<?xml version="1.0" encoding="UTF-8" standalone="yes"?>
<?xml-stylesheet href="/css/rss20.xsl" type="text/xsl"?>
<rss version="2.0" xmlns:media="http://search.yahoo.com/mrss/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:s="http://www.zdnet.com/search" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd">
	<channel>
		<link>http://www.zdnet.com/</link>
		<title>ZDNet | Lawgarithms Blog RSS</title>
		<description>Latest blogs in Lawgarithms</description>
		<language>en</language>
		<copyright>ZDNet</copyright>
		<managingEditor>http://www.zdnet.com/meet-the-team/</managingEditor>
		<webMaster>http://www.zdnet.com/meet-the-team/</webMaster>
		<pubDate>Wed, 07 Aug 2013 10:52:11 -0700</pubDate>
		<lastBuildDate>Wed, 07 Aug 2013 10:52:11 -0700</lastBuildDate>
		<docs>http://blogs.law.harvard.edu/tech/rss</docs>
		<ttl>2</ttl>
		<image>
			<url>http://i.zdnet.com/images/spry/zdnet_300x300.jpg</url>
			<link>http://www.zdnet.com/</link>
			<title>ZDNet | Lawgarithms Blog RSS</title>
			<width>143</width>
			<height>39</height>
		</image>
		<s:counts>
			<start>0</start>
			<return>20</return>
			<found>160</found>
		</s:counts>
		<item>
			<guid isPermaLink="false">6056000711</guid>
			<link><![CDATA[http://www.zdnet.com/blog/howell/touched-by-the-tsa/711]]></link>
			<title><![CDATA[Touched by the TSA]]></title>
			<description><![CDATA[Time was when having "the talk" with your kids meant the birds and the bees. Nowadays parents also have to be ready to explain shoe- and underwear-bombers, molotov toothpaste, and the touchy-feely TSA. <br clear="both" style="clear: both;"/>
<br clear="both" style="clear: both;"/>
<a href="http://ads.pheedo.com/click.phdo?s=cdad5f4fbe5019a5b63cc74479fb964c&p=1"><img alt="" style="border: 0;" border="0" src="http://ads.pheedo.com/img.phdo?s=cdad5f4fbe5019a5b63cc74479fb964c&p=1"/></a>
<img alt="" height="0" width="0" border="0" style="display:none" src="http://tags.bluekai.com/site/5148"/><img alt="" height="0" width="0" border="0" style="display:none" src="http://insight.adsrvr.org/track/evnt/?ct=0:8pyu3gz&adv=wouzn4v&fmt=3"/>]]></description>
			<pubDate><![CDATA[Wed, 17 Nov 2010 07:37:48 +0000]]></pubDate>
			<media:credit role="author"><![CDATA[Denise Howell]]></media:credit>
			<s:doctype><![CDATA[Text]]></s:doctype>
			<media:text type="html"><![CDATA[<p><a title="Touched by the TSA" href="http://www.flickr.com/photos/fotoecke/4055940421/" target="_blank"><img  /></a>Stop the security line, I want to get off.  And I'm taking my kid with me.
</p>

<p>It was bad enough while he was a baby.  I wouldn't take my glands, and thus my child, through an airport scanner while I was lactating.  Pretty basic stuff:  you do your best to keep tequila, tobacco, and tachyons away from your child and this elixir he's drinking that's supposed to be nothing short of the <a href="http://en.wikipedia.org/wiki/Water_of_Life_%28Dune%29">Water of Life</a>.  (Hold your talkbacks, I don't actually think body scanners involve tachyons, but accuracy must sometimes be sacrificed on the altar of alliteration - not to mention loading a single sentence with both <a href="http://en.wikipedia.org/wiki/Tachyons_in_fiction">Star Trek</a> and Dune allusions.)  So we're no strangers to "we'll take the pat-down" interludes at airports, at least in the good old days that involved a wand and a sticker for the little guy if he managed not to bolt from the area.
</p>

<p>As he got older, he began to notice the inconvenience and ridiculousness of padding through the scanner area in stocking feet.  And you can bet when something is both inconvenient and ridiculous, my kid wants answers.  Did I <a href="http://en.wikipedia.org/wiki/Richard_Reid_%28shoe_bomber%29">thoroughly explain</a> why we must bid adieu to our footwear?  Um, no.  My son still flees the room in terror when Snoopy rises as the Great Pumpkin.  He is simply not equipped (yet?) to handle the notion of being surrounded by potentially lethal Skechers.
</p>

<p>Then there was The Sunscreen Incident.  It coincided with that stage, around three years of age, when kids start to get really possessive and particular about Their Stuff.  Of course it was all my fault.  It was a return flight, and I was either trying to streamline things by not checking bags this one time, or I'd simply forgotten there was a nearly-empty spray can of sunblock in his carry-on.  Out it came, away it went, and I'll wager that day's entire TSA shift is wistful for when they used to have eardrums.  "Why mom, why did they take my sunscreen?"  I have a hard enough time getting him to <em>use</em> the stuff, not to mention shampoo and toothpaste - so no, I did not go into great detail about the foiling of the <a href="http://blog.tsa.gov/2010/08/talk-to-tsa-response-are-liquids-really.html">UK Liquids Plot</a>.  (Though as I write this, I realize that if he thought he could whip up something explosive with his various hygienic, protective, and cleansing liquids, my child might actually take a shine to them.  Hmm, some rethinking could be in order.)
</p>

<p>Though my days of toting bodies and bottles full of breast milk through airports are well and thankfully over, given the new <a href="http://www.npr.org/blogs/health/2010/11/12/131275949/protests-mount-over-safety-and-privacy-of-airport-scanners">AIT scanners</a>, to the extent I choose to fly at all any more, I will be opting out of them and for the new, <a href="http://www.msnbc.msn.com/id/40136368/ns/travel-news/">more invasive pat-down</a> - but that means so will my kid.
</p>

<p>Terrible timing, TSA.  One of the first things the little guys have to learn in Cub Scouts <a href="http://www.guardian.co.uk/world/2010/apr/29/boy-scouts-sexual-abuse-dykes">these days</a> is a whole mess of process and procedure about "dangerous situations" and "inappropriate touching."  Per the Cub Scout Tiger Cub Handbook,
</p>
<blockquote>
<p>It's your body and you have the right to say no to anyone who tries to touch you in places covered by your swimming suit or to do things that you think are wrong.</p>
</blockquote>
<p>
Given that my child tends to take these things pretty literally, and to append "AT THE TOP OF MY LUNGS" to any assurance he has the right to say no, I feel terrible for the poor TSA agents who draw us on our next trip.  I may bring along cotton batting for their ears - assuming that's not a banned substance by then.  Just today TSA announced a "<a href="http://www.boston.com/business/articles/2010/11/17/no_exemption_from_scans_pat_downs/">modified pat-down</a>" for travelers 12 and under, but I haven't found any description or account of how that will work.  Let's hope it leaves swimming suits completely out of the conversation.
</p>

<p>Another thing no one warned me about when I became a parent:  that you either have to explain to your kids about people who want to blow them up, and others who want to (or are paid to) feel them up, or else be reckless and irresponsible with their safety, and unresponsive and unhelpful to their  curiosity.  There should be a "none of the above" option there, but sadly, there's not.
</p>

<p>At least while we're waiting to see how much patting goes down, I can take solace in the fact I chose that option.  Apparently, for families with kids who simply can't stand still long enough for the AIT scanners to work, <a href="http://cbs4denver.com/news/tsa.airport.security.2.2012360.html">the choice is made for them</a>.
</p>

<p>If you're a car dealer or auto mechanic, you've seldom heard such good news.  For the rest of us?  Not so much.
</p>

<p>More: Adrian Kingsley-Hughes, <a href="http://www.zdnet.com/blog/hardware/body-scanner-saved-35000-naked-images/10362">Body scanner saved 35,000 'naked' images</a>
</p>

<p><strong>Update</strong>: We delved further into this topic <a href="http://twit.tv/twil87">today (11/19/10) on This WEEK in LAW</a>, with panelists <a href="http://lisaborodkin.com/">Lisa Borodkin</a>, <a href="http://blog.internetcases.com/">Evan Brown</a>, and <a href="http://about.me/balasubramani">Venkat Balasubramani</a>.
</p>

<p>[poll id="12"]
</p>

<p>(<em>Image by </em><em><a href="http://www.flickr.com/photos/fotoecke/4055940421/">anja_johnson</a>, <a href="http://creativecommons.org/licenses/by/2.0/deed.en-us">CC Attribution-2.0</a></em>)
</p>]]></media:text>
		</item>
		<item>
			<guid isPermaLink="false">6056000658</guid>
			<link><![CDATA[http://www.zdnet.com/blog/howell/video-kinect-the-telepresent-under-the-tree/658]]></link>
			<title><![CDATA[Video Kinect: The telepresent under the tree]]></title>
			<description><![CDATA[Easter eggs in December? When Santa brings the XBox Kinect, cheap, sophisticated video conferencing comes along for the ride.]]></description>
			<pubDate><![CDATA[Tue, 09 Nov 2010 19:37:40 +0000]]></pubDate>
			<media:credit role="author"><![CDATA[Denise Howell]]></media:credit>
			<s:doctype><![CDATA[Text]]></s:doctype>
			<category domain="http://www.zdnet.com/topic-enterprise-software/">Enterprise Software</category>
			<category domain="http://www.zdnet.com/topic-hardware/">Hardware</category>
			<category domain="http://www.zdnet.com/topic-mobility/">Mobility</category>
			<media:text type="html"><![CDATA[<p><a title="Video Kinect: The telepresent under the tree" href=http://www.xbox.com/en-US/Live/VideoKinect target="_blank"><img src="http://cdn-static.zdnet.com/i/story/60/56/000658/vidkinect.jpg" width="160" height="120" alt="Video Kinect: The telepresent under the tree" title="Video Kinect: The telepresent under the tree" align="right" /></a>Over the weekend I picked up our <a href="http://www.xbox.com/en-US/Xbox360/Accessories/Kinect/kinectforxbox360">Kinect Sensor</a>; at $149 including a the <a href="http://marketplace.xbox.com/en-US/Product/Kinect-Adventures/66acd000-77fe-1000-9115-d8024d5308ed">Kinect Adventures</a> game, it was a no-brainer addition to our existing XBox 360.  After a few obligatory but brief software updates and a simple camera and audio calibration process, Kinect is humming along beautifully and I'm basking in the glow of family gratitude and kudos for my A/V installation skills (hey, I can insert a USB cable with the best of them).
</p>

<p>But there was an odd dj vu every time I looked at the new sensor/mic/camera contraption.  I'd seen something like this before...but where?  Then it hit me:  in a far distant time and context, at conference tables seating 40 or more, little devices like this had been the kind of whoppingly pricey infrastructure investment that drove law firm partners to distraction.  The Kinect sensor looks just like an enterprise video conferencing device.
</p>

<p>As it turns out, the Kinect doesn't just look like a duck, it quacks like one too - or rather, it leaves the quacking to you, and tracks you through the room should you also be seized by the urge to waddle.  Video Kinect is the kind of impressive that's difficult to convey: it's like Microsoft has buckled a little time-travel wormhole onto the XBox, that when accessed shoots you a quarter-century ahead.  Kinect's auto-zoom focus finds you and follows you around the room, if necessary.  The mic just works, picking up intonations and inflections from over eight feet away.  It's really, really cool.
</p>

<p><object classid="clsid:d27cdb6e-ae6d-11cf-96b8-444553540000" width="450" height="300" codebase="http://download.macromedia.com/pub/shockwave/cabs/flash/swflash.cab#version=6,0,40,0"><param name="allowFullScreen" value="true" /><param name="allowscriptaccess" value="always" /><param name="src" value="http://www.youtube.com/v/35KpZ8kPsb0?fs=1&amp;hl=en_US" /><embed type="application/x-shockwave-flash" width="450" height="300" src="http://www.youtube.com/v/35KpZ8kPsb0?fs=1&amp;hl=en_US" allowscriptaccess="always" allowfullscreen="true"></embed></object>
</p>

<p>And as these things go, it's a really, really cheap addition to a device a lot of people already own.  If the Cisco Umi was <a href="http://www.zdnet.com/blog/btl/cisco-logitech-botch-most-important-digital-living-room-spec-price/40172">doomed</a> before, Video Kinect just drank its milkshake.  Video Kinect requires an XBox Live Gold subscription (that's $9.99 US/month, or $59.99/year), and it's a $149 hardware addition to any of the <a href="http://www.joystiq.com/2010/01/06/xbox-by-the-numbers-20m-xbox-live-users-10m-nongaming-39m-xbo/">39 million</a> XBox 360 consoles out there in the world.  Compare Umi, at four times as much for the hardware, and five times as much for the service - and no river-rafting or Netflix.  <a href="http://www.zdnet.com/blog/perlow/why-personal-telepresence-will-fail-it-aint-the-price/14136">Jason Perlow is probably right</a> that we're not likely to see a rush to telepresence systems as ends in themselves.  But tack cheap, sophisticated video conferencing onto an already popular entertainment platform and you've got a win.  Old skool video conferencing connects dispersed employees over long distances.  Families, friends, and small businesses will want to do this too if it's suddenly and incidentally just there for them, untethered from desk and computer monitor.
</p>

