<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><feed xmlns='http://www.w3.org/2005/Atom' xmlns:openSearch='http://a9.com/-/spec/opensearchrss/1.0/' xmlns:blogger='http://schemas.google.com/blogger/2008' xmlns:georss='http://www.georss.org/georss' xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr='http://purl.org/syndication/thread/1.0'><id>tag:blogger.com,1999:blog-11089964</id><updated>2026-01-15T01:41:25.781+10:00</updated><category term="google"/><category term="privacy"/><category term="copyright."/><category term="patent"/><category term="facebook"/><category term="domain names"/><category term="defamation"/><category term="third party conduct"/><category term="jurisdiction"/><category term="content regulation"/><category term="apple"/><category term="internet"/><category term="crime"/><category term="adwords"/><category term="social networks"/><category term="trademark"/><category term="AI"/><category term="China"/><category term="cybersecurity"/><category term="crime spam phishing"/><category term="amazon"/><category term="user generate content"/><category term="advertisements"/><category term="artificial intelligence"/><category term="business methods"/><category term="search"/><category term="speech"/><category term="laws"/><category term="law school"/><category term="review"/><category term="wipo"/><category term="youtube"/><category term="freedom"/><category term="intellectual property"/><category term="keywords"/><category term="misleading conduct"/><category term="security"/><category term="ebay"/><category term="microsoft"/><category term="twitter"/><category term="udrp"/><category term="censorship"/><category term="cybersquatting"/><category term="fraud"/><category term="hacking"/><category term="hate speech"/><category term="piracy"/><category term="ISP"/><category term="accc"/><category term="dotcom"/><category term="ecommerce"/><category term="gTLD"/><category term="internet marketing"/><category term="online contracting"/><category term="research"/><category term="software"/><category term="affilate"/><category term="blog"/><category term="consumer"/><category term="cyberspace law and policy"/><category term="ebook"/><category term="iinet"/><category term="law firm"/><category term="platform"/><category term="trade secret"/><category term="trip advisor"/><category term="DMCA"/><category term="ICANN"/><category term="adsense"/><category term="auDA"/><category term="audrp"/><category term="computers"/><category term="icyte"/><category term="media"/><category term="news"/><category term="takedown"/><category term="websites"/><category term="SOPA"/><category term="antitrust"/><category term="apps"/><category term="autonomous"/><category term="cambridge analytics"/><category term="click fraud"/><category term="click wrap"/><category term="cyberlaw"/><category term="data"/><category term="inventor"/><category term="liability"/><category term="license"/><category term="lwn117"/><category term="megaupload"/><category term="metatags"/><category term="NFT"/><category term="RDNH"/><category term="Reveal Day"/><category term="USA"/><category term="australia"/><category term="book"/><category term="cases"/><category term="class action"/><category term="cloud"/><category term="counterfeit"/><category term="crypto"/><category term="database"/><category term="ethics"/><category term="evidence"/><category term="fair use"/><category term="filtering"/><category term="first amendment"/><category term="france"/><category term="information"/><category term="injunction"/><category term="insurance"/><category term="map"/><category term="ownership"/><category term="payments"/><category term="publisher"/><category term="ransomware"/><category term="regulation"/><category term="responsibility"/><category term="robots"/><category term="samsung"/><category term="service"/><category term="signature"/><category term="streaming"/><category term="technology"/><category term="trends"/><category term="unjustified threat"/><category term="yahoo"/><category term="3D printer"/><category term="Brisbane"/><category term="CCPA"/><category term="EDPB"/><category term="FBI"/><category term="GDPR"/><category term="GST"/><category term="IP Address"/><category term="Ravel"/><category term="acceptance"/><category term="airbnb"/><category term="android"/><category term="apra"/><category term="art"/><category term="auction"/><category term="audience matching"/><category term="bail"/><category term="bank"/><category term="bias"/><category term="binance"/><category term="bing"/><category term="block"/><category term="blockchain"/><category term="broadcast"/><category term="canada"/><category term="clinton"/><category term="computer generated works"/><category term="consequential loss"/><category term="contract"/><category term="covid"/><category term="critical infrastructure"/><category term="damages"/><category term="data breach"/><category term="directories"/><category term="disney"/><category term="disruption"/><category term="dog"/><category term="domineer"/><category term="facial recognition"/><category term="gambling"/><category term="great firewall"/><category term="hashtag"/><category term="hosted domains"/><category term="hotels"/><category term="human rights"/><category term="hyperlink"/><category term="iPhone"/><category term="innovation"/><category term="instagram"/><category term="job"/><category term="law enforcement"/><category term="lessig"/><category term="meriton"/><category term="moral rights"/><category term="morals"/><category term="music"/><category term="negligence"/><category term="netflix"/><category term="netflix; sec"/><category term="notification"/><category term="online surveys"/><category term="parody"/><category term="passing off"/><category term="pay per click"/><category term="paypal"/><category term="peter black"/><category term="podcast"/><category term="poker"/><category term="police"/><category term="pollution"/><category term="porn"/><category term="power"/><category term="price"/><category term="property"/><category term="qut"/><category term="radio"/><category term="realestate.com.au"/><category term="redbubble"/><category term="revenge porn"/><category term="risk"/><category term="scam"/><category term="sharing economy"/><category term="shopping"/><category term="sidewiki"/><category term="simulcasting"/><category term="solicitor"/><category term="squared"/><category term="supreme court"/><category term="surveilance"/><category term="swipes"/><category term="tablet"/><category term="tax"/><category term="techlash"/><category term="telephone number"/><category term="the secret"/><category term="theft"/><category term="tinder"/><category term="translation"/><category term="uber"/><category term="unfair terms"/><category term="vehicles"/><category term="vimeo"/><category term="wave"/><category term="westlaw"/><category term="wsj"/><category term="xxx"/><title type='text'>Cyberlaw</title><subtitle type='html'>A blog relating to Internet legal issues by Professor John Swinson, University of Queensland</subtitle><link rel='http://schemas.google.com/g/2005#feed' type='application/atom+xml' href='http://www.cyberspac.com/feeds/posts/default'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/11089964/posts/default?redirect=false'/><link rel='alternate' type='text/html' href='http://www.cyberspac.com/'/><link rel='hub' href='http://pubsubhubbub.appspot.com/'/><link rel='next' type='application/atom+xml' href='http://www.blogger.com/feeds/11089964/posts/default?start-index=26&amp;max-results=25&amp;redirect=false'/><author><name>John Swinson</name><uri>http://www.blogger.com/profile/05828283754031385550</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjEEYfvtYKyOuw-wUOTTqXBYnEhznl0Qij3ZK7bLysUeHFsc6-agc7jRFnNmoYhX868_c4u30i8f7fmRio7EGV2enXnOKlYS4cSsM8fqYZa04QD0d7zmscvUiWK82t18g/s113/swinson_j.png'/></author><generator version='7.00' uri='http://www.blogger.com'>Blogger</generator><openSearch:totalResults>670</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><entry><id>tag:blogger.com,1999:blog-11089964.post-8819430570729262982</id><published>2023-04-10T17:27:00.003+10:00</published><updated>2023-04-10T17:27:34.359+10:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="cybersecurity"/><category scheme="http://www.blogger.com/atom/ns#" term="damages"/><category scheme="http://www.blogger.com/atom/ns#" term="podcast"/><category scheme="http://www.blogger.com/atom/ns#" term="privacy"/><title type='text'>How should damages be assessed for privacy and cybersecurity breaches</title><content type='html'>&lt;p&gt;Listen to this &lt;a href=&quot;https://www.lawyersweekly.com.au/podcast/36990-how-damages-could-be-assessed-for-data-and-cyber-class-actions&quot; target=&quot;_blank&quot;&gt;podcast&lt;/a&gt; where I discuss how damages should be assessed in privacy and cybersecurity lawsuits.&lt;/p&gt;&lt;p&gt;The Lawyers Weekly Show host Jerome Doraisamy speaks with Professor John Swinson, who teaches&amp;nbsp;&lt;span&gt; &lt;/span&gt;cyber security&lt;span&gt;&amp;nbsp;&lt;/span&gt;law and privacy law at The University of Queensland, about growing awareness of data and&lt;span&gt;&amp;nbsp;&lt;/span&gt;cyber security&lt;span&gt;&amp;nbsp;&lt;/span&gt;issues
 and subsequent legal claims. &lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.cyberspac.com/feeds/8819430570729262982/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/11089964/8819430570729262982' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/11089964/posts/default/8819430570729262982'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/11089964/posts/default/8819430570729262982'/><link rel='alternate' type='text/html' href='http://www.cyberspac.com/2023/04/how-should-damages-be-assessed-for.html' title='How should damages be assessed for privacy and cybersecurity breaches'/><author><name>John Swinson</name><uri>http://www.blogger.com/profile/05828283754031385550</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjEEYfvtYKyOuw-wUOTTqXBYnEhznl0Qij3ZK7bLysUeHFsc6-agc7jRFnNmoYhX868_c4u30i8f7fmRio7EGV2enXnOKlYS4cSsM8fqYZa04QD0d7zmscvUiWK82t18g/s113/swinson_j.png'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-11089964.post-6357268115987525031</id><published>2022-11-29T17:11:00.003+10:00</published><updated>2022-11-29T17:11:10.818+10:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="privacy"/><title type='text'>Amended Privacy Law in Australia</title><content type='html'>&lt;p&gt;AUSTRALIAN &lt;span class=&quot;break-words&quot;&gt;&lt;span&gt;&lt;span dir=&quot;ltr&quot;&gt;PRIVACY AMENDMENT BILL. 
