Following from libel proof individuals to the realm of Twitter, and the “Wild-West” approach towards online statements, comes an interesting idea.  It is given that most people will communicate anonymously on the web.  So, if a person is a victim of libel, then how can he/she recover? The online service provider technically didn’t publish it, but only acted as the forum. The person who published the statement cannot be easily found because the statement was posted under a pseudonym.  So, what if the online service provider could be forced to give up identifying information (e.g., name, address, telephone, email, IP address) of the commenting individual? How much is that anonymity worth? Is there a way to actually engage in defamation and get away with it?

How does anonymity make things harder?

Naturally, an unknown person is difficult to sue in court.  The amount of damages he or she could pay is difficult to ascertain. While there are rules allowing a lawsuit without knowing the individual’s identity­­ (which is common in some cases), however, it adds the difficulty in discovering the identity of the “Doe Defendants.”

On the Internet, individuals can go out and make attempts to rib each other, or to mock certain celebrities or infamous individuals. This opens the realm of libel and slander laws to expand towards online activities. Yet, depending on the person’s history, defamation may be borderline impossible.  If defamation is harm to one’s reputation, then theoretically it should be impossible to harm an irredeemable reputation.  This idea is a concept known as being libel proof — i.e., a person who cannot be defamed any longer.  So, can a completely libel-proof person exist? How could someone argue the individual is libel proof? How might this affect online communications?

What is libel proof?

Libel proof means, quite simply, that a person cannot be defamed any further.  Generally, to even satisfy libel, it would have to be an unprivileged false written statement that was published towards third parties (compared to slander, which is an unprivileged false oral statement that was published towards third parties).  Even then, defamatory statements are judged differently to protect free speech interests.

Among the rights people have, many are unknown or unsung until there is a dispute and the courts get involved in the process. Rarely recognized is the right to reverse engineer under the Fair Use Doctrine and Digital Millennium Copyright Act.  However, this is not an absolute right.  Rather, it can be waived under certain circumstances. So, how can the right to reverse engineer be used? How might an individual hope to reverse engineer anything? Can you prevent others from reverse engineering your products?

What does the reverse engineering law apply to?

Reverse engineering is a method of taking a device or program and taking it apart to determine how it works, occasionally in attempts to duplicate or improve it. Generally, this would be applied to devices or physical products that are protected by patents. However, in the realm of copyright, reverse engineering is allowed in some situations. Specifically, this applies to computer programs to allow interoperability of devices or systems.  Since computer programs may be designed to only work with a few devices or systems, to allow a consumer to use them on another operating system, reverse engineering would be a necessity.  This would allow individuals to ensure programs operate without interference or to add integration features.

This month, we’re looking at various constitutional issues and tangential actions. Of these, there’s a recent hot-button issue regarding the purpose of “freedom of speech” online. From fake news to political speech on websites, the notion of “what is allowed” and “what should be allowed” is still raised by people.  So, what can a website do to maintain the balance between free speech rights and acceptable community standards? Is there any responsibility to allow negative views? What is the risk, if any, towards censorship?

Freedom of speech online

In the wake of 2016, there’s a new question of online service providers that if they allow people to express themselves then they should either act as a gate keeper or grant carte blanche to all users.  Most notably, there’s been the Facebook “fake news” complaints, as well as the actions of a Reddit executive towards supporters of Donald Trump. In the case of Facebook, there were both complaints that it was discriminatory not showing stories from every end of the political spectrum, and negligent that it was not taking action to curtail “fake news” and their influences.  For Reddit, an executive had made edits to statements by Trump supporters to change comments critical of him to individuals that were managing the Reddit group.

As we close out the year and enjoy the new technology from the holiday season, one piece of technology stands out as a forerunner.  It is something that we’ve dreamed and written about to the point it is a staple in science fiction. An artificial intelligence that anticipates and responds to a person’s desires and questions. This is the new technology, the “digital assistant,” such as Alexa, Siri, Cortana, and Google Home. These digital assistants manage to carry on conversations and answer questions.  How can these digital assistants think? How can they change and learn how to respond properly? Does the way these digital assistants work put data at risk?

How do digital assistants work?

Much like wearable technology, the digital assistant relies on “chatter” between itself and another computer hooked up through the internet.  However, the chatter tends to be slightly more reliant. Digital assistants, while they may have a few pre-programmed responses, are mostly reliant upon internet access to perform their duties. Alexa cannot work without WiFi, and Siri cannot work without a decent connection to data. When a person asks a digital assistant a question, the question is essentially pushed from the receiving device to the Cloud where it is answered, or some of the instructions are put out for the phone to follow. However, this may also entail, akin to a search history, a sort of assistant database where a person’s recorded voice may be kept, and in the case of the Amazon Echo at least, a user’s feedback on how Alexa did her job to allow it to grow and become more efficient, learning slang, or picking up on verbal tricks that are more similar towards human activities.

Wearable devices become more popular as the holiday season approaches. Among various new technologies, there’s a focus on the idea of wearable devices, which include items like smartwatches, fitness trackers, and other electronic accessories that can help make life easier.  However, with that comes the risk of privacy and security.  What would you need to know about your wearable device? What are the limitations of wearable devices? How secured are they, who has access to or owns the stored data?