<p>I mention small businesses because the business appeal of videoconferencing this cheap and full-featured is undeniable, but so are XBox Live's terms of service:  "You must not...use the Service for commercial purposes (except as expressly permitted by us)."  (The <a href="http://www.xbox.com/en-US/legal/codeofconduct">Code of Conduct</a> bars commercial use too.)  But <a href="http://www.zdnet.com/blog/hardware/do-you-read-eulas/10259">nobody</a> reads those things anyway right?
[poll id="11"]
</p>]]></media:text>
		</item>
		<item>
			<guid isPermaLink="false">6056000578</guid>
			<link><![CDATA[http://www.zdnet.com/blog/howell/four-legal-predictions-for-foursquare/578]]></link>
			<title><![CDATA[Four legal predictions for Foursquare]]></title>
			<description><![CDATA[Checking in? Check out how law and businesses will respond to the rise of location services.]]></description>
			<pubDate><![CDATA[Mon, 08 Nov 2010 13:03:47 +0000]]></pubDate>
			<media:credit role="author"><![CDATA[Denise Howell]]></media:credit>
			<s:doctype><![CDATA[Text]]></s:doctype>
			<category domain="http://www.zdnet.com/topic-legal/">Legal</category>
			<media:text type="html"><![CDATA[<p><a title="Four legal predictions for Foursquare" href="http://www.foursquare.com" target="_blank"><img src="http://cdn-static.zdnet.com/i/story/60/56/000578/4sq.jpg" width="160" height="120" alt="Four legal predictions for Foursquare" title="Four legal predictions for Foursquare" align="left" /></a>While the percentage of people actively sharing their location <a href="http://www.zdnet.com/blog/btl/where-are-you-will-anyone-answer-that-question-on-the-internet/41294">may still be pretty small</a>, it feels like we're zooming toward an event horizon, beyond which everyone will be opting in - and checking in - to location services like <a href="http://foursquare.com">Foursquare</a>, <a href="http://www.zdnet.com/blog/btl/facebook-upgrades-mobile-platform-brings-two-way-interactions-to-phones/41227">Places</a>, and <a href="http://bdnooz.com/lbsn-location-based-social-networking-links/">others</a>. Skeptics about the uptake of location services remain, but I'm not one of them.   You might, like Sam Diaz, <a href="http://www.zdnet.com/blog/btl/facebook-deals-bargains-are-enticing-to-those-whove-resisted-location-based-services/41262">appreciate a good deal</a> (count me in on that point too).  Or perhaps you're a parent in search of an impromptu play date, a businessperson in search of leads or networking, a hipster in search of the night's hotspot, a <a href="http://scobleizer.com/">techie</a> who enjoys <a href="http://www.youtube.com/watch?v=dI_23eUCy9c">following in Mark Zuckerberg's culinary wake</a>, or anyone attempting to sync up with a friend or colleague's schedule and connect in the real world.
</p>

<p><a title="Four legal predictions for Foursquare" href="http://www.flickr.com/photos/thetalesend/5113541454/" target="_blank"><img src="http://cdn-static.zdnet.com/i/story/60/56/000578/teeter.jpg" width="160" height="120" alt="Four legal predictions for Foursquare" title="Four legal predictions for Foursquare" align="right" /></a>Like other online activities, location sharing's privacy tradeoff ultimately is (or will be, for a great many) overcome by its payoff in convenience, perks, and timely, relevant information. Unlike many other online activities though, location sharing begins and ends in the real world, inherently carrying with it the goal - and of course the dangers - of real world encounters and consequences. Given this, it's inevitable we'll see the following on the legal front:
</p>
<ol>
<li><strong>Location-savvy privacy standards and penalties.</strong> Facebook initially drew us in by providing away to share personal information and media with trusted, contextually appropriate others. Location services offer the same promise, and ask for the same kind of trust: namely, that data routing and user sharing expectations will match up. Such services might yet be on the periphery of lawmakers' vision, but they'll react quickly once the consequences of a data leak or user confusion begin to include crimes that make identity theft look quaint by comparison: rape, murder, home invasion, kidnapping, and the like. And those interested in your insurability, creditworthiness, or <a href="http://www.nydailynews.com/news/world/2009/11/22/2009-11-22_nathalie_blanchard_loses_benefits_over_facebook_beach_photos.html">eligibility for benefits</a> certainly would like to check out your check-in data - if they can get it.  In the U.S., look for <a href="http://www.privacyprotection.ca.gov/">states</a> and the <a href="/the Children’s Online Privacy Protection Act">federal</a> government to implement stricter standards and penalties for sites that accidentally leak location data, or fail to clearly inform users when they're about to share such data publicly or in a new context. The EU is in the process of <a href="http://www.out-law.com/page-11527">overhauling its data privacy protection</a> laws as we speak, in response to the expanding universe of tools that let users "share information about their behaviour and preferences easily and make it publicly and globally available on an unprecedented scale."</li>
<li><strong>Service-side restrictions on employee check-ins.</strong> As <a href="http://www.zdnet.com/blog/btl/facebook-deals-bargains-are-enticing-to-those-whove-resisted-location-based-services/41262">Sam points out</a> and Facebook illustrated last week, people like deals, businesses like customers, and fundamental to the location service business model is the ability to play transactional matchmaker.  Sprinkle liberally with <a href="http://mashable.com/2010/07/13/game-mechanics-business/">game mechanics</a> and you've got a time-and-place sensitive loyalty program - but not if employees skew the numbers by checking in each time they show up for work.  Look for location services to fine-tune their terms of service, their in-game incentive system, or both, to help ensure the leads they deliver to advertisers are actually potential customers.</li>
<li><strong>Employer-side restrictions on employee check-ins.</strong> Just as employers begin to get a handle on employee blogging, tweeting and Facebooking, in roar location services.  The "employee mayor" throwing a wrench into one's marketing program is just the tip of the iceberg.  Oh, you say our VP of Sales is mayor of the Pleasure Chest, and our chief engineer just checked again in at HQ of that company we're not supposed to be partnering with?  Legal, please...</li>
<li><strong>Geo-located "paper" trails as evidence.</strong> Lawyers and litigants in civil and criminal disputes now have a whole new way of answering the question, "Where were you on the night of September 12?"  An individual's check-in history will be subject to subpena and disclosure regardless of the person's privacy settings if whereabouts or behavior are at issue in court proceedings.  That "<a href="http://www.4squarebadges.com/foursquare-badge-list/crunked-badge/">Crunked</a>" badge might not play so well in child custody proceedings.  Working on an alibi?  Let's hope you didn't check in at the crime scene (or, if you've checked in elsewhere, let's hope you can establish it can't be faked).</li>
</ol>
<p>
As location services grow in popularity, they add new texture and detail to what is known and knowable about us.  Our <a href="http://www.newsweek.com/2010/10/22/forget-privacy-what-the-internet-knows-about-you.html">online</a> and <a href="http://www.eff.org/wp/locational-privacy">offline</a> activities already are fairly well documented.  By voluntarily adding records of our daily movements to the mix, we are giving law and policy makers new challenges to try to guard against unfair or dangerous use of this information.
</p>

<p>(<em>Image by </em><em><a href="http://www.flickr.com/photos/thetalesend/5113541454/">thetalesend</a>, <a href="http://creativecommons.org/licenses/by/2.0/deed.en-us">CC Attribution-2.0</a></em>)
</p>]]></media:text>
		</item>
		<item>
			<title><![CDATA[A Special Offer From Our Sponsor]]></title>
			<link>http://ads.pheedo.com/click.phdo?s=77f947a80c2dc3bde84dcb93ea01861b&amp;p=4</link>
			<guid isPermaLink="false">77f947a80c2dc3bde84dcb93ea01861b</guid>
			<description><![CDATA[<a href="http://ads.pheedo.com/click.phdo?s=77f947a80c2dc3bde84dcb93ea01861b&amp;p=4"><img alt="" style="border: 0;" border="0" src="http://ads.pheedo.com/img.phdo?s=77f947a80c2dc3bde84dcb93ea01861b&amp;p=4"/></a>]]></description>
			<pubDate><![CDATA[Mon, 08 Nov 2010 13:03:47 +0000]]></pubDate>
		</item>
		<item>
			<guid isPermaLink="false">6056000494</guid>
			<link><![CDATA[http://www.zdnet.com/blog/howell/bill-would-let-u-s-kill-allegedly-infringing-sites-without-trial-immunize-isps/494]]></link>
			<title><![CDATA[Bill would let U.S. kill allegedly infringing sites without trial, immunize ISPs]]></title>
			<description><![CDATA[Proposed new legislation would strip domain access from sites 'dedicated to infringing activities,' cutting through the red tape of due process, sovereignty, and property rights.]]></description>
			<pubDate><![CDATA[Tue, 21 Sep 2010 13:54:56 +0000]]></pubDate>
			<media:credit role="author"><![CDATA[Denise Howell]]></media:credit>
			<s:doctype><![CDATA[Text]]></s:doctype>
			<media:text type="html"><![CDATA[<p><a title="Bill would let U.S. kill allegedly infringing sites without trial, immunize ISPs" href="http://www.flickr.com/photos/kthread/4300688059/" target="_blank"><img src="http://cdn-static.zdnet.com/i/story/60/56/000494/blindfold.jpg" width="160" height="120" alt="Bill would let U.S. kill allegedly infringing sites without trial, immunize ISPs" title="Bill would let U.S. kill allegedly infringing sites without trial, immunize ISPs" align="left" /></a>Recently I've gotten a lot of mail from concerned people wondering whether the Obama administration has <a href="http://thehill.com/blogs/hillicon-valley/technology/116839-lawmakers-frustrated-by-internet-qkill-switchq-reports">secreted an "Internet kill switch" into a pending cybersecurity bill</a>. As of yesterday, I can tell them: right needle, wrong haystack.
</p>

<p>While it's apparently debatable whether the U.S. government already has the ability to shut sites down, proponents of the just-introduced Combating Online Infringement and Counterfeits Act (<a href="http://judiciary.senate.gov/legislation/upload/CombatingOnlineInfringementAndCounterfeitsAct.pdf">PDF</a>) don't want there to be any confusion on the point: if this law is passed, it will. Not in the name of national security, but instead to protect the economic interests of U.S. intellectual property owners.
</p>

<p>To put things in context, it's no secret aggressive enforcement by U.S. rightsholders in the entertainment, software, and other industries has driven online traffic in infringing material offshore. In May, the Congressional Anti-Piracy Caucus <a href="http://hatch.senate.gov/public/index.cfm?FuseAction=PressReleases.Detail&amp;PressRelease_id=b109414b-1b78-be3e-e0b8-34869d0477c4&amp;Month=5&amp;Year=2010">named</a> China,  Russia, Mexico, Canada and Spain -- home of some of the top file-sharing sites -- as its primary Axis of Evil, and of course Sweden, which houses the <a href="http://en.wikipedia.org/wiki/The_Pirate_Bay#Legal_issues">uber</a>-<a href="http://en.wikipedia.org/wiki/The_Pirate_Bay#Blocking">resilient</a> Pirate Bay, gets an honorable mention on any such list. The legislation introduced yesterday is evidence of a lightbulb going off over someone's head on the enforcement side of this <a href="http://en.wikipedia.org/wiki/File_sharing_timeline">struggle</a>: though the U.S. lacks jurisdiction and control over far-flung Web hosts and ISPs, it <em>has</em> jurisdiction over the <a href="http://en.wikipedia.org/wiki/Domain_name_registry">registries</a> for the .com (VeriSign), .net (VeriSign), and .org (the Public Interest Registry) domains, and various other TLDs. "Let's use it," the rightsholders have declared.
</p>

<p>Under this proposed new law, in light of the dominance of U.S. firms in the domain registry arena, U.S. rightsholders would be able to effectively flip the kill switch on sites offering allegedly infringing material without having to rely on the cooperation of <a href="http://travel.state.gov/law/judicial/judicial_691.html">pesky foreign governments and courts</a>. Here's how Keith Kupferschmid, Senior Vice President for Intellectual Property Policy &amp; Enforcement at <a href="http://www.siaa.net/">SIIA</a>, put it:
</p>
<blockquote>
<p>The legislation not only strengthens the DOJ’s ability to shut down individual domains; it also gives authorities the power to cut piracy off at the source by eliminating critical technical and financial resources. SIIA runs the industry’s most aggressive anti-piracy program, and we believe the legislation introduced today could greatly extend our reach and ability to thwart piracy – especially operations taking place on foreign websites.</p>
</blockquote>
<p>
Once the Justice Department concurred that a particular site was "dedicated to infringing activities," here's how it would work:
</p>
<ul>
<li>The U.S. Attorney General institutes an <em>in rem</em> action against the site in question. <em>In rem</em> actions are actions <a href="http://supreme.justia.com/constitution/amendment-14/41-actions-in-rem.html">directly against a property interest</a>. Here, the property is the target site's domain name.</li>
<li>If the domain's registry OR registrar is located within the U.S. (remember, that's <em>all</em> .coms, .nets, and .orgs), the action is to be brought in the local jurisdiction of the registrar or registry (<em>e.g.</em>, VeriSign is headquartered in Dulles, VA).</li>
<li>If the domain's registry or registrar is not located within the U.S., the action may be brought in the District of Columbia.</li>
<li>Once the action is commenced, the Attorney General can apply for injunctive relief "against the domain name used by an Internet site dedicated to infringing activities, to cease and desist from undertaking any infringing activity...." There's no need for a trial to get the injunction; it can be issued immediately if the court is satisfied with the A.G.'s showing. And there's no call for a jury to be involved in granting the relief; injunctive relief is equitable in nature, and is dispensed by a judge only, no jury.</li>
<li>Once the injunction issues, it's game over for the target site. If its registry or registrar is within the U.S., the order enjoining use of the domain by the site is simply served on that entity and -- POOF! No more site. The proposed law also anticipates that target sites will scramble for new identities, and makes it easy to expand the injunction to other domain names as needed.</li>
<li>If the registry and registrar are <em>both</em> outside the U.S. -- and since that excludes all .coms, .nets, and .orgs, for practical purposes these are much smaller fish -- the order may still be used to 1) block access to the site within the U.S. (by directing ISPs to decline to resolve the address), 2) prevent financial transactions providers from completing transactions for U.S. customers, and 3) prevent ad networks from serving ads to the site associated with the blocked domain. These non-domain management-related providers have no incentive to challenge or object to the A.G.'s directives, as they are expressly immunized from liability associated with compliance.</li>
</ul>
<p>
I guess Cary Sherman <a href="http://arstechnica.com/tech-policy/news/2010/08/trade-groups-policing-our-digital-copyrights-is-just-too-hard.ars">wasn't kidding</a> about the DMCA not being a big enough stick. COICA, if passed, would be nothing short of <a href="http://en.wikipedia.org/wiki/General_Sherman_%28tree%29"><em>General</em> Sherman</a>.
</p>

