Brand Protection

Sponsored
by

Noteworthy

Brand Protection / Recently Commented

Copyright Infringement and ccTLDs

.tk was once designated as the riskiest ccTLD. .ru is often said to be, after .com, the most used in the content of spam messages. But is there a ccTLD that is a favorite destination for copyright infringement? The question is worth asking in view of the growing trend for .com domain names seizures related to copyright infringement. more

Why the Republican Policy Brief on Copyright Should Have Been Withdrawn

On November 16, the Republican Study Committee, a caucus of conservative Republican members of the U.S. House of Representatives, inadvertently released a policy brief entitled "Three Myths About Copyright Law" which was quickly withdrawn. Of course, as a work of the U.S. government, this document does not itself enjoy copyright protection, so it is widely available on the internet through groups like The Internet Archive project. more

Problems With Defining Jurisdiction on the Internet

The term "jurisdiction" has various definitions in law, but for our purposes here we can say it is the power of some legal body to exercise its authority over a person or subject matter or territory. In the Internet today, it is territory that gives rise to many major issues. As in real estate, what matters in jurisdiction is "location, location, location". When the Internet and trademark rights began to intersect, it quickly became apparent that traditional concepts of the jurisdiction of courts and legislatures would be seriously strained by situations where a registrant in one country could use a registrar in a second country to register a domain name in yet a third country. more

How SOPA Will Destroy The Internet

As you read this, please keep in mind that I say it all with a track record nearly 14 years of being proactive and having a zero-tolerance policy toward criminal activity and network abuse on our system. We have great relationships with Law Enforcement Agencies both here in Canada and abroad. We are always helpful and (usually) happy to answer questions, and help LEA understand the complexities and nuances of the internet. We've had the good fortune to meet some really intelligent and clued in cybercrime units. We participate in numerous communities in combating net.abuse and cybercrime. more

DNS Policy is Hop by Hop; DNS Security is End to End

The debate continues as to whether ISP's can effectively filter DNS results in order to protect brand and copyright holders from online infringement. It's noteworthy that there is no argument as to whether these rights holders and their properties deserve protection - nobody is saying "content wants to be free" and there is general agreement that it is harder to protect rights in the Internet era where perfect copies of can be made and distributed instantaneously. What we're debating now is just whether controlling DNS at the ISP level would work at all and whether the attempt to insert such controls would damage Secure DNS (sometimes called DNSSEC). more

ICANN Senate Hearing: The Battle Between Intellectual Property and Multistakeholderism

The US Senate Committee on Commerce, Science and Transportation Hearing on ICANN's Expansion of Top Level Domain Names on December 8, 2001 was all about strategy. The strategy was simple: while the world has its attention turned to the debate on the copyright legislative proposals of the Stop Online Piracy Act (SOPA) and the PROTECT IP Act, let's have another ICANN hearing and try to re-open trademark protection for new gTLDs. more

New TLD Spotted - .FUD

In politics, as in Internet policy, the most effective weapons are also the oldest. So when it came time for hard-line intellectual property advocates to make a desperate last stand against the new gTLD program, it came as no surprise they turned to the atomic bomb of rhetorical devices: FUD. FUD stands for "fear, uncertainty and doubt" and it is the tool of last resort when change is coming and you want to stop it. The theory is simple: the human response to fear is to cling to what's familiar and oppose what's new. So if you can scare enough people about the potential effects of a new policy or law, you stand a pretty good chance of preventing it from ever going into effect. more

Of Canaries and Coal Mines: Verisign’s Proposal and Sudden Withdrawal of Domain Anti-Abuse Policy

Too many techies still don't understand the concept of due process, and opportunistic law enforcement agencies, who tend to view due process constraints as an inconvenience, are very happy to take advantage of that. That's the lesson to draw from Verisign's proposal and sudden withdrawal of a new "domain name anti-abuse policy" yesterday. The proposal, which seems to have been intended as a new service to registrars, would have allowed Verisign to perform malware scans on all .com, .net, and .name domain names quarterly when registrars agreed to let them do it. more

Protecting Intellectual Property is Good; Mandatory DNS Filtering is Bad

It has been about six months since I got together with four of my friends from the DNS world and we co-authored a white paper which explains the technical problems with mandated DNS filtering. The legislation we were responding to was S. 968, also called the PROTECT-IP act, which was introduced this year in the U. S. Senate. By all accounts we can expect a similar U. S. House of Representatives bill soon, so we've written a letter to both the House and Senate, renewing and updating our concerns. more

Multi-Stakeholder Debate at the IGF: Lessons from a Safari

Here at the IGF in Kenya, we're debating how governments, private sector, and civil society can improve the multi-stakeholder model that's helped the Internet become such a vital part of life around the world. Makes me think of another kind of multi-stakeholder model I saw last week on a photo safari in Kenya's Masai Mara National Reserve. more

Automated Theft of Intellectual Property

A few days ago I wrote about a piece of my intellectual property, an article I wrote and posted on DaileyMuse.com, being stolen, plagiarized, and posted on another web site under a different authors name. I hadn't been looking for my work elsewhere, I was simply browsing the access logs and visiting other websites that stood out. As a result of finding my work posted elsewhere without my permission, I contacted the owner of the website by email and provided 24 hours to remove the content before I pursued legal action. more

Implications of ICANN’s New TLD Disqualification Policies and Cybersquatting 3-Strike Law

ICANN's proposed final applicant guidebook unraveled some new policies that would disqualify applicants from the new TLD program. ICANN states that if you lose 3 UDRP cases, you will be disqualified from being a major shareholder, partner, officer, director of a new top-level domain registry... Has ICANN opened a new can of worms with the 3-strike rule? more

Digital Rights Management or Digital Restrictive Management?

We are all accustomed to purchasing and/or using copyrighted material in one fashion or another. From music, movies-(BluRay), e-books-(Kindle), computers-(software), mobile phones-(iPhone) and games; the umbrella of companies wanting to restrict access to its products continues to grow and become increasingly restrictive. more

Protection of Intellectual Property: The Core of the Net Neutrality Debate

It didn't take long for criticism of the Verizon/Google net neutrality proposal to start pouring in. "nterest groups, bloggers, and even Google fanboys [have started] discrediting the plan" according to one trade publication. Although most of the commentary simply echoes various groups' long-held positions, the Electronic Frontier Foundation, the nation's foremost cyber-rights watchdog, provided a crucial insight about the plan that goes to the core of the net neutrality issue. more

Regulating and Not Regulating the Internet

There is increasingly heated rhetoric in DC over whether or not the government should begin to "regulate the internet." Such language is neither accurate nor new. This language implies that the government does not currently involve itself in governing the internet -- an implication which is clearly untrue given a myriad of laws like CFAA, ECPA, DMCA, and CALEA (not to mention existing regulation of consumer phone lines used for dialup and "special access" lines used for high speed interconnection). more