The first exclusively online law review.

Author: JOLT Page 46 of 50

Blog: Vindictive Exes Need to Find a New Outlet: States Consider Outlawing ‘Revenge Porn’

by Taylor Linkous, Associate Staff

Technology and pornography–one of the great love stories of our time. That’s right; technology and porn have always had an exciting, juicy, and mutually beneficial relationship.  Where technology goes, porn follows.  Take the Polaroid camera. Much of the success of the Polaroid camera is said to come from the fact that people could take explicit photos without having to go to the store to get the film developed.[1]  Now, cell phones and more specifically, camera phones have seemed to give people this same sense of privacy and promiscuity.  However, this is a false sense of privacy considering we now have the internet, an amazing, yet very scary place where your boyfriend, girlfriend, or whoever else comes across these explicit photos can post them for the world to see.  This is called revenge porn.

 Revenge porn is a nude picture or video that is publicly shared on the internet, usually by an ex-lover, for the purpose of humiliation.[2] This happened to Holly Jacobs, a Florida woman who is now a strong advocate of strengthening laws against revenge porn and who founded the website End Revenge Porn.[3] Jacobs found out from a friend that nude photos she had sent to her ex-boyfriend had been posted on her Facebook and then later to hundreds of revenge porn websites. Even more disturbing was that her name, email address, and place of business were posted along with the pictures.[4] As if finding out your body was exposed to the entire internet world was not enough, she went to the police only to discover they could do nothing for her. 

Currently, the act of posting revenge porn is a crime in only two states, New Jersey and just recently, California.  New Jersey’s Title 2C: 14-9 is an invasion of privacy law which is directed at people who secretly photograph or videotape another person while they are naked or engaged in sexual activity without their consent.[5]  Although the law was not drafted with the criminalization of revenge porn in mind, it was written broad enough to apply to revenge porn situations. 

About a month ago, the California legislature passed SB 255, a revenge porn bill introduced by Senator Cannella.  Governor Jerry Brown signed the bill into law on October 1st and it went into effect immediately.[6]  The law makes posting revenge porn a misdemeanor punishable by up to 6 months in jail and a $1,000 fine.[7]

Revenge porn has become a hot topic in recent months as a couple of other states have attempted to draft legislation specifically directed at criminalizing revenge porn.  This past year, Florida, the home state of Holly Jacobs, tried and failed to pass a revenge porn law.[8]  Also, just recently, New York Senator Joseph Griffo and Assemblyman Edward Braunstein announced they would introduce a bill criminalizing revenge porn.[9] The Wisconsin legislature is also considering a revenge porn bill.[10]

Many have voiced concerns about enacting laws that ban revenge porn. First, the failure of the Florida bill was partly due to concerns that such a law would abridge free speech in violation of the First Amendment.[11]  Similar concerns have been expressed regarding California’s newly enacted revenge porn law.  The ACLU initially opposed the bill because of First Amendment concerns, but has since changed this position and stated there are no objections to the bill.[12]  While most would agree that revenge porn is repulsive and wrong, it may be difficult to strike the right balance with a law that successfully bans the posting of revenge porn without simultaneously restricting legitimate free speech. 

Next, many people don’t see a point in criminalizing this activity as victims are already able to file civil suits against the person who posted the pictures.  However, filing a civil suit takes lots of time and money.  Moreover, the reality is that once these pictures are posted to a revenge porn website, they will spread like wildfire all over internet and are next to impossible to take down.  A civil suit won’t really remedy this issue.  Threatening criminal penalties for posting revenge porn may be a better way to deal with the problem as it will discourage people from posting the pictures in the first place.

On the flipside, there are also concerns that revenge porn laws could be written too narrow.  For example, as written, California’s new law makes revenge porn illegal only if the photo was taken by the same person who distributes it and that person must have distributed the picture with the intent to cause serious emotional distress.[13]  This means that if a girl takes the naked picture of herself and sends it to her boyfriend and then her boyfriend later posts the picture on a revenge porn website, the California law would not apply.  Moreover, showing that a person posted revenge porn with the intent to cause serious emotional distress may be difficult to prove.  People may post these pictures intending to make money rather than with an intent to cause emotional distress.  

There are still many questions to be answered about criminalizing revenge porn.  While state laws criminalizing revenge porn are a start, it may be necessary for federal law to address the issue.  It will be interesting to see how many states follow California’s lead and whether Congress decides to step in. 