 The Privacy Legislation Amendment (Enforcement and Other Measures) Bill
 2022 has now passed both houses of Parliament, and will be presented to
 the Governor General for assent.&amp;nbsp; The amendment adds substantial penalties&amp;nbsp; for serious or repeated breaches of the 
Australian Privacy Act.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.cyberspac.com/feeds/6357268115987525031/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/11089964/6357268115987525031' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/11089964/posts/default/6357268115987525031'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/11089964/posts/default/6357268115987525031'/><link rel='alternate' type='text/html' href='http://www.cyberspac.com/2022/11/amended-privacy-law-in-australia.html' title='Amended Privacy Law in Australia'/><author><name>John Swinson</name><uri>http://www.blogger.com/profile/05828283754031385550</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjEEYfvtYKyOuw-wUOTTqXBYnEhznl0Qij3ZK7bLysUeHFsc6-agc7jRFnNmoYhX868_c4u30i8f7fmRio7EGV2enXnOKlYS4cSsM8fqYZa04QD0d7zmscvUiWK82t18g/s113/swinson_j.png'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-11089964.post-2460478024085308498</id><published>2022-11-06T19:01:00.000+10:00</published><updated>2022-11-06T19:01:07.927+10:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="auDA"/><category scheme="http://www.blogger.com/atom/ns#" term="audrp"/><category scheme="http://www.blogger.com/atom/ns#" term="domain names"/><title type='text'>Domain Name Disputes</title><content type='html'>&lt;p&gt;With the recent introduction of &quot;direct registration&quot; in the Australian domain name space (e.g. anyone with a connection to Australia can register domain names such as lawprofessor.au or telstra.au), I predict that there will be a sudden uptick of auDRP disputes.&amp;nbsp; Even though .au did not launch until October 2022, as at today, three auDRP complaints have already been &lt;a href=&quot;https://www.auda.org.au/au-domain-names/au-dispute-resolution-policy/audrp-proceedings-database&quot; target=&quot;_blank&quot;&gt;lodged&lt;/a&gt;: cointre.au, rockypoint.au and magnaflow.au.&amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;p&gt;Some law firms are specialising in this area, such as &lt;a href=&quot;https://www.coopermills.com.au/what-we-do/domain-names-law/&quot; target=&quot;_blank&quot;&gt;Cooper Mills&lt;/a&gt;.&lt;br /&gt;&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.cyberspac.com/feeds/2460478024085308498/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/11089964/2460478024085308498' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/11089964/posts/default/2460478024085308498'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/11089964/posts/default/2460478024085308498'/><link rel='alternate' type='text/html' href='http://www.cyberspac.com/2022/11/domain-name-disputes.html' title='Domain Name Disputes'/><author><name>John Swinson</name><uri>http://www.blogger.com/profile/05828283754031385550</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjEEYfvtYKyOuw-wUOTTqXBYnEhznl0Qij3ZK7bLysUeHFsc6-agc7jRFnNmoYhX868_c4u30i8f7fmRio7EGV2enXnOKlYS4cSsM8fqYZa04QD0d7zmscvUiWK82t18g/s113/swinson_j.png'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-11089964.post-2175811867374388826</id><published>2022-09-03T10:31:00.001+10:00</published><updated>2022-09-03T10:31:16.233+10:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="crime spam phishing"/><category scheme="http://www.blogger.com/atom/ns#" term="udrp"/><category scheme="http://www.blogger.com/atom/ns#" term="wipo"/><title type='text'>Law Firm Phishing</title><content type='html'>&lt;p&gt;A good article about how a NY law firm (Debevoise) attacked a phishing website but attacking the domain name.&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.reuters.com/legal/litigation/debevoise-fries-phishers-cyberpiracy-case-take-heed-law-firms-2022-08-31/&quot;&gt;https://www.reuters.com/legal/litigation/debevoise-fries-phishers-cyberpiracy-case-take-heed-law-firms-2022-08-31/&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Some WIPO decisions regarding Australian law firms:&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.wipo.int/amc/en/domains/decisions/text/2017/d2017-1721.html&quot;&gt;https://www.wipo.int/amc/en/domains/decisions/text/2017/d2017-1721.html&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.wipo.int/amc/en/domains/search/text.jsp?case=D2015-1452&quot;&gt;https://www.wipo.int/amc/en/domains/search/text.jsp?case=D2015-1452&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.cyberspac.com/feeds/2175811867374388826/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/11089964/2175811867374388826' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/11089964/posts/default/2175811867374388826'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/11089964/posts/default/2175811867374388826'/><link rel='alternate' type='text/html' href='http://www.cyberspac.com/2022/09/law-firm-phishing.html' title='Law Firm Phishing'/><author><name>John Swinson</name><uri>http://www.blogger.com/profile/05828283754031385550</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjEEYfvtYKyOuw-wUOTTqXBYnEhznl0Qij3ZK7bLysUeHFsc6-agc7jRFnNmoYhX868_c4u30i8f7fmRio7EGV2enXnOKlYS4cSsM8fqYZa04QD0d7zmscvUiWK82t18g/s113/swinson_j.png'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-11089964.post-8515222594776164396</id><published>2022-08-17T13:53:00.002+10:00</published><updated>2022-08-17T13:53:18.628+10:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="australia"/><category scheme="http://www.blogger.com/atom/ns#" term="defamation"/><category scheme="http://www.blogger.com/atom/ns#" term="google"/><category scheme="http://www.blogger.com/atom/ns#" term="liability"/><category scheme="http://www.blogger.com/atom/ns#" term="search"/><category scheme="http://www.blogger.com/atom/ns#" term="third party conduct"/><title type='text'>Google not a publisher of newspaper article that is indexed in search engine results</title><content type='html'>&lt;p class=&quot;CentreItalics&quot; style=&quot;text-align: left;&quot;&gt;Google LLC v Defteros&lt;span lang=&quot;EN-GB&quot;&gt; &lt;a href=&quot;https://eresources.hcourt.gov.au/showCase/2022/HCA/27&quot; target=&quot;_blank&quot;&gt;[2022] HCA 27&lt;/a&gt;, decided 17 August 2022 by High Court of Australia.&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;CentreItalics&quot; style=&quot;text-align: left;&quot;&gt;&lt;span lang=&quot;EN-GB&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;CentreItalics&quot; style=&quot;text-align: left;&quot;&gt;&lt;span lang=&quot;EN-GB&quot;&gt;The High Court decided that for the purposes of defamation law, Google is not a publisher of a newspaper article when providing a link to the article in search engine results and a short summary of the article.&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;CentreItalics&quot; style=&quot;text-align: left;&quot;&gt;&lt;span lang=&quot;EN-GB&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;CentreItalics&quot; style=&quot;text-align: left;&quot;&gt;&lt;span lang=&quot;EN-GB&quot;&gt;&quot;&lt;/span&gt;&lt;span lang=&quot;EN-GB&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Times New Roman&amp;quot;,serif; font-size: 13.0pt; mso-ansi-language: EN-AU; mso-bidi-language: AR-SA; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-language: EN-AU;&quot;&gt;The question which arises here is whether
providing search results which, in response to an enquiry, direct the attention
of a person to the webpage of another and assist them in accessing it amounts
to an act of participation in the communication of defamatory matter. ...&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;CentreItalics&quot; style=&quot;text-align: left;&quot;&gt;&lt;span lang=&quot;EN-GB&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Times New Roman&amp;quot;,serif; font-size: 13.0pt; mso-ansi-language: EN-AU; mso-bidi-language: AR-SA; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-language: EN-AU;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;CentreItalics&quot; style=&quot;text-align: left;&quot;&gt;&lt;span lang=&quot;EN-GB&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Times New Roman&amp;quot;,serif; font-size: 13.0pt; mso-ansi-language: EN-AU; mso-bidi-language: AR-SA; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-language: EN-AU;&quot;&gt;
















&lt;span style=&quot;font-family: &amp;quot;Times New Roman&amp;quot;,serif; font-size: 13.0pt; mso-ansi-language: EN-AU; mso-bidi-language: AR-SA; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-language: EN-AU;&quot;&gt;It is not suggested that [Google] itself
communicated the defamatory matter in the Underworld article, which appeared on
&lt;i&gt;The Age&lt;/i&gt;&#39;s website. Unlike the defendants in the innocent dissemination
cases, [Google] did not do so by selling, distributing or otherwise
disseminating the matter complained of. &lt;/span&gt;



&lt;style&gt;@font-face
	{font-family:&quot;Cambria Math&quot;;
	panose-1:2 4 5 3 5 4 6 3 2 4;
	mso-font-charset:0;
	mso-generic-font-family:roman;
	mso-font-pitch:variable;
	mso-font-signature:-536870145 1107305727 0 0 415 0;}@font-face
	{font-family:Univers;
	panose-1:2 11 5 3 2 2 2 2 2 4;
	mso-font-charset:0;
	mso-generic-font-family:swiss;
	mso-font-pitch:variable;
	mso-font-signature:-2147483001 0 0 0 15 0;}p.MsoNormal, li.MsoNormal, div.MsoNormal
	{mso-style-priority:99;
	mso-style-unhide:no;
	mso-style-qformat:yes;
	mso-style-parent:&quot;&quot;;
	margin-top:0cm;
	margin-right:6.5pt;
	margin-bottom:0cm;
	margin-left:0cm;
	text-indent:36.0pt;
	line-height:24.0pt;
	mso-line-height-rule:exactly;
	mso-pagination:widow-orphan;
	tab-stops:36.0pt 72.0pt 108.0pt 144.0pt 180.0pt 216.0pt 252.0pt 288.0pt 324.0pt 360.0pt;
	font-size:13.0pt;
	font-family:&quot;Univers&quot;,sans-serif;
	mso-fareast-font-family:&quot;Times New Roman&quot;;
	mso-bidi-font-family:&quot;Times New Roman&quot;;
	mso-fareast-language:EN-AU;}.MsoChpDefault
	{mso-style-type:export-only;
	mso-default-props:yes;
	font-size:13.0pt;
	mso-ansi-font-size:13.0pt;
	mso-bidi-font-size:13.0pt;
	font-family:&quot;Univers&quot;,sans-serif;
	mso-ascii-font-family:Univers;
	mso-hansi-font-family:Univers;
	mso-fareast-language:EN-AU;}div.WordSection1
	{page:WordSection1;}&lt;/style&gt; ...&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;CentreItalics&quot; style=&quot;text-align: left;&quot;&gt;&lt;span lang=&quot;EN-GB&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Times New Roman&amp;quot;,serif; font-size: 13.0pt; mso-ansi-language: EN-AU; mso-bidi-language: AR-SA; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-language: EN-AU;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;CentreItalics&quot; style=&quot;text-align: left;&quot;&gt;&lt;span lang=&quot;EN-GB&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Times New Roman&amp;quot;,serif; font-size: 13.0pt; mso-ansi-language: EN-AU; mso-bidi-language: AR-SA; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-language: EN-AU;&quot;&gt;
















&lt;span style=&quot;font-family: &amp;quot;Times New Roman&amp;quot;,serif; font-size: 13.0pt; mso-ansi-language: EN-AU; mso-bidi-language: AR-SA; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-language: EN-AU;&quot;&gt;The question of whether the appellant could be
said to participate comes down to the assistance provided by the hyperlink to
move to another webpage. This is not a strong basis for liability and it finds
no support in existing authority in Australia or recent cases elsewhere.&lt;/span&gt;&quot;&lt;style&gt;@font-face
	{font-family:&quot;Cambria Math&quot;;
	panose-1:2 4 5 3 5 4 6 3 2 4;
	mso-font-charset:0;
	mso-generic-font-family:roman;
	mso-font-pitch:variable;
	mso-font-signature:-536870145 1107305727 0 0 415 0;}@font-face
	{font-family:Univers;
	panose-1:2 11 5 3 2 2 2 2 2 4;
	mso-font-charset:0;
	mso-generic-font-family:swiss;
	mso-font-pitch:variable;
