The Humphreys IP Buzz : Dedicated to commentary on copyrights, trademarks, trade secrets and patents and legal issues centered on software, knowledge management, outsourcing, virtual organizations, ASP's and contracts. This is NOT legal advice.
Updated: 2/2/03; 1:52:47 PM.

 

Subscribe to "The Humphreys IP Buzz" in Radio UserLand.

Click to see the XML version of this web page.

Click here to send an email to the editor of this weblog.

 
 

Friday, January 10, 2003

In New York City or other metro areas a city statute might also apply. State statutes presumably apply also.

Thanks to Hale & Dorr

INTERNET ALERT: The Americans with Disabilities Act and Company Websites [^] the Ever-changing Legal Landscape!

Whether private company websites are public accommodations under Title III of the Americans with Disabilities Act (the ADA) is a hotly contested issue. In our November 15, 2000 Internet Alert, we reported on the developing legal argument that websites are [base "]places of public accommodation[per thou] and, therefore, are subject to the ADA. Many of the cases discussed addressed the factors considered in determining what constitutes a [base "]place of public accommodation[per thou] and did not specifically address Internet websites. One of the cases mentioned, a U.S. District Court case from the Southern District of Florida, concluded that a telephone system of selecting participants for a game show was not a place of public accommodation. The Eleventh Circuit Court of Appeals, however, recently overturned and vacated that decision. See Rendon v. Valleycrest Prod., Ltd., 294 F.3d 1279 (11th Cir. 2002).

Specifically at issue in Rendon was the means by which contestants qualify to participate in a game show. The court found that the phone quiz was a means of access to a place of public accommodation (participation in the game show), not an end in itself. Therefore, under Title III, the selection procedures for the game show were required to be accessible to persons with disabilities. Based on this analysis, one might assume that websites in general would soon be found to be places of public accommodation. However, this is not what has happened.

Access Now, Inc. v. Southwest Airlines, Co.: Federal District Court Holds Websites Are Not Public Accommodations

The Rendon decision was distinguished in the more recent case of Access Now, Inc. v. Southwest Airlines, 2002 U.S. Dist. LEXIS 19795 (S.D. Fla. Oct. 18, 2002). According to the U.S. District Court for the Southern District of Florida, Internet websites do not encompass a physical structure and, as a result, are not places of public accommodation for purposes of Title III. As a result of this determination, websites are not required to be made accessible to disabled persons.

Title III of the ADA requires that: [base "]No individual shall be discriminated against on the basis of disability in the full and equal enjoyment of the goods, services, facilities, privileges, advantages or accommodations of any place of public accommodation.[per thou] 42 U.S.C. § 12182 (1990). The obligations of Title III of the ADA only extend to private entities that are public accommodations. In the suit brought by Access Now, Inc., a Florida non-profit advocacy group, against Southwest Airlines, Co., Access Now claimed that southwest.com, Southwest Airline[base ']s internet website, violated Title III because it was a [base "]place of public accommodation[per thou], but was not accessible to blind individuals. More specifically, Access Now argued that the website violated Title III of the ADA because the [base "]goods and services offered on southwest.com are inaccessible to blind persons using a screen reader.[per thou] Southwest Airlines countered by arguing that southwest.com is not a [base "]place of public accommodation,[per thou] and therefore not covered by Title III.

In reaching its conclusion that southwest.com was not a public place of public accommodation, the Florida court reviewed the twelve (12) categories listed in Title III that qualify as [base "]public accommodations[per thou] and determined that, in order to be considered a place of public accommodation, there must be a [base "]physical, concrete structure.[per thou] Examples of places of public accommodation listed in the regulations include insurance offices, bakeries, restaurants, and museums. The court determined southwest.com was neither a physical, public accommodation nor a means of accessing a concrete structure; the website does not exist in any particular geographical location. Furthermore, Access Now could not demonstrate that access to a physical ticket counter or travel agency was somehow impeded. Therefore, southwest.com was not a place of public accommodation and not subject to the requirements of Title III.

The Florida court addressed the Eleventh Circuit decision in Rendon and concluded that its decision was in fact aligned with Rendon. The court noted that under Rendon, the reasoning behind the Eleventh Circuit[base ']s ruling that Title III applied to the automated telephone screening system was because there was a [base "]nexus between the challenged service and the premises of the public accommodation,[per thou] namely the concrete television station. It used this same analogy to demonstrate that there was no nexus between southwest.com and a physical, public accommodation.

Access Now immediately appealed the Southwest Airlines decision to the Eleventh Circuit Court of Appeals.

Similar Suits by Access Now, Inc.

While the Southwest Airlines suit is similar to other suits filed by Access Now, it appears that the defendants in other suits have chosen to settle the claims brought by Access Now, rather than litigate. For example, the settlement reached between Access Now and the Claire[base ']s Stores requires Claire[base ']s Stores to modify its Internet website to ensure that it is accessible to disabled persons. Access Now, Inc. v. Claire[base ']s Stores, Inc., No. 00-14017-CIV, 2002 WL 1162422 at *6 (S.D. Fla. May 7, 2002). In noting its approval of the Claire[base ']s Stores[base '] settlement agreement, the Southern District of Florida acknowledged that [base "][n]o court has held that internet websites made available to the public by retail entities must be accessible.[per thou] The Claire[base ']s Stores suit and another similar suit against Barnes and Noble both were settled prior to the decision in Southwest Airlines.

Situations Where Websites Must be Accessible to Disabled Persons

The U.S. Supreme Court has not voiced its opinion on whether private company websites are subject to the requirements of Title III. However, the Federal Government has already determined, under Section 508 of the Rehabilitation Act regulations, that its Internet websites must be accessible for Federal employees and members of the public with disabilities. Electronic and Information Technology Accessibility Standards, 36 C.F.R. §§ 1194.1, 1194.4 (2001). Additionally, in an unpublished U.S. District Court for the Northern District of Georgia opinion, Martin v. Metro. Atlanta Rapid Transit Auth. (MARTA), 2002 U.S. Dist. LEXIS 19650 (Oct. 7, 2002), the court held that the plaintiffs would likely meet their burden in demonstrating that the government transportation agency, MARTA, failed to make information and schedules located on its website available, through accessible formats as required by Title II of the ADA and its regulations, to individuals with disabilities. See 28 C.F.R. § 35.160.

While Title II of the ADA only applies to [base "]public entities,[per thou] such as local governments, these examples of Internet websites being required to be accessible may influence any future U.S. Supreme Court decision regarding accessibility of private company websites and the requirements of Title III. For now, the wait for a definitive answer on private websites and the ADA still will go on.

Copyright 2002 Hale and Dorr LLP. All Rights Reserved.
2:29:08 PM    comment []


Thanks to Hale and Dorr

INTERNET ALERT: Homeland Security Bill Offers New Opportunities for Technology Companies

The Homeland Security Act of 2002, which President Bush signed into law on November 25, 2002, has been described as a massive consolidation of 22 federal agencies and approximately 170,000 employees with a wide range of anti-terrorism responsibilities.

Beyond the new organizational charts, however, the Homeland Security Act contains numerous provisions of interest to private-sector technology companies, including stronger cyber-security measures, authorizations for targeted public-private research initiatives, sales opportunities for commercial technology products and services, streamlined procurement policies, and limitations on legal liabilities. Through these provisions, the new Department of Homeland Security (DHS) is expected to leverage [base "]private sector products, applications and solutions as they relate to homeland security challenges.[per thou] See our November 14, 2001 Internet Alert on the Defense Department[base ']s previous effort to solicit commercial solutions following the terrorist attacks of September 11, 2001.

Technology Infrastructure and Cyber-Security Enhancements

The DHS Directorate for Information Analysis and Infrastructure Protection will collect and analyze homeland security information and intelligence and protect the nation[base ']s government and private-sector critical information technology networks.

In order to encourage non-federal entities to provide DHS with information about threats to critical computer systems, information voluntarily provided to DHS may be protected from use for other purposes and can be provided under an exemption from disclosure under the Freedom of Information Act. Recognizing that non-government networks are vulnerable to terrorist attacks, the law directs DHS to provide analysis, warnings, crisis management, and technical assistance to private-sector operators of critical information systems and proposes the creation of a [base "]NET Guard[per thou] corps of volunteer technical experts to assist local authorities to respond and recover from cyber-attacks.

The law instructs DHS to utilize commercial technologies and service providers to improve the government[base ']s domestic intelligence-gathering capabilities. A DHS Privacy Officer will be responsible for monitoring these information collection technologies, reviewing DHS regulations, and reporting to Congress on DHS efforts to protect individual privacy.

The law also adds new protections against unauthorized access to information networks. Among these provisions are increased penalties for cyber-terrorism under the Computer Fraud and Abuse Act and a prohibition of Internet advertising of devices that illegally intercept electronic communications.

Federally-Supported Acquisitions, Research & Development

Given its size and complex mission, the new DHS may quickly become a major consumer of commercial products and services, including significant purchases of commercial information technologies and software. So far, however, a widely expected wave of new homeland security contracts has been slow to materialize. This is due in part to a moratorium on major information technology acquisitions by DHS component agencies, imposed by the White House in July 2002 to avoid redundant acquisitions while DHS needs are assessed. In addition, DHS will have to compete for funding with other federal budget priorities, because the law authorizes, but does not fund, new homeland security initiatives.

However, as the consolidated agency[base ']s acquisition requirements are defined, new opportunities for technology companies will emerge. For example:

· The new Bureau of Citizenship and Immigration Services (a successor to the current Immigration and Naturalization Service) to directed to seek [base "]Internet-based technologies[per thou] for providing information and receiving filings affecting millions of immigrants.

· DHS and other federal agencies are required to implement information security safeguards [base "]commensurate with the risk and magnitude of the harm resulting from unauthorized access, use, disclosure, disruption, modification, or destruction[per thou] of the data maintained on agency systems, and the law states a preference for commercial information security solutions.

The DHS Directorate of Science and Technology will be a new focus for public-private collaboration on technologies addressing chemical, biological, radiological, nuclear, and other terrorist threats. The law provides for a wide range of homeland security R&D initiatives, including:

· A Homeland Security Advanced Research Projects Agency to provide competitive awards to private companies to develop priority technologies, supported by a proposed [base "]Acceleration Fund[per thou] of up to $500 million, subject to Congressional funding.

· Homeland security-related collaborations with the Department of Energy[base ']s renowned national laboratories, which already provide funding, research facilities, and technical expertise to private companies.

· Coordination of human health research projects conducted by the Department of Health and Human Services, which houses the National Institutes of Health and the Centers for Disease Control and Prevention.

· A DHS advisory commission, a research institute and a technology clearinghouse, intended to promote private-sector participation in DHS science and technology activities.

In addition, the law creates a new Justice Department Office of Science and Technology to fund R&D projects in areas such as monitoring and alarms, communications systems, and DNA identification.

Streamlined Procurement Rules

The Homeland Security Act contains streamlined procurement policies that may be a model for future changes in government-wide acquisition policies. Among the special rules for DHS acquisitions are expanded authorizations to make noncompetitive purchases, increased thresholds for using [base "]simplified[per thou] procurement methods, and broader use of [base "]commercial[per thou] contract terms. Other federal agencies will be permitted to use these streamlined procedures for emergency acquisitions related to homeland security needs.

The law helps companies with innovative technologies by requiring federal agencies to make ongoing efforts to identify [base "]new entrants[per thou] that may be able to provide anti-terrorism products or services to the government.

New Liability Limitations

The law provides new protection for companies that disclose electronic communications to law enforcement agencies. Specifically, the law amends the Electronic Communication Privacy Act, 18 USC 2702(b), to permit electronic communication providers to disclose the contents of a subscriber[base ']s message in emergency situations involving a danger of death or personal injury.

Other provisions limit the legal liability of companies that are sued for alleged defects in vaccines and certain anti-terrorism technologies. For technology suppliers, these protections include a prohibition on punitive damages, limitations on noneconomic damages, and an extension of the so-called [base "]government contractor defense[per thou] that shields companies from liability for work performed under federal direction.

The new DHS will immediately become one of the largest federal government entities, with perhaps the most complex set of missions. In creating DHS, Congress acknowledged the critical role of commercial technology companies in protecting homeland security and in providing the tools needed to operate the vast new Department. The Homeland Security Act provides a blueprint for involving the technology sector in homeland security.

Barry J. Hurewitz, via email

Hale and Dorr LLP

Telephone: 202-942-8413

Telecopy: 202-942-8484

To receive a free copy of our 2001 e-Alert book - a compilation of all 2001 Internet Alerts, please click here.

