Blogs

FISA Transparency: Microsoft & Google Fight to Disclose Surveillance Data to Users

Thursday, September 5, 2013, by Brittany Croom As transparency initiatives continue to infiltrate the nation following recent revelations of surveillance by US intelligence, some tech companies are already taking a stand.  Only a few days after social media giant, Facebook, revealed the US government has already made information requests for 20,000 users under the Foreign

Are Cloned Horses Ready for Primetime?

Tuesday, September 3, 2013, by Daniel Choo With every scientific breakthrough, there comes the potential for misappropriate use—nuclear fission and the atomic bomb; Google Earth and the Mumbai terrorist attacks; the Internet and the increased incidences of cyberbullying and cyberstalking.  To discourage such misuse, laws relating to such technological innovations need to be tightly regulated,

Trademarking the Rainbow: T-Mobile Asserts Its Ownership of the Color Magenta

Tuesday, September 3, 2013, by Will Blackton Before picking up a crayon, consider that you may be “trespassing” in an area of the visible spectrum. You may be in trouble if your box contains “Coca-Cola Red,” “Starbucks Green,” or “Ford Blue.” “T-Mobile Magenta” was a subject of litigation last week. Deutsche Telekom AG, the parent

Beyond United States v. Jones: The Absolute Mosaic & The Inverted Fourth Amendment

Sunday, April 21, 2013, by Ken Jennings The Mosaic Theory of the Fourth Amendment has featured front-and-center in the continuing debate over the impact of the Supreme Court’s decision in United States v. Jones.  In Jones, law enforcement officials tracked the location of the defendant’s (borrowed) vehicle for 28 days via a GPS device installed

Circuit Court Split: Tacking Old Forms of Trademark

Thursday, April 18, 2013, by Drew Hargrove Trademark law allows an owner to “tack” an older form of mark if the owner makes slight alterations to the existing mark.   In order to “tack” the old form of a mark, both the old and new form of the mark must retain the same, “continuing commercial impression.” 

The New Joint Information Environment: CISPA and Cybersecurity

Tuesday, April 16, 2013, by Samantha Surles The Government’s ability to find and apprehend cyber criminals is one of the big features in the 2014 Defense budget. One of the Department of Defense’s top priorities in 2014 is “expanding the Cyber Forces” under U.S. Cyber Command and developing a system for “cyber security information sharing.”