<p>Not being a D.C. insider or much of a policy wonk myself, I honestly don't know what to think about the chances of this proposed legislation becoming law. If it does, it may not remain one for long. Favoring COICA's passage is the fact it is presented as a bipartisan initiative, and Washington seems pretty receptive these days to rightsholders' complaints that their enforcement efforts are hamstrung. On the other hand, this bill is quite a land-grab, or domain-grab is more like it. It makes some sweeping assumptions about the ability and authority of U.S. courts to interfere with international entities, gives scant due to due process, and tosses the longstanding "substantial noninfringing use" principles of <em><a href="http://en.wikipedia.org/wiki/Sony_Corp._of_America_v._Universal_City_Studios,_Inc.">Sony v. Universal</a></em> out the window by specifying only "commercially significant" uses are relevant in determining whether a site is "dedicated to infringement." (On that last point, legislatures <a href="http://en.wikipedia.org/wiki/Separation_of_powers#Checks_and_balances">can</a> actually toss judicially-decreed wisdom out the window. But still.)
</p>

<p>COICA shows that when it comes to enforcement, U.S. intellectual property interests have plenty of bold, creative, and innovative ideas. Though perhaps some of that initiative might be better directed at the business model side of things.
</p>

<p><strong>Update #1</strong>: Another interesting little tidbit is the bill's   requirement that the Attorney General maintain a public list of domain   names "that, upon reasonable information and belief, the Department of   Justice determines are dedicated to infringing activities but for which   the Attorney General has not filed an action under this section." It's   like a most wanted list for copyright suspects. Again, with no  trial. How'd you like to try to get/keep investors or insurance under  those circumstances?
</p>

<p><strong>Update #2</strong>: Though this bill makes it easier to pursue alleged  international infringers than otherwise would be the case, it applies  equally to domestic U.S. ones as well. Thus, if this had been on the  books when it could be more forcefully argued that YouTube had no  "commercially significant purpose or use" beyond distributing infringing  works, Keyboard Cat might still be tickling the ivories in obscurity.
</p>

<p>More on COICA:
</p>

<p>Gautham Nagesh, <a href="http://thehill.com/blogs/hillicon-valley/technology/119771-bipartisan-bill-would-ramp-up-anti-piracy-enforcement-online">Bipartisan bill would ramp up anti-piracy enforcement online</a>
</p>

<p>David Kravets, <a href="http://www.wired.com/threatlevel/2010/09/justice-department-piracy/">Bill Would Give Justice Department Power to Shutter Piracy Sites Worldwide</a>
</p>

<p>Greg Sandoval, <a href="http://news.cnet.com/8301-31001_3-20016995-261.html">Lawmakers want power to shut down 'pirate sites'</a>
</p>

<p>Digital Music News, <a href="http://www.digitalmusicnews.com/stories/092010combating">This Is War, Baby: Combating Online Infringement Act Hits the Senate</a>
</p>

<p>Mike Masnick, <a href="http://www.techdirt.com/articles/20100920/12460811083/us-senators-propose-bill-to-censor-any-sites-the-justice-depatement-declares-pirate-sites-worldwide.shtml">US Senators Propose Bill To Censor Any Sites The Justice Depatement Declares 'Pirate' Sites, Worldwide</a>
</p>

<p>Wendy Seltzer, <a href="http://wendy.seltzer.org/blog/archives/2010/09/21/copyright-censorship-and-domain-name-blacklists-at-home-in-the-us.html">Copyright, Censorship, and Domain Name Blacklists at Home in the U.S.</a>
</p>

<p>Richard Esguerra, <a href="http://www.eff.org/deeplinks/2010/09/censorship-internet-takes-center-stage-online">Censorship of the Internet Takes Center Stage in "Online Infringement" Bill</a>
</p>

<p>(<em>Image by <a href="http://www.flickr.com/photos/kthread/4300688059/">kthread</a>, <a href="http://creativecommons.org/licenses/by/2.0/deed.en-us">CC Attribution-2.0</a></em>)
</p>]]></media:text>
		</item>
		<item>
			<guid isPermaLink="false">6056000410</guid>
			<link><![CDATA[http://www.zdnet.com/blog/howell/sites-harvesting-kids-data-fly-under-the-radar-even-for-the-ftc/410]]></link>
			<title><![CDATA[Sites harvesting kids' data fly under the radar, even for the FTC]]></title>
			<description><![CDATA[Parents routinely fear creepy online individuals, but creepy online data collection and sales practices are commonplace and rarely exposed, discussed, and considered.<br clear="both" style="clear: both;"/>
<br clear="both" style="clear: both;"/>
<a href="http://ads.pheedo.com/click.phdo?s=57a784d4df234d4144398b7420b3a595&p=1"><img alt="" style="border: 0;" border="0" src="http://ads.pheedo.com/img.phdo?s=57a784d4df234d4144398b7420b3a595&p=1"/></a>
<img alt="" height="0" width="0" border="0" style="display:none" src="http://tags.bluekai.com/site/5148"/><img alt="" height="0" width="0" border="0" style="display:none" src="http://insight.adsrvr.org/track/evnt/?ct=0:8pyu3gz&adv=wouzn4v&fmt=3"/>]]></description>
			<pubDate><![CDATA[Mon, 20 Sep 2010 13:57:26 +0000]]></pubDate>
			<media:credit role="author"><![CDATA[Denise Howell]]></media:credit>
			<s:doctype><![CDATA[Text]]></s:doctype>
			<category domain="http://www.zdnet.com/topic-legal/">Legal</category>
			<category domain="http://www.zdnet.com/topic-mobility/">Mobility</category>
			<media:text type="html"><![CDATA[<p><a title="Sites harvesting kids' data fly under the radar, even for the FTC" href="http://www.flickr.com/photos/jstanden/3128641067/" target="_blank"><img src="http://cdn-static.zdnet.com/i/story/60/56/000410/3128641067_16cc6dd25f.jpg" width="160" height="120" alt="Sites harvesting kids' data fly under the radar, even for the FTC" title="Sites harvesting kids' data fly under the radar, even for the FTC" align="right" /></a>
</p>

<p>Ask any parent what are the greatest dangers to kids online, and you're likely to hear about scary individuals: the pedophile masquerading as a friend on a social site, game, or virtual world (such as those sensationalized on <a href="http://en.wikipedia.org/wiki/To_Catch_a_Predator">To Catch a Predator</a>); the bullying schoolmate who taunts online; the inconsiderate, callous, or hormone-addled peer who posts inappropriate pictures or encourages one's little angel to "sext." Scary <em>companies</em> and commercial interests, however, fall low on the list of concerns, if at all. In my experience, most adults either don't think about the collection and sale of children's online activity, or <a href="http://blogs.law.harvard.edu/vrm/2010/09/19/do-we-have-to-trade-off-privacy/">accept it as an unavoidable cost</a> of using Web services.
</p>

<p>The Federal Trade Commission is a case in point. The FTC is in charge of <a href="http://www.ftc.gov/privacy/coppafaqs.shtm">review and enforcement</a> of <a href="http://en.wikipedia.org/wiki/Children%27s_Online_Privacy_Protection_Act">COPPA</a> (the Children's Online Privacy Protection Act), and educates parents about online safety with its <a href="http://www.onguardonline.gov/topics/net-cetera.aspx">Net Cetera</a> site and guide. Net Cetera talks a lot about keeping kids themselves accountable -- "remind your kids that online actions can reverberate;" "if your kids download copyrighted material, you could get mired in legal issues." It has some excellent guidelines for talking to kids about <a href="http://www.onguardonline.gov/topics/net-cetera-communicating-online.aspx">communicating</a> and <a href="http://www.onguardonline.gov/topics/net-cetera-socializing-online.aspx">socializing</a> online, and gets credit for telling parents that "your child's personal information is valuable, and you can do a lot to protect it." But Net Cetera saves its discussion of COPPA and privacy for the guide's <a href="http://www.onguardonline.gov/topics/net-cetera-protect-pre-teen.aspx">final page</a>, and fails to explain tracking with cookies at all (while cookies get a nod in the guide's glossary, its <a href="http://http://www.onguardonline.gov/topics/net-cetera-protect-computers.aspx">security</a> section highlights viruses, malware, spyware, and, that perennial bogeyman, P2P). While Net Cetera does tell parents to think about fine-tuning whether and how information can be collected and used --
</p>
<blockquote>
<p>[C]onsider how much consent you want to give — it's not all or nothing.  You might give the                  company permission to collect some personal information,  for example, but not allow them to share that information with others</p>
</blockquote>
<p>
-- it doesn't address the fact that nothing in COPPA requires sites to negotiate with parents about data collection or use and sale of anonymized data. The FTC is closer to the mark when it tells parents to read and understand relevant privacy policies, and that "if the policy says there are no limits to what it collects or who gets to see it,                  there are no limits."
</p>

<p>The Wall Street Journal is doing a great job getting the word out that perhaps the spectral online pedophiles, bullies, and sex maniacs are stealing the spotlight from a more stealthy, insidious, and concrete danger: the routine collection and sale of profiles built from records of online activity. Its "<a href="http://online.wsj.com/public/page/what-they-know-digital-privacy.html">What They Know</a>" series should be required reading for all, especially parents. In the series' most recent entry, <a href="http://online.wsj.com/article/SB10001424052748703904304575497903523187146.html">On the Web, Children Face Intensive Tracking</a>, Steven Stecklow exposes how easy it is to to purchase "anonymized" data about teens, and how dodgy even the companies trafficking in such data consider the information. For example, data exchange firm <a href="http://www.bluekai.com/">BlueKai</a> first denied the existence of "teeny bopper" data (kids age 13 to 19) on its service, then, when it became clear a third party <em>was</em> selling such data via BlueKai, removed the data "as a result of the Journal's inquiries."
</p>

<p>Having identified this both under-reported and underrated problem then, what is to be done? To begin with, I'd like to see those who hold themselves out as trusted sources on the subject of online safety, such as the FTC -- Net Cetera is distributed by our school's PTA -- pay at least as much attention to the dangers of commercial online tracking as they do to, say, the hazards of P2P file sharing. (While the FCC is currently <a href="http://www.ftc.gov/bcp/workshops/coppa/index.shtml">considering</a> whether to expand COPPA's definition of "personal information" to cover such activity, it has not yet done so.) The fact there's no such thing as really anonymized data should also be addressed (<em>see</em> Emily Steel and Julia Angwin, <a href="http://online.wsj.com/article/SB10001424052748703294904575385532109190198.html">On The Web's Cutting Edge, Anonymity in Name Only</a> and Nate Anderson, <a href="http://arstechnica.com/tech-policy/news/2009/09/your-secrets-live-online-in-databases-of-ruin.ars">"Anonymized" data really isn't -- and here's why not</a>). And parents need the tools to make the FTC's "it's not all or nothing" vision a reality. Cue <a href="http://blogs.law.harvard.edu/doc/2010/09/18/cookies-for-kiddies/">Doc Searls</a>:
</p>
<blockquote>
<p>Let’s also fix the problem on the users’ end. Because what we really  need here are tools by which individuals (including parents)  can issue  their own global preferences, their own terms of engagement, their own  controls, and their own ends of relationships with companies that serve  them.</p>
</blockquote>
<p>
If you're not yet familiar with <a href="http://cyber.law.harvard.edu/projectvrm/Main_Page">Project VRM</a>, and these issues seem as critical to you as they do to me, you should check it out, spread the word, and perhaps get involved. I for one am looking forward to the day when it is both commonplace and easy for individuals, including parents, to have real control over collection and use of records of online activities.
</p>

<p>(<em>Image by <a href="http://www.flickr.com/photos/jstanden/3128641067/">Jeff Standen</a>, <a href="http://creativecommons.org/licenses/by/2.0/deed.en-us">CC Attribution-2.0</a></em>)
</p>]]></media:text>
		</item>
		<item>
			<guid isPermaLink="false">6056000456</guid>
			<link><![CDATA[http://www.zdnet.com/blog/howell/facebook-ads-might-work-but-not-how-they-think/456]]></link>
			<title><![CDATA[Facebook ads might work, but not how they think]]></title>
			<description><![CDATA[Facebook ads are notoriously and comically off-base.  But even when they pique our interest, in today's multi-option environment they are likely to sell something for a competitor.]]></description>
			<pubDate><![CDATA[Sun, 19 Sep 2010 21:37:18 +0000]]></pubDate>
			<media:credit role="author"><![CDATA[Denise Howell]]></media:credit>
			<s:doctype><![CDATA[Text]]></s:doctype>
			<media:text type="html"><![CDATA[<p><a href="/i/story/60/56/000456/screen-shot-2010-09-19-at-13918-pm.png" ><img src="http://cdn-static.zdnet.com/i/story/60/56/000456/screen-shot-2010-09-19-at-13918-pm.png" width="160" height="120" alt="Facebook ads might work, but not how they think" title="Facebook ads might work, but not how they think" align="left" /></a><strong>[Updated 9/22/10 with a clarification from Facebook re ad clicks.] </strong>
</p>