The Hale and Dorr Internet Law Group periodically distributes short and practical alerts on topics of interest to Internet and other technology companies. You can access our earlier alerts, or subscribe to receive future alerts, at our Web site. Subscribers may periodically receive other informational materials from us. Our web site also contains extensive information about our Internet attorneys, legal services, clients, transactions and publications, as well as links to numerous Internet resources.

If you do not wish to receive any further Internet Alerts from Hale and Dorr LLP, please reply to this email with the word "Remove" typed in the subject line.

Copyright 2002 Hale and Dorr LLP. All Rights Reserved.
2:21:12 PM    comment []


http://www.washingtonpost.com/wp-dyn/articles/A34171-2003Jan9.html
2:07:35 PM    comment []

http://www.internetwk.com/story/INW20030109S0001
1:58:09 PM    comment []

http://www.abanet.org/journal/ereport/j10aus.html
1:46:26 PM    comment []

Thanks to Hale & Dorr

INTERNET ALERT: Seminar Explores Data Protection Challenges for Companies with U.K. Operations

The European Union[base ']s Data Protection Directive establishes a standard for protecting personally-identifiable data which is more demanding than currently accepted privacy principles in the United States. See our June 24, 1999 and April 18, 2000 Internet Alerts. The Data Protection Directive also restricts the transfer of EU personally-identifiable data to other countries [^] such as the United States [^] which are not deemed by the EU to have adequate privacy laws of their own. Such transfers have become particularly challenging for European subsidiaries of U.S. companies, which must both comply with the Data Protection Directive and at the same time provide human resource ([base "]HR[per thou]) and other information to their U.S. parent companies in connection with paying EU employees, evaluating their performance and conducting other routine operations. Companies should be aware that breaching the relevant rules in this area exposes them to civil claims as well as the risk of criminal prosecution.

On November 19, Hale and Dorr, in conjunction with Brobeck Hale and Dorr, conducted a seminar in London (with a live video conference link to Boston) that explored how U.K. and U.S. companies are dealing with these new regulatory challenges.

Sarah Harrop of Brobeck Hale and Dorr[base ']s London and Oxford offices discussed the implementation of the Data Protection Directive, along with the related Directive on the Protection of Privacy in the Telecommunications Sections (the [base "]ISDN Directive[per thou]) and the recent Directive on the Protection of Privacy in the Electronic Communications Sector (the [base "]Spam Directive[per thou]), which was the subject of our August 12, 2002 Internet Alert. To see Sarah[base ']s PowerPoint presentation, click here.

Barry Hurewitz of Hale and Dorr[base ']s Washington office then reviewed the various methods by which personally-identifiable data may be transferred from EU countries to the U.S. under the Data Protection Directive. The primary mechanisms for transferring personal data from the EU to the U.S. permit transfers subject to contractual privacy safeguards, transfers necessitated by contractual obligations, and transfers to U.S. companies that have self-certified under the voluntary safe harbor program (see our February 14, 2001 and December 27, 2001 Internet Alerts). To see Barry[base ']s PowerPoint presentation, click here.

Finally, Henry Clinton-Davis of Brobeck Hale and Dorr[base ']s London Office reviewed, from a U.K. labor law perspective, the HR issues that arise when dealing with personally-identifiable information of U.K. employees. Click here to review a paper discussing data protection principles in the HR context, including special guidelines for sensitive personal data, the U.K. Information Commissioner[base ']s employment practices data protection code, proposed additional European privacy legislation, individuals[base '] rights to access data about themselves, procedures for handling medical and sickness records, guidelines for monitoring employees[base '] e-mail and Internet usage, providing access to records of disciplinary investigations, and remedies for privacy violations. To see Henry[base ']s PowerPoint presentation on laws and regulations with respect to U.K. HR data and employee monitoring, click here.

For further questions on these topics, please contact Sarah Harrop, Barry Hurewitz or Henry Clinton-Davis directly.

Hale and Dorr LLP

Washington, D.C.

Telephone: 1-202-942-8413

Telecopy: 1-202-942-8484

Brobeck Hale and Dorr

London

Telephone: 44-20-7645-2524 or 2507

Telecopy: 44-20-7645-2424

To receive a free copy of our 2001 e-Alert book - a compilation of all 2001 Internet Law Email Alerts, please click here.

The Hale and Dorr Internet Law Group periodically distributes short and practical alerts on topics of interest to Internet and other technology companies. You can access our earlier alerts, or subscribe to receive future alerts, at our Web site. Subscribers may periodically receive other informational materials from us. Our web site also contains extensive information about our Internet attorneys, legal services, clients, transactions and publications, as well as links to numerous Internet resources.

If you do not wish to receive any further Internet E-Mail Alerts from Hale and Dorr LLP, please reply to this email with the word "Remove" typed in the subject line.

Copyright 2002 Hale and Dorr LLP. All Rights Reserved.
1:33:15 PM    comment []


http://www.abanet.org/journal/ereport/d6plag.html
1:32:02 PM    comment []

ATTEMPTED TRADE SECRET SALE VIOLATED ECONOMIC ESPIONAGE ACT

A former employee's attempted sale of reverse-engineering data for making aftermarket aircraft brake assemblies violated the Economic Espionage Act's prohibition against dealing in "trade secrets," the U.S. Court of Appeals for the Seventh Circuit holds. "U.S. v. Lange. " . . . Page 113

http://ippubs.bna.com/ip/BNA/ptc.nsf/is/a0a6f1q5c7

FAILURE TO RESPOND TO NAME CHANGES WAS ACQUIESCENCE TO TRADEMARK USE

A trademark owner's failure to respond to an alleged infringer's good faith offer to change its name qualified as active consent by the trademark owner to the use of the name, the U.S. Court of Appeals for the Second Circuit rules. However, the court vacates a summary judgment for an infringement defendant because the district court failed to make findings on likely confusion to resolve the plaintiff's claim of progressive encroachment. "Pro Fitness Physical Therapy Center v. Pro-Fit Orthopedic and Sports Physical Therapy P.C., " . . . Page 115

http://ippubs.bna.com/ip/BNA/ptc.nsf/is/a0a6f1j1q2

TRADEMARKS:The use of a trademark for the domain name of a Web site containing critical commentary about the trademark owner is a commercial use, even though the domain name is also the surname of the defendant, the U.S. District Court for the Central District of California rules. "Nissan Motor Co. Ltd. v. Nissan Computer Corp. " . . . Page 118

http://ippubs.bna.com/ip/BNA/ptc.nsf/is/a0a6e6g1f7

COPYRIGHTS:The way a three-note "arpeggiated" chord was used and memorialized in a sound recording was sufficiently original and creative to warrant copyright protection, but its sampling in another recording was not infringing, the U.S. District Court for the Middle District of Tennessee holds. "Bridgeport Music Inc. v. Dimension Films LLC. " . . . Page 119

http://ippubs.bna.com/ip/BNA/ptc.nsf/is/a0a6e1r0k1

COPYRIGHTS:The right of publicity claim by a model to block the use of her likeness on a hair product is preempted by the Copyright Act, the U.S. District Court for the Central District of California rules. "Toney v. L'Oreal USA Inc. " . . . Page 120
1:29:25 PM    comment []


http://www.interesting-people.org/archives/interesting-people/200212/msg00030.html
1:26:31 PM    comment []

Thanks to Hale and Dorr

INTERNET ALERT: E-Retailers May be Affected by State Gift Certificate Statutes

Clients who offer gift certificates for products sold over the internet should be aware that several states have specific statutes governing the use and appearance of gift certificates. Moreover, several states have pending legislation governing gift certificates. Under these statutes, any violation -- however minor -- can give rise to a claim by the purchaser or holder, including claims that carry multiple damages and attorneys' fees. In addition, such claims can be brought as class actions.

In several states, a violation of the gift certificate statute also constitutes a violation of the state's consumer protection law. These consumer protection statutes carry the potential for class action law suits, multiple damages, fee shifting and, in some cases, enforcement and penalties by the attorney general.

The number of class action suits based on alleged violation of gift certificate statutes is on the rise. It is therefore particularly important for e-retailers to be aware of the various state laws governing gift certificates. The attached bulletin sets out the requirements of the statutes currently in place for California, Hawaii, Massachusetts, New Hampshire, New Jersey, New York, Oklahoma, and Rhode Island. It also details the pending legislation in Kansas, Michigan, Nebraska, Pennsylvania, and Tennessee.

Gabrielle R. Wolohojian, via email

James W. Prendergast, via email

Hale and Dorr LLP

Telephone: 617-526-6167 and 6181

Telecopy: 617-526-5000

To receive a free copy of our 2001 e-Alert book - a compilation of all 2001 Internet Alerts, please click here.

The Hale and Dorr Internet Law Group periodically distributes short and practical alerts on topics of interest to Internet and other technology companies. You can access our earlier alerts, or subscribe to receive future alerts, at our Web site. Subscribers may periodically receive other informational materials from us. Our web site also contains extensive information about our Internet attorneys, legal services, clients, transactions and publications, as well as links to numerous Internet resources.

If you do not wish to receive any further Internet Alerts from Hale and Dorr LLP, please reply to this email with the word "Remove" typed in the subject line.

Copyright 2002 Hale and Dorr LLP. All Rights Reserved.
1:22:48 PM    comment []


http://www6.law.com/lawcom/displayid_cases.cfm?statename=NY&docnum=170713&table=case+digest&flag=full
1:16:58 PM    comment []

http://www.law.com/jsp/article.jsp?id=1039054440840
1:13:02 PM    comment []

http://www.nacdonline.org/publications/pubDetails.asp?pubID=138&user=A170493

http://www.nacdonline.org/publications/pubDetails.asp?pubID=138&user=A170493
1:07:02 PM    comment []


-----Original Message----- From: Custserv [mailto:custserv@sportsendeavors.com] Sent: Sunday, December 08, 2002 9:45 AM To: nhumphreys@akingump.com Subject:

Dear Customer,

We did carry the Manchester United Heather Fleece, item 187188 with an embroidered logo, but unfortunately, we have now sold out of that item. We do not have anything else like it available now, but you can try the websites listed below:

www.subside.co.uk www.replicaworld.co.uk www.jags-online.com www.kitbag.com www.calciomania.com

Sara Hils Alternative Orders Supervisor Eurosport: The Fabled Soccer Traders Keepersport Great Atlantic Lacrosse 431 US Hwy 70-A East Hillsborough, NC 27278 1-800-934-3876 ext. 2119 Fax: 1-800-443-8326 custserv@soccer.com (lacrosse.com) www.soccer.com www.lacrosse.com
12:57:55 PM    comment []


Thanks to Hale and Dorr

INTERNET ALERT: Council of the EU Adopts Major Antitrust Law Reform

Based on a proposal by the European Commission (2000/0243CNS), on November 26, 2002 the Council of the European Union adopted the most comprehensive reform since 1962 with respect to procedures to be followed for ensuring the compliance of individual license, distribution, research and related agreements with EU antitrust law. Effective May 1, 2004, the reform will make significant changes to Regulation No. 17 of 1962, which has since 1962, without major changes, provided the procedural rules under which the EU Treaty[base ']s Articles 81 and 82 are enforced with respect to agreements which restrict competition.

Fundamentally, the reform attempts to enhance enforcement by simplifying procedures. Companies will no longer have to notify the European Commission with respect to individual agreements in order to obtain clearance or exemption under the EU[base ']s antitrust rules. Under the current Regulation 17, companies are required to notify the Commission with respect to agreements which restrict competition and which do not fall within the safe harbors created by various block exemptions, such as Reg. No. 2790/1999 on Vertical Agreements, Reg. No. 240/1996 on Technology Transfer and Reg. No. 2659/2000 on Research and Development.

In the past, these procedural requirements resulted in the EU Commission receiving notice of an enormous number of agreements. It is widely acknowledged that continuing this system of notification and clearance/exemption for individual agreements would not be workable when the EU expands from 15 to 25 Member States in 2004, with the addition of Cyprus, the Czech Republic, Estonia, Hungary, Latvia, Lithuania, Malta, Poland, the Slovak Republic and Slovenia.