Finally, in case you’re interested, a revenge porn case popped up in local news in the last month as the Albemarle County Commonwealth’s Attorney, Denise Lunsford, filed for a protective order in Missouri against her former lover, David Cosgrove, former chief legal counsel to Governor Bob Holden, for posting nude pictures of her on the Internet.[14]  Cosgrove has asked the judge to dismiss the request and sanction Lunsford for “filing an unnecessary legal complaint.”[15]

           


[7] Id.

[10] Id.

[15] Id.

 

Blog: Aging Adults and Technology

by Morgan Ackerman, Managing Editor

 

Admittedly aging adults is not the first thing that comes to mind when thinking about the intersection of law and technology. However, there have been many recent technological advancements to aid aging adults and their caregivers. These advancements are aimed to both enable seniors to live at-home longer, and to help their caregivers.[1]

            Some of these advancements include Smartphone applications that help track medications[2], GPS trackers to monitor aging adults with Alzheimer’s and dementia[3], sensors, skin detectors, and social interaction tools.[4] All of these new technologies are making it possibly for many seniors to live independently, and for those caring for seniors, to better care for them. Along with these life enhancing, and life saving technologies comes potential legal ramifications. 

            The Supreme Court recently ruled that placing a GPS tracker on a car is considered a search under the 4th Amendment.[5]  Police will now need to obtain a warrant to lawfully place a GPS tracker on cars of criminal suspects. The court’s ruling leaves open the question of whether individuals can place GPS trackers on others. Private investigators have used the term “electronic stalking” when referring to the misuse of GPS trackers, and this is a serious concern surrounding GPS trackers.[6]

             In the context of aging adults, the use of GPS trackers to monitor seniors with Alzheimer’s and dementia seems to be a gray area. Likely, individuals tracking these adults are family or medical professionals that have gained consent to track individuals. However, this technology has an extraordinary potential for abuse and has yet to be regulated.

            Smartphone applications that help track medications may be the targets of medical malpractice lawsuits.[7]  Currently, Apple’s iPhone Developer Program License Agreement indemnifies Apple from liability for all iPhone applications, and places liability on the individual developers.[8] The potential that these medicine-tracking apps could have a glitch, or malfunction is high. A glitch or a malfunction could seriously harm a person relying on the app. The potential harm on the elderly population, that might solely rely on the app to remind them to take their medication, could have an even greater harm. With Apple’s indemnity clause, this leaves the Smartphone application developers liable. There has yet to be a medical malpractice case for medical Smartphone apps, but medical malpractice experts and the FDA foresee this scenario arising.

            Given the reality of such problems the FDA recently issued final rules on the development of medical Smartphone applications.[9] However, the FDA did not issue regulations of medicine reminders, caloric in-take, heart monitors, etc. leaving these types of medical apps unregulated.

            Overall, the implications of modern technology that aids the aging populations are positive, but the legal consequences should be kept in mind.

 


[1] Mario Sollitto, Technology for Elderly Enhances Health, Safety, Agingcare.com, http://www.agingcare.com/Articles/techology-for-elderly-living-at-home-147427.htm   Technology for Elderly Enhances Health, Safety Agingcare.com.

[2] MedCoach Medication Reminder, itunes.com, https://itunes.apple.com/us/app/medcoach-medication-reminder/id443065594?mt=8.

[3]Elderly & Special Needs GPS Tracking, Brick House Security, http://www.brickhousesecurity.com/category/gps+tracking/elderly+care+gps+tracking+products.do.

[4] Mario Sollitto, Technology for Elderly Enhances Health, Safety, Agingcare.com

[5] United States v. Jones, 565 U.S. ____, 132 S.Ct. 945 (2012); see also Adam Liptak, Police use of GPS is Ruled Unconstitutional, NYTimes.com,

http://www.nytimes.com/2012/01/24/us/police-use-of-gps-is-ruled-unconstitutional.html.

[6] Id.

[7] Satish Misra, iPhone Medical Apps Medical May Be Targets of Medical Malpractice, KevinMD.com, http://www.kevinmd.com/blog/2010/04/iphone-medical-apps-medical-malpractice-targets.html.

[8] Id.

[9] Melissa Gall, FDA Announces Regulations of Medical Smartphone Apps, Locum Tenens Daily, http://www.locumtenensdaily.com/fda-announces-regulations-of-medical-smartphone-apps/.