<p>I've been reading <a href="http://online.wsj.com/article/SB10001424052748703904304575497903523187146.html">the latest</a> in The Wall Street Journal's excellent <a href="http://online.wsj.com/public/page/what-they-know-digital-privacy.html">What They Know series</a> (further post to come on that front), and pondering online advertising. Companies are doing their darnedest to figure out who we are and what we want so they can serve us relevant ads that might relate to a real need (or strong wish), and lead to a purchase. But the system is hopelessly broken, and seems to get more, not less, so as online advertisers learn ever more about us.
</p>

<p>Case in point: this strange photo of a woman applying a camouflage print to her eyelid was to the right of my Facebook profile the other day, along with text having something to do with "free samples." The weirdness of it made me curious, so the ad had at least caught my interest. In the world of Facebook and its advertisers, that means I probably clicked the ad to learn more, and maybe bought a product or took part in a promotion they were offering.
</p>

<p>In the real world, that's not even close to what happened. The last thing I want to do is give my information to some promotional outfit in exchange for "free" samples. So of course I didn't click the ad. (<a href="http://www.businessweek.com/magazine/content/07_46/b4058053.htm">Does anyone</a>?) <strong>[Update 9/22: Facebook wrote in to clarify it gives no personally identifiable information to advertisers without a user's knowledge, and that if I had clicked the ad, the advertiser wouldn't have gotten any personal information about me unless I had chosen to enter it on the advertiser's site. My assumption though was that such information would have to be voluntarily provided by me at some point in order for an ad for "free samples" to have any payoff.] </strong>But I did want to know just what that thing was, it had me curious. (Halloween is on the horizon, after all, and one could build a whole costume around that eye.) So I Googled "camo eyeshadow." The <a href="http://www.google.com/search?q=camo+eyeshadow">fourth result</a> was the company responsible for the product featured in the Facebook ad. I clicked through the search result, got the company's name, <a href="http://www.coloronpro.com/">ColorOn</a>, and the name of the product.
</p>

<p>Not so bad for Facebook and its advertising clients, so far, even if not precisely how they expect things to work. While I didn't click the ad next to my profile, <em>seeing</em> the ad still got me to the site where the product was for sale. But did I buy it there? Of course not.
</p>

<p>As an <a href="http://www.amazon.com/gp/help/customer/display.html/ref=hp_rel_topic?ie=UTF8&amp;nodeId=13819211">Amazon Prime</a> member, Amazon is <em>always</em> where I look if I'm in a buying mode. So off I went to Amazon with the company and product names, and searched there. The product was there, but as no Prime (free) shipping was available, any notion I might have been entertaining to buy that particular product evaporated. Instead, I went back to being merely curious about this weird new world of stick-on/peel off eyeshadow, something I'd never seen before and found sort of academically intriguing. An Amazon search for the manufacturer's name pulled up several related results -- including a <a href="http://www.avon.com/1/1/4241-a-wink-instant-eyeshadow-sheets.html">similar product</a> from ColorOn's competitor, Avon. Since those were far cheaper on Amazon (shipping included), and since my curiosity was sufficient to justify the few dollars it would take to satisfy it, I bought the Avon product from Amazon.
</p>

<p>Thus did a Facebook ad lead straight to a result no Facebook advertiser wants: a completed sale for a competitor. Maybe such an advertiser might take a philosophical "rising tide floats all boats" approach to my anecdote, but I'd be surprised.
</p>

<p>Am I that unusual, or a pretty standard modern-day customer? Do online ads affect your behavior at all, and if so, do you behave in ways the advertisers expect? If you have anecdotes like mine or even more convoluted ones, I'd love to hear them.
</p>

<p>[poll id="9"]
</p>]]></media:text>
		</item>
		<item>
			<guid isPermaLink="false">6056000389</guid>
			<link><![CDATA[http://www.zdnet.com/blog/howell/another-reason-for-acta-caution-u-s-rightsholders-as-government-pawns/389]]></link>
			<title><![CDATA[Another reason for ACTA caution: U.S. rightsholders as government pawns]]></title>
			<description><![CDATA[ACTA negotiations are coming to a close, but even without it, nothing prevents repressive governments from seizing dissident computers on the pretext of infringement on U.S. copyrights. Do we really need to amplify opportunities for abuse? <br clear="both" style="clear: both;"/>
<br clear="both" style="clear: both;"/>
<a href="http://ads.pheedo.com/click.phdo?s=acc71b35b70bfddd238ae6a2aacdc5dc&p=1"><img alt="" style="border: 0;" border="0" src="http://ads.pheedo.com/img.phdo?s=acc71b35b70bfddd238ae6a2aacdc5dc&p=1"/></a>
<img alt="" height="0" width="0" border="0" style="display:none" src="http://tags.bluekai.com/site/5148"/><img alt="" height="0" width="0" border="0" style="display:none" src="http://insight.adsrvr.org/track/evnt/?ct=0:8pyu3gz&adv=wouzn4v&fmt=3"/>]]></description>
			<pubDate><![CDATA[Tue, 14 Sep 2010 17:58:11 +0000]]></pubDate>
			<media:credit role="author"><![CDATA[Denise Howell]]></media:credit>
			<s:doctype><![CDATA[Text]]></s:doctype>
			<media:text type="html"><![CDATA[<p><a title="Will ACTA lead to more computer seizures?" href="http://www.flickr.com/photos/speedesign/2856692271/" target="_blank"><img src="http://cdn-static.zdnet.com/i/story/60/56/000389/grabcomputer.jpg" width="160" height="120" alt="Will ACTA lead to more computer seizures?" title="Will ACTA lead to more computer seizures?" align="left" /></a>
</p>

<p>Last Sunday, Clifford Levy in the New York Times published a disturbing and eye-opening <a href="http://www.nytimes.com/2010/09/12/world/europe/12raids.html?_r=1&amp;partner=rss&amp;emc=rss&amp;pagewanted=all">account</a> of selective crackdowns by the Russian government against alleged pirates of Microsoft products who also happened to be vocal environmental activists.  The day after the story's publication, Microsoft <a href="http://www.nytimes.com/2010/09/14/world/europe/14raid.html?_r=2&amp;src=twt&amp;twt=nytimestech">changed</a> its policy, stating (as reported again by Mr. Levy) that it will now "provid[e] a blanket software license to advocacy groups and media outlets," so that there will be no question about whether certain computers are running licensed software or not.  Though they will "be automatically covered by it, without having to apply," I'm wondering what exactly will qualify as an "advocacy group" or "media outlet," and how and when those determinations will be made -- <em>e.g.</em>, before, or after, a seizure has occurred?
</p>

<p>This story seems particularly timely given that finalization of the <a href="http://en.wikipedia.org/wiki/Anti-Counterfeiting_Trade_Agreement">Anti-Counterfeiting Trade Agreement</a> (ACTA) is <a href="http://ictsd.org/i/news/bridgesweekly/84469/">imminent</a>.  Even without ACTA, a government in search of a pretext has all the tools it needs to ransack or seize computers in the name of protecting foreign copyright holders.  ACTA promises to provide a whole new legal infrastructure and justification for such tactics, in addition to the myriad <a href="http://www.michaelgeist.ca/index.php?option=com_tags&amp;task=view&amp;tag=acta&amp;Itemid=408">concerns</a> it raises simply if enforced in a non-corrupt, as-intended manner.  Participation in ACTA is voluntary, and not tied to membership in the WTO, WIPO, G8, etc.  As Canadian law professor Michael Geist <a href="http://www.michaelgeist.ca/content/view/5302/408/">points out</a>, ACTA will effectively
</p>
<blockquote>
<p>export tougher enforcement measures -- often to countries where free speech is not a given -- without including the exceptions, due process, and balancing provisions. The recent Russian case highlights why this is such a dangerous and misguided approach that is apt to cause more problems than it solves.</p>
</blockquote>
<p>
As if ACTA weren't already objectionable enough, Mr. Levy's reporting demonstrates how governments may turn an invitation to help rightsholders into an opportunity to help themselves.
</p>

<p>Further reading:
</p>

<p>David Gewirtz, <a href="http://www.zdnet.com/blog/government/are-microsoft-lawyers-partying-with-putin-to-harass-russian-rebels/9388">Are Microsoft lawyers partying with Putin to harass Russian rebels?</a>
</p>

<p>Darren Pauli, <a href="http://www.zdnet.com/news/isps-could-be-freed-from-liability-over-user-copyright-abuses/463151">ISPs could be freed from liability over user copyright abuses</a>
</p>

<p>Nate Anderson, <a href="http://arstechnica.com/tech-policy/news/2010/09/european-parliament-passes-anti-acta-declaration.ars">European Parliament passes anti-ACTA declaration</a>
</p>

<p>Mike Masnick, <a href="http://techdirt.com/articles/20100906/09440810913.shtml">And, Of Course, ACTA Leaks: Some Good, Plenty Of Bad</a>, and <a href="http://techdirt.com/articles/20100908/23324410951.shtml">How Can Border Patrol Know Whether Music On Your iPod Is Infringing?</a>
</p>

<p>(<em>Image by <a href="http://www.flickr.com/photos/speedesign/2856692271/">speedesign</a>, <a href="http://creativecommons.org/licenses/by/2.0/deed.en-us">CC Attribution-2.0</a></em>)
</p>]]></media:text>
		</item>
		<item>
			<guid isPermaLink="false">6056000327</guid>
			<link><![CDATA[http://www.zdnet.com/blog/howell/in-autodesk-case-9th-circuit-missed-better-reason-to-bar-resales/327]]></link>
			<title><![CDATA[In Autodesk case, 9th Circuit missed better reason to bar resales]]></title>
			<description><![CDATA[The software Timothy Vernor tried to sell was supposed to have been destroyed due to subsequent upgrades.  This would have been a sounder basis for the 9th Circuit's decision than the fact the EULA restricted sales, transfers, and copying.]]></description>
			<pubDate><![CDATA[Mon, 13 Sep 2010 18:52:33 +0000]]></pubDate>
			<media:credit role="author"><![CDATA[Denise Howell]]></media:credit>
			<s:doctype><![CDATA[Text]]></s:doctype>
			<media:text type="html"><![CDATA[<p>The 9th Circuit's <a href="http://www.ca9.uscourts.gov/datastore/opinions/2010/09/10/09-35969.pdf">Vernor v. Autodesk</a> decision last Friday has gotten a lot of attention and engendered a good deal of handwringing. Many are mourning the loss of the first sale doctrine (an exception to copyright law that lets someone who purchases a lawful copy of a protected work sell it, lend it, or give it away), and proclaiming we no longer own software, but merely use it instead at the pleasure of the licensor.  <em>See, e.g.,</em> commentary from
<a href="http://www.wired.com/threatlevel/2010/09/first-sale-doctrine/">David Kravets</a> ("[S]oftware makers can use shrink-wrap and click-wrap licenses to forbid the transfer or resale of their wares, an apparent gutting of the so-called first-sale doctrine"), <a href="http://techdirt.com/articles/20100912/12212110968.shtml">Mike Masnick</a> ("This ruling is pretty depressing if you actually believe in property rights"), and <a href="http://arstechnica.com/tech-policy/news/2010/09/the-end-of-used-major-ruling-upholds-tough-software-licenses.ars">Nate Anderson</a> ("EULAs are binding, they can control just about everything you might dream up, and only Congress can change the situation").  Personally, I think the case may have been rightly decided, but for the wrong reasons.
</p>

<p>There is something interesting and important about this case that has not come through in the coverage and commentary -- understandably enough, because the court didn't rely on it as the basis of its decision.  If it had, we'd have a better reasoned case, more likely to survive rehearing and appeal, and less likely to occasion such panic.  The plaintiff, Mr. Vernor, sought to sell some copies of AutoCAD on eBay, but he didn't buy them from Autodesk.  Instead, he bought them from an Autodesk customer called CTA.  Prior to then, CTA had purchased a paid upgrade from v.14 to v.15 of AutoCAD, at an upgrade price of $495/license (versus the $3,750 price v.15 would have otherwise cost).  As part of the upgrade pricing and arrangement, CTA agreed to <em>destroy</em> previous versions of the software, and to give proof of that task to Autodesk upon request.  This, CTA did not do.  Instead, CTA <em>sold</em> its v.14 copies to Mr. Vernor, along with handwritten activation codes necessary for the software to work.
</p>

<p>In other words, Autodesk gives customers the ability to upgrade at a discount well below the cost of buying new software, but also expects them not to deepen the effective discount by selling their old copies.  Autodesk forbids this practice by having its software license agreement (SLA) require customers to destroy old copies after an upgrade.  True, Autodesk <em>also</em> purports to require customers to obtain its consent to any sale of any of its software (<em>e.g.</em>, if CTA had tried instead to sell v.15), but that provision did not need to be at issue here because CTA didn't try to sell any of its upgraded copies; it sold the outdated ones.
</p>