Furthermore, as we discussed in our January 8, 2001 Internet Alert, when the Vertical Agreement block exemption was issued in 1999, for the first time, the market share of the parties became relevant in determining whether the safe harbor is available. The safe harbor under that block exemption is not available if the supplier's market share exceeds 30% or, in exclusive supply arrangements, the buyer's market share exceeds 30%. For companies that offer goods and services that are often promoted as having no competitive alternatives, it is sometimes difficult, under the current block exemption approach, to prove that relevant market shares are less than 30%

The Council[base ']s reforms replace the current system with a system that offers directly applicable exceptions, based on the judgment of the companies involved rather than a decision of the European Commission. Under the new system, companies are freed from the requirement that they notify the European Commission of their agreements. Those agreements will automatically be valid as long as the criteria for exemption in Article 81(3) are met:

The provisions of paragraph 1 [Article 81[base ']s prohibition of restrictive agreements] may, however, be declared inapplicable in the case of:

[macron] any agreement or category of agreements between undertakings [companies];

[macron] any decision or category of decisions by associations of undertakings; [and]

[macron] any concerted practice or category of concerted practices;

which contributes to improving the production or distribution of goods or to promoting technical or economic progress, while allowing consumers a fair share of the resulting benefit, and which does not:

(a) impose on the undertakings concerned restrictions which are not indispensable to the attainment of these objectives; [or]

(b) afford such undertakings the possibility of eliminating competition in respect of a substantial part of the products in question.

A central pillar of this reform is the increased role of national competition authorities. They are, along with the European Commission, enforcers of EU competition rules. By May 1, 2004, the EU will establish the so-called network of European Competition Authorities (ECN). The goal of this network will be to ensure that antitrust rules are enforced in a consistent manner throughout the 25 EU Member States.

The EU Commission intends to issue a number of Notices in order to explain and clarify certain key issues of this reform and to thus assist companies in evaluating their agreements in light of the EU competition rules.

This reform does not affect the requirements under the current rules governing merger control. Mergers which have a [base "]community dimension[per thou] as defined in the Merger Regulation must still be notified to the European Commission.

The new system puts more responsibility in the hands of the companies, who will need to ensure themselves that their agreements do not restrict competition or, in case they do, that these restrictions qualify under the Article 81 (3) criteria. In this sense, the new system will resemble the general enforcement approach followed in the United States, where companies in a vertical relationship (e.g., suppliers and distributors) enter into various restrictive contractual provisions based not on clearance from a government agency, but rather, based on the companies[base '] belief that, if they were ever challenged, a court or administrative agency would ultimately conclude that the pro-competitive benefits of the agreement outweigh any anticompetitive effects (under the so-called rule of reason).

In shifting this determination of what is reasonable under competition law from the European Commission to the contracting parties themselves, the ultimate goal of this reform is to streamline procedures without sacrificing underlying competition principles. Of course, no one will know until well after May 1, 2004 how achievable that goal will be.

Peter W. Kremer, via email

Brobeck Hale and Dorr, Munich

Telephone: 49-89-24-213-102

Telecopy: 49-89-24-213-213

Michelle D. Miller, via email

Hale and Dorr, Boston

Kenneth H. Slade, via email

Hale and Dorr, Boston

Hale and Dorr LLP

Telephone: 617-526-6116 and 6184

Telecopy: 617-526-5000

To receive a free copy of our 2001 e-Alert book - a compilation of all 2001 Internet Alerts, please click here.

The Hale and Dorr Internet Law Group periodically distributes short and practical alerts on topics of interest to Internet and other technology companies. You can access our earlier alerts, or subscribe to receive future alerts, at our Web site. Subscribers may periodically receive other informational materials from us. Our web site also contains extensive information about our Internet attorneys, legal services, clients, transactions and publications, as well as links to numerous Internet resources.

If you do not wish to receive any further Internet Alerts from Hale and Dorr LLP, please reply to this email with the word "Remove" typed in the subject line.

Copyright 2002 Hale and Dorr LLP. All Rights Reserved.

This alert is provided with the understanding that it does not constitute the rendering of legal, tax or other professional advice or services by Hale and Dorr LLP or its attorneys.
12:56:21 PM    comment []


ALLOWING PUBLICATION OF TOBACCO INGREDIENTS IS TAKING OF TRADE SECRETS

A Massachusetts law that permits the publication of disclosed tobacco product ingredients is an unconstitutional taking of the tobacco companies' trade secrets, the en banc U.S. Court of Appeals for the First Circuit rules. Affirming a summary judgment for the tobacco companies, the three-judge en banc court concludes that the tobacco companies had a reasonable investment-backed expectation that their trade secrets would be protected, and that the state law essentially extinguished that right with the prospect of public disclosure. Judge Bruce M. Selya agrees, but argues that the economic impact or character of the state action need not be considered in a trade secret case. Judge Kermit Lipez in a dissenting opinion insists that there was no showing that the statute would require disclosure of all of the ingredients lists. "Philip Morris Inc. v. Reilly". . . . Page 138

http://ippubs.bna.com/ip/BNA/ptc.nsf/is/a0a6f6d2q1 [subscription required]
12:54:33 PM    comment []


http://ipcenter.bna.com/PIC/ippic.nsf/(Index)/A7D01BB883AEE5D785256C8300595184?OpenDocument
12:51:33 PM    comment []

http://ipcenter.bna.com/PIC/ippic.nsf/(Index)/FB107EC4C00F042E85256C800079B4DA?OpenDocument
12:50:43 PM    comment []

Isat study of privacy

http://www.epic.org/privacy/profiling/tia/isat_study.pdf

Study Seeks Technology Safeguards for Privacy

December 19, 2002 By JOHN MARKOFF

The Pentagon has released a study that recommends the government pursue specific technologies as potential safeguards against the misuse of data-mining systems similar to those now being considered by the government to track civilian activities electronically in the United States and abroad.

The study, "Security and Privacy," was commissioned in late 2001 before the advent of the Pentagon's Total Information Awareness system, which is under the leadership of Dr. John M. Poindexter, national security adviser in the Reagan administration. The study was conducted by a group of civilian and military researchers, the Information Sciences and Technologies Study Group, or ISAT, which meets annually to review technology problems.

A Washington privacy group, the Electronic Privacy Information Center, filed a Freedom of Information request last month with the Pentagon's Defense Advanced Research Projects Agency, or Darpa, and made the report available yesterday.

The privacy group had asked the military to release documents relating to any review of the privacy implications of the Total Information Awareness system. Yesterday a group official said the study did not appear to be a complete response to its request. "They seem to be saying they have made no assessment of the privacy issues raised by the Total Information Awareness system," said David Sobel, general counsel for the group. "It's disturbing."

The study concludes that technologies can be adapted to permit surveillance while minimizing exposure of individual information. Those technologies include automated tracing of access to database records; the ability to hide individual identification while conducting searches of databases with millions of records; and the ability to segregate databases and to block access to people without authorization.

"Perhaps the strongest protection against abuse of information systems is Strong Audit mechanisms," the authors wrote. "We need to watch the watchers."

But several study participants said there was also widespread skepticism within the group about whether technological safeguards would protect privacy.

"It's laughable they gave our report in response" to the privacy group's request, said Barbara Simons, an ISAT member who is the former president of the Association of Computing Machinery. "We weren't looking at Total Information Awareness, and we weren't looking at policy issues."

The study was commissioned in the wake of the Sept. 11 attacks. It drew together 41 computer scientists and policy and civil liberties experts at several meetings this year.

The report specifically notes that it is not a review of the Total Information Awareness system or any other program. The authors also note that they intentionally focused only on technology, not on policy issues.

A Darpa spokeswoman did not respond to a request for comment.

Dr. Poindexter took over in February as director of the Information Awareness Office, one of two Darpa agencies created after Sept. 11 to combat new kinds of warfare.

The Information Awareness Office is developing a prototype of a system that might cast a vast electronic net to detect suspicious patterns of behavior - possibly alerting the authorities to terrorist attacks. But the prototype system has drawn angry reactions from privacy advocates and others because it could lead to elaborate monitoring of civilians.

The Information Awareness Office was a sponsor of the study, and Dr. Poindexter was a participant in one meeting, several participants said. Dr. Poindexter has said publicly that he has begun discussions with the National Academy of Science to finance a long-range study of the privacy implications of new surveillance technologies.

http://www.nytimes.com/2002/12/19/national/19COMP.html?ex=1041304089&ei=1&en =405d25536916233c
12:39:46 PM    comment []


http://www.praxagora.com/andyo/ar/ip_owners.html
12:27:20 PM    comment []

The Cybersecurity Industrial Complex

The Feds have a massive, multiagency plan to protect the national information infrastructure. Get ready for IT police and network smart bombs.

By Bruce Sterling

Since the dawn of the information age, computer security commandos have battled the Four Horsemen of the Infocalypse: child pornographers, drug lords, mafiosi, and terrorists. A noble struggle, to be sure, but mostly vaporwar.

Computer cops have long predicted that a massive cyberdisaster would transform their field from an underfunded annex into a law enforcement cornerstone. On 9/11, disaster struck, and whileal Qaeda doesn't appear to have mastered high tech, a year later the President's Critical Infrastructure Protection Board has unveiled a comprehensive plan: "The National Strategy to Secure Cyberspace." It's not a precise scheme for defeating cyberwar, cyberterror, and cybercrime, but the 58-page document does give a firm sense of the immense bureaucratic scale and vast budget required.

Self-appointed security experts may scoff, yet "National Strategy" is actually a well-informed report written by sober, career-oriented functionaries. Richard Clarke and Howard Schmidt, the board's chair and vice chair, respectively, have broad experience that ranges from police work to the Air Force to the National Security Council to Microsoft. And there's money on the table. The $1.4 billion a year currently spent to secure federal computers is likely to expand by a factor of 10 during the rest of the Bush presidency. Given the present lean times, many clever hands will have their palms out. "National Strategy" cordially name-checks nearly every outfit that might improve the situation.

Who will secure America's computing resources? Here's a brief list of organizations mentioned in the report, ranked from most formidable to least effectual, along with my best guesses as to their marching orders. Cyberterrorists beware: This is what you're up against.

Defense Department If you're operating on foreign soil, the DOD will blow up your desktop and comb the wreckage for incriminating data.

National Security Agency/UKUSA Echelon Outside and possibly inside the US, these spooks will listen in on your phone calls and read your faxes and email.

Federal Bureau of Investigation The FBI will continue being the FBI, only bigger and angrier.

Targets: global terror and multinational business crime.

Secret Service The earphone army will collar money launderers, credit card and bank fraudsters, plus anybody "of protective interest."

Federal Telecommunications and Information Systems Infrastructure This hypothetical outfit will get federal communications off the hack-prone Internet and onto safe, dedicated hardware.

National Homeland Security Portal This is a one-stop Web shop for security patches and approved encryption, still in the idea stage.

Office of Management and Budget The OMB will map federal networks and issue security report cards. A bad grade means you lose your computer money.

National Infrastructure Assurance Partnership NIAP reps will make sure your workplace hardware meets their standards. Do what they say or your insurance will skyrocket.

National Institute of Standards and Technology NIST's Computer Security Resource Center will write primers, distribute patches, and hand out cool security toys.

Federal Computer Incident Response Center When new 'sploits devastate government routers, these white hats will man the servers.

National Infrastructure Protection Center This is an attempt to keep data lines open among 18,000 federal, state, and local law enforcers should all hell break loose.

Federal Emergency Management Agency The valiant disaster relief office will rush food and clothing to American cyberwar casualties.

Task Force on Computer and Network Security Responsible for locking down the .edu sector, this agency will sniff out student hackers and have them expelled.

Partnership for Critical Infrastructure Security This confederation will roll 13 federal agencies and 60 businesses into a military-industrial complex for waging long-term infowar.

Information Sharing and Analysis Centers Here, corporate players who otherwise would be conspiring in restraint of trade can share "sector-specific security information."

Cyberspace Academy This imaginary defense school will trade hordes of Cyber Corps soldiers for the expanding security apparatus.

Forum of Incident Response and Security Teams A vague diplomatic huddle where Americans will argue about security with increasingly alienated Europeans, Japanese, Indians, Canadians, Australians, and Chinese. ------------------------------------------------------------------------

Email Bruce Sterling at bruces@well.com.
12:23:00 PM    comment []


-----Original Message----- From: Consorcio Software Libre [mailto:info2@csl.cc] Sent: Saturday, December 21, 2002 9:56 PM To: nylug-talk@nylug.org Subject: [nylug-talk] [Off-Topic] Free Software Consortium in search of Consultants and Agents in your area.

We would like to invite you to be a founding members of the FSC either as a Consultant and/or an Agent.

http://www.fsconsortium.com

On the main page you will find links to subscribe as consultant and/or agent.

Free Software Consortium is a multinational consortium established to link the companies and the independent consultants that use and promote free software.

One of the bigger obstacles to the development of the free software services market is the fear of many companies to establish contracts with independent consultants who do not have support of a well known Company, Corporation or Consortium. Questioning quality, support, experience and capability to successfully complete a project are the companies manager's main concerns when considering the option of migrating their systems to free software.