Sedona Conference® to Use JOLT Article at 10th Annual Georgetown Law Center Advanced e-Discovery Institute Program

For ten years, the Sedona Conference® has been working together with the Georgetown Advanced e-Discovery Institute to produce the finest e-Discovery education in the nation. To celebrate the ten year anniversary of this unique collaboration, the Sedona e-Discovery Cooperation Training Program will come to Georgetown on November 21 to host three concurrent sessions entitled “Cooperation in Practice.” Each session will feature a panel of experts, including state and federal judges, who will review and critique the performance of two teams assigned to negotiate the scope of discovery in an employment discrimination case.

The Sedona Conference® has requested permission to include a JOLT article as part of the materials used to familiarize the team participants and attendees with the case study and the practical tools for cooperative advocacy. The article requested was included in Vol. XVIII, Issue 3 , and titled Cooperation – What Is It and Why Do It? by Hon. David J. Waxse. 

The Sedona Conference® is a nonprofit, 501(c)(3) research and educational institute dedicated to the advanced study of law and policy in the areas of antitrust law, complex litigation, and intellectual property rights.  The Sedona Conference’s mission is to drive the reasoned and just advancement of law and policy by stimulating ongoing dialogue amongst leaders of the bench and bar to achieve consensus on critical issues.

To learn more about the upcoming program, please visit https://thesedonaconference.org/sedona-ediscovery-cooperation-training-program.

sedona conference logo

 

 

Blog: Privacy Concerns and the New iPhone

by Silvia Lee, Associate Staff

 

People waited in lines all over the world on Friday, September 20th to purchase Apple’s latest release, the iPhone 5s. Among the mobile device’s new features is a fingerprint scanner built into the home button. After an initial set-up, Apple’s proprietary “Touch ID” technology can scan sub-epidermal layers to allow users to unlock their phones and make iTunes purchases by scanning their fingerprint. Addressing privacy and security issues, Apple has stated that the biometric data is encrypted and stored only on the device and the information will not be sent to Apple’s servers or Cloud service. In addition, third party apps will not have access to the Touch ID system.

The much talked-about feature has at least one lawmaker voicing his concerns. Senator Al Franken, the Chairman of the Senate Judiciary Subcommittee on Privacy, Technology and the Law, has written a letter to Apple CEO Tim Cook in which he poses several questions regarding the new technology. One of his concerns is whether Apple considers the biometric data to be “contents” of communication or a “subscriber number or identity.”[1] Under the Stored Communication Act, “content” cannot be freely disclosed to law enforcement agencies without a warrant, while “subscriber number or identity” requires only a subpoena.[2]  

            Senator Franken is also concerned with how secure the fingerprint scanner actually is. He notes that “[p]asswords are secret and dynamic; fingerprints are public and permanent.”[3] If a passcode is compromised, users can change it for a new one, but fingerprints are unique and unchangeable. He fears that someone could lift a user’s fingerprint and use it to hack into the phone and all the information stored within.

The idea of lifting a fingerprint and hacking into an iPhone 5s has been turned into a competition on a website launched by Nick DePetrillo and Robert Graham. The site is crowdfunding a bounty for the first Touch ID hack. The duo claims their motives are to show that it is more difficult than people think. The crowdfunding campaign has raised over $5,000.00 so far and garnered much attention on Twitter with the hashtag #istouchidhackedyet.[4] In order to win the bounty, the hackers must post a video detailing the process of lifting a fingerprint from an everyday object (like a beer mug) and using it to unlock an iPhone 5s.[5] As of 10:00 no official winner of the bounty has been declared, but the Chaos Computer club from Germany is rumored to have accomplished the feat and have published a step-by-step guide.[6]

So far Apple has stayed silent on the matter. However, with a successful Touch ID hack a mere two days after the phone’s release and Senator Franken’s request for answers to his queries within a month, Apple may be pushed to speak sooner than anticipated.


[1] Andrea Peterson & Hayley Tsukayama, Fingerprint Scanner for iPhone 5s Raises Privacy, Security Concerns, Wash. Post, (Sept. 20, 2013), http://www.washingtonpost.com/business/technology/fingerprint-scanner-for-iphone-5s-raises-privacy-security-concerns/2013/09/20/0992cbee-222f-11e3-966c-9c4293c47ebe_story.html.