	mso-font-signature:-2147483001 0 0 0 15 0;}p.MsoNormal, li.MsoNormal, div.MsoNormal
	{mso-style-priority:99;
	mso-style-unhide:no;
	mso-style-qformat:yes;
	mso-style-parent:&quot;&quot;;
	margin-top:0cm;
	margin-right:6.5pt;
	margin-bottom:0cm;
	margin-left:0cm;
	text-indent:36.0pt;
	line-height:24.0pt;
	mso-line-height-rule:exactly;
	mso-pagination:widow-orphan;
	tab-stops:36.0pt 72.0pt 108.0pt 144.0pt 180.0pt 216.0pt 252.0pt 288.0pt 324.0pt 360.0pt;
	font-size:13.0pt;
	font-family:&quot;Univers&quot;,sans-serif;
	mso-fareast-font-family:&quot;Times New Roman&quot;;
	mso-bidi-font-family:&quot;Times New Roman&quot;;
	mso-fareast-language:EN-AU;}.MsoChpDefault
	{mso-style-type:export-only;
	mso-default-props:yes;
	font-size:13.0pt;
	mso-ansi-font-size:13.0pt;
	mso-bidi-font-size:13.0pt;
	font-family:&quot;Univers&quot;,sans-serif;
	mso-ascii-font-family:Univers;
	mso-hansi-font-family:Univers;
	mso-fareast-language:EN-AU;}div.WordSection1
	{page:WordSection1;}&lt;/style&gt;&amp;nbsp;&lt;/span&gt;



&lt;style&gt;@font-face
	{font-family:&quot;Cambria Math&quot;;
	panose-1:2 4 5 3 5 4 6 3 2 4;
	mso-font-charset:0;
	mso-generic-font-family:roman;
	mso-font-pitch:variable;
	mso-font-signature:-536870145 1107305727 0 0 415 0;}@font-face
	{font-family:Univers;
	panose-1:2 11 5 3 2 2 2 2 2 4;
	mso-font-charset:0;
	mso-generic-font-family:swiss;
	mso-font-pitch:variable;
	mso-font-signature:-2147483001 0 0 0 15 0;}p.MsoNormal, li.MsoNormal, div.MsoNormal
	{mso-style-priority:99;
	mso-style-unhide:no;
	mso-style-qformat:yes;
	mso-style-parent:&quot;&quot;;
	margin-top:0cm;
	margin-right:6.5pt;
	margin-bottom:0cm;
	margin-left:0cm;
	text-indent:36.0pt;
	line-height:24.0pt;
	mso-line-height-rule:exactly;
	mso-pagination:widow-orphan;
	tab-stops:36.0pt 72.0pt 108.0pt 144.0pt 180.0pt 216.0pt 252.0pt 288.0pt 324.0pt 360.0pt;
	font-size:13.0pt;
	font-family:&quot;Univers&quot;,sans-serif;
	mso-fareast-font-family:&quot;Times New Roman&quot;;
	mso-bidi-font-family:&quot;Times New Roman&quot;;
	mso-fareast-language:EN-AU;}.MsoChpDefault
	{mso-style-type:export-only;
	mso-default-props:yes;
	font-size:13.0pt;
	mso-ansi-font-size:13.0pt;
	mso-bidi-font-size:13.0pt;
	font-family:&quot;Univers&quot;,sans-serif;
	mso-ascii-font-family:Univers;
	mso-hansi-font-family:Univers;
	mso-fareast-language:EN-AU;}div.WordSection1
	{page:WordSection1;}&lt;/style&gt; &lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;CentreItalics&quot; style=&quot;text-align: left;&quot;&gt;&lt;span lang=&quot;EN-GB&quot;&gt;&lt;br /&gt;&lt;/span&gt;





&lt;/p&gt;&lt;p class=&quot;CentreItalics&quot; style=&quot;text-align: left;&quot;&gt;&lt;span lang=&quot;EN-GB&quot;&gt;&lt;br /&gt;&lt;/span&gt;





&lt;/p&gt;&lt;p&gt;&lt;style&gt;@font-face
	{font-family:&quot;Cambria Math&quot;;
	panose-1:2 4 5 3 5 4 6 3 2 4;
	mso-font-charset:0;
	mso-generic-font-family:roman;
	mso-font-pitch:variable;
	mso-font-signature:-536870145 1107305727 0 0 415 0;}@font-face
	{font-family:Univers;
	panose-1:2 11 5 3 2 2 2 2 2 4;
	mso-font-charset:0;
	mso-generic-font-family:swiss;
	mso-font-pitch:variable;
	mso-font-signature:-2147483001 0 0 0 15 0;}p.MsoNormal, li.MsoNormal, div.MsoNormal
	{mso-style-priority:99;
	mso-style-unhide:no;
	mso-style-qformat:yes;
	mso-style-parent:&quot;&quot;;
	margin-top:0cm;
	margin-right:6.5pt;
	margin-bottom:0cm;
	margin-left:0cm;
	text-indent:36.0pt;
	line-height:24.0pt;
	mso-line-height-rule:exactly;
	mso-pagination:widow-orphan;
	tab-stops:36.0pt 72.0pt 108.0pt 144.0pt 180.0pt 216.0pt 252.0pt 288.0pt 324.0pt 360.0pt;
	font-size:13.0pt;
	font-family:&quot;Univers&quot;,sans-serif;
	mso-fareast-font-family:&quot;Times New Roman&quot;;
	mso-bidi-font-family:&quot;Times New Roman&quot;;
	mso-fareast-language:EN-AU;}p.OrdersCentre, li.OrdersCentre, div.OrdersCentre
	{mso-style-name:&quot;Orders Centre&quot;;
	mso-style-unhide:no;
	mso-style-qformat:yes;
	mso-style-parent:&quot;&quot;;
	margin-top:0cm;
	margin-right:.85pt;
	margin-bottom:0cm;
	margin-left:0cm;
	text-align:center;
	mso-pagination:widow-orphan;
	tab-stops:36.0pt 72.0pt;
	font-size:13.0pt;
	mso-bidi-font-size:10.0pt;
	font-family:&quot;Times New Roman&quot;,serif;
	mso-fareast-font-family:&quot;Times New Roman&quot;;
	mso-ansi-language:EN-GB;
	mso-fareast-language:EN-AU;}p.CentreItalics, li.CentreItalics, div.CentreItalics
	{mso-style-name:&quot;Centre Italics&quot;;
	mso-style-unhide:no;
	mso-style-qformat:yes;
	margin-top:0cm;
	margin-right:.85pt;
	margin-bottom:0cm;
	margin-left:0cm;
	text-align:center;
	mso-pagination:widow-orphan;
	tab-stops:36.0pt 72.0pt;
	font-size:13.0pt;
	mso-bidi-font-size:10.0pt;
	font-family:&quot;Times New Roman&quot;,serif;
	mso-fareast-font-family:&quot;Times New Roman&quot;;
	mso-fareast-language:EN-AU;
	font-style:italic;}.MsoChpDefault
	{mso-style-type:export-only;
	mso-default-props:yes;
	font-size:13.0pt;
	mso-ansi-font-size:13.0pt;
	mso-bidi-font-size:13.0pt;
	font-family:&quot;Univers&quot;,sans-serif;
	mso-ascii-font-family:Univers;
	mso-hansi-font-family:Univers;
	mso-fareast-language:EN-AU;}div.WordSection1
	{page:WordSection1;}&lt;/style&gt;&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.cyberspac.com/feeds/8515222594776164396/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/11089964/8515222594776164396' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/11089964/posts/default/8515222594776164396'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/11089964/posts/default/8515222594776164396'/><link rel='alternate' type='text/html' href='http://www.cyberspac.com/2022/08/google-not-publisher-of-newspaper.html' title='Google not a publisher of newspaper article that is indexed in search engine results'/><author><name>John Swinson</name><uri>http://www.blogger.com/profile/05828283754031385550</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjEEYfvtYKyOuw-wUOTTqXBYnEhznl0Qij3ZK7bLysUeHFsc6-agc7jRFnNmoYhX868_c4u30i8f7fmRio7EGV2enXnOKlYS4cSsM8fqYZa04QD0d7zmscvUiWK82t18g/s113/swinson_j.png'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-11089964.post-1303609414294374569</id><published>2022-08-15T12:09:00.003+10:00</published><updated>2022-08-15T12:09:52.098+10:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="cybersecurity"/><category scheme="http://www.blogger.com/atom/ns#" term="facebook"/><title type='text'>Facebook Data Leak</title><content type='html'>&lt;p&gt;An interesting detailed article about the Facebook data leak:&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.digitalshadows.com/blog-and-research/the-facebook-data-leak-explained/&quot;&gt;https://www.digitalshadows.com/blog-and-research/the-facebook-data-leak-explained/&lt;/a&gt;&lt;/p&gt;&lt;p&gt;The leak took place in 2019.&lt;/p&gt;&lt;p&gt;&quot;&lt;span style=&quot;-webkit-text-stroke-width: 0px; background-color: white; color: #2a2942; display: inline !important; float: none; font-family: &amp;quot;Open Sans&amp;quot;, sans-serif; font-size: 16px; font-style: normal; font-variant-caps: normal; font-variant-ligatures: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; text-decoration-color: initial; text-decoration-style: initial; text-decoration-thickness: initial; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;&quot;&gt;Initially, attackers offered the data at quite a steep price. As the data began circulating in open and gated cybercriminal forums in 2020, a listing on Russian-speaking cybercriminal forum XSS in August 2020 advertised the sale of this data for “&lt;/span&gt;&lt;em style=&quot;-webkit-text-stroke-width: 0px; background-color: white; box-sizing: border-box; color: #2a2942; font-family: &amp;quot;Open Sans&amp;quot;, sans-serif; font-size: 16px; font-variant-caps: normal; font-variant-ligatures: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; text-decoration-color: initial; text-decoration-style: initial; text-decoration-thickness: initial; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;&quot;&gt;only”&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;/em&gt;&lt;span style=&quot;-webkit-text-stroke-width: 0px; background-color: white; color: #2a2942; display: inline !important; float: none; font-family: &amp;quot;Open Sans&amp;quot;, sans-serif; font-size: 16px; font-style: normal; font-variant-caps: normal; font-variant-ligatures: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; text-decoration-color: initial; text-decoration-style: initial; text-decoration-thickness: initial; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;&quot;&gt;USD 25,000 (see Figure 2). Listings were identified across several other forums, such as&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;a href=&quot;https://www.securitymagazine.com/articles/93172-digital-shadows-report-the-number-one-cybercriminal-forum&quot; style=&quot;-webkit-text-stroke-width: 0px; background-color: white; box-sizing: border-box; color: #eb38d4; font-family: &amp;quot;Open Sans&amp;quot;, sans-serif; font-size: 16px; font-style: normal; font-variant-caps: normal; font-variant-ligatures: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; text-decoration: none; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;&quot;&gt;Raidforums&lt;/a&gt;&lt;span style=&quot;-webkit-text-stroke-width: 0px; background-color: white; color: #2a2942; display: inline !important; float: none; font-family: &amp;quot;Open Sans&amp;quot;, sans-serif; font-size: 16px; font-style: normal; font-variant-caps: normal; font-variant-ligatures: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; text-decoration-color: initial; text-decoration-style: initial; text-decoration-thickness: initial; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;&quot;&gt;. The sheer size of the data leakage and the wide geography it covered (106 countries) made the data a gold mine for cybercriminals. Therefore, these listings often caught the interest of multiple threat actors.&quot;&lt;/span&gt;&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.cyberspac.com/feeds/1303609414294374569/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/11089964/1303609414294374569' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/11089964/posts/default/1303609414294374569'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/11089964/posts/default/1303609414294374569'/><link rel='alternate' type='text/html' href='http://www.cyberspac.com/2022/08/facebook-data-leak.html' title='Facebook Data Leak'/><author><name>John Swinson</name><uri>http://www.blogger.com/profile/05828283754031385550</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjEEYfvtYKyOuw-wUOTTqXBYnEhznl0Qij3ZK7bLysUeHFsc6-agc7jRFnNmoYhX868_c4u30i8f7fmRio7EGV2enXnOKlYS4cSsM8fqYZa04QD0d7zmscvUiWK82t18g/s113/swinson_j.png'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-11089964.post-2541141828118454475</id><published>2022-07-25T12:00:00.001+10:00</published><updated>2022-07-25T12:00:58.345+10:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="blockchain"/><category scheme="http://www.blogger.com/atom/ns#" term="NFT"/><title type='text'>Proposed Digital Services Act</title><content type='html'>&lt;p&gt;An Australian senator proposes a Digital Services Act relating to blockchain technology.&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.andrewbragg.com/post/address-at-blockchain-week-2022&quot;&gt;https://www.andrewbragg.com/post/address-at-blockchain-week-2022&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.cyberspac.com/feeds/2541141828118454475/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/11089964/2541141828118454475' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/11089964/posts/default/2541141828118454475'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/11089964/posts/default/2541141828118454475'/><link rel='alternate' type='text/html' href='http://www.cyberspac.com/2022/07/proposed-digital-services-act.html' title='Proposed Digital Services Act'/><author><name>John Swinson</name><uri>http://www.blogger.com/profile/05828283754031385550</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjEEYfvtYKyOuw-wUOTTqXBYnEhznl0Qij3ZK7bLysUeHFsc6-agc7jRFnNmoYhX868_c4u30i8f7fmRio7EGV2enXnOKlYS4cSsM8fqYZa04QD0d7zmscvUiWK82t18g/s113/swinson_j.png'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-11089964.post-9177548841380785709</id><published>2022-07-11T02:30:00.025+10:00</published><updated>2022-07-11T02:30:00.190+10:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="cybersquatting"/><category scheme="http://www.blogger.com/atom/ns#" term="NFT"/><category scheme="http://www.blogger.com/atom/ns#" term="trademark"/><title type='text'>NY NFT Trademark Lawsuit by Hemmes regarding Birkin bag NFT art</title><content type='html'>&lt;p&gt;A decision from Judge Rakoff from the SDNY regarding a motion to dismiss in a case involving NFTs.