Like you, we know the excellent quality that Free Software offers. We have complete confidence that Free Software is going to be the platform of the future. That is why it's so important to work and consolidate together to solve the problem mentioned above.

Free Software Consortium intends to fill this void joining the best free software companies and consultants at the national and international level.

By joining to Free Software Consortium you or your company will have the following benefits:

1. Possibility of being hired by other Consortium members. 2. Possibility of hiring other Consortium members. 3. Use of the Consortium image and name with your clients. 4. Use of the Consortium's resources like Publicity Brochures, Business Cards, Banners for presentations and events, financial presentations, publicity articles for the press and magazines, support via mailing list and forums with the Consortium's members, marketing and communication assistance, CD's and manuals from the Consortium, site and mail hosting (yourarea.fsc.cc) and other future services. 5. Representation of the FS Consortium in your area to share administrative, legal and marketing resources between the Consultant members in your area.

Free Software Consortium will establish a contract with an Agent company which will have exclusive representation in it's area, in charge of organizing the consultants in the area. This Agent company will provide the administrative services, marketing and sales with the local customers.

From the business generated by the Free Software Consortium, the Agent company will receive 20% of the value of the contract, and the Consultant or Consulting company will receive 80%.

The Free Software Consortium is developing a new business model and invites you to join as a founding member and contribute in developing this new business model. We need your valuable help to give us ideas and comments. Please write to info@fsconsortium.com

Thank you for your attention.

Free Software Consortium http://www.fsconsortium.com info@fsc.cc
12:18:17 PM    comment []


http://www.eweek.com/article2/0,6071,800596,00.asp

YEAR'S BIGGEST TECH STORY: The biggest threat to IT in 2002 wasn't viruses, worms or terror-backed hacker groups; it was government intervention[~]from legislation that would criminalize basic security research to Hollywood-backed bills that would cripple all future hardware and software.

WHAT TO WATCH IN 2003: In 2002, the U.S. government established a set of system configuration security guidelines for government workers and departments[~]and anyone who, or any company that, works with these entities. More of these guidelines will be established, forcing default security mandates for many businesses.
12:09:09 PM    comment []


Archives at: http://www.interesting-people.org/archives/interesting-people/
12:04:48 PM    comment []

------ Forwarded Message From: Steven Cherry Date: Tue, 31 Dec 2002 11:28:37 -0500 To: "David J. Farber" Subject: IEEE Spectrum 2003 Technology Forecast & Review

Dave,

The IEEE Spectrum 2003 Technology Forecast & Review is now up and available. It covers five areas, Communications; Computers; Energy; Transportation; and Semiconductors, a total of 16 articles, including the one you authored on cybersecurity.

I hope the issue can play a small part in helping everyone have a happy and successful new year.

Regards,

Steven

Communications

What's Wrong With Telecom http://www.spectrum.ieee.org/WEBONLY/publicfeature/jan03/comm.html Combine greed, corporate crime, misguided regulation and explosive new technology, and you get an industry that's in serious trouble. By Peter A. Bernstein

What's Right With Telecom http://www.spectrum.ieee.org/WEBONLY/publicfeature/jan03/solu.html Broadband's secret success and our never-ending love of mobile communication are the aces up the industry's sleeve. By Steven M. Cherry

Opinion Three Takes on Telecom's Trouble http://www.spectrum.ieee.org/WEBONLY/publicfeature/jan03/cfell.html From IEEE members with intimate views of the industry's current woes and prospects. By Roch Guerin, Frank Ferrante & Jules A. Bellisio

Opinion The End of the Middle http://www.spectrum.ieee.org/WEBONLY/publicfeature/jan03/clude.html Intelligent devices on stupid networks are grabbing the phone business away from the traditional carriers. By David S. Isenberg

Computers

Hardware Hangover http://www.spectrum.ieee.org/WEBONLY/publicfeature/jan03/comp.html System complexity is driving customers and vendors to seek solace and solutions in software. By Harry Goldstein

The Perfect Handheld: Dream On http://www.spectrum.ieee.org/WEBONLY/publicfeature/jan03/hand.html New technology is on the way to make your heart's desire a reality. By Peter Savage

Can't We All Just Get Along? http://www.spectrum.ieee.org/WEBONLY/publicfeature/jan03/soft.html In a networked world, software needs to interoperate. By Steven Cass

Opinion Fame, but No Riches, For Cybersecurity http://www.spectrum.ieee.org/WEBONLY/publicfeature/jan03/compi.html We've had enough talk, and not enough action, from government and industry. By David Farber

Energy

Opening Up Energy Trading http://www.spectrum.ieee.org/WEBONLY/publicfeature/jan03/ewoe.html A small circle of players gave nascent U.S. electricity markets a bad name. By Kennedy Maize

Emission Permission http://www.spectrum.ieee.org/WEBONLY/publicfeature/jan03/emis.html Bartering in carbon dioxide will be big business. By Mark Ingebretsen & William Sweet

Opinion Are We Safe Yet? http://www.spectrum.ieee.org/WEBONLY/publicfeature/jan03/elude.html Richard L. Garwin explains how to keep nuclear bombs out of the hands of terrorists. By Jean Kumagai

Transportation

Running off the Rails http://www.spectrum.ieee.org/WEBONLY/publicfeature/jan03/trail.html Why does high-speed rail work well everywhere but the United States? By Tony R. Eastham

Hybrid Vehicles to the Rescue http://www.spectrum.ieee.org/WEBONLY/publicfeature/jan03/thev.html They've been making major gains and could soon be in your garage. By Willie D. Jones

The Ticket Chase http://www.spectrum.ieee.org/WEBONLY/publicfeature/jan03/tair.html Can cutting off the middleman return needed revenue to airline coffers? By Holli Riebeek

Reversal of Fortune http://www.spectrum.ieee.org/WEBONLY/publicfeature/jan03/tlude.html Stanford University's Stephen R. Barley reflects on what's going on in the engineering workplace. By Jean Kumagai

Semiconductors

A Sea Change for Semiconductors http://www.spectrum.ieee.org/WEBONLY/publicfeature/jan03/semi.html When the recovery is in full swing, chip makerswill be ready with new technologies. By Linda Geppert

--

-- Steven Cherry, +1 212-419-7566 Senior Associate Editor IEEE Spectrum, 3 Park Ave, New York, NY 10016 < TITLE="http://www.spectrum.ieee.org>" TARGET="_blank">http://www.spectrum.ieee.org>
12:04:24 PM    comment []


------ Forwarded Message From: Steven Cherry Date: Tue, 31 Dec 2002 11:28:37 -0500 To: "David J. Farber" Subject: IEEE Spectrum 2003 Technology Forecast & Review

Dave,

The IEEE Spectrum 2003 Technology Forecast & Review is now up and available. It covers five areas, Communications; Computers; Energy; Transportation; and Semiconductors, a total of 16 articles, including the one you authored on cybersecurity.

I hope the issue can play a small part in helping everyone have a happy and successful new year.

Regards,

Steven

Communications

What's Wrong With Telecom http://www.spectrum.ieee.org/WEBONLY/publicfeature/jan03/comm.html Combine greed, corporate crime, misguided regulation and explosive new technology, and you get an industry that's in serious trouble. By Peter A. Bernstein

What's Right With Telecom http://www.spectrum.ieee.org/WEBONLY/publicfeature/jan03/solu.html Broadband's secret success and our never-ending love of mobile communication are the aces up the industry's sleeve. By Steven M. Cherry

Opinion Three Takes on Telecom's Trouble http://www.spectrum.ieee.org/WEBONLY/publicfeature/jan03/cfell.html From IEEE members with intimate views of the industry's current woes and prospects. By Roch Guerin, Frank Ferrante & Jules A. Bellisio

Opinion The End of the Middle http://www.spectrum.ieee.org/WEBONLY/publicfeature/jan03/clude.html Intelligent devices on stupid networks are grabbing the phone business away from the traditional carriers. By David S. Isenberg

Computers

Hardware Hangover http://www.spectrum.ieee.org/WEBONLY/publicfeature/jan03/comp.html System complexity is driving customers and vendors to seek solace and solutions in software. By Harry Goldstein

The Perfect Handheld: Dream On http://www.spectrum.ieee.org/WEBONLY/publicfeature/jan03/hand.html New technology is on the way to make your heart's desire a reality. By Peter Savage

Can't We All Just Get Along? http://www.spectrum.ieee.org/WEBONLY/publicfeature/jan03/soft.html In a networked world, software needs to interoperate. By Steven Cass

Opinion Fame, but No Riches, For Cybersecurity http://www.spectrum.ieee.org/WEBONLY/publicfeature/jan03/compi.html We've had enough talk, and not enough action, from government and industry. By David Farber

Energy

Opening Up Energy Trading http://www.spectrum.ieee.org/WEBONLY/publicfeature/jan03/ewoe.html A small circle of players gave nascent U.S. electricity markets a bad name. By Kennedy Maize

Emission Permission http://www.spectrum.ieee.org/WEBONLY/publicfeature/jan03/emis.html Bartering in carbon dioxide will be big business. By Mark Ingebretsen & William Sweet

Opinion Are We Safe Yet? http://www.spectrum.ieee.org/WEBONLY/publicfeature/jan03/elude.html Richard L. Garwin explains how to keep nuclear bombs out of the hands of terrorists. By Jean Kumagai

Transportation

Running off the Rails http://www.spectrum.ieee.org/WEBONLY/publicfeature/jan03/trail.html Why does high-speed rail work well everywhere but the United States? By Tony R. Eastham

Hybrid Vehicles to the Rescue http://www.spectrum.ieee.org/WEBONLY/publicfeature/jan03/thev.html They've been making major gains and could soon be in your garage. By Willie D. Jones

The Ticket Chase http://www.spectrum.ieee.org/WEBONLY/publicfeature/jan03/tair.html Can cutting off the middleman return needed revenue to airline coffers? By Holli Riebeek

Reversal of Fortune http://www.spectrum.ieee.org/WEBONLY/publicfeature/jan03/tlude.html Stanford University's Stephen R. Barley reflects on what's going on in the engineering workplace. By Jean Kumagai

Semiconductors

A Sea Change for Semiconductors http://www.spectrum.ieee.org/WEBONLY/publicfeature/jan03/semi.html When the recovery is in full swing, chip makerswill be ready with new technologies. By Linda Geppert

--

-- Steven Cherry, +1 212-419-7566 Senior Associate Editor IEEE Spectrum, 3 Park Ave, New York, NY 10016 < TITLE="http://www.spectrum.ieee.org>" TARGET="_blank">http://www.spectrum.ieee.org>
11:57:58 AM    comment []


http://www.spectrum.ieee.org/WEBONLY/publicfeature/jan03/compi.html
11:55:11 AM    comment []

http://www.wweek.com/flatfiles/News3485.lasso
11:43:22 AM    comment []

To the W3C Patent Policy Working Group:

I have received the following comments from various other online sources, all indicating that they have been sent to the www-patentpolicy-comment@w3.org list.

However, these comments have not shown up tonight, the final day of the comments period; I am therefore forwarding them below and cc'ing their authors.

Comments by the following authors follow:

1) Jay Sulzberger 2) David Kaufman 3) Edward Welbourne 4) Ward Vandewege 5) Jim Bray

Thank you,

Seth Johnson

---------- Forwarded message ---------- Date: Tue, 31 Dec 2002 15:51:55 -0500 (EST) From: Jay Sulzberger Subject: Against Item 3 of Section 3 of the proposed Policy on Patents

Dear Patent Policy Working Group of the World Wide Web Consortium,

The buggy Item 3 of Section 3 of the proposed W3C Policy on Patents allows for patent encumbrances of standards-compliant software. Up to now, the W3C has not allowed such encumbrances. Up to now the Web has been built with un-encumbered software. Up to now those pushing for encumbrances have lost in the market for web servers and have lost in any free market for web clients. If the buggy policy document is adopted a special advantage will be granted to patent holders, which means, in the main, large companies and cartels. These large companies and cartels did not build the Net, we did and we did it using un-encumbered software. There is no reason to grant these companies and cartels special privileges. It is known that any patent encumbrance is effective at stopping commercial and often non-commercial development and use of encumbered software. A patent encumbrance need not be plain and direct to do such damage; an indirect, obscure, and uncertain threat of patent encumbrance is usually equally effective. Patent encumbrances can only decrease inter-operability and increase the barrier to entry in the market for software.