[2] Sen. Al Franken, Sen. Franken Questions Apple on Privacy Implications of New Fingerprint Technology, Al Franken (Sept. 20, 2013), http://www.franken.senate.gov/?p=press_release&id=2562.

[3] Id.

[4] Adam Vrankulj, Can the iPhone 5s Be Spoofed With a Lifted Print? Hackers Crowdfund Reward to Find Out, Biometric Update (Sept. 20, 2013), http://www.biometricupdate.com/201309/can-the-iphone-5s-be-spoofed-with-a-lifted-print-hackers-crowdfund-reward-to-find-out (Arturus Rosenbacker originally pledged $10,000 toward the bounty but has since been discovered as a scammer, http://www.zdnet.com/charlatan-hijacks-iphone-5s-fingerprint-hack-contest-fools-press-7000020978/).

[5] istouchidhackedyet, www.istouchidhackedyet.com (last visited Sept. 22, 2013 11:30 P.M.).

[6] How to Fake Fingerprints? Chaos Computer Club, (Sept. 22, 2013), http://dasalte.ccc.de/biometrie/fingerabdruck_kopieren?language=en

Blog: Google’s Street View Captures More Than Just Pictures

by Dylan Denslow, Associate Staff

 

If you ask someone a question and they don’t know the answer, it’s a fair guess that their answer will be “Google it.”  These days, it seems like Google is used for everything – it’s expanded much further than a simple Internet search engine.  While this expansion has its fair share of benefits, it also means that Google continues to collect even more piles of data from its users.  However, just recently the Ninth Circuit issued an opinion in Joffe v. Google that will rein in some of Google’s activity and have implications for other Internet users.

 

Google’s Street View program is a feature connected to the company’s popular Google Maps and Google Earth applications, which allows users to see 360-degree panoramic images of cities from a street-level perspective.  Google provides this service by sending computer-filled vehicles with cameras down city streets. While capturing street images between 2008 and 2010, Google’s Street View cars simultaneously collected around 600 gigabytes of data transmitted over Wi-Fi networks in more than 30 countries.  Among the types of data captured were personal emails, usernames, passwords, videos and documents[1].

 

The US Wiretap Act generally prohibits the intentional interception, use, or disclosure of wire, oral and electronic communications unless a statutory exception allows for such activity.[2] One such exception involves communications that are readily accessible to the public, such as radio communications[3]

 

In Joffe v. Google, Google argued that the case should be dismissed based on the theory that its collection of data from unencrypted Wi-Fi networks fit within the Wiretap Act’s exception covering communications readily available to the public.  However, the Ninth Circuit felt otherwise and held that “Google’s collection of data from unencrypted Wi-Fi networks under its Street View program is not exempt from federal wiretap laws.”[4]  Specifically, the court noted that unencrypted Wi-Fi networks do not qualify as radio communications and that they are not electronic communications readily accessible to the general public.[5] This case represented the first time an appellate court addressed the issue and made a determination on the Wiretap Act’s applicability to unencrypted Wi-Fi networks.[6]

 

The practical implication of this ruling is that anyone who intercepts your information on an unencrypted Wi-Fi network may be punished. Anyone can join an unencrypted network, and once joined all of the data on the network is available to all connected devices. Without hacking, it is easy to collect data from these networks both intentionally or unintentionally. Some privacy experts are concerned that going forward, this court’s holding has the potential to “create accidental outlaws of researchers, and the generally technical and curious.”[7] Because of the relative ease in accessing data on unencrypted Wi-Fi networks, Internet users and researchers in particular should be aware that even their unintended use of an open Wi-Fi network may expose them to potential legal risks.

 


[1] Google Street View ruling denotes “landmark” privacy case on Wi-Fi-enabled data collection, SC Magazine, http://www.scmagazine.com/google-street-view-ruling-denotes-landmark-privacy-case-on-wi-fi-enabled-data-collection/article/311655/ (last visited September 22, 2013).

[2] See 18 U.S.C. § 2511 (2013).

[3] Id.

[4]Google loses appeal in Street View privacy lawsuit, PC World Australia, http://www.pcworld.idg.com.au/article/526168/google_loses_appeal_street_view_privacy_lawsuit/ (last visited September 22, 2013).

[5] Apparently Open WiFI is actually private, The Privacy Blog, https://www.theprivacyblog.com/online-privacy/apparently-open-wifi-is-actually-private/ (last visited September 22, 2013).