<p>Given all this, the court seems to have missed a more palatable path to the same outcome.  From a legal and policy standpoint, I'd be far more comfortable with a court saying CTA did not "own" its outdated v.14 copies for resale purposes, because it knowingly and reasonably forfeited those sorts of rights when it opted for the discounted upgrade.  That's telling your customer it can't have its cake and eat it too, and shouldn't offend anyone's notions of rationality and fairness.  Confoundingly however, that's not what the 9th Circuit hung its hat on here.  Instead it found only, and much more broadly, that
</p>
<blockquote>
<p>[B]ecause Autodesk reserved title to Release 14 copies and imposed significant transfer and use restrictions, ... its customers are licensees of their copies of Release 14 rather than owners.</p>
</blockquote>
<p>
A better-reasoned outcome would have been that "ownership" of software is possible, even in the face of various transfer and use restrictions, but <em>not</em> when a customer opts for the covert "sell" over the contractually required and financially rewarded "destroy."  The court viewed this case as black and white:  you either own software or, if "significant transfer and use restrictions are present," you don't.  It seems to have missed the gray area here:  that maybe you can own it, but forfeit that right if you breach a provision specifying, "if it's old, it can't be sold."
</p>

<p>In our era of increasingly digital and virtual goods, I'm even ok with upholding an "if it's old, it can't be sold" restriction -- tied, as here, to a discounted upgrade -- in the non-software context.  Suppose an ebook author and publisher offer an updated copy of a publication annually, at a discounted price to prior purchasers who agree their prior copy will be replaced -- sounds good to me.  Say a physical book author and publisher do the same thing, if buyers will trade in their old editions for the new one -- still fine.  Not that I'm a fan of involving lawyers in book sales, but there's no denying that notions of ownership are evolving along with the nature of our goods:
</p>

<p><object classid="clsid:d27cdb6e-ae6d-11cf-96b8-444553540000" width="460" height="300" codebase="http://download.macromedia.com/pub/shockwave/cabs/flash/swflash.cab#version=6,0,40,0"><param name="allowFullScreen" value="true" /><param name="allowscriptaccess" value="always" /><param name="src" value="http://www.youtube.com/v/g5utHUrkqtc?fs=1&amp;hl=en_US" /><embed type="application/x-shockwave-flash" width="460" height="300" src="http://www.youtube.com/v/g5utHUrkqtc?fs=1&amp;hl=en_US" allowscriptaccess="always" allowfullscreen="true"></embed></object>
</p>

<p>Until the Free Culture movement gains much more traction, we can expect to see more, not fewer, license agreements governing the things we purchase, use, and consume.  We need courts to construe them with common sense and fairness.  It makes sense for both things -- licenses <em>and</em> resales -- to survive in the marketplace of bits you can't hold, but whether and how that will happen remains to be seen.
</p>

<p><strong>Update</strong>:  More analysis from EFF's Corynne McSherry, <a href="http://www.eff.org/deeplinks/2010/09/magic-words-trump-user-rights-ninth-circuit-ruling">“Magic Words” Trump User Rights: Ninth Circuit Ruling in Vernor v. Autodesk</a>
</p>]]></media:text>
		</item>
		<item>
			<guid isPermaLink="false">6056000306</guid>
			<link><![CDATA[http://www.zdnet.com/blog/howell/muddling-through-privacy-and-the-social-web/306]]></link>
			<title><![CDATA[Muddling through privacy and the social Web]]></title>
			<description><![CDATA[Chief privacy officers from Yahoo!, IBM, and Comcast, as well as CDT's public policy guru, weigh in on where things stand with privacy as social network usage becomes ubiquitous.<br clear="both" style="clear: both;"/>
<br clear="both" style="clear: both;"/>
<a href="http://ads.pheedo.com/click.phdo?s=65d1d5ea1abe806b1460657ccd350c2f&p=1"><img alt="" style="border: 0;" border="0" src="http://ads.pheedo.com/img.phdo?s=65d1d5ea1abe806b1460657ccd350c2f&p=1"/></a>
<img alt="" height="0" width="0" border="0" style="display:none" src="http://tags.bluekai.com/site/5148"/><img alt="" height="0" width="0" border="0" style="display:none" src="http://insight.adsrvr.org/track/evnt/?ct=0:8pyu3gz&adv=wouzn4v&fmt=3"/>]]></description>
			<pubDate><![CDATA[Wed, 02 Dec 2009 20:45:03 +0000]]></pubDate>
			<media:credit role="author"><![CDATA[Denise Howell]]></media:credit>
			<s:doctype><![CDATA[Text]]></s:doctype>
			<category domain="http://www.zdnet.com/topic-collaboration/">Collaboration</category>
			<category domain="http://www.zdnet.com/topic-ibm/">IBM</category>
			<category domain="http://www.zdnet.com/topic-legal/">Legal</category>
			<category domain="http://www.zdnet.com/topic-security/">Security</category>
			<media:text type="html"><![CDATA[<p><a href="http://www.supernova2009.com/"><img src="http://cdn-static.zdnet.com/i/story/60/56/000306/supernova.png" width="242" height="114" alt="Supernova '07" title="Supernova '07" /></a></p>I'm at the Privacy and the Social Web panel at <a href="http://supernovahub.com/">Supernova</a>, featuring lawyer/moderator <a href="http://www.dwt.com/People/KraigLMariniBaker">Kraig Baker</a>, <a href="http://www-03.ibm.com/press/us/en/biography/10073.wss">Harriet Pearson</a> (Security Counsel/Chief Privacy Officer, IBM), <a href="http://www.linkedin.com/in/annetoth">Anne Toth</a> (VP Global Policy/Chief Privacy Officer, Yahoo!), <a href="http://www.linkedin.com/in/gjlewisjr">Jerry Lewis</a> (Chief Privacy Officer/Deputy General Counsel, Comcast), and <a href="http://www.cdt.org/personnel/jim-dempsey">Jim Dempsey</a> (Center for Democracy and Technology).  They're discussing how:

<blockquote>The networked digital environment creates massive new opportunities for personal information to be collected, shared, and used. Will the law change, and if so, how? Is privacy even a viable concept any more?</blockquote>

These are my unedited, unproofed notes, posted as soon after the talk as possible.  <a href="http://blogs.zdnet.com/BTL/">Sam Diaz</a>, coincidentally, is right next to me posting as well (<strong>See <a href="http://blogs.zdnet.com/BTL/?p=27988&tag=col1;post-27988">Supernova: Can social media be the savior of privacy?</a></strong>)  (I've also been posting shorter impressions of the conference <a href="http://twitter.com/dhowell">on Twitter</a>.)

<strong>Harriet Pearson</strong>:  when organizations can extract value from use of things like Facebook, LinkedIn, SalesForce and others, you get more widespread use.  This increases the issues from a personal and consumer perspective, and also from the enterprise standpoint.  We used to have work-life balance, now we have work-life integration - which sounds like something painful.  It's something like passion in all forms of your life.  There's a fuzziness to it that leads to a set of policy issues, and public policy and regulatory issues.  Privacy is part of the equation but not the only piece.  

Harriet is at IBM, where 50k+ employees put themselves out there as experts on various social media sites; they have over 200,000 employees on LinkedIn, for ex.  IBM's social computing guidelines for employees are <a href="http://www.ibm.com/blogs/zz/en/guidelines.html">here</a>.  Essentially, beware and be thoughtful.  IBM believes norms and leadership must come from all quarters.

"Tipping point:" staying on the right side of it.  People will use social media if it provides value, if you're in a geographical area/community that accepts it, if there is transparency and individual control, and if there's community regulation.

<strong>Anne Toth</strong>:  one of our biggest challenges at Yahoo! from a privacy standpoint is how to integrate social functions in services that previously functioned otherwise.  Yahoo! Updates=social syndication via Yahoo!  Threads activity throughout the Yahoo! network.  You see other people's status updates, among other things.  Managing expectations: when Facebook introduced its newsfeed there was a big outcry.  Yahoo! has embedded a number of different tools to provide transparency and control.  You're told when Updates are being generated and who can see them.  Idea is to socialize the users to public vs. private, don't want anyone to be negatively surprised.  Anne remembers being surprised when LinkedIn introduced it's "who's been searching on you?" feature.  There was no notice, and it prompted her to go limit her settings.

<strong>Jerry Lewis</strong>:  As our business has evolved to become more e-commerce focused, how do we manage the current work-life seamless integration?  Shutting it down is not desirable or practical.  The better way is to identify what behaviors you want to value and encourage with these tools.  Organizations want to use social media to promote themselves and their products.  It's a valuable recruiting tool.  Getting benefits from promoting company's use of open source.  Trade secrets, IP, privacy interests of individuals: Comcast has simple, easy-to-read internal policies, and there's lots of self-policing.  It's been largely successful.  If you thoughtfully approach these issues, you can derive a lot of value and manage the downside.

<strong>Jim Dempsey</strong>:  For years we've been trying to play this Tale of Two Cities kind of game:  "It's the best of Webs, it's the worst of Webs."  He's not going to do this.  Thinks the social networking phenomenon could actually be the savior of privacy.  There's been a broad push towards controls, and to some extent demand for user controls.  Facebook yesterday made a teaser announcement about revamping controls, eliminating regional networks, and adding per-item choice about sharing and privacy.  You see the Google Ads preference movement, Google Dashboard, what Yahoo! is offering.  It's common to say, "Young people don't care about privacy, look what they post online."  Things like the uproar over Beacon don't support that.  Users do demand and require a sense of control, and when they don't get it they get very upset.  We thus have a trend toward user control.  The share/don't share, the granularity of sharing choices, the index/don't index options all show this.  It's interesting to think about how corporate use plays into this.  As social networking becomes increasingly integrated into professional life, you want your people sharing a lot, but not necessarily with everyone.  

Re advertising, up 'til now the behavioral advertising model has been based on guesswork.  Social networking now says, "don't guess who I am, this is who I am."  That user generated content, if you combine it with control, that is, "I have chosen to say this, I have chosen to put out there that this is who I am," this could really change and threaten the whole model of inference-based approach to advertising.  Jim is enough of a pessimist to know there are countervailing considerations, such as:  does anyone have the time to exercise and understand the controls.  At some level its incumbent on organizations like CDT to educate users about these things.  Tomorrow, CDT is launching its <a href="http://www.cdt.org/takebackyourprivacy">Take Back Your Privacy</a> initiative, concerns social networking, the browser, apps:  all ways in which your information is collected.  There's also a need for a baseline federal privacy law.  

There's hope here for the user control envisioned by the original creators of the Internet.

<strong>Kraig Baker</strong> asks about how privacy missteps can damage your brand.  Yahoo!'s Anne Toth says you have to manage and fulfill user expectations over time.  Through one errant action - "I mean, Tiger Woods is living this right now" - years of trust can be destroyed.  Need to get what you want and expect every time.  

<strong>Jerry Lewis</strong>:  how we handle and treat customer information is a key piece of that.  Says Comcast tries to put on its "consumer" hat: would I like this?  "We're all consumers too, we all have likes and dislikes, we're probably representative of a lot of our users."  Focus groups too.  "We're excessively vigilant and probably over-analyze this," but they want to make sure things act like people think they should.

<strong>Kraig Baker</strong> asks about issues of personal security, when you're letting lots of people know where you are and what you're doing.  "I have a hard time thinking of how the proliferation of connectedness adds to security," says <strong>Harriet Pearson</strong>."  There are issues, and we have to figure it out.  Not on our own, but with help from various parts of society.  Normal people aren't going to have the time to figure it out in detail.  IBMers use social media outside the company, and they try to mitigate the risk of this: from a straightforward IT security standpoint, from a brand-protection standpoint, and others.  One of the easy ways to lose trust is not to secure the information you have under your management.  The easiest way to screw up privacy is to screw up security.  The "oops, I lost the information, I couldn't handle it properly" phenomenon.  Over the longer term, if you don't have a long-haul process for properly and securely managing information, you can't expect trust.

<strong>Jim Dempsey</strong>:  It seems logical that intelligence garnered from social networking will be exploited for criminal purposes.  On social networking sites themselves, there's the issue of how information is used internally:  in any other company your biggest security threat is the insider threat, assume that's the same for social networking companies as well.

<a href="http://blogs.zdnet.com/bio.php?id=diaz"><strong>Sam Diaz</strong></a> (in audience) asked <strong>Jerry Lewis</strong> about <a href="http://twitter.com/comcastcares">@comcastcares</a>.  Lewis acknowledges humorously that cable companies don't have the most stellar reputation for customer service, and that's not acceptable.  So, they started reaching out to people, and saying, "Where do you live?  We'll send a truck over right now."  It's a great story because the customer got what he needed.  Comcast actively monitors the discussion around Comcast.  "One of the more valuable things we get is what's going on on Twitter."  Helpful diagnosing and fixing things like bad routers and servers.  And, they now have relationships with customers on Twitter.  "There're still people who bash us, and we still drop the ball," but at the end of the day we help people better get the value out of the services they're paying for.  Interacting in realtime in various ways has really increased customer satisfaction.

Woman who lost health benefits "allegedly" lost them - "It's an IBM employee," clarifies <strong>Harriet Pearson</strong>.  Harriet continues, "Part of what needs to happen is a paradigm change for how the law approaches privacy."  Policy, law, and other organizations need to optimize around the concept that "it's out there, but I need to be able to control it."  What we thought was happening a decade ago is really happening now.  That paradigm shift is really hard to achieve, but governments around the world are exploring what the paradigm should be.  Let's imagine the information is out that, but a core concept should be it shouldn't be able to harm someone.  Another: organizations should be accountable for their actions.  If you get your arms around those concepts, then you get into the more amorphous realm of zones of privacy.  It's an incredibly complicated problem that deserves some new thinking.

<strong>Jim Dempsey</strong>:  "You tapped into my inner paranoid here."  We could do a whole session on governmental access to information.  The way the law is currently structured, it's statutorily unclear what the government can get.  "'Subpena' is latin for 'no judge has ever seen this piece of paper.'"  Subpenas are issued by prosecutors, etc.  We need to have a major update to checks and balances, while still letting law enforcement do their job.  Years ago we created an elaborate regulatory structure around credit reports and credit reporting agencies.  You have a right to see the information and challenge it before it becomes final.  Led to a whole market for "credit reporting agencies," which Google and Facebook and MySpace are not.  If I find derogatory information about you through a credit reporting agency, I'm required to tell you; social networks fall completely outside that framework, yet are used to make adverse decisions about people.  Ultimately we're going to need something like the Fair Credit Reporting Act, part of the catch-up that needs to occur.