The World Wide Web Consortium has at this juncture a chance to act in the interest of all, rather than in the imagined self-interest of a small and economically unimportant group of special interests. I say "small and economically unimportant" because they are. They are a few companies whose combined capital is much less than than the wealth of the billion people who make use of the Web for their own private, business, and public purposes. Of this billion, a negligible number would vote to have the Web less competitive, less efficient, and less free than it is today. That means that the real stakeholders, the people of the world, are overwhelmingly against adoption of Item 3 of Section 3 of the proposed Policy on Patents.

Jay Sulzberger

For purposes of identification only:

I am the Corresponding Secretary of LXNY, New York's Free Computing Organization. http://www.lxny.org

---------- Forwarded message ---------- Date: Mon, 30 Dec 2002 14:22:10 -0500 From: David Kaufman Subject: Comments: the "field of use" restrictions in Section 3 Item 3 of the proposed W3C Patents Policy

To: Patent Policy Working Group World Wide Web Consortium

From: David Kaufman Power Data Development 87 East 21st Street Bayonne, NJ 07002

Re: W3C Patents Policy, Section 3 Item 3 "field of use" restriction

I'm writing to add my voice to those calling for the removal of the "field of use" restrictions in the current wording of the proposed W3C Patents Policy.

As a web developer, I rely on *truly* free software each day for the operation of my business. I choose to use only Free Software, as defined by the Free Software Foundation (www.fsf.org), and not merely the more broad range of other "open source" software because, to remain competitive in this industry, I must be free to modify and redistribute software without legal restrictions, in order to deliver secure and reliable products and services to my customers.

The freedom to modify and redistribute software should not be restricted to the so-called "web" or even "the Internet" as fields of endeavor, because the business use of the web and internet themselves are hardly relevant when not tightly bound to the context of a particular business, industry, field of study, or some other narrow area of human endeavor.

Patents allowing so-called free software that is restricted to the internet would be more harmful than helpful to most of the single field to which it *is* limited, the web. Why? Well, how could internet software written for a bookstore not be construed as being used in *both* the internet, and the publishing industry? Therefore future W3C patented software and protocols that are freely modifiable and redistributable only to the "web" or internet industries would be neither freely modifiable nor redistributable when an online publisher, for instance, uses these to create an OS-specific GUI application, that is protocol-compatible with their web site, built using not-completely-free tools. A non-web application that allows their staff to edit books in their database would be merely a publishing industry application, or a database application, that the patent owner might decide to license restrictively for developers to be allowed to *let it* talk to the website using a W3C-patented storage system, communications protocol, file format, or even, Amazon taught us, any simple-but-patented idea!

Such a situation would create a loophole for economical opportunism that no corporation could or would resist driving their delivery trucks through.

Companies would soon be rushing to W3C patent applications, protocols and other software ideas (which should *never* be patented in the first place) (think: Amazon-One-Click) and use the W3C's reputation to market these products as "free and open" in order to lure developers and create a large installed base of users who were mistakenly led to believe that these tools were in fact Free (as in freedom) and that any company's developers, including their own, were free to use them to extend and enhance their use and enjoyment of the software, when in fact, those freedoms would be quite restrictable by the patent owners.

The obvious second step is to then create proprietary industry-specific tools, GUI, OS/Specific user interfaces, or any other "non-web" tools for which these is No Freedom, for which only the patent owner may legally develop and sell solutions, and for which the users, the users' programmers and the entire "third-party" developer marketplace, must pay hefty licensing fees to compete, or possibly be simply forbidden from competing at all.

The GPL prevents this unfortunate situation by placing no restrictions *whatsoever* on the modification and redistribution rights granted to everyone, except one sensible one: no one may circumvent freedom bestowed on the software by the GPL license by simply *redistributing* and placing a *more* restrictive license on the redistributed version. This sole limitation closes the legal loophole of control of ideas, and protects the rights of the developers, the users, by restricting only the rights of those who would seek to further restrict or control the complete freedom rights that the developer intends, and this is why the GPL is used and championed by so many developers such as myself. It keeps freedom free. Any lesser license is vulnerable to the completely legal theft, control and exploitation of ideas.

I urge the W3C and the Patent Policy Working Group to consider this matter seriously, and take the position that is best for the users and developers of the large body of excellent and truly free software that has made the internet what it is today.

Please do not create a W3C-sanctioned loophole that must by it's very existence be exploited by the natural profiteering tendencies of normal competitive corporations which *must* bow to competitive pressures to profit by trying to legally own, control, license and otherwise restrict the use of the high quality best-practices ideas, and industry standards and other intellectual property that the W3C develops. These should remain the property of the public, not of corporations, and only a Free Software Foundation approved license can ensure exactly that those property rights are ensured.

Thank you in advance for your consideration to this matter.

Sincerely,

David Kaufman

---

www.Gigawatt.com / Power Data Development www.ClickSQL.com Hosting Scriptage Databasics

www.Power-Data.com 87 East 21st Street, Bayonne, NJ 07002 (201) 436-0668

-------- Original Message -------- Date: Tue, 31 Dec 2002 17:16:48 +0000 From: Edward Welbourne Subject: Patent Policy

http://www.w3.org/TR/2002/WD-patent-policy-20021114/

> The W3C Royalty-Free Patent Policy governs the handling of patents in > the process of producing Web standards.

A very important topic. Many pieces of software in the modern world are naturally obliged to interact with the world-wide web; it is crucial that the web thus be governed by open standards, if innovation is to continue to flourish on and around the web. A standard whose implementation is covered by a patent cannot be sensibly described as open unless the patent is first de-fanged.

> The goal of this policy is to assure that Recommendations produced > under this policy can be implemented on a royalty-free basis.

(aside: assure ... `ensure' seems more apt ...)

I contend that this goal is too tame: software designed to interoperate with the Recommendations must also be implementable on a royalty-free basis, even if the software in question is not countenanced by the Recommendations.

Both Web Servers and User Agents (to give the most obvious examples) are significant and complex bodies of software which support mechanisms for third-party code to provide added functionality at run-time (e.g. flash and kindred plugins for browsers, or [NI]SAPI server-side extensions). Such extensions are not parts of the Recommendation, and the extension is a separate piece of software from the implementation of the Recommendation. Yet an extension may need - and typically does have - access to arbitrary functionalities of the program it extends - including those covered by an Essential Claim.

Once an Essential Claim is available to extensions to, and to programs interoperating with, implementations of a Recommendation, it will effectively be available to arbitrary other programs, save that it will oblige them to go through some artificial motions to make themselves classifiable as implementation of, interoperator with or extension to the Recommendation. Introducing the need for such artefacts benefits no-one, least of all the W3C.

It is clear, further, that many in the Free (as in Liberty) Software movement will be unable (both in principle and in practice) to work with your policy unless all techniques which are necessary to implement W3C Recommendations are available for use in all software - not just that relating to W3C Recommendations - on a royalty-free basis. The Liberty to re-purpose code - to re-use it in arbitrary other programs - is an essential part of the Open Source revolution. Any Libre implementation of a W3C Recommendation will include implementations of all Essential Claims; limiting the royalty-free ambit only to implementations of W3C Recommendations will collide disastrously with such re-purposing.

Accommodating the needs of the Free Software movement will effectively turn the policy into a requirement that patenters of Essential Claims substantially abandon relevant patent privileges; however, one may equally read this as saying that a standard cannot sensibly be called open if it depends on a technology which is subject to a monopolistic privilege. This would appear to be a prima facie truth which must be accepted by all participants in the standards-making process. To this essentially political argument, I shall add a strictly technical argument, below, with the same net effect.

(aside: > All sections of this document are normative unless specifically > market non-normative. ^ marked typo !)

That said, the policy appears to be a very sensible and prudent approach to the sensitive and difficult problem of engaging holders of monopolistic privileges in the standardisation process, save for one clause which realises the restriction, implicit in the above goal, to protecting only implementations of W3C Recommendations - namely ...

Section 3, clause 3: [a W3C Royalty-Free license ...] > 3. may be limited to implementations of the Recommendation, and to > what is required by the Recommendation;

This may lead to software being forbidden to interoperate with a Recommendation, unless it is, itself, an implementation thereof. It may prevent extensions from integrating properly with implementations of Recommendations, in so far as they have an existence independent of the implementation (e.g. they are separately distributed). It might even oblige an implementation to use one solution to a general problem where the Recommendation requires exercise of an Essential Claim while yet using a separate solution to most of the same problem where the Recommendation does not strictly require the Essential Claim. It runs against the W3C's interests for such restrictions to arise.

Worse, such a limitation may restrict the architectural choices of those implementing a Recommendation: one would naturally chose to break up the functionalities involved therein into a family of libraries, all employed by one program to implement the Recommendation. However, no one of the libraries would constitute an implementation of the Recommendation: only the main program itself would then be allowed to contain the code which exercises the Essential Claim.

Indeed, where the Recommendation's implementation has, or may have, several running instances at one time on a computer, breaking the program up into shared libraries (a.k.a. DLLs) is the natural way to minimise the host computer's resource-use; only a `thin application' need remain as the program of which several copies are run. Likewise, if parts of the functionality (of an implementation of a Recommendation) are only used on some runs of the program, putting those parts into a shared library makes it possible for the program to only load the library when needed - thereby, again, reducing load on the computer. Again, if several W3C Recommendations require some common functionality (e.g. URL parsing), it makes sense for an implementor to write a shared library providing this, to be used by the implementations of all the relevant W3C Recommendations - rather than obliging each of these to include its own, probably with subtly incompatible bugs. In like manner, shared libraries provide a natural mechanism for the development of a W3C standards-compliant core on top of which application-developers can implement `thin applications', thus separating out the user interface from the core and allowing several different user agents to be built on top of a single engine (c.f. the gecko renderer).

If code implementing an Essential Claim is included in a shared library, however, it becomes accessible to other programs - they need only link against the shared library and exercise its API - even if those programs do not implement W3C Recommendations. It will then be a legal nightmare to decide who is guilty of the patent infringement - the application author has not written, published or distributed any code which implements the Essential Claim, but has merely linked against an API provided as part of the existing functionality of the target computer system; yet the implementor of the Recommendation supplied the shared library, in good faith, as part of the implementation of the Recommendation. Clause 3 would thus appear to allow the patent holder to forbid the implementation of an Essential Claim in a shared library.

The flip-side of this is that the natural way for an implementor of a Recommendation to make functionalities available, to other programs interoperating with the Recommendation, is to provide those functionalities via shared libraries. It is, indeed, desirable that essential components of implementations of W3C standards (e.g. XML parsing, HTTP requests, etc.) should be provided in this form, so as to facilitate the various uses (discussed above) of shared libraries as common `engine and API' components. Clause 3 allows a patent-holder to forbid such sensible practices: indeed, the objective it tries to achieve (namely, to ensure that the license not extend to applications outside the arena of the W3C Recommendation) implicitly presumes that it will be so used.

The world of computer software is ill suited to such "field of use" restrictions, since the boundaries are far less well-defined than is naively supposed in the wording of clause 3: allowing such restrictions will merely lead to a legal quagmire from which neither the W3C nor implementors of its Recommendations will ever escape. If a patent restricts the use of a technique essential to the support of a standard, either the relevant claim of the patent needs to be substantially waived or, if the patent-holder cannot be prevailed upon to do so, the standard must be changed; otherwise, the standard is not meaningfully `open'.

Please remove clause 3 from Section 3 before ratifying this policy.

Your humble and obedient servant,

Edward Welbourne. -- Writing in my capacity as a private netizen; however, I earn my living as a programmer, in which the web has been pivotal since 1994, including a period as a server developer for www.Zeus.com and my present employment as a browser developer for www.Opera.com. For more, see http://www.chaos.org.uk/~eddy/cv/history.html

-------- Original Message -------- Subject: Re: DEADLINE New Years: Drop the W3C's "Field of Use" Patent Policy Clause Date: Tue, 31 Dec 2002 18:00:53 +0000 From: Ward Vandewege

In addition to doing a Masters in Science and Technology Policy, I'm a Software Consultant, and I use Free and Open Software exclusively because that is the only way I can assure that I can adapt the software I use to the specific needs of my clients.

I'm very grateful for the tremendous amount of work that has gone into the Royalty-Free Patent Policy. I really appreciate how the Patent Policy Working Group has listened to and acted on the input of the public, and worked with Bruce Perens, Larry Rosen, Eben Moglen, and others. The current compromise is laudable, and I realize it may be the best we can get short of the W3C becoming irrelevant by being bypassed altogether by corporate interests trying to establish a 'standard'.