[6] Google Street View ruling denotes “landmark” privacy case on Wi-Fi-enabled data collection, SC Magazine, http://www.scmagazine.com/google-street-view-ruling-denotes-landmark-privacy-case-on-wi-fi-enabled-data-collection/article/311655/ (last visited September 22, 2013).

[7] Id.

Blog: The Dangers of Keyloggers

by Miles Jolley, Associate Staff

 

A few college kids have recently found themselves in federal hot water for taking advantage of campus computers.  For two different but sinister ends, Matthew Weaver and Marcus Barrington used keyloggers to steal others’ online usernames and passwords.  If you’re like me, you have hopefully never encountered this technology.  Keyloggers are covert devices that can easily assist ne’er-do-wells in stealing your identity and accessing personal information.  Also, if you’re like me, you’ll be surprised at how obtainable these are and the relatively weak legal response preventing their use.  First, let’s marvel at the idiocy of these students.

Matthew Weaver was running for student council president at California State University, San Marcos in March of 2012.  Instead of kissing babies and shaking hands, he decided to steal the election.  Weaver installed keyloggers on campus computers to steal other students’ university network usernames and passwords in order to cast hundreds of votes for himself.  Once university officials got wise, they involved federal investigators.  The election ended up winning Weaver a year in jail for committing identity theft, wire fraud, and unauthorized access to a computer.[1]

Barrington was a student at Florida A&M University and similarly used keyloggers to access the school’s Registrar’s system.  Once Barrington infiltrated the system, he altered grades and other vital information.  All total, there were over 650 changes made which involved over 90 students.  Barrington wound up with 84 months in prison for various identity theft and fraud convictions.[2]

Keyloggers are computer applications that record your keystrokes.  The common criminal usage of a keylogger is for stealing online usernames and passwords that protect email accounts, online banking, you name it.  They come in both hardware and software formats and all it takes is a little internet surfing to get your hands on one.  Legitimate companies market keyloggers to IT admins and parents that want to track activity on their computers.  However, it is easy for criminals to wield this otherwise legal technology for wrongdoing.[3]

The reality is that this is a hard situation to remedy.  Nowhere in the federal code is the illegal use of a keylogger specifically mentioned.  Lawmakers attempted to pass relevant provisions in 2007 with the Securely Protect Yourself Against Cyber Trespass Act, but it died in the Senate after twice passing the House.  The law would make illegal “[c]ollecting personally identifiable information through the use of a keystroke logging function.”[4]  A clear law such as this might make technology companies think twice about to whom they sell keyloggers.  Additionally, this definitive language would let potential criminals know there will be consequences for illicit use.  However, until more is done, these devices will be used to take advantage of innocent, hard-working Americans.


[1] Press Release, Federal Bureau of Investigation, Cal State San Marcos Student Sentenced for Rigging Campus Elections (July 15, 2013), http://www.fbi.gov/sandiego/press-releases/2013/cal-state-san-marcos-student-sentenced-for-rigging-campus-elections.  

[2] United States v. Barrington, 648 F.3d 1178, 1183-85 (11th Cir. 2011).

[3] Sachin Shetty, Introduction to Spyware Keyloggers, Symantec.com (Apr. 13, 2005), http://www.symantec.com/connect/articles/introduction-spyware-keyloggers

[4] Securely Protect Yourself Against Cyber Trespass Act, H.R. 964, 110th Cong. § 2(a)(3) (2007).

Blog: Early NFL Matchups Giving Superbowl Stiff Competition

by Walton Milam, Associate Staff

 

Though the Superbowl typically provides the best television advertisement of the year, the 2014 political races and particularly the Virginia gubernatorial election are giving the NFL championship a run for its money.   From Voldemort like voice overs to overly done images of the candidates sharing their vast knowledge of Virginia agriculture and manufacturing techniques, these candidates make it clear that they are the key to a more prosperous Virginia and that their opponent is downright evil.  Terry McAuliffe and Ken Cuccinelli have managed to spend what are likely millions in television marketing without making a single argument, instead relying on a litany of inductive fallacies that leave me laughing every time.[1] [2] 

 

Sadly, these commercials must be indicative of what political entities believe will sway voters.  Given the immense money spent by political groups across the nation to determine what campaigning tactics yields results, I think politicians vying for 2014 positions are likely catering to the demands of voters who are affected more by emotionally charged ad hominems than a candidate who ventures to make an argument.   The televised town halls meetings associated with Obamacare left me with impression that American political discourse is devolving to the “rabble- rabble” type meetings that occur on Southpark rather than a market of competing ideas that supposedly lead to a more fruitful society. 