<strong>Kraig Baker</strong> asks where privacy will evolve in the next 5-10 years.  <strong>Anne Toth</strong> says we need to make it easy for people to exercise their choices and be aware of what digital footprints they're leaving.  Jerry Lewis sees focusing on technology and innovation rather than law.  Spam is controlled at your inbox, not via anti-spam laws.  A combination of good technology, responsiveness to customers, go a lot further toward empowering us and giving us the control we want.  <strong>Harriet Pearson</strong> says there is a role for regulation, but the most regulated areas for privacy are healthcare and financial, and none of us feel that great about the situations there.  The issue of cyber-security, more needs to be done to secure the infrastructures that underlie businesses and society.  Investment in foundational areas to address security.  We can't mature and get into the big productivity shift unless we can do it securely.  <strong>Jim Dempsey</strong>, "I'll close on a post-modern note and say that we'll muddle on through.  A true post-modern note is that muddling through takes efforts by individuals and companies."]]></media:text>
		</item>
		<item>
			<guid isPermaLink="false">6056000278</guid>
			<link><![CDATA[http://www.zdnet.com/blog/howell/six-things-to-know-if-your-facebook-username-has-been-squatted/278]]></link>
			<title><![CDATA[Six things to know if your Facebook username has been squatted]]></title>
			<description><![CDATA[Mike Arrington couldn't get his name as a Facebook username when registration opened on 6/12/09.  Here are six things you should know if you're in the same boat.]]></description>
			<pubDate><![CDATA[Sat, 13 Jun 2009 15:34:01 +0000]]></pubDate>
			<media:credit role="author"><![CDATA[Denise Howell]]></media:credit>
			<s:doctype><![CDATA[Text]]></s:doctype>
			<media:text type="html"><![CDATA[<p><img src="http://cdn-static.zdnet.com/i/story/60/56/000278/squat-300x185.png" width="300" height="185" alt="Six things to know if your Facebook Username has been squatted" title="What to do if your Facebook Username has been squatted" class="alignLeft size-medium wp-image-283" />Here are some things to bear in mind about username squatting on Facebook.</p>
<ol>
<li>I'm guessing Mike Arrington can get <a href="http://twitter.com/arrington/status/2150353523">this</a> fixed with a phone call or two.  (<a href="http://friendfeed.com/davew/0ded7775/inexplicable-i-thought-arrington-got-his-name">via Dave Winer</a>)  If you're not him...</li>
<li>You may have missed the fact there <a href="http://mashable.com/2009/06/11/facebook-page-usernames-2/">was</a>, before username registration opened up, a form to complete for "preventing [your] trademarks from being registered as usernames."  That form is now <a href="http://www.facebook.com/help/contact.php?show_form=username_rights">closed</a>, and links off instead to Facebook's non-copyright <a href="http://www.facebook.com/help/contact.php?show_form=username_rights#/copyright.php?noncopyright_notice=1">IP Infringement Form</a>.  (Given its wording and stated purpose, I doubt it would have helped with non-trademark-registered individual names anyway.)</li>
<li>Facebook (like Twitter, etc.) is not <a href="http://www.icann.org/">ICANN</a>, and the <a href="http://www.icann.org/en/udrp/">UDRP</a> has no application to its vanity URLs.  Facebook's <a href="http://www.facebook.com/help/contact.php?show_form=username_rights#/terms.php">terms of service</a>, however, mandate that users not "take any action on Facebook that infringes someone else's rights or otherwise violates the law."</li>
<li><a href="http://en.wikipedia.org/wiki/Personality_rights">Many jurisdictions</a>, (including California where Facebook is headquartered), restrict or prohibit unauthorized use of a person's "name, image, likeness or other unequivocal aspects of one's identity."</li>
<li>It's not "squatting" if someone else happens to share an individual's name and was able to register it or a variation.</li>
<li>All that said, it seems one's first recourse as the victim of a username squatter is the aforementioned non-copyright <a href="http://www.facebook.com/help/contact.php?show_form=username_rights#/copyright.php?noncopyright_notice=1">IP Infringement Form</a>.</li>
</ol>
<p>
I'd be interested in hearing about people's experiences with this &mdash; whether it turns out to be streamlined and effective or frustrating and a pain.  Let me know and I'll update.
</p>

<p><strong>Previously:</strong>  <a href="http://blogs.zdnet.com/Howell/?p=156">Chris Pirillo is socialsquatted; does the law care?</a>
</p>]]></media:text>
		</item>
		<item>
			<guid isPermaLink="false">6056000267</guid>
			<link><![CDATA[http://www.zdnet.com/blog/howell/napster-and-the-the-more-things-change-rule/267]]></link>
			<title><![CDATA[Napster and the "The more things change" rule]]></title>
			<description><![CDATA[Drew Wilson at Zero Paid points out that Napster celebrates its 10th birthday this month.  The Globe and Mail takes a deeper look in its Download Decade series.<br clear="both" style="clear: both;"/>
<br clear="both" style="clear: both;"/>
<a href="http://ads.pheedo.com/click.phdo?s=da1f21942edd0a70c21bffbe283378b4&p=1"><img alt="" style="border: 0;" border="0" src="http://ads.pheedo.com/img.phdo?s=da1f21942edd0a70c21bffbe283378b4&p=1"/></a>
<img alt="" height="0" width="0" border="0" style="display:none" src="http://tags.bluekai.com/site/5148"/><img alt="" height="0" width="0" border="0" style="display:none" src="http://insight.adsrvr.org/track/evnt/?ct=0:8pyu3gz&adv=wouzn4v&fmt=3"/>]]></description>
			<pubDate><![CDATA[Thu, 11 Jun 2009 16:05:24 +0000]]></pubDate>
			<media:credit role="author"><![CDATA[Denise Howell]]></media:credit>
			<s:doctype><![CDATA[Text]]></s:doctype>
			<category domain="http://www.zdnet.com/topic-legal/">Legal</category>
			<media:text type="html"><![CDATA[<p>Drew Wilson at Zero Paid <a href="http://www.zeropaid.com/news/86393/10th-anniversary-of-napster-this-month/">points out</a> that Napster celebrates its 10th birthday this month.  The Globe and Mail takes a deeper look in its <a href="http://www.theglobeandmail.com/news/technology/download-decade/">Download Decade</a> series.  In the last decade, iTunes, Amazon, and various subscription music services have demonstrated there's a vast audience more than willing to pay for entertainment downloads given the right mix of value and convenience, though pricing and freedom from DRM remain sticking points.  At the same time, lawsuits against individual alleged file sharers march forward, and the entertainment industry has not relented in its pursuit of what it perceives as Napster's successors (<em>e.g.</em>, Pirate Bay, <a href="http://news.cnet.com/8301-1023_3-10248134-93.html?tag=contentMain;contentBody">Real DVD</a>).  Which prompts me to wonder:  in the ten years since Napster sent the entertainment industry its wake-up call, has anything fundamentally changed?
[<strong>Update</strong>:]  Or as <a href="http://lefsetz.com/wordpress/index.php/archives/2009/06/12/pricing-2/">Bob Lefsetz puts it</a>:  "So I just don’t understand this ten year period.  What did the rights holders prove?"
[poll id="8"]
</p>]]></media:text>
		</item>
		<item>
			<guid isPermaLink="false">6056000245</guid>
			<link><![CDATA[http://www.zdnet.com/blog/howell/microsofts-bing-playing-fast-and-loose-with-fair-use/245]]></link>
			<title><![CDATA[Microsoft's Bing playing fast and loose with fair use?]]></title>
			<description><![CDATA[Microsoft's new Bing Search engine displays full length thumbnail videos -- with sound, stripped of ads.  This appears to be the broadest "universal video search" yet, and may exceed the recognized bounds of fair use.]]></description>
			<pubDate><![CDATA[Tue, 02 Jun 2009 15:53:57 +0000]]></pubDate>
			<media:credit role="author"><![CDATA[Denise Howell]]></media:credit>
			<s:doctype><![CDATA[Text]]></s:doctype>
			<category domain="http://www.zdnet.com/topic-microsoft/">Microsoft</category>
			<media:text type="html"><![CDATA[<p><img src="http://cdn-static.zdnet.com/i/story/60/56/000245/bing-logo.jpg" width="160" height="100" title="Bing fast and loose with fair use?" class="alignLeft size-full wp-image-251" /><a href="http://www.beet.tv/">Beet.TV's</a> Andy Plesser <a href="http://www.beet.tv/2009/06/wow-bing-has-live-video-thumbnails-but-is-it-fair-use.html">asks</a>:  is Microsoft's <a href="http://www.bing.com/">Bing</a> search playing fast and loose with fair use?  Specifically, Andy points out that Bing displays "live," or perhaps more accurately "dynamic," thumbnails in its <a href="http://www.bing.com/videos">video search</a> results, and users can "watch <del datetime="2009-06-04T14:53:16+00:00">the entire video</del> an extended excerpt [see below] as a thumbnail, with sound."  Andy notes Bing "appears to pull a media RSS feed which is stripped of advertising overlays," but "<em>does</em> provide a link to the original source."  "This is the broadest implementation of 'universal video search' by a major company we have seen," he says.
</p>

<p>Since 2002 it has been pretty well accepted in the U.S. that search engines can properly display thumbnails of images in search results under the fair use doctrine.  Crucial to that result though is the fact search result thumbnails do not "supplant the need for the original" or harm the market or value of the images as used on the original site.  (See the Ninth Circuit's <a href="http://en.wikipedia.org/wiki/Kelly_v._Arriba_Soft_Corporation"><em>Kelly v. Arriba Soft</em></a> <a href="http://images.chillingeffects.org/cases/Kelly_v_Arriba.html">decision</a>.)  In fact, thumbnail images in search results were found to help the market or value of the images by
</p>

<p></p>
<blockquote>
<p>guid[ing] users to [the site] rather than away from it.  Even if users were more interested in the image itself rather than the information on the page, they would still have to go to [the] site to see the full-sized image.  (<em>Kelly</em>)</p>
</blockquote>
<p>
</p>

<p>Bing presents an interesting twist on this, and the question is:  is displaying a thumbnail rather than full-sized video enough to trigger fair use?  Here, I think the argument is stronger than in <em>Kelly</em> that the need for the original <em>is</em> supplanted.  <del datetime="2009-06-04T14:53:16+00:00">Full length</del> Lengthy [see below] thumbnail videos with sound strike me as more likely to serve as a complete substitute for the original than a thumbnail image, and if I'm right, fewer users would be guided to the original site by the search engine (in fact, they'd be discouraged from clicking through).  The thumbnails also impair the value of the original by removing the originally included ads.
</p>

<p>On the other hand, Bing's video search could be fair use if the videos are <a href="http://www.eff.org/deeplinks/2007/07/youtube-embedding-and-copyright"> embedded and/or inline linked</a> rather than copied.  (That doesn't sound like what's going on, particularly given the ad removal, but I need more info.)
</p>

<p>I'd be curious to hear more from others, including <a href="http://www.eff.org/about/staff/?f=fred_von_lohmann.html">Fred von Lohmann</a> <a href="http://www.eff.org/deeplinks/">at EFF</a>, about Bing's video search and fair use.
</p>

<p>[<strong>Update</strong>, 2:30 p.m.]  As <a href="http://www.techcrunch.com/2009/06/01/badda-bing-indeed/">TechCrunch pointed out</a> yesterday, Bing puts users two clicks away from a whole lot of video porn, again with the thumbnail/full video/full sound scenario (though I didn't do an <em>extensive</em> survey, the couple of thumbnails I clicked through required you to click further to "play the [full size &mdash; no tittering now] video at the original site" rather than staying on Bing).  Adult entertainment producers can be among the most strident objectors to search engines hurdling their paywalls and providing access to their otherwise for-pay content, as we learned a few years back in the <a href="http://www.eff.org/cases/perfect-10-v-google"><em>Perfect 10 v. Google</em></a> litigation.  <em>Perfect 10</em> involved still images only, and Google won, as Jason Schultz describes <a href="http://www.eff.org/deeplinks/2007/05/p10-v-google-public-interest-prevails-digital-copyright-showdown">here</a>.  Bing's porn thumbnails are significantly more....enhanced.  'Scuse me while I reinstate safe search before my kid wanders in.
</p>