However, I must admit I am worried about the 'field of use' clause in the proposal. I'm afraid it will make the standards the W3C endorses rather irrelevant, as they will be much less attractive for (grassroots) innovative purposes. A short example to illustrate this point:

Imagine that the Internet Protocol (IP) was established under the RF licensing requirements as proposed, and that it would only be RF when used on the internet. Would we have seen the proliferation of the IP as we see today? I don't think so. Proprietary networks that have switched to the IP would not have done so, e.g. Novell would probably not have dumped IPX in favour of the IP if there was a royalty fee involved. Companies selling products that use the IP would have had to spend much time and effort also supporting proprietary protocols they would understand less thoroughly because there would be much less documentation and sample implementations, and they would be much harder to come by. This would result in buggy implementations and/or much higher overhead. People unaffiliated with (big) corporations would not have used the IP for the thousands of innovations that they have come up with since, making the marketplace even more fragmented.

Essentially, the more open the standard, the higher the chance it will become widely used and accepted (given that there are no monopolistic factors that work against it). This is something the creators of the Internet Protocol understood well - they decidedly didn't try to foresee how the protocol would be used, rightly realising they could never guess all future uses of their innovation. Instead, they tried to remove as many barriers towards unforeseen future use as they could, both technically (by making it totally open and designing a 'stupid' network) and more relevant for this argument, financially - no royalty fees whatsoever. The result is the Internet Protocol as we know it today - omnipresent, unencumbered. Why limit the chances of open W3C standards to become the most widely used, by allowing royalties for unforeseen uses?

In the long run, I think this is in the interest of both (big) industry and more independant developers. The value of having a pool of standards totally unencumbered by Intellectual Property Rights, is that much more is available for innovators to build on. In other words, barriers to innovation go down. More innovations will be made, directly resulting in economic growth for everyone involved. If we choose this road, everyone will benefit. If not, only a few (large) entities will, and certainly not to a similar extent. In that case, the world will be a much less interesting place for people with a passion for technology...

---

Happy New Year, Ward.

-- Pong.be -( "Fools ignore complexity. Pragmatists suffer it. Some )- Virtual hosting -( can avoid it. Geniuses remove it." -- Perlis's )- http://pong.be -( Programming Proverb #58, SIGPLAN Notices, Sept. 1982 )- GnuPG public key: http://gpg.dtype.org

---------- Forwarded message ---------- Date: Mon, 30 Dec 2002 13:49:25 -0500 (EST) From: Jim Bray Subject: No 'field of use' patent restrictions

Dear Sirs,

I have read and agree with the Free Software Foundation's objection to the 'field of use' patent restrictions presently allowed in Section 3 of the W3C's proposed patent policy, as described here: http://www.fsf.org/philosophy/w3c-patent.html

Please amend the proposed draft to be fully consistent with the GPL and Free Software.

With Best Regards,

Jim Bray
11:28:49 AM    comment []


From http://home.gci.net/~agimarc/

"Your Conservative Weekly OnLine Since 1997"

------ Forwarded Message From: Alex Gimarc Reply-To: splickplus@lists.spunge.org Date: Wed, 01 Jan 2003 09:37:24 -0900 To: Alex Gimarc Subject: [slickplus] Interesting Items 12/30

2. Aerospace. The portion of the American economy that has performed the very worst since 9-11 is Aerospace. We have seen a rash of airline bankruptcies, falling passenger count, and generally poor performance by all aerospace sectors. Why is this? From an economic standpoint, it is simple: Aerospace is the portion of the economy with the very most government control, government meddling and government money. The airlines, in their response to 9-11, all instantly demanded a federal takeover of airport security - and they got it. Result ? The feds have completely destroyed the under 300-mile portion of the market by making it simply too painful to get on an airplane for a short trip. The airlines also demanded a monetary bailout from the feds for losses suffered. The feds delivered. In response, the airlines cut back amenities for passengers - cutting food and beverage service, imposing new restrictions on carry-on baggage, and a range of other responses all typical of businesses protected from competition. Result ? Passengers are only flying when they need to do so, telling the newly surly airlines to go straight to hell. The airlines did it to themselves - demanded federal intervention into the marketplace. They got that intervention. They also got the destruction of a marginally competitive marketplace by the US government. The defense -related portion of aerospace has been doing quite nicely, with great gobs of money being spent to replace and revitalize our forces for the next phase of the World War. The final portion doing poorly is spaceflight. Manned spaceflight is a government monopoly - and has been one for over 40 years. The marketplace has never been allowed to exist, and as a result, the dream of private tickets for a ride to orbit has all but died here in the US. Two tickets have been purchased, much to the chagrin of the Federalies. Both purchased rides in Russian spacecraft. It is a darn shame that the only capitalists for manned space travel are former Soviets.

3. Solution. Given all the above, what do we do to fix it? Easy: get the feds out of the marketplace. Do it instantly. Do it completely. Shut down the TSA. Make airlines responsible for their own security. Arm pilots. Arm passengers. Arm gate agents and baggage handlers. Let the airlines figure out how they want to handle security and let them do so. Start identifying hijackers rather than identifying weapons (the Israeli solution). The only federal response ought to be a limit on lawsuit awards. The marketplace will quickly identify and reward the companies that do security well. It will also identify and quickly destroy those that don't (remember Pan Am?). For space, shut down all NASA manned spaceflight operations. Force the agency to purchase launch and flight services from commercial vendors. Get the marketplace working. Do it before it is too late.
11:18:17 AM    comment []


http://kmself.home.netcom.com/
11:17:14 AM    comment []

On January 28 the Alumni Association holds its annual Winter Meeting in the Lecture Hall at the Graduate School of Journalism. There will be a reception at 6:30pm followed by a panel discussion at 7pm. The topic is one that will be of interest to all alumni. I hope you will make plans to attend and I look forward to seeing you there:

"Journalism Education: Is It Meeting the Challenges of the 21st Century?"

Panelists include:

* James W. Carey, CBS Professor of International Journalism at the Columbia School of Journalism; * Brent Cunningham, managing editor of the Columbia Journalism Review; * Josh Mills, director of the masters program in business journalism at Baruch College- CUNY; * Jay Rosen, chairman of the journalism and mass communication department at New York University.

The panel will be moderated by: Joan Konner, J '61, dean emerita and professor at the Columbia University Graduate School of Journalism.

RSVP to Sasha Boak Kelly 212-854-3864 or alumni@jrn.columbia.edu

http://www.jrn.columbia.edu/alumni/association/calendar/
11:04:51 AM    comment []


Top Ten Web-Design Mistakes of 2002 http://www.useit.com/alertbox/20021223.html Check your web site to see if you've committed one or more of these offenses against usability.
11:01:52 AM    comment []

An ERIC Digest on how libraries deal with the pressing issue of spreading declining budgets across multiple new formats like books on tape, DVDs, large type, CDs, etc.

Foundation Center's Online Librarian http://fdncenter.org/learn/librarian/ Responding to "your need for factual information on foundations, philanthropy, and other issues related to nonprofits, and to assist with your fundraising research." Check out the FAQ file, use the Foundation Finder, or submit a query online.
11:01:08 AM    comment []


Creative Commons Weblog http://creativecommons.org/weblog/ News on creative commons and copyright developments.
11:00:18 AM    comment []

From Dave Farber

--

"They that can give up essential liberty to obtain a little temporary safety deserve neither liberty nor safety." - Benjamin Franklin Historical Review of Pennsylvania 1759

"To announce that there must be no criticism of the president, or that we are to stand by the president right or wrong, is not only unpatriotic and servile, but is morally treasonable to the American public." - Theodore Roosevelt (1918)

"During times of universal deceit, telling the truth becomes a revolutionary act." - George Orwell

"If ye love wealth better than liberty, the tranquility of servitude better than the animating contest of freedom, go home from us in peace. We ask not your counsels or arms. Crouch down and lick the hands which feed you. May your chains set lightly upon you, and may posterity forget that ye were our countrymen." - Samuel Adams, speech at the Philadelphia State House, August 1, 1776.
10:58:44 AM    comment []


Government Executive January 6, 2003 National cybersecurity plan omits industry mandates By Bara Vaida and William New , National Journal's Technology Daily

The latest version of the national cybersecurity plan expected to be presented to President Bush within the next month encourages the private sector to do more to protect the Internet but without mandates on industry, which had been proposed in the initial draft released publicly last September.

Internet service providers (ISPs) will not be required to build a centralized system to enable broad monitoring of the Internet; rather, they will be encouraged to develop a national network operations center (NOC) that could complement a federal cybersecurity response team that is to be developed in the Homeland Security Department, according to a copy of the plan obtained by National Journal's Technology Daily.

"In substance, the latest draft isn't all that different from September," said one high-tech industry source who viewed the latest version. "Stylistically, it's much different in that it is much better written, simpler and more straightforward. If you ticked off the items in this draft compared to the other, however, there aren't that many differences."

The administration has been gathering comments on the first draft and has addressed issues raised in those comments, including suggestions that the plan more clearly state that it does not seek to regulate the private sector.

Late last month, The New York Times reported that the Bush administration was planning to propose requiring that ISPs build a central monitoring system of the Internet, raising fears that the strategy had become more regulatory. However, the version that has been circulating within the high-tech sector since December says only that private-sector organizations focused on cybersecurity "should consider the benefits of creating an entity or center with a synoptic view of the health of cyberspace on a 24 by 7 basis."

The creation of such an operations center will continue to face resistance from companies that have made a business by monitoring cyberspace for specific clients, a high-tech lobbyist said. Richard Clarke, the special adviser to Bush on cybersecurity and chief architect of the strategy, "just hasn't made a good enough case that a NOC is necessary ... when it is already being done in the private sector," the lobbyist said.

The strategy states that "federal regulation will not be used as a primary means of securing cyberspace" but also emphasizes that the federal government cannot protect the Internet alone.

On the international front, the draft still makes a strong pitch for global cooperation but adds that the United States "reserves the right to respond in an appropriate manner, including through cyberwarfare." It also stresses stronger U.S. counterintelligence efforts in cyberspace, improvements in attributing cyberattacks to their sources, and better interagency coordination.

Other points emphasized in the latest version include:

A Cyber Warning and Information Network to allow government officials and the private sector to discuss cyber threats.

Tests to determine the impact cyberattacks would have on processes in various agencies.

A program to manage the information flow and to protect the information on threats to critical infrastructures that companies voluntarily submit.

A public-private task force to recommend the implementation of the new Internet protocol, IPv6 in the United States.

Annual priorities for cyber-security research and development and periodic reviews of emerging cyber-security technologies.

An information and analysis center for universities and colleges because they have among the most powerful computing systems in the nation.

A task force of public and private-sector officials to identify ways that information technology providers, other organizations and the government can reduce the burden on home users and small businesses in securing their computer systems.
10:55:32 AM    comment []


Wisdom is the principal thing; therefore get wisdom: and with all thy getting get understanding. Bible: Hebrew Proverbs, 4:7
10:34:59 AM    comment []

http://www.kdnuggets.com/news/2003/n01/39i.html
10:33:27 AM    comment []

http://digitalmass.boston.com/news/globe_tech/at_large/2002/1230.html
10:30:52 AM    comment []

http://www.kdnuggets.com/news/2003/n01/20i.html
10:27:51 AM    comment []

Thanks to Dave Farber's IP list:

------ Forwarded Message From: John Lyon Date: Tue, 07 Jan 2003 07:32:47 -0600 To: dave@farber.net Subject: Links to RA - NPR Series on Deregulation

As the html was stripped - here are links to the segments

Begin forwarded message:

> Deregulation: Boon or Bust for U.S. Business? > http://www.npr.org/ramfiles/me/20021230.me.07.ram > > Deregulation Trend Lowers Some Prices, Raises Frustration > http://www.npr.org/ramfiles/me/20021231.me.06.ram > > Utility Deregulation Backfires in California, Nevada > http://www.npr.org/ramfiles/me/20030101.me.07.ram > > Deregulation- Part IV > http://www.npr.org/ramfiles/me/20030102.me.06.ram > -- John Lyon This e-mail may be monitored by the Total Information Awareness System http://truthout.com/docs_02/11.16F.safire.you.htm http://www.darpa.mil/iao/TIASystems.htm
10:18:59 AM    comment []