 

Unfortunately both voters and politicians face incentives that give little reason to think the nature of political campaigns will change.  Voters face the prospect of choosing a “superior” candidate or facing the stigma of foregoing their civic duty to participate in elections.   This dilemma will likely force voters to give into the lesser of two evils and vote in November.  Hopeful politicians must get elected to have any impact and are willing to do what is necessary to achieve their end goal, including waging political warfare that does not actually get to any meaningful issue.

 

The perplexing issue facing voters is how to change demands so that politicians vying for office will be forced to switch campaigning tactics so that there is meaningful argument that involves improved government rather than alleged personal issues facing their political opponents.  Perhaps the best approach is the one put forth by PJ O’Rourke, to abstain from voting as it only encourages the political machine that their campaigning tactics and efforts are worthwhile.[3]

 

As mentioned supra, the prospect of abstaining from elections altogether is viewed with disdain as many consider election participation a fundamental element of American democracy.  O’Rourke’s idea then, though well-taken, will not sit well with a majority of voters and thus will not likely be a mechanism through which the nature of political campaigning shifts.

 

Long terms solutions might come through an improved education system through which both voters and potential elected officials come to understand the importance of using argument rather than fallacy.  This solution will have little impact in the short run and seems even more bleak as education policy stems from the same elected officials waging campaigns today. 

 

Though a solution seems distant, I think it is important to understand that the lack of inductive argument is a major issue in political races and all facets of society.  While I am entirely confident that this blog post will have a statistically insignificant impact on the 2014 Virginia Governor’s election and the commercials associated with it, I think informal discussion of argument and fallacy can only be helpful.[4]

 

At least the Virginia race is sure to provide us with more entertainment.  I can’t wait for the debates.   


[1] http://www.youtube.com/watch?v=hz7gkphqchs

[2] http://www.youtube.com/watch?v=m1nTNP9Crlk

[3] http://www.cato.org/events/dont-vote-it-just-encourages-bastards

[4] http://www.philosophicalsociety.com/logical%20fallacies.htm

Blog: Mario vs. the Internet: How Nintendo Chose to Enforce its Intellectual Property Rights

By Dimitri Karles, Associate Staff

 

The universal appeal of video games is impossible to deny. According to data collected by the Electronics Software Rating Board, the regulatory body that oversees the video game industry, 67% of US households play video games.[1] This ubiquity has led to record sales and industry-wide revenue eclipsed $10.5 billion in 2009.[2] Many entities, from independent developers to giant publishing houses, comprise the video game industry, and each one has the potential to influence the industry. However, there is one company whose influence pervades the industry to a greater degree than any other. Nintendo not only has some of the most recognizable gaming mascots in the world, but has also released a number of best-selling consoles. As such, the gaming community, in a rare show of solidarity, is generally positive in its views towards the Japanese gaming giant.

 

In May of 2013, however, Nintendo took actions that drew the ire of a large part of the gaming community[3]. One of the recent phenomena of the gaming community sees YouTubers posting videos of footage of new games, with or without commentary, which they share among their followers[4]. The community frequently refers to these clips as “Let’s Play videos” and calls those who upload them “Let’s Players.”[5] A number of these “Let’s Players” run ads on these videos, in turn generating revenue dependent on the number of views the video garners.[6] On May 14, however, a Let’s Player posting to the ZackScottGames channel discovered that the ad earnings from videos he posted of Nintendo games had ceased.[7]

 

After the news broke, and after the denizens of the Internet reacted as they are wont to do, Nintendo released a statement explaining the situation. Rather than completely blocking Let’s Players from posting copyright content on YouTube, Nintendo chose to insert its own advertisements “at the beginning, next to or at the end of clips.”[8] This meant that Let’s Players would no longer be able to gain revenue from videos containing content containing Nintendo copyright material, and, in turn, many Let’s Players stopped posting such content.[9]

 

Did Nintendo make the right choice? Should it have left well enough alone and continued to allow Let’s Players to post copyright content? Or, was its decision to exercise its intellectual property rights sound corporate policy? Though there is solid precedent that abandonment of a copyright can only be accomplished by some overt act, Nintendo was justifiably concerned about the future of its copyrights had it continued to allow Let’s Players to post copyright content without comment.[10] So, did, as the Internet predicted, these policies spell doom and gloom for the corporation at the center of this “controversy”? As it turns out, only nine days after he reported the cessation of his ad earnings, the same Let’s Player was back to earning ad revenue on those videos.[11] Was this just Nintendo’s way of sending a message to the gaming community that they would do everything in their power to retain their intellectual property rights, regardless of any potential backlash? We might never find out the answer to that question, but, as the world becomes increasingly reliant on digital media, we have to figure out how this situation fits into the larger context of digital rights management and the gaming community.  