<p>[<strong>Update</strong>, 3:36 p.m.]  As noted in the comments here and in an <a href="http://www.beet.tv/2009/06/wow-bing-has-live-video-thumbnails-but-is-it-fair-use.html">update</a> to Andy Plesser's original post, it's not yet clear exactly how much of each video gets played in the thumbnails, and whether this varies from video to video or source to source.  From what I've seen of the thumbnails they play enough of the original to prompt obvious fair use concerns.
</p>]]></media:text>
		</item>
		<item>
			<guid isPermaLink="false">6056000239</guid>
			<link><![CDATA[http://www.zdnet.com/blog/howell/video-helps-to-quantify-fair/239]]></link>
			<title><![CDATA[Video helps to quantify "fair"]]></title>
			<description><![CDATA[American University's Center for Social Media is working to lend some certainty to the amorphous doctrine of "fair use."]]></description>
			<pubDate><![CDATA[Sat, 30 May 2009 15:46:29 +0000]]></pubDate>
			<media:credit role="author"><![CDATA[Denise Howell]]></media:credit>
			<s:doctype><![CDATA[Text]]></s:doctype>
			<category domain="http://www.zdnet.com/topic-patents/">Patents</category>
			<media:text type="html"><![CDATA[<p>Did you know that American University has a <a href="http://www.centerforsocialmedia.org/">Center for Social Media</a>? (Part of its <a href="http://www.american.edu/soc/">School of Communications</a>.) They have a great collection of <a href="http://www.centerforsocialmedia.org/resources/fair_use">fair use resources</a>, including "<a onclick="javascript:urchinTracker ('/outbound/article/centerforsocialmedia.org');" href="http://centerforsocialmedia.org/resources/online_video"><span >Program on Information Justice and Intellectual Property</a>.</p>
<p><embed src="http://blip.tv/play/Af_VSoz4Yw" type="application/x-shockwave-flash" width="480" height="295" allowscriptaccess="always" allowfullscreen="true"></embed></p>
<p>As Professor <a href="http://pittsblog.blogspot.com/">Mike Madison</a> <a href="http://madisonian.net/2009/05/19/best-practices-in-fair-use/">puts it</a>:</p>
<blockquote>
<p>Among other things, the best practices approach is one way of rendering concrete an emerging sense that fair use in copyright law is neither as radically indeterminate nor as toothless in operation as the conventional wisdom might suggest....</p>
<p>The best practices approach is not a panacea, and it is far from costless.  Producing these statements and working with gatekeepers to acknowledge them is time-consuming, challenging work.  And there is no assurance that if tested in court, a copyright defendant&rsquo;s reliance on a Best Practices approach or publication would be persuasive to a judge or jury.  The hope, however, is that the more robust the set of Best Practices followed by creators in these fields, the less likely it is that litigation will ensue.</p>
</blockquote>
<p>Positive steps toward building <a href="http://blogs.zdnet.com/Howell/?p=113">law that works</a>.</p>]]></media:text>
		</item>
		<item>
			<title><![CDATA[A Special Offer From Our Sponsor]]></title>
			<link>http://ads.pheedo.com/click.phdo?s=127ff18f076e8caaf972fae85c204650&amp;p=4</link>
			<guid isPermaLink="false">127ff18f076e8caaf972fae85c204650</guid>
			<description><![CDATA[<a href="http://ads.pheedo.com/click.phdo?s=127ff18f076e8caaf972fae85c204650&amp;p=4"><img alt="" style="border: 0;" border="0" src="http://ads.pheedo.com/img.phdo?s=127ff18f076e8caaf972fae85c204650&amp;p=4"/></a>]]></description>
			<pubDate><![CDATA[Sat, 30 May 2009 15:46:29 +0000]]></pubDate>
		</item>
		<item>
			<guid isPermaLink="false">6056000237</guid>
			<link><![CDATA[http://www.zdnet.com/blog/howell/barack-obama-is-male-taken-and-cc-licensed/237]]></link>
			<title><![CDATA[Barack Obama is male, taken, and CC licensed]]></title>
			<description><![CDATA[While John McCain recently complained about Google's application of the DMCA, Barack Obama has been quietly employing a Creative Commons license for his Flickr photostream.]]></description>
			<pubDate><![CDATA[Sat, 08 Nov 2008 18:13:12 +0000]]></pubDate>
			<media:credit role="author"><![CDATA[Denise Howell]]></media:credit>
			<s:doctype><![CDATA[Text]]></s:doctype>
			<category domain="http://www.zdnet.com/topic-hardware/">Hardware</category>
			<category domain="http://www.zdnet.com/topic-mobility/">Mobility</category>
			<media:text type="html"><![CDATA[<p><a href="http://www.flickr.com/photos/barackobamadotcom/3009095236/" target="_blank" title="Barack Obama is male, taken, and CC licensed"><img src="http://cdn-static.zdnet.com/i/story/60/56/000237/obamapump.jpg" width="265" alt="Barack Obama is male, taken, and CC licensed" title="Barack Obama is male, taken, and CC licensed" align="right" /></a>I've been following Obama's <a href="http://twitter.com/BarackObama">tweets</a> for awhile, but had neglected the President-elect's <a href="http://www.flickr.com/photos/barackobamadotcom/">Flickr account</a> until this morning when the Today Show featured some of the great behind-the-scenes election night shots posted there.  A lot of these look like they were snapped on a staffer's camera phone (<a href="http://www.flickr.com/cameras/canon/eos_5d/">digital SLR</a>, actually).  The U.S. will soon swear in its first President ever who is fluent in online communications, and that does indeed fill me with hope.  As does the fact the President-elect's Flickr photos are Creative Commons <a href="http://creativecommons.org/licenses/by-nc-sa/2.0/deed.en">licensed.</a>  (If you haven't already done so, you can peruse Obama's savvy technology policy positions <a href="http://www.barackobama.com/issues/technology/">here</a>.)
</p>

<p>(<em>Image by <a href="http://www.flickr.com/photos/barackobamadotcom/">Barack Obama</a>, <a href="http://creativecommons.org/licenses/by-nc-sa/2.0/deed.ens">CC Attribution-Noncommercial-Share Alike 2.0 Generic</a></em>)
</p>]]></media:text>
		</item>
		<item>
			<guid isPermaLink="false">6056000235</guid>
			<link><![CDATA[http://www.zdnet.com/blog/howell/mail-goggles-an-idea-that-goes-well-beyond-drunk-emails/235]]></link>
			<title><![CDATA[Mail Goggles:  an idea that goes well beyond drunk emails]]></title>
			<description><![CDATA[There's a new GMail Labs app:  Mail Goggles, by GMail engineer Jon Perlow:When you enable Mail Goggles, it will check that you're really sure you want to send that late night Friday email. And what better way to check than by making you solve a few simple math problems after you click send to verify you're in the right state of mind?<br clear="both" style="clear: both;"/>
<br clear="both" style="clear: both;"/>
<a href="http://ads.pheedo.com/click.phdo?s=f8974dcfe69e4bbaff1309643b846712&p=1"><img alt="" style="border: 0;" border="0" src="http://ads.pheedo.com/img.phdo?s=f8974dcfe69e4bbaff1309643b846712&p=1"/></a>
<img alt="" height="0" width="0" border="0" style="display:none" src="http://tags.bluekai.com/site/5148"/><img alt="" height="0" width="0" border="0" style="display:none" src="http://insight.adsrvr.org/track/evnt/?ct=0:8pyu3gz&adv=wouzn4v&fmt=3"/>]]></description>
			<pubDate><![CDATA[Wed, 08 Oct 2008 17:43:38 +0000]]></pubDate>
			<media:credit role="author"><![CDATA[Denise Howell]]></media:credit>
			<s:doctype><![CDATA[Text]]></s:doctype>
			<category domain="http://www.zdnet.com/topic-cloud/">Cloud</category>
			<category domain="http://www.zdnet.com/topic-collaboration/">Collaboration</category>
			<category domain="http://www.zdnet.com/topic-google/">Google</category>
			<media:text type="html"><![CDATA[<p>There's a new GMail Labs app:  <a href="http://gmailblog.blogspot.com/2008/10/new-in-labs-stop-sending-mail-you-later.html">Mail Goggles</a>, by GMail engineer Jon Perlow:
</p>

<p><a href="http://gmailblog.blogspot.com/2008/10/new-in-labs-stop-sending-mail-you-later.html" target="_blank" title="Mail Goggles:  an idea that goes well beyond drunk emails"><img src="http://cdn-static.zdnet.com/i/story/60/56/000235/mail_goggles.png" width="265" height="175" alt="Mail Goggles:  an idea that goes well beyond drunk emails" title="Mail Goggles:  an idea that goes well beyond drunk emails" align="right" /></a>
</p>

<p></p>
<blockquote>
<p>When you enable Mail Goggles, it will check that you're really sure you want to send that late night Friday email. And what better way to check than by making you solve a few simple math problems after you click send to verify you're in the right state of mind? ... Hopefully Mail Goggles will prevent many of you out there from sending messages you wish you hadn't. Like that late night memo -- I mean mission statement -- to the entire firm.</p>
</blockquote>
<p>
</p>

<p>Jon's idea is lighthearted and fun, but when you look past the humor and consider it more broadly it's quite brilliant.  The current climate of panic is not confined to the financial markets.  Corporate legal departments are bombarded with articles and concerns about online corporate communications, <a href="http://www.law.com/jsp/legaltechnology/pubArticleLT.jsp?id=1202424595821&rss=ltn">liability</a> and more <a href="http://www.law.com/jsp/legaltechnology/pubArticleLT.jsp?id=1202424595821&rss=ltn">liability</a>.  The tug-of-war between PR/communications professionals and in-house legal continues to escalate as it becomes idiotic (if not impossible) for companies to remain on the sidelines of the Live Web.  How do you train people to address the IP, defamation, and other legal concerns involved in free-flowing Web dialogue?  Must every blog post and wall entry be vetted by a team of lawyers?
</p>

<p>Expanding on Jon Perlow's Mail Goggles idea sounds like a great solution.  I like the notion of a straightforward and unburdensome series of questions as precursor to &quot;publish.&quot;  Instead of math problems, people could be asked to briefly confirm they've cleared rights on images, protected confidential information, and complied with policies on the quality of discourse and information provided.  If uncertain on any of those fronts, they could be reminded what to do next.  While a cookie-cutter approach couldn't possibly address every legal nuance and pitfall, it could at least act as a sort of triage, speeding innocuous items out the door and letting the moderation/review process hone in on more complicated situations.
</p>

<p>[poll id=7]
</p>

<p></p>

<p></p>

<p></p>

<p></p>

<p></p>]]></media:text>
		</item>
		<item>
			<guid isPermaLink="false">6056000233</guid>
			<link><![CDATA[http://www.zdnet.com/blog/howell/jennifer-leggio-unpacks-demand-letter-over-branded-community/233]]></link>
			<title><![CDATA[Jennifer Leggio unpacks demand letter over "branded community"]]></title>
			<description><![CDATA[Over at ZDNet's Feeds,  Jennifer Leggio walks us through a cease and desist email she recently received.  The email suggested her blog's use of the term "branded community" might constitute trademark infringement.]]></description>
			<pubDate><![CDATA[Fri, 25 Jul 2008 15:39:33 +0000]]></pubDate>
			<media:credit role="author"><![CDATA[Denise Howell]]></media:credit>
			<s:doctype><![CDATA[Text]]></s:doctype>
			<media:text type="html"><![CDATA[<p><a href="http://www.flickr.com/photos/carolyncoles/2389407045/" target="_blank" title="Jennifer Leggio unpacks demand letter over "branded community""><img src="http://cdn-static.zdnet.com/i/story/60/56/000233/eggface.jpg" width="160" height="120" alt="Jennifer Leggio unpacks demand letter over " title="Jennifer Leggio unpacks demand letter over " align="right" /></a>
</p>

<p>Over at ZDNet's <a href="http://blogs.zdnet.com/feeds/">Feeds</a>,  Jennifer Leggio <a href="http://blogs.zdnet.com/feeds/?p=158">walks us through</a> a cease and desist email she recently received.  The email suggested her blog's use of the term "branded community" might constitute trademark infringement.  It's a good object lesson about paying attention to cease and desist letters but not always accepting them at face value.  <a href="http://www.chillingeffects.org/trademark/">All too often</a>, their legal weight is less than substantial.
</p>

<p>(<em>Image by <a href="http://www.flickr.com/photos/carolyncoles/">Carolyn Coles</a>, <a href="http://creativecommons.org/licenses/by/2.0/deed.en-us">CC Attribution-2.0</a></em>)
</p>]]></media:text>
		</item>
		<item>
			<guid isPermaLink="false">6056000231</guid>
			<link><![CDATA[http://www.zdnet.com/blog/howell/care-to-spend-your-holiday-weekend-policing-directory-listings/231]]></link>
			<title><![CDATA[Care to spend your holiday weekend policing directory listings?]]></title>
			<description><![CDATA[I'm not a fan in general of sites that create a listing or profile for you, hoping you'll eventually claim and/or correct it.  This tactic, neither user-centric nor user-driven, is insidious for at least three reasons:inaccuracies proliferate,privacy is frequently jeopardized, andusers are required to invest considerable time and supply yet more personal data in an effort to remedy 1 and 2.<br clear="both" style="clear: both;"/>
<br clear="both" style="clear: both;"/>
<a href="http://ads.pheedo.com/click.phdo?s=6269ce52a8853b9fa84655fc6a14470f&p=1"><img alt="" style="border: 0;" border="0" src="http://ads.pheedo.com/img.phdo?s=6269ce52a8853b9fa84655fc6a14470f&p=1"/></a>
<img alt="" height="0" width="0" border="0" style="display:none" src="http://tags.bluekai.com/site/5148"/><img alt="" height="0" width="0" border="0" style="display:none" src="http://insight.adsrvr.org/track/evnt/?ct=0:8pyu3gz&adv=wouzn4v&fmt=3"/>]]></description>
			<pubDate><![CDATA[Wed, 02 Jul 2008 18:57:43 +0000]]></pubDate>
			<media:credit role="author"><![CDATA[Denise Howell]]></media:credit>
			<s:doctype><![CDATA[Text]]></s:doctype>
			<media:text type="html"><![CDATA[<p><a href="http://www.flickr.com/photos/labgp/2027484489/" target="_blank" title="Care to spend your holiday weekend policing directory listings?"><img src="http://cdn-static.zdnet.com/i/story/60/56/000231/users.jpg" width="160" height="120" alt="Care to spend your holiday weekend policing directory listings?" title="Care to spend your holiday weekend policing directory listings?" align="right" /></a>
</p>