What type of data do wearable devices collect?

When it comes to wearable devices, it is important to realize that the most prevalent data it stores tends to be personal, health, and fitness-related information.  For instance, the wearable device may track steps, take a pulse, measure heart rate, and in the case of the newer Apple Watch 2.0, they could record your geographic position. However, when it comes to other data, the wearable device’s ability is limited for the time being.

For the uninitiated, motion sensors work on either the idea of cameras capturing motions, infrared light waves, or gyroscopes. Yet, even with this simple trio, this subject has led to a large scale of lawsuits based on patent violations.  There are two major lawsuits to look at, one in the past, giving insight into what would fail, and one more current, involving Apple. What do these motion controls do? What would be patentable? What arguments could be made to fight these patents?

Patent lawsuits on motion-sensor technology

First, it’s important to note that motion controls, and indeed much of the technology that roots current motion controls are not new, but rather opens up to new avenues.  There has been an advent in motion control with the Nintendo Wii System. While it is rudimentary, initially consisting of a motion-controller device and a sensor bar, it allows individuals to control games (e.g., classic example being swinging around the remote to swing a bat).  However, with this came patent disputes, primarily between Koninkl Philips Electronics NV v. Nintendo of Europe GmbH, which ultimately succeeded in the UK, as the court deemed that the idea of a camera and sensor was specialized knowledge in the industry. Comparatively, there is a newer litigation involving Apple and Fitbit.  On or about January 2016, the litigation began over the technology used to track health and fitness for individuals, such as motion and steps taken, among other patents.

In general, December is the month that yields a high volume of consumer activity, and the purchase of new technology devices. One of these is Virtual Reality (“VR”) technology, slowly trickling down from a niche market. However, it is not the only new reality-altering technology coming into the market, as Augmented Reality (“AR”) has had its growing pains in the world after its adoption.  So, what are these new technologies? What are the current risks? Do they have any practical use?

What is Augmented Reality?  What is Virtual Reality?

They are technologies meant to immerse a user into a different world by substituting or enhancing the reality.  AR has the largest number of examples, such as Google Glass and Pokemon GO.  They take data and overlay it into preexisting reality, allowing us to pull up contacts or catch imaginary creatures. While still in its infancy stage, AR has the potential to work as an overlay, where a camera can read and translate signs and books with the new text viewable, or a device can allow a person to follow arrows overlaid onto a road, or see parts of devices highlighted for repairs on the display.

In continuing our comments regarding copyrights online, we are on to fair use and liability for litigation. A dancing baby has created one of the most obscure and interesting cases for the year. The ramifications of this lawsuit could further impact the way that some copyright disputes could play out, bringing in a potential new factor for any takedown or claims of infringement. Yet, how this ultimately will work out is up to the justices who currently compose the highest court of the land (i.e., United States Supreme Court).  What is the story of the “Dancing Baby” case? How might copyright infringement cases change? How could the court decide? Does this interact with the earlier Kirtsaeng ruling, if at all?

What is happening with the case now?

To recap, Lenz v. Universal focuses on whether there is a good faith requirement for takedowns. Lenz had uploaded a video on YouTube showing her toddler dancing to the song “Let’s Go Crazy” by Prince. It also included a snippet of the song in poor quality. Sometime after, Universal issued a takedown of the video. However, in its analysis, the Ninth Circuit first decided that there was a good faith requirement, and questioned if Lenz would be owed damages. So far, the United States Supreme Court has denied a request for certiorari by the petitioner over what, if any, damages could be requested by Lenz. The case has also garnered the attention of various organizations, such as the Electronic Frontier Foundation and Yes Men to curtail incorrect takedowns.

Copyright is a legal right that keeps intellectual property safe, and allows individuals to profit from their efforts. Yet, these copyrighted works will at some point head over to the public domain after their expiration, which means they are not protected anymore.  What if it did not expire? In fact, recent decisions and lobbying have tried to push the effective “lifespan” of copyrights.  Instead of the life of the author, plus 70 years, it becomes further extended. So, how might this happen? What are the decisions that push for an artificially long copyright? How might an entity take advantage of this extension?

Warner Brothers v. X One X Productions:

For a few years now, there has been a legal dispute between Warner Brothers and X One X Productions, commonly known as AVELA, over the copyrights of various properties, like Wizard of Oz and Tom & Jerry. Now, these properties are still protected through copyright, but not entirely.  AVELA had taken a path akin to Dastar, and used images from promotional art, which was not renewed, and placed into the public domain since it failed to renew under the copyright laws of the time. However, back in 2011, a decision was made finding against AVELA, and while damages were disputed, the court found that Warner Brother’s awarded damages were not only justified, but they were liable for trademark infringement as well. Ultimately, this finding was because the works themselves were no longer under copyright protection, however the base work was, and the trademarks for the base work. Thus, any copies of the work incorporating the protected characters, or alterations, would become derivative works, covered under the copyright for the base work. Furthermore, the trademarks, like the names or character designs would be protected too.  Also, as trademarks have no expiration date, they can effectively push the protection of this sort of copyright further.