credence on online retailers claiming that their machines are had not been properly configured and it is designed to make them accountable.&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://networks.silicon.com/webwatch/0,39024876,39155342,00.htm&quot;&gt;Apple pricing &#39;blunder&#39; caught on camera - WebWatch - Breaking Business and Technology News at silicon.com&lt;/a&gt;</content><link rel='replies' type='application/atom+xml' href='http://bytelawyer.blogspot.com/feeds/113740654271875702/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/5786180/113740654271875702?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5786180/posts/default/113740654271875702'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5786180/posts/default/113740654271875702'/><link rel='alternate' type='text/html' href='http://bytelawyer.blogspot.com/2006/01/yet-another-pricing-blunder-at-online.html' title='Yet another pricing &#39;blunder&#39; at an online store'/><author><name>Harry SK Tan</name><uri>http://www.blogger.com/profile/05175119332452691961</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='26' src='http://i3.photobucket.com/albums/y57/cyberlawprof/HTSketch2.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5786180.post-113635365846928147</id><published>2006-01-04T13:47:00.000+08:00</published><updated>2006-01-04T13:50:46.536+08:00</updated><title type='text'>NEWS: New Year starts badly for Microsoft with discovered Windows flaw</title><content type='html'>CNET just reported that there is a new flaw found in the Windows Meta File which may have spawned a series of attacks last week. The primary OS vulnerable are Windows XP with Service Pack 1 and 2 and Windows Server 2003. CNET reports that it is estimated 99 percent of computers worldwide are vulnerable to attack. Some attacks on the WMF flaw has already resulted in attacks such as the &lt;a title=&quot;Trojan delivers unwanted gift to Windows PCs -- Wednesday, Dec 28, 2005&quot; href=&quot;http://news.com.com/Trojan+delivers+unwanted+gift+to+Windows+PCs/2100-7349_3-6011406.html?tag=nl&quot;&gt;Exploit-WMF Trojan&lt;/a&gt;. The report however did indicate that while there is a real risk, the danger of another world wide threat is small.&lt;br /&gt;&lt;br /&gt;I would recommend to keep a finger on the windows update icon to check on the possibility of new patches as well as updating all firewall and antivirusware.&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://news.com.com/Windows+flaw+spawns+dozens+of+attacks/2100-7349-6016140.html?part=dht&amp;amp;tag=nl.e433&quot;&gt;Windows flaw spawns dozens of attacks CNET News.com&lt;/a&gt;</content><link rel='replies' type='application/atom+xml' href='http://bytelawyer.blogspot.com/feeds/113635365846928147/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/5786180/113635365846928147?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5786180/posts/default/113635365846928147'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5786180/posts/default/113635365846928147'/><link rel='alternate' type='text/html' href='http://bytelawyer.blogspot.com/2006/01/news-new-year-starts-badly-for.html' title='NEWS: New Year starts badly for Microsoft with discovered Windows flaw'/><author><name>Harry SK Tan</name><uri>http://www.blogger.com/profile/05175119332452691961</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='26' src='http://i3.photobucket.com/albums/y57/cyberlawprof/HTSketch2.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5786180.post-113510331464177083</id><published>2005-12-21T02:28:00.000+08:00</published><updated>2005-12-21T02:28:34.703+08:00</updated><title type='text'>Is it possible? Free AND legal music online?</title><content type='html'>The Mercora IMRadio was reported here by Seattle PI - as a product review - to provide free yet legal music online. Its not a P2P and does not distribute copies of illegal music to downloaders but rather users just merely listens to the files already stored on its servers. As this is not a download, it does not technically fall foul of copyright infringement by the visitor to the site. &lt;br /&gt;&lt;br /&gt;The question however, is does this absolve any legal liability on the part of the Mercora to stream music to listeners everywhere? While the report is silent on this point, I am of the view that who ever owns the server will face the same responsibility as any radio station. For every song played, it has to pay dues or royalty to the copyright owner. So, while it may be free for users and listeners - it&#39;s still not completely free - at least not to the owner of the server.&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://seattlepi.nwsource.com/business/252118_mercora15.html&quot;&gt;Product Review: Free -- and legal -- music online&lt;/a&gt;</content><link rel='replies' type='application/atom+xml' href='http://bytelawyer.blogspot.com/feeds/113510331464177083/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/5786180/113510331464177083?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5786180/posts/default/113510331464177083'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5786180/posts/default/113510331464177083'/><link rel='alternate' type='text/html' href='http://bytelawyer.blogspot.com/2005/12/is-it-possible-free-and-legal-music.html' title='Is it possible? Free AND legal music online?'/><author><name>Harry SK Tan</name><uri>http://www.blogger.com/profile/05175119332452691961</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='26' src='http://i3.photobucket.com/albums/y57/cyberlawprof/HTSketch2.