&amp;nbsp; See &lt;a href=&quot;https://images.law.com/contrib/content/uploads/documents/389/164932/Hermes-v.-Rotschild.Rakoff-order-on-MTD-1.pdf&quot;&gt;https://images.law.com/contrib/content/uploads/documents/389/164932/Hermes-v.-Rotschild.Rakoff-order-on-MTD-1.pdf&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&amp;nbsp;The court denied the motion to dismiss.&lt;/p&gt;&lt;p&gt;Mr Rotschild, the defendant, created a digital image of the Hermes Birkin bag, with a baby fetus inside the bag.&amp;nbsp; It sold for $23,500.&amp;nbsp; He also created images of faux fur Birkin bags, and 100 numbered NFTs that sold for about the price of a real world Birkin bag.&lt;/p&gt;&lt;p&gt;Hemmes sued Rotschild for trademark infringement.&amp;nbsp; Rotschild says the NFTs are art that have First Amendment protection.&amp;nbsp; He also said that his use of MetaBirkin for the title of his art had First Amendment protection.&lt;/p&gt;&lt;p&gt;The court said that there were too many factual issues to determine (e.g. is the NFT art?) to dismiss the case against Rotschild without having a trial.&lt;br /&gt;&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.cyberspac.com/feeds/9177548841380785709/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/11089964/9177548841380785709' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/11089964/posts/default/9177548841380785709'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/11089964/posts/default/9177548841380785709'/><link rel='alternate' type='text/html' href='http://www.cyberspac.com/2022/07/ny-nft-trademark-lawsuit-by-hemmes.html' title='NY NFT Trademark Lawsuit by Hemmes regarding Birkin bag NFT art'/><author><name>John Swinson</name><uri>http://www.blogger.com/profile/05828283754031385550</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjEEYfvtYKyOuw-wUOTTqXBYnEhznl0Qij3ZK7bLysUeHFsc6-agc7jRFnNmoYhX868_c4u30i8f7fmRio7EGV2enXnOKlYS4cSsM8fqYZa04QD0d7zmscvUiWK82t18g/s113/swinson_j.png'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-11089964.post-6064059766438340869</id><published>2022-07-10T09:32:00.002+10:00</published><updated>2022-07-10T09:32:30.786+10:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="patent"/><title type='text'>The Top Ten Developments in US Patent Law over the past 50 years</title><content type='html'>&lt;p&gt;Professor Don Chisum is a leader in U.S. patent law.&amp;nbsp; He has recently written this excellent article:&lt;/p&gt;&lt;p&gt;&lt;span class=&quot;markedContent&quot;&gt;&lt;/span&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span class=&quot;markedContent&quot; id=&quot;page3R_mcid3&quot;&gt;&lt;span dir=&quot;ltr&quot; role=&quot;presentation&quot; style=&quot;font-family: sans-serif; left: 223.233px; top: 228.34px; transform: scaleX(1.00182);&quot;&gt;Fifty Years of Patent Law: The Top Ten&lt;/span&gt;&lt;span dir=&quot;ltr&quot; role=&quot;presentation&quot; style=&quot;font-family: sans-serif; left: 410.083px; top: 266.74px; transform: scaleX(0.937224);&quot;&gt; Developments&lt;/span&gt;&lt;/span&gt;&lt;/span&gt; &lt;br /&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://chisum-patent-academy.com/wp-content/uploads/ChisumTop10in50Article6July2022.pdf&quot;&gt;https://chisum-patent-academy.com/wp-content/uploads/ChisumTop10in50Article6July2022.pdf&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Well worth reading if you are interested in patent law and the business of patents.&lt;br /&gt;&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.cyberspac.com/feeds/6064059766438340869/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/11089964/6064059766438340869' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/11089964/posts/default/6064059766438340869'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/11089964/posts/default/6064059766438340869'/><link rel='alternate' type='text/html' href='http://www.cyberspac.com/2022/07/the-top-ten-developments-in-us-patent.html' title='The Top Ten Developments in US Patent Law over the past 50 years'/><author><name>John Swinson</name><uri>http://www.blogger.com/profile/05828283754031385550</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjEEYfvtYKyOuw-wUOTTqXBYnEhznl0Qij3ZK7bLysUeHFsc6-agc7jRFnNmoYhX868_c4u30i8f7fmRio7EGV2enXnOKlYS4cSsM8fqYZa04QD0d7zmscvUiWK82t18g/s113/swinson_j.png'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-11089964.post-7877044093523993628</id><published>2022-07-09T09:33:00.016+10:00</published><updated>2022-07-10T09:39:02.373+10:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="google"/><category scheme="http://www.blogger.com/atom/ns#" term="internet marketing"/><category scheme="http://www.blogger.com/atom/ns#" term="review"/><category scheme="http://www.blogger.com/atom/ns#" term="user generate content"/><title type='text'>Lawsuit in Victoria against Google over false reviews for artifical plant company</title><content type='html'>&lt;p&gt;The Age newspaper has this story regarding false reviews of an artificial patents business, that alleged were posted when the business had a dispute with a moving company.&lt;/p&gt;&lt;p&gt;See &lt;a href=&quot;https://amp.theage.com.au/national/victoria/david-and-georgina-had-a-dispute-with-their-removalists-four-years-later-they-ve-taken-google-to-court-20220707-p5azub.html&quot;&gt;https://amp.theage.com.au/national/victoria/david-and-georgina-had-a-dispute-with-their-removalists-four-years-later-they-ve-taken-google-to-court-20220707-p5azub.html&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Interestingly, they are suing Google.&lt;/p&gt;&lt;p&gt;Similar story to the Titan Sheds dispute that ended up in the Federal Court in Brisbane a few years back.&amp;nbsp; There are about 3 court decisions.&amp;nbsp; One involved trying to get evidence from Google, but because Google was offshore, this was difficult.&amp;nbsp; See &lt;a href=&quot;https://www.findlaw.com.au/articles/6068/federal-court-on-issuing-an-international-subpoena.aspx&quot; target=&quot;_blank&quot;&gt;Note&lt;/a&gt;&lt;br /&gt;&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.cyberspac.com/feeds/7877044093523993628/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/11089964/7877044093523993628' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/11089964/posts/default/7877044093523993628'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/11089964/posts/default/7877044093523993628'/><link rel='alternate' type='text/html' href='http://www.cyberspac.com/2022/07/lawsuit-in-victoria-against-google-over.html' title='Lawsuit in Victoria against Google over false reviews for artifical plant company'/><author><name>John Swinson</name><uri>http://www.blogger.com/profile/05828283754031385550</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjEEYfvtYKyOuw-wUOTTqXBYnEhznl0Qij3ZK7bLysUeHFsc6-agc7jRFnNmoYhX868_c4u30i8f7fmRio7EGV2enXnOKlYS4cSsM8fqYZa04QD0d7zmscvUiWK82t18g/s113/swinson_j.png'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-11089964.post-7699487444357612736</id><published>2022-06-30T12:01:00.007+10:00</published><updated>2022-07-25T12:02:32.354+10:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="crypto"/><title type='text'>OSC enforcement against crypto asset trading platforms</title><content type='html'>&lt;p&gt;The Ontario Securities Commission (OSC) &lt;a href=&quot;https://www.osc.ca/en/news-events/news/osc-holds-global-crypto-asset-trading-platforms-accountable&quot;&gt;announced this month&lt;/a&gt;
 the outcome of two successful enforcement actions against non-compliant
 crypto asset trading platforms.&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.cyberspac.com/feeds/7699487444357612736/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/11089964/7699487444357612736' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/11089964/posts/default/7699487444357612736'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/11089964/posts/default/7699487444357612736'/><link rel='alternate' type='text/html' href='http://www.cyberspac.com/2022/06/osc-enforcement-against-crypto-asset.html' title='OSC enforcement against crypto asset trading platforms'/><author><name>John Swinson</name><uri>http://www.blogger.com/profile/05828283754031385550</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjEEYfvtYKyOuw-wUOTTqXBYnEhznl0Qij3ZK7bLysUeHFsc6-agc7jRFnNmoYhX868_c4u30i8f7fmRio7EGV2enXnOKlYS4cSsM8fqYZa04QD0d7zmscvUiWK82t18g/s113/swinson_j.png'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-11089964.post-6172172635432390418</id><published>2022-02-28T11:36:00.002+10:00</published><updated>2022-02-28T11:36:39.399+10:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="accc"/><category scheme="http://www.blogger.com/atom/ns#" term="facebook"/><category scheme="http://www.blogger.com/atom/ns#" term="google"/><title type='text'>ACCC to Review Facebook, Google and other large digital platforms</title><content type='html'>&lt;p&gt;The ACCC is seeking views from consumers, businesses and other parties on options for legislative reform to address concerns about the dominance of digital platforms.&lt;/p&gt;&lt;p&gt;A&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;a data-saferedirecturl=&quot;https://www.google.com/url?q=https://protect-au.mimecast.com/s/-hwDCoV1G9tJQzOU1VGSE?domain%3Daccc.gov.au&amp;amp;source=gmail&amp;amp;ust=1646098149710000&amp;amp;usg=AOvVaw1sN6MK9jgY0m2jeM4lfcaJ&quot; href=&quot;https://protect-au.mimecast.com/s/-hwDCoV1G9tJQzOU1VGSE?domain=accc.gov.au&quot; style=&quot;color: #1155cc;&quot; target=&quot;_blank&quot;&gt;discussion paper&lt;/a&gt;, released today, outlines options for addressing harms to competition, consumers, and business users in a range of areas dominated by large digital platforms, including social media, search, app marketplaces, general online retail marketplaces and ad tech.&lt;/p&gt;&lt;a data-saferedirecturl=&quot;https://www.google.com/url?q=https://protect-au.mimecast.com/s/os01Cp81J6SP78YhDrS43?domain%3Daccc.gov.au&amp;amp;source=gmail&amp;amp;ust=1646098149710000&amp;amp;usg=AOvVaw3cLeUO7fTlk9-FJyRgV5uQ&quot; href=&quot;https://protect-au.mimecast.com/s/os01Cp81J6SP78YhDrS43?domain=accc.gov.au&quot; style=&quot;-webkit-text-stroke-width: 0px; background-color: white; color: #1155cc; font-family: Roboto, RobotoDraft, Helvetica, Arial, sans-serif; font-size: small; font-style: normal; font-variant-caps: normal; font-variant-ligatures: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;&quot; target=&quot;_blank&quot;&gt;Read more&lt;/a&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.cyberspac.com/feeds/6172172635432390418/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/11089964/6172172635432390418' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/11089964/posts/default/6172172635432390418'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/11089964/posts/default/6172172635432390418'/><link rel='alternate' type='text/html' href='http://www.cyberspac.com/2022/02/accc-to-review-facebook-google-and.html' title='ACCC to Review Facebook, Google and other large digital platforms'/><author><name>John Swinson</name><uri>http://www.blogger.com/profile/05828283754031385550</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjEEYfvtYKyOuw-wUOTTqXBYnEhznl0Qij3ZK7bLysUeHFsc6-agc7jRFnNmoYhX868_c4u30i8f7fmRio7EGV2enXnOKlYS4cSsM8fqYZa04QD0d7zmscvUiWK82t18g/s113/swinson_j.png'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-11089964.post-2424879110789970122</id><published>2021-12-08T11:22:00.000+10:00</published><updated>2021-12-08T11:22:02.301+10:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="facebook"/><category scheme="http://www.blogger.com/atom/ns#" term="jurisdiction"/><category scheme="http://www.blogger.com/atom/ns#" term="user generate content"/><title type='text'>Facebook Sued for $150 billion by Rohingya refugees</title><content type='html'>&lt;p&gt;Rohingya refugees are suing Facebook over its own admitted &lt;a href=&quot;https://edition.cnn.com/2018/11/06/tech/facebook-myanmar-report/index.html&quot; target=&quot;_blank&quot;&gt;failure&lt;/a&gt; to stop the spread of hate speech that contributed to &lt;a href=&quot;https://edition.cnn.com/specials/asia/rohingya&quot; target=&quot;_blank&quot;&gt;violence in Myanmar&lt;/a&gt;.