The Legal Lag Behind Emerging Technology: Aereo – Innovation or Exploit?
Ruchir Patel Aereo allowed users to stream and record broadcast television to any laptop or mobile device. Shortly after Aereo was announced, broadcasters filed for an injunction claiming Aereo was in fact a cable company, and as such needed to pay retransmission fees. The heart of broadcasters’ argument focused on the definition of “performance” and “to the public” under the Transmit Clause of the Copyright Act, 17 U.S. Code section 101. Aereo contested, stating that its service was acceptable both legally and technically because it simply provided users an alternative means to access free, over-the-air broadcasts. Much of Aereo’s legal...
Telemedicine’s Opportunities and Risks; A Balancing Act
Robert Park Obstacles that can complicate successful implementation of telemedicine are the legal ramifications. Legal complications can include fraud and abuse, patient confidentiality, and compliance with state requirements. Violation of patient care can result in heavy fines, and in telemedicine, a recent case involving the Texas Medical Board and a Telemedicine company could heat up within the coming months. Because of these obstacles, healthcare organizations face an arduous journey to getting reimbursed for implementing telemedicine. Read Full Text Here
The Trans-Pacific Partnership on Internet Service Providers: Notice, Counter-Notice, and Liability Limitations
Joseph Davi With the recent release of the Trans Pacific Partnership (TPP) intellectual property chapters, jurists and pundits have quickly begun to comb through the language and pick apart the intriguing and possibly soon-to-be influential document. While many have focused on this document’s proposed changes to the way copyright holders and infringers interact with their governments, each other, and each other’s governments, it is very important to stop and try to understand the changes that are more ground level. More specifically, it is worthwhile to take a close look at the proposed changes in how copyright holders and infringers interact...
Intellectual Property Indemnity Clauses
Thomas Hemnes, M.S. The practices associated with intellectual property indemnity can be traced in part to Article 2 of the Uniform Commercial Code. At the dawn of the computer age, practitioners searched for legal models that they could use for transactions in intangible rights and products such as computer software. Although computer software did not fit easily into the “sale of goods” paradigm, analogies to the familiar rules governing sales of goods were inevitable. Lurking in the lower reaches of Article 2 of the UCC, one finds an implied warranty of non-infringement in Section 2-312(2): Unless otherwise agreed, a seller...
Keep an I on the Sky: E-Discovery Risks Forecasted for Apple’s iCloud
Daniel Carmeli Some things have not changed since the fire of March 14, 1873. The competing interests of clients seeking convenient storage on one side against providers seeking protection from liability on the other continue to pervade the legal landscape. Naturally, some things have changed, such as the items being stored, the nature of the storage facilities, the associated risks, and the rules governing preservation obligations. Physical property has been replaced with electronically stored information (“ESI”) and warehouses now take the form of remote data servers. And in addition to longstanding conventional risks, such as accidental fire, companies now face...
Avoid the Rainy Day: Survey of U.S. Cloud Computing Caselaw
Fernando M. Pinguelo; Bradford W. Muller Cloud computing, a computer networking model that gives users on-demand access to shared software applications and data storage, is becoming increasingly popular among businesses and individuals. For example, if you use Google’s Gmail for your email and calendaring, or Snapfish for your online photo sharing and storage; or if your business remotely stores data with a third-party server provider like Salesforce, or uses Windows Azure to create and host web applications and services, you are already “floating in a cloud.” To provide guidance to those companies working within a cloud – or those considering...
A Safe Bet? State Control of Internet Gambling
Scott L. Jones Gambling has been a part of American life longer than the Constitution. The first recorded instance of gambling in the English colonies occurred in 1620 with horse races in Virginia. Shortly thereafter came the first instance of government in America addressing the issue of gambling when in 1621 the Plymouth Colony placed restrictions on gambling in that colony. Ever since that time, gambling has been regulated at both the federal and state levels. With the advent of the Internet, gambling regulations that do not anticipate the use of online gambling are quickly becoming outdated. As individual citizens...
“Indecent” Deception: The Role of Communications Decency Act § 230 in Balancing Consumer and Marketer Interests Online
Amy J. Tindell Should web hosts like Mindspring and online auction houses like eBay be held to the same standard as CSI, a brick-and-mortar flea market operator? Or does the Internet require special treatment due to its higher value as a vast source of information, communication, and social networking? On one hand, the Internet is a developing resource that the free market could shape without governmental regulation. Additionally, it is likely technologically infeasible for Mindspring or eBay to screen every vendor and product that passes through its virtual universe. On the other hand, consumers deserve protection from false and deceptive...
The Edge of Ethics in iParadigms
Michael G. Bennett In an attempt to stem a perceived rise in student plagiarism, educational institutions are increasingly turning to anti-plagiarism technologies. The use of these technological means to police student writings has been controversial, socially, politically, and legally. This article discusses the outcome of A.V. et al. v. iParadigms, to date the most important opinion on the legality of such technology’s use. The author examines the case in detail and presents arguments against the technology’s use, on the grounds that such use undermines educational policy by allowing the ethics of teachers to become a by-product of available technological means and...
Warrantless Search and Seizure of E-Mail and Methods of Panoptical Prophylaxis
Paul Ham U.S. citizens are in a constant battle for their rights to privacy, fighting the government’s increasingly pervasive surveillance and justicial needs. One area where court opinions conflict with the public’s expectation of privacy is over the realm of personal electronic communications. The general public believes electronic communications must be afforded a certain level of privacy that is not currently recognized by case law or statutes. Under current case law, warrantless searches and seizures of your personal e-mail are not prohibited by the Fourth Amendment. The Fourth Amendment should be your source for protecting your e-mails when you are...