Thanks to: ============================================ EUROPEAN TECH WIRE -- Jan. 8, 2003 ============================================ To Subscribe For Free: http://www.europeantechwire.com

o Philips To Transfer "Several Thousand" Jobs Out Of Europe

London -- Philips Electronics will transfer "several thousand" jobs from Western Europe in an ongoing effort to cut costs, the Financial Times reported. Amid the recent economic downturn, many of Europe's largest technology companies have increased the pace that they are relocating various IT and administrative functions to cheaper foreign markets. CEO Gerrard Kleisterless said in an interview that some of the company's human resources, IT and accounting operations will move to new owners or transfer to factories in Asia, Central America and Eastern Europe, where labor costs are lower. Philips has 184,000 employees worldwide. http://www.afxpress.com/afxpress2/afx/story_48024.xml.html _____________________________________________

o SAP Transferring U.S. Call Center Jobs To Ireland

Stuttgart, Germany -- German software group SAP said on Wednesday that it will cut 88 jobs as part of a restructuring of its U.S. sales force and will transfer another 42 U.S. call center jobs to Ireland. The job cuts come as part of a restructuring of SAP's U.S. business by new SAP America CEO Bill McDermott. SAP employs 3,400 staff in the U.S; its U.S. headquarters is located in Philadelphia. http://biz.yahoo.com/rb/030108/tech_sap_jobs_2.html _____________________________________________
10:06:33 AM    comment []


Thanks to: ============================================ EUROPEAN TECH WIRE -- Jan. 8, 2003 ============================================ To Subscribe For Free: http://www.europeantechwire.com

o Norwegian Teenager Johansen Found Not Guilty of DVD Piracy

Oslo, Norway -- In a closely watched case in Hollywood, a Norwegian teenager on trial for his role in creating a controversial computer code that can crack the anti-copying technology on DVDs, has been found not guilty on all charges. Norwegian prosecutors had asked for a suspended 90-day jail sentence for 19-year-old Jon Johansen, who was sued in Norway after a complaint was filed by the Motion Picture Association of America (MPAA), which represents Hollywood movie studios. Several U.S. publishers have been sued by movie studios for distributing the code he developed over the Internet. http://shorterlink.com/?3BU7X7 http://www.aftenposten.no/english/local/article.jhtml?articleID=466519
10:04:57 AM    comment []


http://dc.internet.com/news/article.php/1565901
9:54:09 AM    comment []

This law is a huge and costly problem that justifies a great deal of spending on security measures.

Thanks to Dave Farber's IP for circulating this:

-----Original Message----- From: ghamilton(contr-ato) To: IAIPT Subject: California Disclosure Law Has National Reach Date: Wed, 8 Jan 2003 17:19:45 -0500

California Disclosure Law Has National Reach from SecurityFocus on Wednesday, January 08, 2003

A new California law requiring companies to notify their customers of computer security breaches applies to any online business that counts Californians as customers, even if the company isn't based in the Golden State. So warned Scott Pink, deputy chair of the American Bar Association's Cybersecurity Task Force, in a conference call Monday organized by an industry trade group and attended by approximately 50 representatives of technology companies and law firms concerned about the scope of the new law, which will take effect on July 1st of this year. "If you are selling products or providing services to residents of California, it would probably be determined that you're conducting business in California under this law," said Pink. "This is something that has captured the attention of many corporate counsel and many IT managers around the United States, as they try to understand what the law requires and how it impacts them." The law, called "SB 1386," is intended to combat identity theft. It passed last September in the wake of a high-profile computer intrusion into a California state government system that housed payroll information on 200,000 state workers, in which the victim employees were not warned that their personal information was stolen until weeks after the incident. The law passed over strong objections from industry groups. To trigger the law, a breach must expose certain type of information: specifically, customers' names in association with their social security number, drivers license number, or a credit card or bank account number. After such an intrusion, the company must notify the effected customers in "the most expedient time possible and without unreasonable delay." Other types of information are not covered, and the disclosure only needs to be made to California residents. But as a practical matter, Pink said, online businesses may find it easier to notify everyone impacted by a breach, rather than trying to cherry-pick Californians for special treatment. "Many, many companies outside California are likely to be governed by this law," said Pink. "The question for them is to what extent do they find it convenient to only notify California residents, and do they find it easier to just notify everybody?" Companies that ignore the law face potential exposure to class action lawsuits. The law addresses a chronic problem in e-commerce - companies that are hacked are often reluctant to go public for fear of bad publicity or civil liability. But in forcing companies to come clean, the California law takes the opposite approach of the Bush administration's emerging cyber security policies, which encourage secret disclosure to government officials, rather than public warnings. In Monday's talk, organized by the Information Technology Association Of America, Pink called the law "revolutionary," and said he believes that other states will follow California's lead. But he also pointed out some ambiguities in the law's language that are still waiting to be resolved.: The ROT13 loophole? An exception in the law says companies don't have to disclose a breach if the stolen data was stored in an encrypted form. But it doesn't say the encryption has to be strong. "If someone were to hack into the system... obtain the encrypted contents, and are able to unencrypt them, does that trigger the disclosure requirements?," asks Pink. "As I read the legislation, that' s not entirely clear." Willful Ignorance. Disclosure isn't just triggered by drop-dead, caught-'em-red-handed intrusions, but by any incident in which customer data is "reasonably believed" to have been compromised. That's a vague term that leaves much room for legal wrangling, Pink says. And what constitutes knowledge, anyway? "If a lower level IT person notices some unauthorized activity... is that knowledge of the company as a whole, and does that trigger disclosure?" Law enforcement investigations. Companies are permitted to delay disclosure to meet "the legitimate needs of law enforcement," a provision intended to keep the law from acting as an early warning system for cyber crooks who've fallen under police scrutiny. But who decides what a legitimate need is? That last provision means that law enforcement officials effectively hold the power to grant a stay of execution on disclosure, giving a company time to examine its liability and plan a public relations strategy. That could mean a boost in the number of intrusions companies report to police, something the law enforcement community has been trying to achieve for years. As one participant in Monday's conference call -- an executive at a large Silicon Valley software company -- put it, reporting the crime would be a way of "buying time." ("II'm not trying to get around the law," the exec added). Pink suggested that any company relying on the law enforcement exception first get an explicit request from officials to delay disclosure. And resist the temptation to notify a local traffic cop and consider the matter closed. "The agency you're reporting it to should at least have jurisdiction," said Pink. Copyright (c) 1999-2003 SecurityFocus
9:11:04 AM    comment []


http://www.europeantechwire.com/morganlewis11.html
9:07:14 AM    comment []

Thanks to Abraham Sofer:

Client Alerts are newsletters authored by Lipa Meir attorneys, each addressing a single topic. The purpose is to provide timely information regarding the latest court decisions, legislative developments and business topics-- all in the context of US international trade or Israeli international business development.

Dear Client, Friend and Colleague:

*************************************************************

A road map to sellers' product liability in the Homeland Security market

Minimizing the risk of product liability actions for technologies sold in the Homeland Security market has emerged as a significant element of the new US anti- terrorism legislation seeking to encourage budding technology companies to come forward with new wares and artifacts. Under a "regular" product liability review, the rules generally require no more of manufacturers, importers and retailers than responsible business practices, a culture of safety, quality assurance and prudence in design, production, record keeping and marketing procedures (and customer information material to ensure the safety). However, the types of technologies in the homeland security market -- in many cases stripped down civilian versions of military products, and the obvious risk of unknown factors, may not be offered such a "courteous" treatment by plaintiffs' counsel for product liability victims. For instance, a gas mask designed to withstand certain chemicals may not protect against newly invented compounds not known at the time the mask was being distributed. Thus, technology companies wishing to sell products in the US Homeland Security market, must consider product liability exposure along with other factors associated with doing business in the US. The Homeland Security Act of 2002 ("Act") provides a road map to all potential sellers (Us and foreign) on how to limit such liability in the market.

Generally speaking, product liability applies to a company that manufactured the product; or imported the product, or sold its "own brand" goods manufactured for it under license. Also, in some circumstances, the retailer may be deemed to be the manufacturer of the product and hence liable. As a general rule, a product is defective if it does not provide the level of safety which the community generally is entitled to expect. The level of safety may vary from case to case and it is ultimately for the courts to determine whether a product was indeed defective. There are a number of factors a court will take into account when making its determination, including: the manner in which and the purposes for which the product has been marketed, the packaging of the product; the use of any mark in relation to the product; instructions for or warnings with respect to doing or refraining from doing anything with or in relation to the product; what might reasonably be expected to be done with the product; and the time when the product was supplied. Products would not necessarily be defective simply because the safety of later models had been improved. The drafters of the Act did not leave the treatment of these claims to the courts and plaintiffs lawyers to apply regular tort tests.

As part of the legislative process of the Act, there were floor amendments by congressmen offering to provide full federal indemnification to companies facing potential lawsuits over homeland security-related products. Many have noted that technology companies have been unable or reluctant to sell cutting-edge counter-terrorism technologies to the government because insurance companies, fearful of the liability risks stemming from major terrorist attacks, have been unwilling to provide adequate coverage. The Act did not go as far as to provide a full blanket indemnification, but did provide protection for manufacturers from liability to their products by placing limits on the liability exposure for contractors whose products or services have been certified as "high-risk" by the Homeland Security Secretary (Secretary). Lawsuits would be limited to a "reasonable" amount of insurance, essentially the amount a company can obtain commercially and still be profitable. `Liability insurance' is to cover all legal liabilities incurred by the insured resulting from loss of or damage to property of others; ensuing loss of income or extra expense incurred because of loss of or damage to property of others; bodily injury (including) to persons other than the insured or its employees; or loss resulting from debt or default of another. `Loss' means death, bodily injury, or loss of or damage to property, including business interruption loss.

The coverage essentially relates to acts of terrorism' meaning any act that is unlawful, causes harm to a person, property, or entity, in the United States, or in the case of a domestic United States air carrier or a United States-flag vessel, in or outside the United States; and uses or attempts to use instrumentalities, weapons or other methods designed or intended to cause mass destruction, injury or other loss to citizens or institutions of the United States, subject to such other requirements are further defined and specified by the Secretary.

Risk management. First, the Act provides that any person or entity that sells or otherwise provides a qualified anti-terrorism technology to Federal and non-Federal government customers (`Seller') must obtain liability insurance in accordance with the Act (and certified by the Secretary) to satisfy otherwise compensable third-party claims arising out of, relating to, or resulting from an act of terrorism when qualified anti-terrorism technologies have been deployed in defense against or response or recovery from such act. Second, the Seller must only seek liability insurance which need not exceed the maximum amount of liability insurance reasonably available from private sources on the world market at prices and terms that will not unreasonably distort the sales price of Seller's anti-terrorism technologies. Third, the liability insurance obtained pursuant to the Act shall, in addition to the Seller, extend to contractors, subcontractors, suppliers, vendors and customers of the Seller, and vendors of the customer, to the extent of their potential liability for involvement in the manufacture, qualification, sale, use, or operation of qualified anti-terrorism technologies deployed in defense against or response or recovery from an act of terrorism.

Under a special provision, the Seller, in turn, must enter into a reciprocal waiver of claims with its contractors, subcontractors, suppliers, vendors and customers, and contractors and subcontractors of the customers, involved in the manufacture, sale, use or operation of qualified anti-terrorism technologies, under which each party to the waiver agrees to be responsible for losses, including business interruption losses, that it sustains, or for losses sustained by its own employees resulting from an activity resulting from an act of terrorism when qualified anti-terrorism technologies have been deployed in defense against or response or recovery from such act.

If this coverage is obtained, the Act proclaims that regardless of any other provision of law, liability for all claims against a Seller arising out of, relating to, or resulting from an act of terrorism when qualified anti-terrorism technologies have been deployed in defense against or response or recovery from such act and such claims result or may result in loss to the Seller, whether for compensatory or punitive damages or for contribution or indemnity, shall not be in an amount greater than the limits of liability insurance coverage required to be maintained by the Seller under the Act.

Products covered by the new product liability rules: only products titled `qualified anti-terrorism technologies', to mean any product, equipment, service (including support services), device, or technology (including information technology) designed, developed, modified, or procured for the specific purpose of preventing, detecting, identifying, or deterring acts of terrorism or limiting the harm such acts might otherwise cause, that is designated as such by the Secretary. The designation could apply to property with prior US government use, the availability of the technology for immediate deployment, existence of extraordinary third party exposure, substantial likelihood that the technology will not be deployed absent such certification, magnitude of the risk to the public if the technology is not deployed, etc.

Federal law to apply in most cases: the Act provides that federal law will preempt state law, where applicable, and that a federal cause of action shall exist for claims arising out of, relating to, or resulting from an act of terrorism when qualified anti-terrorism technologies have been deployed in defense against or response or recovery from such act and such claims result or may result in loss to the Seller. The substantive law for decision in any such action shall be derived from the law, including choice of law principles, of the State in which such acts of terrorism occurred, unless such law is inconsistent with or preempted by federal law. Such federal cause of action shall be brought only for claims for injuries that are proximately caused by sellers that provide qualified anti-terrorism technology to Federal and non-Federal government customers.