&lt;/p&gt;&lt;p&gt;A case has been filed in the USA.&amp;nbsp; Because of s230 of the Communications Decency Act, the plaintiffs are asserting that Myanmar law should apply, not U.S. law.&lt;/p&gt;&lt;p&gt;Commentators have stated it is a &lt;a href=&quot;https://edition.cnn.com/2021/12/07/tech/facebook-myanmar-rohingya-muslims-intl-hnk/index.html&quot; target=&quot;_blank&quot;&gt;difficult case&lt;/a&gt; for the refugees.&lt;br /&gt;&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.cyberspac.com/feeds/2424879110789970122/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/11089964/2424879110789970122' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/11089964/posts/default/2424879110789970122'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/11089964/posts/default/2424879110789970122'/><link rel='alternate' type='text/html' href='http://www.cyberspac.com/2021/12/facebook-sued-for-150-billion-by.html' title='Facebook Sued for $150 billion by Rohingya refugees'/><author><name>John Swinson</name><uri>http://www.blogger.com/profile/05828283754031385550</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjEEYfvtYKyOuw-wUOTTqXBYnEhznl0Qij3ZK7bLysUeHFsc6-agc7jRFnNmoYhX868_c4u30i8f7fmRio7EGV2enXnOKlYS4cSsM8fqYZa04QD0d7zmscvUiWK82t18g/s113/swinson_j.png'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-11089964.post-6320843229080302955</id><published>2021-12-07T11:23:00.001+10:00</published><updated>2021-12-08T11:24:11.990+10:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="China"/><category scheme="http://www.blogger.com/atom/ns#" term="cybersecurity"/><category scheme="http://www.blogger.com/atom/ns#" term="security"/><title type='text'>Chinese cyberattacks</title><content type='html'>&lt;p&gt;&lt;span style=&quot;-webkit-text-size-adjust: auto; -webkit-text-stroke-width: 0px; background-color: white; caret-color: rgb(0, 0, 0); color: black; display: inline !important; float: none; font-family: Roboto, &amp;quot;Open sans&amp;quot;, Helvetica, Arial, sans-serif; font-size: 16px; font-style: normal; font-variant-caps: normal; font-weight: normal; letter-spacing: normal; orphans: auto; text-align: start; text-decoration: none; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px;&quot;&gt;As experts say the number of cyber attacks being directed at Australia have reached a disturbing level, it can now be revealed that&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;a href=&quot;https://www.couriermail.com.au/news/national/energy-company-in-queensland-came-close-to-suffering-a-chinese-cyber-attack/news-story/f016acc1260494237c93085ae09b6f2a?rsf=syn:news:nca:cm:spa:edm&amp;amp;utm_source=CourierMail&amp;amp;utm_medium=email&amp;amp;utm_campaign=Editorial&amp;amp;utm_content=CM_PREM-AM_CUR_01&amp;amp;net_sub_id=280394960&amp;amp;type=free_text_block&amp;amp;position=1&amp;amp;overallPos=1&quot; rel=&quot;noopener noreferrer&quot; style=&quot;-webkit-text-size-adjust: auto; -webkit-text-stroke-width: 0px; color: rgb(0, 89, 191) !important; font-family: Roboto, &amp;quot;Open sans&amp;quot;, Helvetica, Arial, sans-serif; font-size: 16px; font-style: normal; font-variant-caps: normal; font-weight: normal; letter-spacing: normal; orphans: auto; text-align: start; text-decoration: none !important; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px;&quot; target=&quot;_blank&quot;&gt;Chinese hackers came within minutes of shutting down two Queensland power stations&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;-webkit-text-size-adjust: auto; -webkit-text-stroke-width: 0px; background-color: white; caret-color: rgb(0, 0, 0); color: black; display: inline !important; float: none; font-family: Roboto, &amp;quot;Open sans&amp;quot;, Helvetica, Arial, sans-serif; font-size: 16px; font-style: normal; font-variant-caps: normal; font-weight: normal; letter-spacing: normal; orphans: auto; text-align: start; text-decoration: none; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px;&quot;&gt;. Had the attack been successful it could have been lights out for some 3 million homes. &lt;br /&gt;&lt;/span&gt;&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.cyberspac.com/feeds/6320843229080302955/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/11089964/6320843229080302955' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/11089964/posts/default/6320843229080302955'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/11089964/posts/default/6320843229080302955'/><link rel='alternate' type='text/html' href='http://www.cyberspac.com/2021/12/chinese-cyberattacks.html' title='Chinese cyberattacks'/><author><name>John Swinson</name><uri>http://www.blogger.com/profile/05828283754031385550</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjEEYfvtYKyOuw-wUOTTqXBYnEhznl0Qij3ZK7bLysUeHFsc6-agc7jRFnNmoYhX868_c4u30i8f7fmRio7EGV2enXnOKlYS4cSsM8fqYZa04QD0d7zmscvUiWK82t18g/s113/swinson_j.png'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-11089964.post-5805434751712754288</id><published>2021-12-01T07:35:00.009+10:00</published><updated>2021-12-04T14:48:30.786+10:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="defamation"/><category scheme="http://www.blogger.com/atom/ns#" term="facebook"/><category scheme="http://www.blogger.com/atom/ns#" term="user generate content"/><title type='text'>Australian Social Media Law proposed</title><content type='html'>&lt;p&gt;The Australian Government has just released a proposed law to deal with defamation and social media comments.&lt;/p&gt;&lt;p&gt;See &lt;a href=&quot;https://www.ag.gov.au/legal-system/social-media-anti-trolling-bill&quot; target=&quot;_blank&quot;&gt;Social Media (Anti-Trolling) Bill.&lt;/a&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.ag.gov.au/legal-system/social-media-anti-trolling-bill&quot;&gt;https://www.ag.gov.au/legal-system/social-media-anti-trolling-bill&lt;/a&gt;&lt;/p&gt;&lt;p&gt;The AG&#39;s office provides the following information:&lt;/p&gt;&lt;p&gt;&quot;The challenges of responding to anonymous online trolling became clear after the High Court&#39;s decision in &lt;a href=&quot;https://eresources.hcourt.gov.au/showCase/2021/HCA/27&quot; target=&quot;_blank&quot;&gt;&lt;i&gt;Fairfax Media Publications v Voller&lt;/i&gt; [2021] HCA 27&lt;/a&gt;, handed down in September 2021. The &lt;i&gt;Voller&lt;/i&gt;
 decision shows that Australians who maintain a social media page may be
 exposed to defamation liability for defamatory comments posted on the 
page by others – even if they are not aware of those defamatory 
comments.&lt;/p&gt;

&lt;p&gt;To urgently address this situation the Australian Government has 
developed the Social Media (Anti-Trolling) Bill 2021. To address the 
implications of the &lt;i&gt;Voller&lt;/i&gt; decision, the Bill will protect 
Australians from defamation liability that could arise if they allow 
users to comment on their social media page.&quot;&lt;/p&gt;&lt;p class=&quot;liveblog-entry-header&quot; style=&quot;text-align: left;&quot;&gt;&amp;nbsp;See my comments in &lt;a href=&quot;https://www.theaustralian.com.au/business/technology/facebook-parent-company-told-to-sell-giphy-by-uk-regulator/live-coverage/730e645f7143d464446c69d28780ee32#29958&quot; target=&quot;_blank&quot;&gt;The Australian blog&lt;/a&gt;:&amp;nbsp; &quot;Law professor supports anti-trolling proposals&quot;&lt;/p&gt;&lt;p&gt; &lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.cyberspac.com/feeds/5805434751712754288/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/11089964/5805434751712754288' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/11089964/posts/default/5805434751712754288'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/11089964/posts/default/5805434751712754288'/><link rel='alternate' type='text/html' href='http://www.cyberspac.com/2021/12/australian-social-media-law-proposed.html' title='Australian Social Media Law proposed'/><author><name>John Swinson</name><uri>http://www.blogger.com/profile/05828283754031385550</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjEEYfvtYKyOuw-wUOTTqXBYnEhznl0Qij3ZK7bLysUeHFsc6-agc7jRFnNmoYhX868_c4u30i8f7fmRio7EGV2enXnOKlYS4cSsM8fqYZa04QD0d7zmscvUiWK82t18g/s113/swinson_j.png'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-11089964.post-2892312952231134920</id><published>2021-11-13T14:39:00.003+10:00</published><updated>2021-11-13T14:39:31.394+10:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="binance"/><category scheme="http://www.blogger.com/atom/ns#" term="crypto"/><category scheme="http://www.blogger.com/atom/ns#" term="jurisdiction"/><title type='text'>Crypto Regulation</title><content type='html'>&lt;p&gt;In an interesting article about Crypto Exchange regulation in the &lt;a href=&quot;https://www.wsj.com/articles/binance-became-the-biggest-cryptocurrency-exchange-without-licenses-or-headquarters-thats-coming-to-an-end-11636640029?mod=saved_content&quot; target=&quot;_blank&quot;&gt;WSJ&lt;/a&gt;.&lt;/p&gt;&lt;p&gt;&quot;The world’s fastest-growing major financial exchange has no head office 
or formal address, lacks licenses in countries where it operates and has
 a chief executive who until recently wouldn’t answer questions about 
his location.&quot; &lt;/p&gt;&lt;p&gt;The biggest exchange is &lt;a href=&quot;https://accounts.binance.com/en-AU/register?ref=326511626&quot; target=&quot;_blank&quot;&gt;Binance&lt;/a&gt;, which has no fixed address it seems.&amp;nbsp; Creates interesting internet jurisdiction issues.&lt;br /&gt;&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.cyberspac.com/feeds/2892312952231134920/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/11089964/2892312952231134920' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/11089964/posts/default/2892312952231134920'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/11089964/posts/default/2892312952231134920'/><link rel='alternate' type='text/html' href='http://www.cyberspac.com/2021/11/crypto-regulation.html' title='Crypto Regulation'/><author><name>John Swinson</name><uri>http://www.blogger.com/profile/05828283754031385550</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjEEYfvtYKyOuw-wUOTTqXBYnEhznl0Qij3ZK7bLysUeHFsc6-agc7jRFnNmoYhX868_c4u30i8f7fmRio7EGV2enXnOKlYS4cSsM8fqYZa04QD0d7zmscvUiWK82t18g/s113/swinson_j.png'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-11089964.post-6702673062133630057</id><published>2021-11-11T07:51:00.001+10:00</published><updated>2021-11-11T07:51:13.900+10:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="google"/><category scheme="http://www.blogger.com/atom/ns#" term="privacy"/><title type='text'>UK Cookies Case</title><content type='html'>&lt;p&gt;An interesting case today from the UK:&amp;nbsp; &lt;i&gt;Lloyd v Google&lt;/i&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;See note here:&amp;nbsp; &lt;a href=&quot;https://www.mishcon.com/news/the-developing-law-on-data-protection-group-claims&quot;&gt;https://www.mishcon.com/news/the-developing-law-on-data-protection-group-claims&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&quot;This is of course a landmark judgment for data protection claims, but 
also more generally for consumer actions brought on an &quot;opt-out&quot; basis. 