<p>I'm not a fan in general of sites that create a listing or profile for you, hoping you'll eventually claim and/or correct it.  This tactic, neither <a href="http://www.youtube.com/watch?v=edrcv-xUFtM">user-centric</a> nor <a href="http://blogs.law.harvard.edu/vrm/2008/04/28/vrm-is-user-driven/">user-driven</a>, is insidious for at least three reasons:
</p>
<ol>
<li>inaccuracies proliferate,</li>
<li>privacy is frequently jeopardized, and</li>
<li>users are required to invest considerable time and supply yet more personal data in an effort to remedy 1 and 2.</li>
</ol>
<p>
<a href="http://www.latimes.com/business/la-columnist-dlazarus,0,3677159.columnist">David Lazarus</a> gives examples of these sorts of problems in his Los Angeles Times piece today, <a href="http://www.latimes.com/business/la-fi-lazarus2-2008jul02,0,2385695.column">Social networking site divulges child's personal information</a>.  He tells of a mom who looked up her Reunion.com listing just to see what it might say, and learned it included her toddler son's name and their family's home town:  things she would rather not have readily associated with one another.  This occurred even though Reunion.com says it creates its listings only from "publicly available" information, including that purchased from a data broker.  When the Times came calling, Reunion.com removed the reference and now says "measures have been put in place to make it easier for people to have information deleted from the site," though I don't see much <a href="http://help.reunion.com/cgi-bin/reunion.cfg/php/enduser/std_alp.php?p_sid=PW3I2M7j">here</a> that bears this out.
</p>

<p>Lazarus tapped privacy guru <a href="http://en.wikipedia.org/wiki/Ray_Everett-Church">Ray Everett-Church</a> for his thoughts on the matter.  There goes the weekend:
</p>
<blockquote>
<p>[I]t's up to parents to monitor online directories such as Reunion.com and make sure their kids' names aren't present.</p>
</blockquote>
<p>
Everett-Church also suggests parents do everything they can to keep children's information <a href="http://blogs.zdnet.com/Howell/?p=207">out of corporate databases</a> — presumably by using false names when subscribing to magazines, using online services, etc.
</p>

<p>There are market opportunities around these pain points.  The value of brokered data plummets once enough people game and/or end-run that system, whereas the value of systems and relationships that meet expectations and demands around accuracy, privacy, and time efficiency goes through the roof.
</p>

<p><a href="http://www.latimes.com/news/printedition/front/la-fi-kidssafe2-2008jul02,0,1861652.story">Elsewhere in the L.A. Times</a>, Numedeon Inc.'s Jen Sun thinks there's an upside to ruses run by some <a href="http://www.whyville.net/smmk/nice">Whyville</a> users who con others out of online goods and funds in exchange for nonexistent rewards:  "It's a learning experience for the victim not to be so gullible, not to be motivated by greed, because the scammers use greed against you."  I hope we don't have to wait for all the nine year-olds to grow up in order to figure this stuff out.
</p>

<p>(<em>Image by <a href="http://www.flickr.com/photos/labgp/">LabGP &amp; SigOther's</a>, <a href="http://creativecommons.org/licenses/by/2.0/deed.en-us">CC Attribution-2.0</a></em>)
</p>]]></media:text>
		</item>
		<item>
			<guid isPermaLink="false">6056000229</guid>
			<link><![CDATA[http://www.zdnet.com/blog/howell/overly-restrictive-a-p-quoting-guidelines-risk-winning-battles-at-the-wars-expense/229]]></link>
			<title><![CDATA[Overly restrictive A.P. quoting guidelines risk winning battles at the war's expense]]></title>
			<description><![CDATA[Saul Hansell reports today that the Associated Press "will, for the first time, attempt to define clear standards as to how much of its articles and broadcasts bloggers and Web sites can excerpt without infringing on The A.P.]]></description>
			<pubDate><![CDATA[Mon, 16 Jun 2008 16:44:20 +0000]]></pubDate>
			<media:credit role="author"><![CDATA[Denise Howell]]></media:credit>
			<s:doctype><![CDATA[Text]]></s:doctype>
			<media:text type="html"><![CDATA[<p><a href="http://www.flickr.com/photos/sidelong/1908434227/" target="_blank" title="Overly restrictive A.P. quoting guidelines risk winning battles at the war's expense"><img src="http://cdn-static.zdnet.com/i/story/60/56/000229/quote.jpg" width="160" height="120" alt="Overly restrictive A.P. quoting guidelines risk winning battles at the war's expense" title="Overly restrictive A.P. quoting guidelines risk winning battles at the war's expense" align="left" /></a>
</p>

<p>Saul Hansell <a href="http://www.nytimes.com/2008/06/16/business/media/16ap.html?partner=rssuserland&emc=rss&pagewanted=all">reports</a> today that the Associated Press &quot;will, for the first time, attempt to define clear standards as to how much of its articles and broadcasts bloggers and Web sites can excerpt without infringing on The A.P.’s copyright.&quot;
</p>

<p>The problem with "clear standards" is that as <a href="http://en.wikipedia.org/wiki/Tim_Wu">Tim Wu</a> (quoted in the article) correctly points out, the legal standard is <em>un</em>clear, and subject to interpretation on a case by case basis.  There are instances when reproducing the entire work (or large portions thereof &mdash; "<a href="http://en.wikipedia.org/wiki/Fisking">Fisking</a>" we used to call it, seems like eons ago) with sufficient commentary is fair use.  The A.P.'s vague statement that it wants to police what appears to be reproduction for reproduction's sake as opposed to commentary, thus is a fair representation of what it's entitled to do by law; anything more specific might not hold up.
</p>

<p>Given this, it'll be interesting to see what the A.P. cobbles together with the <a href="http://www.mediabloggers.org/">Media Bloggers Association</a>, which of course does not act for and can't bind the whole blogosphere and Web.  If, as the statements to Hansell suggest, it's as restrictive as purporting to make brief direct quotations against A.P. policy, the A.P. will either have to backtrack or try to get judicial buy-in on a policy that in all likelihood would be deemed overbroad.
</p>

<p>(<em>Image by <a href="http://www.flickr.com/photos/sidelong/">SideLong</a>, <a href="http://creativecommons.org/licenses/by/2.0/deed.en-us">CC Attribution-2.0</a></em>)
</p>

<p>Related:  Mike Arrington, <a href="http://www.techcrunch.com/2008/06/16/heres-our-new-policy-on-ap-stories-theyre-banned/">Here’s Our New Policy On A.P. stories: They’re Banned</a>, and all stories and posts linked from there; <a href="http://www.techmeme.com/080616/p17#a080616p17">Techmeme re same</a>.
</p>

<p></p>

<p></p>]]></media:text>
		</item>
		<item>
			<guid isPermaLink="false">6056000227</guid>
			<link><![CDATA[http://www.zdnet.com/blog/howell/section-230-to-twitter-and-others-delete-away/227]]></link>
			<title><![CDATA[Section 230 to Twitter and others:  Delete away]]></title>
			<description><![CDATA[Community and content management don't void a site's immunity under Section 230 of the Communications Decency Act.  Participation in an unlawful act does.<br clear="both" style="clear: both;"/>
<br clear="both" style="clear: both;"/>
<a href="http://ads.pheedo.com/click.phdo?s=b56a83d4095164bdedc46d70a7adea51&p=1"><img alt="" style="border: 0;" border="0" src="http://ads.pheedo.com/img.phdo?s=b56a83d4095164bdedc46d70a7adea51&p=1"/></a>
<img alt="" height="0" width="0" border="0" style="display:none" src="http://tags.bluekai.com/site/5148"/><img alt="" height="0" width="0" border="0" style="display:none" src="http://insight.adsrvr.org/track/evnt/?ct=0:8pyu3gz&adv=wouzn4v&fmt=3"/>]]></description>
			<pubDate><![CDATA[Sat, 24 May 2008 07:15:39 +0000]]></pubDate>
			<media:credit role="author"><![CDATA[Denise Howell]]></media:credit>
			<s:doctype><![CDATA[Text]]></s:doctype>
			<media:text type="html"><![CDATA[<p><a href="http://www.flickr.com/photos/carrotcreative/2511539541/" target="_blank" title="Section 230 to Twitter and others:  Delete away"><img src="http://cdn-static.zdnet.com/i/story/60/56/000227/2511539541_b8c0356486_m.jpg" alt="Section 230 to Twitter and others:  Delete away" title="Section 230 to Twitter and others:  Delete away" align="left" /></a>
</p>

<p>Community and content management don't void a site's immunity under <a href="http://w2.eff.org/bloggers/lg/faq-230.php">Section 230 of the Communications Decency Act</a>.  Participation in an unlawful act does.
</p>

<p>I was thus taken aback by the legal analysis included in Wired's/Betsy Schiffman's post about <a href="http://arielwaldman.com/">Ariel Waldman</a> and Twitter (<a href="http://blog.wired.com/business/2008/05/tweeter-takes-o.html">Twitterer takes on Twitter Harassment Policy</a>):
</p>

<p></p>
<blockquote>
<p>
John Dozier Jr., a managing partner at Dozier Internet Law, says Twitter may have risked its immunity under the Communications Decency Act the moment it "edited" or altered content on the site. (An "edit" could include any sort of alteration, such as promotional placement or displacement on the site.)
</p>

<p>"If they've edited content based on their subjective perspective, they put their immunity at risk and virtually their entire online business, because then they'd be liable to defmation [sic] claims or anything else that a publisher would," Dozier says.
</p>
</blockquote>
<p>
</p>

<p>What's at stake in the Twitter-Waldman <a href="http://www.techmeme.com/080523/p49#a080523p49">discussion</a>, as I understand it, is not editing or alteration but removal:  something squarely protected by Section 230.  (To be clear, editing and alteration don't per se void the immunity, either.)  As Professor <a href="http://blog.ericgoldman.org/">Eric Goldman</a> (a Section 230 scholar and <a href="http://blog.ericgoldman.org/archives/derivative_liability/">frequent analyst</a>) put it in a recent, unrelated <a href="http://blog.ericgoldman.org/archives/2008/05/content_generat.htm">post</a>:
</p>
<blockquote>
<p>
47 USC 230. Many people operate under the outdated myth that a site must choose to be either a publisher or a passive conduit. Fortunately, the law <a href="http://blog.ericgoldman.org/archives/msu230talkapr2005.pdf">facilitates heterogeneous approaches to UGC</a>. Per 230, a [site owner] isn't liable for third party content with limited exceptions. Ownership doesn't matter; editing doesn't matter, prescreening/policing doesn't matter. ...
</p>
</blockquote>
<p>
</p>

<p>Evan Williams and co. at Twitter haven't been invoking Section 230 as a basis for their decision not to remove certain complaint-generating submissions or their author; let's not start doing it for them.
</p>

<p>(<em>Image by <a href="http://www.flickr.com/photos/carrotcreative/">carrotcreative</a>, <a href="http://creativecommons.org/licenses/by/2.0/deed.en-us">CC Attribution-2.0</a></em>)
</p>

<p></p>

<p></p>

<p></p>

<p></p>

<p></p>]]></media:text>
		</item>
		<item>
			<guid isPermaLink="false">6056000225</guid>
			<link><![CDATA[http://www.zdnet.com/blog/howell/stanford-information-law-symposium/225]]></link>
			<title><![CDATA[Stanford Information Law Symposium]]></title>
			<description><![CDATA[Though it could scarcely be more cumbersomely named — the Transatlantic Information Law Symposium — this upcoming (and free) program at Stanford Law School looks excellent, featuring such big thinkers as Mark Lemley and Stefan Bechtold, and such big topics as privacy, free speech, the future of Internet regulation, and one that looks particularly intriguing from the standpoint of social media and attention:  property vs. contract to govern online behavior.]]></description>
			<pubDate><![CDATA[Wed, 21 May 2008 17:14:31 +0000]]></pubDate>
			<media:credit role="author"><![CDATA[Denise Howell]]></media:credit>
			<s:doctype><![CDATA[Text]]></s:doctype>
			<category domain="http://www.zdnet.com/topic-browser/">Browser</category>
			<category domain="http://www.zdnet.com/topic-government/">Government</category>
			<media:text type="html"><![CDATA[<p><a href="http://www.flickr.com/photos/maveric2003/241243197/" target="_blank" title="Stanford Information Law Symposium"><img src="http://cdn-static.zdnet.com/i/story/60/56/000225/241243197_081dc420a0_m.jpg" width="120" height="160" alt="Stanford Information Law Symposium" title="Stanford Information Law Symposium" align="left" /></a>
</p>

<p>Though it could scarcely be more cumbersomely named &mdash; the <a href="http://www.seeuthere.com/eps/event/microsite/previewinvitation.asp?pagetype=CUSTOMPAGE&amp;CustomPageid=/338200">Transatlantic Information Law Symposium</a> &mdash; this upcoming (and free) program at Stanford Law School looks excellent, featuring such big thinkers as <a href="http://www.law.stanford.edu/directory/profile/38/">Mark Lemley</a> and <a href="http://cyberlaw.stanford.edu/blog/stefan-bechtold">Stefan Bechtold</a>, and such big topics as privacy, free speech, the future of Internet regulation, and one that looks particularly intriguing from the standpoint of social media and attention:  property vs. contract to govern online behavior.  I'd like to go, though the timing's not great for me; if <em>you're</em> going, blog the wealth.
</p>

<p>(<em>Image by <a href="http://www.flickr.com/photos/maveric2003/">Maveric2003</a>, <a href="http://creativecommons.org/licenses/by/2.0/deed.en-us">CC Attribution-2.0</a></em>)
</p>

<p></p>

<p></p>]]></media:text>
		</item>
	</channel>
</rss>