This Week’s @cyberlaw Links

As a new feature on the blog, I will try to regularly look at articles I tweeted the links for on Twitter (@cyberlaw), and discuss them briefly. Here are some I found interesting this week:

HP Touchpad’s Fate

Jonathan Ezor’s review of the HP Touchpad I linked to last week became more timely after HP’s announcement that it was discontinuing the platform. It looks like WebOS may live on in some form, but the TouchPad itself is being phased out. Sad, really, as among Jonathan’s conclusions was the following nugget:

“With its ease of setup and support, true multitasking, Bluetooth keyboard compatibility, Flash-enabled browser, and Synergy, the HP TouchPad represents a solid choice for law firms and legal departments that want to add tablets to their technology portfolios.”

Too bad. I used Palms before they were even called Palms (I had a Pilot 1000 back in the day), and was quietly rooting for HP to do well after it acquired Palm.

Fake Apple Stores in China

On Ron Coleman’s Likelihood of Confusion blog, guest author Paul Jones offered his insight into the fake Apple Stores that were recently spotted in China. His insight isn’t that China is finding it hard to crack down on infringers, but rather the remote nature of the province and its inability to have a real store:

Kunming is the capital of Yunnan Province, in the far south of China. The province borders on Vietnam, Laos and Myanmar. It is thus far inland and is not one of the richer coastal provinces where foreign retailers first open their stores. But Kunming Prefecture has about 6 ½ million people. In other words there is demand there but no supply.

The entire article is well worth a read.

The Challenge of Producing Secure Devices

This article in Security Week was interesting for its insight into the world of developers. The pressure on developers to ship devices is so strong that they may have to ship devices with security flaws in order to meet deadlines. Chris Eng of Veracode is quoted as saying:

“I don’t think that every tiny bug, every tiny security bug, has to be fixed before it goes out the door,” he said. “Ideally you fix as many as you can but there’s always going to be some date where you have to ship stuff and you have to prioritize…but you also shouldn’t forget about them.”

This is relevant as many security issues today come from these vulnerabilities which may never be completely patched. There will always be someone who hasn’t applied the recommended security patches, etc., and thus perpetuate the problem caused by the hardware being released this way.

Copyright Termination

I liked this article by Larry Rohter on the upcoming battle over recording artists who can now file termination notices for their master recordings dating from 1978. The recording studios say no deal, however, claiming that the master recordings are works made for hire and thus not eligible for termination. As the article notes,

“Independent copyright experts, however, find that argument unconvincing. Not only have recording artists traditionally paid for the making of their records themselves, with advances from the record companies that are then charged against royalties, they are also exempted from both the obligations and benefits an employee typically expects.”

Artists already filing notices include Bob Dylan, Tom Petty, Bryan Adams, Loretta Lynn, Kris Kristofferson, Tom Waits and Charlie Daniels.

Article source: http://feedproxy.google.com/~r/CyberlawCentral/~3/Wqz9OnnsnLo/

View full post on National Cyber Security

Leave a Reply