The claimant, Mr Lloyd, represented a group of more than 4 million 
iPhone users, and alleged, on their behalf, that Google&#39;s historic 
deployment of cookies on the Safari browser had been not just unlawful, 
but that it meant that Google should pay compensation to everyone who 
had received cookies on that basis.&quot;&lt;/p&gt;&lt;p&gt;The court found for Google. &lt;br /&gt;&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.cyberspac.com/feeds/6702673062133630057/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/11089964/6702673062133630057' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/11089964/posts/default/6702673062133630057'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/11089964/posts/default/6702673062133630057'/><link rel='alternate' type='text/html' href='http://www.cyberspac.com/2021/11/uk-cookies-case.html' title='UK Cookies Case'/><author><name>John Swinson</name><uri>http://www.blogger.com/profile/05828283754031385550</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjEEYfvtYKyOuw-wUOTTqXBYnEhznl0Qij3ZK7bLysUeHFsc6-agc7jRFnNmoYhX868_c4u30i8f7fmRio7EGV2enXnOKlYS4cSsM8fqYZa04QD0d7zmscvUiWK82t18g/s113/swinson_j.png'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-11089964.post-5307396828619767527</id><published>2021-11-01T18:57:00.001+10:00</published><updated>2021-11-01T18:57:16.090+10:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="FBI"/><category scheme="http://www.blogger.com/atom/ns#" term="law enforcement"/><category scheme="http://www.blogger.com/atom/ns#" term="police"/><category scheme="http://www.blogger.com/atom/ns#" term="privacy"/><title type='text'>How the FBI obtains access to telephone information</title><content type='html'>&lt;p&gt;This is a good article.&amp;nbsp; It provides &lt;span class=&quot;abc__textblock size--article&quot; data-component=&quot;TextBlock&quot;&gt;insights on what exactly each carrier collects, a more recent run-down 
of how long each United States telecom retains certain types of data for, and images 
of the tool the FBI makes available to law enforcement agencies across 
the country to analyze cell phone tower data.&lt;/span&gt;&lt;/p&gt;&lt;div&gt;&lt;h4&gt;&lt;a href=&quot;https://www.vice.com/en/article/m7vqkv/how-fbi-gets-phone-data-att-tmobile-verizon&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;font-size: xx-small;&quot;&gt;&lt;span style=&quot;font-family: courier;&quot;&gt;&lt;span data-article-description=&quot;The newly obtained document shows in granular detail the sort of data that the country&#39;s carriers keep, and for how long.&quot; data-article-id=&quot;61730f08a3fc4a00939604d3&quot; data-article-locale=&quot;en_us&quot; data-article-title=&quot;Here&#39;s the FBI&#39;s Internal Guide for Getting Data from AT&amp;amp;T, T-Mobile, Verizon&quot; data-article-url=&quot;/en/article/m7vqkv/how-fbi-gets-phone-data-att-tmobile-verizon&quot; data-direction=&quot;down&quot;&gt;&lt;h1 class=&quot;smart-header__hed smart-header__hed--size-2&quot; style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;Here&#39;s the FBI&#39;s Internal Guide for Getting Data from AT&amp;amp;T, T-Mobile, Verizon&lt;/span&gt;&lt;/h1&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;/h4&gt;&lt;/div&gt;&lt;p&gt;&lt;a href=&quot;https://www.vice.com/en/article/m7vqkv/how-fbi-gets-phone-data-att-tmobile-verizon&quot;&gt;https://www.vice.com/en/article/m7vqkv/how-fbi-gets-phone-data-att-tmobile-verizon&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;span class=&quot;abc__textblock size--article&quot; data-component=&quot;TextBlock&quot;&gt;&lt;/span&gt; &lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.cyberspac.com/feeds/5307396828619767527/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/11089964/5307396828619767527' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/11089964/posts/default/5307396828619767527'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/11089964/posts/default/5307396828619767527'/><link rel='alternate' type='text/html' href='http://www.cyberspac.com/2021/11/how-fbi-obtains-access-to-telephone.html' title='How the FBI obtains access to telephone information'/><author><name>John Swinson</name><uri>http://www.blogger.com/profile/05828283754031385550</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjEEYfvtYKyOuw-wUOTTqXBYnEhznl0Qij3ZK7bLysUeHFsc6-agc7jRFnNmoYhX868_c4u30i8f7fmRio7EGV2enXnOKlYS4cSsM8fqYZa04QD0d7zmscvUiWK82t18g/s113/swinson_j.png'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-11089964.post-2695666576578980049</id><published>2021-10-29T08:01:00.004+10:00</published><updated>2021-10-29T08:01:00.216+10:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="cybersecurity"/><category scheme="http://www.blogger.com/atom/ns#" term="insurance"/><category scheme="http://www.blogger.com/atom/ns#" term="risk"/><title type='text'>Is cybersecurity insurance worth the risk? </title><content type='html'>&lt;p&gt;A good source of information about cybersecurity risks is the &lt;a href=&quot;https://www.securityforum.org/&quot; target=&quot;_blank&quot;&gt;Information Security Forum&lt;/a&gt; (ISF).&lt;/p&gt;&lt;p&gt;For example, ISF recently published an interesting report regarding cybersecurity insurance.&amp;nbsp; Is cybersecurity insurance worth the risk?&amp;nbsp; See &lt;a href=&quot;https://www.securityforum.org/solutions-and-insights/cyber-insurance-is-it-worth-the-risk/&quot; target=&quot;_blank&quot;&gt;Report&lt;/a&gt;.&lt;br /&gt;&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.cyberspac.com/feeds/2695666576578980049/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/11089964/2695666576578980049' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/11089964/posts/default/2695666576578980049'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/11089964/posts/default/2695666576578980049'/><link rel='alternate' type='text/html' href='http://www.cyberspac.com/2021/10/is-cybersecurity-insurance-worth-risk.html' title='Is cybersecurity insurance worth the risk? '/><author><name>John Swinson</name><uri>http://www.blogger.com/profile/05828283754031385550</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjEEYfvtYKyOuw-wUOTTqXBYnEhznl0Qij3ZK7bLysUeHFsc6-agc7jRFnNmoYhX868_c4u30i8f7fmRio7EGV2enXnOKlYS4cSsM8fqYZa04QD0d7zmscvUiWK82t18g/s113/swinson_j.png'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-11089964.post-3215072659368775958</id><published>2021-10-28T07:52:00.001+10:00</published><updated>2021-10-28T07:52:23.343+10:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="domain names"/><category scheme="http://www.blogger.com/atom/ns#" term="laws"/><category scheme="http://www.blogger.com/atom/ns#" term="RDNH"/><category scheme="http://www.blogger.com/atom/ns#" term="udrp"/><title type='text'>Reverse Domain Name Hijacking Lawsuit Dismissed in USA</title><content type='html'>&lt;p&gt;&lt;span style=&quot;font-family: trebuchet;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;An interesting legal decision regarding the domain name pocketbook.com was handed down by a United States district judge this month.&amp;nbsp; The case arose out of this NAF UDRP decision from 2019 that decided for the domain name owner:&amp;nbsp; &lt;a href=&quot;https://www.adrforum.com/DomainDecisions/1857174.htm&quot;&gt;https://www.adrforum.com/DomainDecisions/1857174.htm&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: trebuchet;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;The court reviewed the &lt;span dir=&quot;ltr&quot; role=&quot;presentation&quot; style=&quot;left: 180px; top: 380.8px; transform: scaleX(0.991271);&quot;&gt;Anticybersquatting  Consumer  Pr&lt;/span&gt;&lt;span dir=&quot;ltr&quot; role=&quot;presentation&quot; style=&quot;left: 556.6px; top: 380.8px; transform: scaleX(0.994305);&quot;&gt;otection  Act  (ACPA)  prohibits  reverse  &lt;/span&gt;&lt;br role=&quot;presentation&quot; /&gt;&lt;span dir=&quot;ltr&quot; role=&quot;presentation&quot; style=&quot;left: 120px; top: 403.8px; transform: scaleX(0.960066);&quot;&gt;domain  name  hijacking,  which  &lt;/span&gt;&lt;span dir=&quot;ltr&quot; role=&quot;presentation&quot; style=&quot;left: 380.7px; top: 403.8px; transform: scaleX(0.972228);&quot;&gt;occurs  when  “overreaching  tradem&lt;/span&gt;&lt;span dir=&quot;ltr&quot; role=&quot;presentation&quot; style=&quot;left: 666.5px; top: 403.8px; transform: scaleX(0.947063);&quot;&gt;ark  owners”  interfere  with  a  &lt;/span&gt;&lt;br role=&quot;presentation&quot; /&gt;&lt;span dir=&quot;ltr&quot; role=&quot;presentation&quot; style=&quot;left: 120px; top: 426.8px; transform: scaleX(0.968233);&quot;&gt;domain  name  registrant’s  la&lt;/span&gt;&lt;span dir=&quot;ltr&quot; role=&quot;presentation&quot; style=&quot;left: 349px; top: 426.8px; transform: scaleX(0.9227);&quot;&gt;wful  use  of  a  domain  name.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: trebuchet;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span dir=&quot;ltr&quot; role=&quot;presentation&quot; style=&quot;left: 349px; top: 426.8px; transform: scaleX(0.9227);&quot;&gt;The court decided that &lt;/span&gt;&lt;span dir=&quot;ltr&quot; role=&quot;presentation&quot; style=&quot;left: 349px; top: 426.8px; transform: scaleX(0.9227);&quot;&gt;&lt;span dir=&quot;ltr&quot; role=&quot;presentation&quot; style=&quot;left: 180px; top: 676.8px; transform: scaleX(0.966026);&quot;&gt;the  requirement  that  the  domain  name  “has  &lt;/span&gt;&lt;span dir=&quot;ltr&quot; role=&quot;presentation&quot; style=&quot;left: 557.6px; top: 676.8px; transform: scaleX(0.981903);&quot;&gt;been  suspended,  disabl&lt;/span&gt;&lt;span dir=&quot;ltr&quot; role=&quot;presentation&quot; style=&quot;left: 747.8px; top: 676.8px; transform: scaleX(0.965699);&quot;&gt;ed,  or  transferred”  &lt;/span&gt;&lt;span dir=&quot;ltr&quot; role=&quot;presentation&quot; style=&quot;left: 120px; top: 699.8px; transform: scaleX(0.956745);&quot;&gt;does  not  include  temporary  suspension during the pendency of a UDRP case.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: trebuchet;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span dir=&quot;ltr&quot; role=&quot;presentation&quot; style=&quot;left: 349px; top: 426.8px; transform: scaleX(0.9227);&quot;&gt;&lt;span dir=&quot;ltr&quot; role=&quot;presentation&quot; style=&quot;left: 120px; top: 699.8px; transform: scaleX(0.956745);&quot;&gt;See decision here &lt;a href=&quot;https://domainnamewire.com/wp-content/pocketbook.pdf&quot; target=&quot;_blank&quot;&gt;https://domainnamewire.com/wp-content/pocketbook.pdf&amp;nbsp; &lt;/a&gt;and case note &lt;a href=&quot;https://domainnamewire.com/2021/10/19/judge-returns-mixed-bag-in-pocketbook-com-domain-dispute-ruling/&quot; target=&quot;_blank&quot;&gt;here&lt;/a&gt;.