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5786180.post-113259649024314327</id><published>2005-11-22T02:08:00.000+08:00</published><updated>2005-11-22T02:08:10.296+08:00</updated><title type='text'>Sony finally withdraws CDs with DRM from shelves</title><content type='html'>Security Pipeline reports what I had predicted earlier. As an internationally renowned brand, Sony could ill afford the negative impact that was spreading like wildfire through the blogsphere. They have since realised that they made a mistake and withdrew those CDs with the DRM off the shelves. &lt;br /&gt;&lt;br /&gt;However despite the change in their position, their troubles are not over. The company faces charges of deceptive advertising, illegal spyware distribution, and computer crimes in three lawsuits according to SecurityPipeline.&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://www.securitypipeline.com/174400449?CID=rssfeed_pl_scp&quot;&gt;Security Pipeline | Sony Plays The Blues As Bloggers Turn Up The Volume&lt;/a&gt;</content><link rel='replies' type='application/atom+xml' href='http://bytelawyer.blogspot.com/feeds/113259649024314327/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/5786180/113259649024314327?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5786180/posts/default/113259649024314327'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5786180/posts/default/113259649024314327'/><link rel='alternate' type='text/html' href='http://bytelawyer.blogspot.com/2005/11/sony-finally-withdraws-cds-with-drm.html' title='Sony finally withdraws CDs with DRM from shelves'/><author><name>Harry SK Tan</name><uri>http://www.blogger.com/profile/05175119332452691961</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='26' src='http://i3.photobucket.com/albums/y57/cyberlawprof/HTSketch2.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5786180.post-113257226200787937</id><published>2005-11-21T19:15:00.000+08:00</published><updated>2005-12-26T01:49:39.370+08:00</updated><title type='text'>Even Foxtrot makes a point about SONY&#39;s DRM</title><content type='html'>While its not in the usual tone of my blog to trivialise current issues, I found that this particular cartoon strip by Foxtrot&#39;s Bill Amend brought home the dangers of how an unpopular method of implementation of an idea can result in it becoming the source of ridicule to others.&lt;br /&gt;&lt;br /&gt;(cartoon has since been removed from source by cartoon publishers)&lt;br /&gt;&lt;a href=&quot;http://images.ucomics.com/comics/ft/2005/ft051121.gif&quot;&gt;&lt;/a&gt;</content><link rel='replies' type='application/atom+xml' href='http://bytelawyer.blogspot.com/feeds/113257226200787937/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/5786180/113257226200787937?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5786180/posts/default/113257226200787937'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5786180/posts/default/113257226200787937'/><link rel='alternate' type='text/html' href='http://bytelawyer.blogspot.com/2005/11/even-foxtrot-makes-point-about-sonys.html' title='Even Foxtrot makes a point about SONY&#39;s DRM'/><author><name>Harry SK Tan</name><uri>http://www.blogger.com/profile/05175119332452691961</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='26' src='http://i3.photobucket.com/albums/y57/cyberlawprof/HTSketch2.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5786180.post-113177630152938642</id><published>2005-11-12T14:09:00.000+08:00</published><updated>2005-11-12T14:18:21.540+08:00</updated><title type='text'>New Trojan Released to Exploit SONY&#39;s CD Music DRM</title><content type='html'>Following the previous post about Sony&#39;s new DRM, a new trojan has been reported to exploit the root kit software that the Sony&#39;s DRM technology installs when playing the music CD. The new Trojan called &lt;strong&gt;Stinx &lt;/strong&gt;had been reportedly spammed to UK  email addresses thereby raising the risk of computers there being compromised.&lt;br /&gt;&lt;br /&gt;Apparently spokepersons for Sony claims that the risk is very low right now - as the CD has to be purchased in the US with the DRM technology built into the CDs there. Nonetheless, it is curious that has been openly admitted that their DRM does open the PCs of users to criminal hackers. I think Sony will be relooking carefully their strategy on the use of this version of DRM.&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://software.silicon.com/malware/0,3800003104,39154102,00.htm&quot;&gt;Silicon.com - New Trojan exploits Sony DRM anti-piracy tool &lt;/a&gt;</content><link rel='replies' type='application/atom+xml' href='http://bytelawyer.blogspot.com/feeds/113177630152938642/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/5786180/113177630152938642?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5786180/posts/default/113177630152938642'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5786180/posts/default/113177630152938642'/><link rel='alternate' type='text/html' href='http://bytelawyer.blogspot.com/2005/11/new-trojan-released-to-exploit-sonys.html' title='New Trojan Released to Exploit SONY&#39;s CD Music DRM'/><author><name>Harry SK Tan</name><uri>http://www.blogger.com/profile/05175119332452691961</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='26' src='http://i3.photobucket.com/albums/y57/cyberlawprof/HTSketch2.jpg'/></author><thr:total>0</thr:total></entry></feed>