Which courts shall have jurisdiction: the district courts of the United States shall have original and exclusive jurisdiction over all actions for any claim for loss of property, personal injury, or death arising out of, relating to, or resulting from an act of terrorism when qualified anti-terrorism technologies have been deployed in defense against or response or recovery from such act and such claims result or may result in loss to the Seller.

Limitations on damages awarded: In an action brought for damages the following provisions apply, (a) no punitive damages intended to punish or deter, exemplary damages, or other damages not intended to compensate a plaintiff for actual losses may be awarded, nor shall any party be liable for interest prior to the judgment, (b) non-economic damages (that is, damages for losses for physical and emotional pain, suffering, inconvenience, physical impairment, mental anguish, disfigurement, loss of enjoyment of life, loss of society and companionship, loss of consortium, hedonic damages, injury to reputation, and any other nonpecuniary losses) may be awarded against a defendant only in an amount directly proportional to the percentage of responsibility of such defendant for the harm to the plaintiff, and no plaintiff may recover non-economic damages unless the plaintiff suffered physical harm, and (c) any recovery by a plaintiff in an action under this section shall be reduced by the amount of collateral source compensation, if any, that the plaintiff has received or is entitled to receive as a result of such acts of terrorism that result or may result in loss to the Seller.

Defense for government contractors: if a product liability or other lawsuit is filed for claims arising out of, relating to, or resulting from an act of terrorism when qualified anti-terrorism technologies approved by the Secretary, have been deployed in defense against or response or recovery from such act and such claims result or may result in loss to the Seller, there shall be a rebuttable presumption that the government contractor defense applies in such lawsuit. This presumption shall only be overcome by evidence showing that the Seller acted fraudulently or with willful misconduct in submitting information to the Secretary during the course of the Secretary's consideration of such technology under this subsection. This presumption of the government contractor defense shall apply regardless of whether the claim against the Seller arises from a sale of the product to Federal Government or non-Federal Government customers.

Steps to be taken by the manufacturers relying on a government contractor defense: if you plan on selling products in the Homeland Security market and you wish to be covered by the limitations on liability, you must apply to the Secretary for review and approval of the anti-terrorism technology developed by you for purposes of establishing a government contractor defense in any product liability lawsuit.

Upon such submission to the Secretary for approval, the Secretary will conduct a comprehensive review of the design of such technology and determine whether it will perform as intended, conforms to the Seller's specifications, and is safe for use as intended. The Seller will conduct safety and hazard analyses on such technology and will supply the Secretary with all such information.

For anti-terrorism technology reviewed and approved by the Secretary, the Secretary will issue a certificate of conformance to the Seller and place the anti-terrorism technology on an Approved Product List for Homeland Security.

Finally, it has been reported that the defense and technology industries are hopeful that in the coming weeks, the Bush administration will commit to pay for some future lawsuits involving homeland security products and services provided to the government. The White House is expected to circulate a draft modifying a longstanding executive order under which the Defense secretary and agency heads may choose to indemnify contractors for unusually hazardous products. The technology industry considered the Act to create a Homeland Security Department a win, but they failed to get indemnification included in earlier versions of the bill. As mentioned above, they did get protection from liability for their products to the level of commercially available insurance, but there is no agreement that the government would step in above that level. Indemnification would commit the federal government to cover additional damages resulting from terrorist attack or other incident involving the homeland security products.

As yet to be seen, creating a new department in a time of war, merging various cultures and organizations, and significantly increasing the people and resources involved is a tremendous management challenge. But the Act promises a mini revolution in the area of product liability. Several plaintiffs counsel are notorious for suing corporate America on behalf of persons who have suffered injury or loss as the result of a defective product or service -- the asbestos, Dalkon Shield, tobacco, Pen Phen cases, to name a few and it is yet unclear, though, how they will react in the Homeland Security tort domain.

************************************** This communication is designed to provide accurate and authoritative information in regards to the subject matter covered. It is offered with the understanding that it is not a legal opinion and should not be relied upon or presented as such. If legal advice or other expert assistance is required, the services of a competent professional should be sought. *************************************

NO SPAM POLICY

Your privacy is important to us. We abide by a no spam policy. If you believe that you are receiving this message in error or would no longer like to receive email from Lipa Meir & Co. please click on "reply", type "unsubscribe" in the subject field and click "send."

Abraham Sofer, Esquire Admitted in New York, Washington DC and Israel Lipa Meir & Co. -- Attorneys at law

Please visit our web site at : www.israelattorneys.co.il

E-mail address:

asofer@lipameir.co.il asofer@attglobal.net

Telephone number: 972-3-6070600 Fax number: 972-3-6070666
8:58:43 AM    comment []


Homeland security http://www.washingtonpost.com/wp-dyn/articles/A18662-2003Jan6.html

------ Forwarded Message From: Ted Bridis Organization: The Associated Press Date: Tue, 07 Jan 2003 11:16:05 -0500 To: dave@farber.net Subject: RE: [IP] National cybersecurity plan omits industrymandates

>>[IP] National cybersecurity plan omits industry mandates<< Dave, Gov't Executive's review of the administration's latest plan for cyber-security missed at least one change that I found curious: eliminating an earlier, formal proposal to consult regularly with privacy experts. In the September draft (available at http://www.whitehouse.gov/pcipb/) there was a section of explicit proposals (See Recommendations R-36, -37 and -38) dedicated to "Privacy and Civil Liberties," all of which have been eliminated as formal proposals from the latest draft, as far as I can tell. It will be interesting to see whether the privacy provisions are added back in before this latest draft is made public. http://news.yahoo.com/news?tmpl=story2&cid=528&ncid=528&e=3&u=/ap/200301 06/ap_on_go_pr_wh/securing_cyberspace White House Trims Cyber-Security Plan By TED BRIDIS Associated Press Writer WASHINGTON - The Bush administration has reduced by nearly half its initiatives to tighten security for vital computer networks, giving more responsibility to the new Homeland Security Department and eliminating an earlier plan to consult regularly with privacy experts. An internal draft of the administration's upcoming plan also eliminates a number of voluntary proposals for America's corporations to improve security, focusing instead on suggestions for U.S. government agencies, such as a broad new study assessing risks. "Governments can lead by example in cyberspace security," the draft said. The draft, circulating among government offices and industry executives this week, was obtained by The Associated Press. President Bush was expected to sign the plan, called the National Strategy to Secure Cyberspace, and announce the proposals within several weeks. The new draft pares the number of security proposals from 86 to 49. Among changes, the draft drops an explicit recommendation for the White House to consult regularly with privacy advocates and other experts about how civil liberties might be affected by proposals to improve Internet security. The draft notes that "care must be taken to respect privacy interests and other civil liberties," and it noted that the new Homeland Security Department will include a privacy officer to ensure that monitoring the Internet for attacks would balance privacy and civil liberties concerns. "It's perplexing," said James X. Dempsey of the Washington-based Center for Democracy and Technology. "This administration is constantly on the receiving end of criticism on privacy issues. This looks like another example of willfully raising privacy concerns. They should know better by now." An official for the White House cyber-security office declined to comment, saying the latest draft hasn't yet been published. The draft obtained by the AP puts the new Homeland Security Department squarely in the role of improving Internet security, proposing to use it to launch some test attacks against civilian U.S. agencies and to improve the safety of automated systems that operate the nation's water, chemical and electrical networks. The new version also makes it more clear than ever that the Defense Department can wage cyber warfare if the nation is attacked. The administration said previously that government "should continue to reserve the right to respond in an appropriate manner." The new draft cautions that it can be difficult or even impossible to trace an attack's source. But it warns that the government's response "need not be limited to criminal prosecution. The United States reserves the right to respond in an appropriate manner, including through cyber warfare," it said. The new version also puts new responsibilities on the CIA and FBI to disrupt other countries from using cyber tactics to collect intelligence on government agencies, companies and universities. The administration published an early version of its plan in September - weeks before Congress voted to create the Homeland Security Department - with 86 recommendations for at home users, small businesses, corporations, universities and government agencies. Critics, even the InfraGard national organization of private security experts established by the FBI, seized on the lack of new regulations that would have mandated better security practices but could have required America's largest corporations to spend millions for improvements. "We felt that there was a significant security improvement that could be made most easily through regulation," the InfrGard group wrote to the White House. "In many cases the deeply held conclusion was that the same result could not be reached in the absence of new regulation." The draft, however, continues to refute the need for any new regulations, saying mandates for private industry would violate the nation's "traditions of federalism and limited government." It said broad regulations would hamstring security by creating a "lowest common-denominator approach" and could result in even worse security.
8:56:02 AM    comment []


Thanks to: THE WRITE NEWS(TM) WEEKLY 1-6-03

"A look at the highlights of the news published in The Write News(TM) http://www.writenews.com for the weeks of 12-16-02 through 1-3-03."

LIGHT READING ACQUIRES BOARDWATCH MAGAZINE ----------------------------------------------------------------------- Light Reading, a telecommunications technology resource, announced that it has purchased Boardwatch magazine from Penton Media. Light Reading also acquired Penton's Boardwatch and ISPworld websites and its directory of Internet service providers.

"This is a huge day for Light Reading. Integrating Boardwatch's 50,000 service provider readers with our existing carrier audience gives Light Reading the largest service provider audience of any publication in the world," said Stephen Saunders, president and CEO of Light Reading. "We now reach over 100,000 service providers in the U.S., Asia, and Europe."

The Boardwatch magazine will be moved online, like all of Light Reading's publications. The resulting savings on printing and distribution costs will be reinvested into the magazine's editorial coverage -- which will be expanded to include analysis of both the economics of service provider networks and the technology installed in them.

"Boardwatch will focus on the issues that service providers are concerned with -- not just technology and the business case for deploying it, but also everything to do with the information supply chain that links content providers to end users," said Peter Heywood, cofounder of Light Reading.

The Boardwatch website will also undergo a sweeping redesign -- including the incorporation of an existing part of the Light Reading Website: the Service Provider Circle, a portal that brings together information of interest to carriers from third-party sources.

Light Reading launched in February 2000. Its website provides analysis of telco networking developments. Light Reading says it has been profitable from its inception and that its lightreading.com website receives 850,000 visitors each month. Light Reading also publishes byteandswitch.com, which covers storage networking issues, and unstrung.com, a site providing analysis of the wireless industry.
8:49:23 AM    comment []


Thanks to Dave Farber's IP mailing list:

From: Declan McCullagh Reply-To: declan@well.com Date: Thu, 9 Jan 2003 18:20:48 -0500 To: politech@politechbot.com Subject: FC: Lexmark invokes DMCA in suit over aftermarket printer toner

Hearing postponed: http://news.com.com/2110-1023-979975.html

Complaint: http://www.politechbot.com/docs/lexmark.complaint.010803.pdf

---

http://news.com.com/2100-1023-979791.html

Lexmark invokes DMCA in toner suit By Declan McCullagh January 8, 2003, 7:28 PM PT

Printer maker Lexmark has found an unusual weapon to thwart rivals from selling replacement toner cartridges: the Digital Millennium Copyright Act. A federal judge in Kentucky has scheduled a hearing for Thursday in the case, which Lexmark filed against Static Control Components in an effort to slam the brakes on the toner cartridge remanufacturing industry. Lexmark is the No. 2 printer maker in the United States, behind Hewlett-Packard, and manufactures printers under the Dell Computer brand. [...]

Lexmark claims that Static Control violated the DMCA by selling its Smartek chips to companies that refill toner cartridges and undercut Lexmark's prices.
8:46:37 AM    comment []


© Copyright 2003 Noel D. Humphreys.



Click here to visit the Radio UserLand website.

 


January 2003
Sun Mon Tue Wed Thu Fri Sat
      1 2 3 4
5 6 7 8 9 10 11
12 13 14 15 16 17 18
19 20 21 22 23 24 25
26 27 28 29 30 31  
Nov   Feb
 2/2/03
 1/31/03
 1/31/03
 1/31/03
 1/31/03
 1/31/03
 1/31/03
 1/31/03
 1/31/03
 1/31/03
 1/31/03
 1/29/03
 1/29/03
 1/28/03
 1/28/03
 1/23/03
 1/23/03
 1/23/03
 1/23/03
 1/23/03
 1/23/03
 1/23/03
 1/23/03
 1/23/03
 1/23/03
 1/20/03