&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.cyberspac.com/feeds/3215072659368775958/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/11089964/3215072659368775958' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/11089964/posts/default/3215072659368775958'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/11089964/posts/default/3215072659368775958'/><link rel='alternate' type='text/html' href='http://www.cyberspac.com/2021/10/reverse-domain-name-hijacking-lawsuit.html' title='Reverse Domain Name Hijacking Lawsuit Dismissed in USA'/><author><name>John Swinson</name><uri>http://www.blogger.com/profile/05828283754031385550</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjEEYfvtYKyOuw-wUOTTqXBYnEhznl0Qij3ZK7bLysUeHFsc6-agc7jRFnNmoYhX868_c4u30i8f7fmRio7EGV2enXnOKlYS4cSsM8fqYZa04QD0d7zmscvUiWK82t18g/s113/swinson_j.png'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-11089964.post-965161722931056906</id><published>2021-10-25T20:02:00.004+10:00</published><updated>2021-10-25T20:02:39.463+10:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="privacy"/><title type='text'>Privacy Act Review in Australia</title><content type='html'>&lt;p class=&quot;MsoNormal&quot; style=&quot;-moz-text-size-adjust: auto; -webkit-text-stroke-width: 0px; caret-color: rgb(0, 0, 0); color: black; font-style: normal; font-variant-caps: normal; font-weight: normal; letter-spacing: normal; text-align: start; text-decoration: none; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;span style=&quot;font-family: georgia;&quot;&gt;The Australian Attorney-General&#39;s Office has released the Privacy Act Review Discussion Paper and seeks comments before 10 January 2022. The discussion paper considers these matters:&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;ul style=&quot;-moz-text-size-adjust: auto; -webkit-text-stroke-width: 0px; caret-color: rgb(0, 0, 0); color: black; font-style: normal; font-variant-caps: normal; font-weight: normal; letter-spacing: normal; margin-top: 0cm; text-align: start; text-decoration: none; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot; type=&quot;disc&quot;&gt;&lt;li style=&quot;margin-left: 0cm;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;span style=&quot;font-family: georgia;&quot;&gt;Scope, application &amp;amp; effectiveness of the Privacy Act&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;&lt;li style=&quot;margin-left: 0cm;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;span style=&quot;font-family: georgia;&quot;&gt;Direct rights of action by individuals&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;&lt;li style=&quot;margin-left: 0cm;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;span style=&quot;font-family: georgia;&quot;&gt;Statutory tort for invasion of privacy&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;&lt;li style=&quot;margin-left: 0cm;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;span style=&quot;font-family: georgia;&quot;&gt;Notifiable data breach scheme effectiveness&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;&lt;li style=&quot;margin-left: 0cm;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;span style=&quot;font-family: georgia;&quot;&gt;Enforcement power effectiveness&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;&lt;li style=&quot;margin-left: 0cm;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;span style=&quot;font-family: georgia;&quot;&gt;Aspects of a certification scheme&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;-moz-text-size-adjust: auto; -webkit-text-stroke-width: 0px; caret-color: rgb(0, 0, 0); color: black; font-style: normal; font-variant-caps: normal; font-weight: normal; letter-spacing: normal; text-align: start; text-decoration: none; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;span style=&quot;font-family: georgia;&quot;&gt;&lt;a href=&quot;https://consultations.ag.gov.au/rights-and-protections/privacy-act-review-discussion-paper/&quot; target=&quot;_blank&quot;&gt;https://consultations.ag.gov.au/rights-and-protections/privacy-act-review-discussion-paper/&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: georgia;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;Concurrently, the AG&#39;s Office is holding this consultation at the same time as a &lt;a href=&quot;https://consultations.ag.gov.au/rights-and-protections/online-privacy-bill-exposure-draft&quot; target=&quot;_blank&quot;&gt;consultation on the exposure draft&lt;/a&gt; of the Privacy Legislation Amendment (Enhancing Online Privacy and Other Measures) Bill 2021 (Online Privacy Bill).&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;span style=&quot;font-family: georgia;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;

&lt;/span&gt;&lt;/span&gt;&lt;p&gt;&lt;span style=&quot;font-family: georgia;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;The Online Privacy Bill addresses the pressing privacy challenges posed by social media and certain other online platforms.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;span style=&quot;font-family: georgia;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;

&lt;/span&gt;&lt;/span&gt;&lt;p&gt;&lt;span style=&quot;font-family: georgia;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;The Privacy Act Review seeks to build on the outcomes of the Online 
Privacy Bill to ensure that Australia&#39;s privacy law framework empowers 
consumers, protects their data and supports the Australian economy.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;-moz-text-size-adjust: auto; -webkit-text-stroke-width: 0px; caret-color: rgb(0, 0, 0); color: black; font-style: normal; font-variant-caps: normal; font-weight: normal; letter-spacing: normal; text-align: start; text-decoration: none; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;span style=&quot;font-family: georgia;&quot;&gt; &lt;/span&gt;&lt;/span&gt;&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.cyberspac.com/feeds/965161722931056906/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/11089964/965161722931056906' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/11089964/posts/default/965161722931056906'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/11089964/posts/default/965161722931056906'/><link rel='alternate' type='text/html' href='http://www.cyberspac.com/2021/10/privacy-act-review-in-australia.html' title='Privacy Act Review in Australia'/><author><name>John Swinson</name><uri>http://www.blogger.com/profile/05828283754031385550</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjEEYfvtYKyOuw-wUOTTqXBYnEhznl0Qij3ZK7bLysUeHFsc6-agc7jRFnNmoYhX868_c4u30i8f7fmRio7EGV2enXnOKlYS4cSsM8fqYZa04QD0d7zmscvUiWK82t18g/s113/swinson_j.png'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-11089964.post-8124270056538143173</id><published>2021-10-24T09:07:00.002+10:00</published><updated>2021-10-24T09:07:41.661+10:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="audrp"/><category scheme="http://www.blogger.com/atom/ns#" term="domain names"/><category scheme="http://www.blogger.com/atom/ns#" term="RDNH"/><category scheme="http://www.blogger.com/atom/ns#" term="udrp"/><category scheme="http://www.blogger.com/atom/ns#" term="wipo"/><title type='text'>Non Specialist Lawyers Doing Domain Name Disputes - A big risk!</title><content type='html'>&lt;p&gt;In my opinion, there is a big risk using a non-specialist lawyer to run a domain name dispute under the UDRP or auDRP.&amp;nbsp; A recent example is the Brisbane law firm &lt;a href=&quot;https://www.dowdandco.com.au/index.php&quot; target=&quot;_blank&quot;&gt;Dowd &amp;amp; Co&lt;/a&gt; running a domain name dispute under the UDRP for a complainant.&amp;nbsp; Not only were they unsuccessful, there was a finding of Reverse Domain Name Hijacking (RDNH) against the Complainant, and resulting bad publicity.&lt;/p&gt;&lt;p&gt;The Panel stated:&lt;/p&gt;&lt;p style=&quot;margin-left: 40px; text-align: left;&quot;&gt;&quot;It is evident from the Complaint in this case that the Complainant has 
not fully appreciated the requirement to prove both registration and use
 in bad faith.... This Complaint was therefore doomed to fail at the outset as the 
Complainant could not prove registration in bad faith. The Complainant 
and/or its legal counsel should have appreciated this. A passing 
familiarity with Policy precedent on this issue (for example, as 
described in section 3.8 of the &lt;a href=&quot;https://www.wipo.int/amc/en/domains/search/overview3.0/&quot;&gt;WIPO Overview 3.0&lt;/a&gt;)
 is something that the Panel is entitled to expect from parties 
represented by legal counsel, and it is lacking here. Such familiarity 
would have caused the Complainant to be aware of its difficulties in 
pursuing the Complaint. A modicum of additional research would also have
 indicated to the Complainant that the Respondent itself had created and
 run a business by the name of “Streamline Servers”, well before 2009, 
and it therefore had a bona fide basis for registration of the disputed 
domain name.&quot;&lt;/p&gt;&lt;p style=&quot;text-align: left;&quot;&gt;Not something good to have on the public record against you.&lt;/p&gt;&lt;p style=&quot;text-align: left;&quot;&gt;See &lt;a href=&quot;https://www.wipo.int/amc/en/domains/search/text.jsp?case=D2021-2255&quot; target=&quot;_blank&quot;&gt;GSL Networks Pty Ltd. v. Domains By Proxy, LLC / Alex Alvanos, Bobservers, WIPO Case No. D2021-2255&lt;/a&gt;&lt;/p&gt;&lt;p style=&quot;text-align: left;&quot;&gt;See &lt;a href=&quot;https://domainnamewire.com/2021/10/11/australian-server-company-tries-reverse-domain-name-hijacking/&quot; target=&quot;_blank&quot;&gt;Domain Wire &lt;/a&gt;&lt;br /&gt;&lt;/p&gt;&lt;p style=&quot;text-align: left;&quot;&gt; &lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.cyberspac.com/feeds/8124270056538143173/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/11089964/8124270056538143173' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/11089964/posts/default/8124270056538143173'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/11089964/posts/default/8124270056538143173'/><link rel='alternate' type='text/html' href='http://www.cyberspac.com/2021/10/non-specialist-lawyers-doing-domain.html' title='Non Specialist Lawyers Doing Domain Name Disputes - A big risk!'/><author><name>John Swinson</name><uri>http://www.blogger.com/profile/05828283754031385550</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjEEYfvtYKyOuw-wUOTTqXBYnEhznl0Qij3ZK7bLysUeHFsc6-agc7jRFnNmoYhX868_c4u30i8f7fmRio7EGV2enXnOKlYS4cSsM8fqYZa04QD0d7zmscvUiWK82t18g/s113/swinson_j.png'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-11089964.post-5427323595457303684</id><published>2021-10-19T06:03:00.001+10:00</published><updated>2021-10-19T06:03:00.219+10:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="cybersecurity"/><category scheme="http://www.blogger.com/atom/ns#" term="cyberspace law and policy"/><category scheme="http://www.blogger.com/atom/ns#" term="insurance"/><title type='text'>Cyber Insurance</title><content type='html'>&lt;p&gt;An excellent paper on Cyber Insurance in Australia:&amp;nbsp; &quot;&lt;a href=&quot;https://cybersecuritycrc.org.au/sites/default/files/2021-10/Underwritten%20or%20oversold%20%20-%20DV.pdf&quot; target=&quot;_blank&quot;&gt;Underwritten or Oversold&lt;/a&gt;&quot;.&amp;nbsp; Well worth reading.&lt;/p&gt;&lt;p&gt;From the &lt;a href=&quot;https://cybersecuritycrc.org.au/&quot; target=&quot;_blank&quot;&gt;CSCRC &lt;/a&gt;(the Cyber Security Cooperative Research Centre).&lt;br /&gt;&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.cyberspac.com/feeds/5427323595457303684/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/11089964/5427323595457303684' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/11089964/posts/default/5427323595457303684'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/11089964/posts/default/5427323595457303684'/><link rel='alternate' type='text/html' href='http://www.cyberspac.com/2021/10/cyber-insurance.html' title='Cyber Insurance'/><author><name>John Swinson</name><uri>http://www.blogger.com/profile/05828283754031385550</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjEEYfvtYKyOuw-wUOTTqXBYnEhznl0Qij3ZK7bLysUeHFsc6-agc7jRFnNmoYhX868_c4u30i8f7fmRio7EGV2enXnOKlYS4cSsM8fqYZa04QD0d7zmscvUiWK82t18g/s113/swinson_j.png'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-11089964.post-4031022321123419543</id><published>2021-10-18T09:49:00.001+10:00</published><updated>2021-10-18T09:49:00.220+10:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="affilate"/><category scheme="http://www.blogger.com/atom/ns#" term="amazon"/><title type='text'>Affiliate Program Advertisers Must Take Care Not to be Misleading</title><content type='html'>&lt;p&gt;Many businesses run affiliate programs.&amp;nbsp; That is, a publisher or blogger will receive a commission for referring people to the website of the business.