[1] Video Game Industry Statistics, Electronics Software Rating Board (last visited September 13, 2013), http://www.esrb.org/about/images/vidGames04.png

[2] Id.

[3] Stephen Totilo, Nintendo’s Turn for a 180? ‘Let’s Play’ Drama Might Have a Happy Ending, Kotaku (last visited September 13, 2013), http://kotaku.com/nintendos-lets-play-drama-might-have-a-happy-ending-513818999

[4] Id.

[5] Id.

[6] Id.

[7] Id.

[8] Nintendo comments on YouTube ‘Let’s Play’ situation, adding ads to certain videos, GoNintendo (last visited September 14, 2013), http://www.gonintendo.com/?mode=viewstory&id=202693&utm_source=feedly

[9] ‘Let’s Play’ Drama.

[10] See generally, A & M Records, Inc. v. Napster, Inc., 239 F.3d 1004, 1026 (9th Cir. 2001); Hampton v. Paramount Pictures Corp., 279 F.2d 100, 104 (9th Cir. 1960).

[11] ‘Let’s Play’ Drama.

JOLT 2013-2014 Outlook and Announcement of 20th Volume Alumni Celebration

by Benjamin Fox, Editor-in-Chief

Following the announcement of the new staff members in August, JOLT turned its full attention to Volume XX.  I would like to take a few moments to discuss our outlook for this year, and announce some special plans.  First, however, I would like to say a huge “Thank You” to Editor-in-Chief Laura Cahill and the rest of the JOLT Volume XIX Editorial Board for all their exceptional work last year and help in the transition process.  In addition to publishing four issues and organizing an e-Discovery Symposium, the Board oversaw a complete re-design of the website, which now offers blog posts, reader and author interaction, and advanced searchable features.  We hope to build upon their advances.

Our staff is hard at work editing articles for Issue One and looking for quality articles to publish throughout the year.  We strive to continue JOLT’s tradition of publishing insightful, informative, and well-written articles that will drive discussion on a topic.  It is this tradition that has made JOLT the second most cited science, technology, and computing journal in judicial opinions over the past eight years.[1]  Furthermore, we have expanded our blog post section and will continue to increase the number and frequency of posts, so check back often!  Our blog posts present an opportunity to address evolving issues at the intersection of law and technology as they emerge.  As always, we appreciate your comments.  Additionally, while many of our blog posts come from JOLT staff, we welcome submissions from all sources.  Therefore, if you are interested in writing an article or blog post, please contact us at jolt@richmond.edu.

JOLT’s Annual Symposium is scheduled for February 28, 2014, and looks to be our biggest yet.  This year’s Symposium will focus on e-Discovery and Information Governance, with topics including the ethics of data retention, privacy and security of data, the importance of developing and implementing information governance procedures, and the effects of the proposed amendments to the Federal Rules of Civil Procedure.  We will provide updates under the “Symposium” tab on the site and will publish blog posts from a number of the authors and speakers in the months leading up to the Symposium.

Finally, it is with genuine excitement that I announce the JOLT 20th Volume Alumni Celebration.  On November 15, 2013, we will be hosting a reunion event for all University of Richmond JOLT alumni and their families.  JOLT alumni should be on the lookout for a save-the-date and a formal invitation with more information.  We will provide further updates on the website, but in the meantime, if you have questions about the event, please contact our Managing Editor Morgan Ackerman at morgan.ackerman@richmond.edu.  We hope to see many of you then!


[1] Law Journals: Submissions and Ranking, 2005-2012, Wash. & Lee Sch. L. L. Libr., http://lawlib.wlu.edu/LJ/index.aspx (search by selecting “Science, Technology and Computing” under Journal Criteria and “Case Cites” under Ranking Criteria)

Page 46 of 50

Powered by WordPress & Theme by Anders Norén