&lt;/p&gt;&lt;p&gt;For example, The Circle is a good novel that considers the future of social media, and I will receive a small commission if you buy The Circle from Amazon via this link:&amp;nbsp; &lt;a href=&quot;https://amzn.to/3pawSJK&quot;&gt;https://amzn.to/3pawSJK&lt;/a&gt;&amp;nbsp; Or better still, buy my book!&amp;nbsp; &lt;a href=&quot;https://amzn.to/3vl85Dy&quot;&gt;https://amzn.to/3vl85Dy&lt;/a&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;There are even affiliate programs for bitcoin purchases &lt;a href=&quot;https://app.bitcoinlatinum.com/invite?ref=UD03527&quot;&gt;https://app.bitcoinlatinum.com/invite?ref=UD03527&lt;/a&gt; &lt;br /&gt;&lt;/p&gt;&lt;p&gt;Amazon recently emailed the following to their affiliate program members (which they call an Associates Program), to ensure that the affiliate is not acting in a misleading way (which is not uncommon):&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;-webkit-text-size-adjust: auto; -webkit-text-stroke-width: 0px; background-color: white; caret-color: rgb(0, 0, 0); color: black; display: inline !important; float: none; font-family: Arial, sans-serif; font-size: 14px; font-style: normal; font-variant-caps: normal; font-weight: normal; letter-spacing: normal; orphans: auto; text-align: -webkit-left; text-decoration: none; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px;&quot;&gt;This is a recurring reminder that any time you share an associate link, it’s important to disclose that to your audience. They will trust you more if you are transparent about where you are directing them and why. To meet the Associate Program’s requirements, you must (1) include a legally compliant disclosure with your links and (2) identify yourself on your Site as an Amazon Associate with the language required by the Operating Agreement.&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;-webkit-text-size-adjust: auto; -webkit-text-stroke-width: 0px; caret-color: rgb(0, 0, 0); color: black; font-family: Arial, sans-serif; font-size: 14px; font-style: normal; font-variant-caps: normal; font-weight: normal; letter-spacing: normal; orphans: auto; text-align: -webkit-left; text-decoration: none; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px;&quot;&gt;To comply with Federal Trade Commission (FTC) regulations, your link-level disclosure must be:&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;-webkit-text-size-adjust: auto; -webkit-text-stroke-width: 0px; caret-color: rgb(0, 0, 0); color: black; font-family: Arial, sans-serif; font-size: 14px; font-style: normal; font-variant-caps: normal; font-weight: normal; letter-spacing: normal; orphans: auto; text-align: -webkit-left; text-decoration: none; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px;&quot;&gt;1. Clear. A clear disclosure could be as simple as “(paid link)”, “#ad” or “#CommissionsEarned”.&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;-webkit-text-size-adjust: auto; -webkit-text-stroke-width: 0px; caret-color: rgb(0, 0, 0); color: black; font-family: Arial, sans-serif; font-size: 14px; font-style: normal; font-variant-caps: normal; font-weight: normal; letter-spacing: normal; orphans: auto; text-align: -webkit-left; text-decoration: none; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px;&quot;&gt;2. Conspicuous. It should be placed near any associate link or product review in a location that customers will notice easily. They shouldn’t have to hunt for it.&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;-webkit-text-size-adjust: auto; -webkit-text-stroke-width: 0px; caret-color: rgb(0, 0, 0); color: black; font-family: Arial, sans-serif; font-size: 14px; font-style: normal; font-variant-caps: normal; font-weight: normal; letter-spacing: normal; orphans: auto; text-align: -webkit-left; text-decoration: none; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px;&quot;&gt;In addition, the Operating Agreement requires that the following statement clearly and conspicuously appears on your Site: “As an Amazon Associate I earn from qualifying purchases.” For social media user-generated content, this statement must be associated with your account.&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;-webkit-text-size-adjust: auto; -webkit-text-stroke-width: 0px; caret-color: rgb(0, 0, 0); color: black; font-family: Arial, sans-serif; font-size: 14px; font-style: normal; font-variant-caps: normal; font-weight: normal; letter-spacing: normal; orphans: auto; text-align: -webkit-left; text-decoration: none; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px;&quot;&gt;To read more about the FTC Endorsement Guides, visit:&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;https://smile.amazon.com/gp/f.html?C=1VPQ7MC8R1RL2&amp;amp;K=3KM1ZHALQLTZ8&amp;amp;M=urn:rtn:msg:20211013180423997eafbced02497ebc88ada46350p0na&amp;amp;R=1T33PF9Y0DNBJ&amp;amp;T=C&amp;amp;U=https%3A%2F%2Fwww.ftc.gov%2Ftips-advice%2Fbusiness-center%2Fguidance%2Fftcs-endorsement-guides-what-people-are-asking%23affiliate&amp;amp;H=QOFGFXFXAYJT52V0OC5JCAJXXKSA&quot;&gt;https://www.ftc.gov/tips-advice/business-center/guidance/ftcs-endorsement-guides-what-people-are-asking#affiliate&lt;/a&gt;.&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;-webkit-text-size-adjust: auto; -webkit-text-stroke-width: 0px; caret-color: rgb(0, 0, 0); color: black; font-family: Arial, sans-serif; font-size: 14px; font-style: normal; font-variant-caps: normal; font-weight: normal; letter-spacing: normal; orphans: auto; text-align: -webkit-left; text-decoration: none; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px;&quot;&gt;Visit this&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;https://smile.amazon.com/gp/f.html?C=1VPQ7MC8R1RL2&amp;amp;K=3KM1ZHALQLTZ8&amp;amp;M=urn:rtn:msg:20211013180423997eafbced02497ebc88ada46350p0na&amp;amp;R=WL1C3UFQ6AY8&amp;amp;T=C&amp;amp;U=https%3A%2F%2Faffiliate-program.amazon.com%2Fhelp%2Fnode%2Ftopic%2FGHQNZAU6669EZS98%3Fref_%3Dpe_3519780_607717750&amp;amp;H=GRGCAIKGHSJGD2KJX21RAHASROIA&amp;amp;ref_=pe_3519780_607717750&quot;&gt;page&lt;/a&gt;&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;on AC to bookmark this information about disclosures.&lt;span class=&quot;Apple-converted-space&quot;&gt; &lt;br /&gt;&lt;/span&gt;&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.cyberspac.com/feeds/4031022321123419543/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/11089964/4031022321123419543' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/11089964/posts/default/4031022321123419543'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/11089964/posts/default/4031022321123419543'/><link rel='alternate' type='text/html' href='http://www.cyberspac.com/2021/10/affiliate-program-advertisers-must-take.html' title='Affiliate Program Advertisers Must Take Care Not to be Misleading'/><author><name>John Swinson</name><uri>http://www.blogger.com/profile/05828283754031385550</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjEEYfvtYKyOuw-wUOTTqXBYnEhznl0Qij3ZK7bLysUeHFsc6-agc7jRFnNmoYhX868_c4u30i8f7fmRio7EGV2enXnOKlYS4cSsM8fqYZa04QD0d7zmscvUiWK82t18g/s113/swinson_j.png'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-11089964.post-7270970653958858423</id><published>2021-10-17T18:13:00.013+10:00</published><updated>2021-10-17T18:13:00.194+10:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="censorship"/><category scheme="http://www.blogger.com/atom/ns#" term="China"/><category scheme="http://www.blogger.com/atom/ns#" term="freedom"/><category scheme="http://www.blogger.com/atom/ns#" term="microsoft"/><category scheme="http://www.blogger.com/atom/ns#" term="speech"/><title type='text'>LinkedIn to Pull Out of China</title><content type='html'>&lt;p&gt;&lt;span style=&quot;-webkit-text-size-adjust: auto; -webkit-text-stroke-width: 0px; caret-color: rgb(51, 51, 51); color: #333333; font-family: georgia, serif; font-size: inherit; font-style: normal; font-variant-caps: normal; font-weight: 700; letter-spacing: normal; orphans: auto; text-align: -webkit-left; text-decoration: none; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px;&quot;&gt;LinkedIn said it would end service in China&lt;/span&gt;&lt;span style=&quot;-webkit-text-size-adjust: auto; -webkit-text-stroke-width: 0px; background-color: white; caret-color: rgb(51, 51, 51); color: #333333; display: inline !important; float: none; font-family: georgia, serif; font-size: 17px; font-style: normal; font-variant-caps: normal; font-weight: normal; letter-spacing: normal; orphans: auto; text-align: -webkit-left; text-decoration: none; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px;&quot;&gt;&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;after the platform censored posts to keep operating but still came under government scrutiny.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;-webkit-text-size-adjust: auto; -webkit-text-stroke-width: 0px; background-color: white; caret-color: rgb(51, 51, 51); color: #333333; display: inline !important; float: none; font-family: georgia, serif; font-size: 17px; font-style: normal; font-variant-caps: normal; font-weight: normal; letter-spacing: normal; orphans: auto; text-align: -webkit-left; text-decoration: none; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px;&quot;&gt;&quot;&lt;/span&gt;&lt;span style=&quot;-webkit-text-size-adjust: auto; -webkit-text-stroke-width: 0px; background-color: white; caret-color: rgb(51, 51, 51); color: #333333; display: inline !important; float: none; font-family: georgia, serif; font-size: 17px; font-style: normal; font-variant-caps: normal; font-weight: normal; letter-spacing: normal; orphans: auto; text-align: -webkit-left; text-decoration: none; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px;&quot;&gt;The operating environment in China has also become more difficult. Since
 President Xi Jinping took the reins of the Communist Party in 2012, he 
has repeatedly cracked down on what can be said online. Presiding over 
the rising power of the Cyberspace Administration of China, the 
country’s internet regulator, Mr. Xi turned China’s internet from a 
place where some sensitive topics were censored to one where critics 
face arrests for a constantly shifting set of infractions, like jokes at
 Mr. Xi’s expense. &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;-webkit-text-size-adjust: auto; -webkit-text-stroke-width: 0px; background-color: white; caret-color: rgb(51, 51, 51); color: #333333; display: inline !important; float: none; font-family: georgia, serif; font-size: 17px; font-style: normal; font-variant-caps: normal; font-weight: normal; letter-spacing: normal; orphans: auto; text-align: -webkit-left; text-decoration: none; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px;&quot;&gt;See &lt;a href=&quot;https://www.nytimes.com/2021/10/14/technology/linkedin-china-microsoft.html&quot; target=&quot;_blank&quot;&gt;NYTimes&lt;/a&gt;&amp;nbsp; and &lt;a href=&quot;https://www.scmp.com/news/china/article/3152391/microsofts-linkedin-job-site-says-it-will-shut-operations-china-citing&quot; target=&quot;_blank&quot;&gt;South China Morning Post&lt;/a&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.cyberspac.com/feeds/7270970653958858423/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/11089964/7270970653958858423' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/11089964/posts/default/7270970653958858423'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/11089964/posts/default/7270970653958858423'/><link rel='alternate' type='text/html' href='http://www.cyberspac.com/2021/10/linkedin-to-pull-out-of-china.html' title='LinkedIn to Pull Out of China'/><author><name>John Swinson</name><uri>http://www.blogger.com/profile/05828283754031385550</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjEEYfvtYKyOuw-wUOTTqXBYnEhznl0Qij3ZK7bLysUeHFsc6-agc7jRFnNmoYhX868_c4u30i8f7fmRio7EGV2enXnOKlYS4cSsM8fqYZa04QD0d7zmscvUiWK82t18g/s113/swinson_j.png'/></author><thr:total>0</thr:total></entry></feed>