The big bad wolf to the . . . rescue?

If you work in technology, the big bad wolf can be your best friend. Read below to find out why.

A few days ago, the U.S. Supreme court denied Google's appeal from a decision by the United States Court of Appeals for the Federal Circuit which found that source code -- written instructions that run computer software -- can be protected by copyright law. In so doing, the nation's highest court left in tact a ruling by the Federal Circuit which found Google could have infringed the copyright to Oracle's software programming platform. 

“Tool Without a Handle”: 21st Century Data Privacy – A Quantum Puzzle – Part 2

In this part 2, I describe a quantum principle – the familiar “uncertainty principle” – and how it applies to privacy law and policy considerations. In particular, I observe that the process of managing data respectfully creates something of a quantum paradox. The paradox is a form of an “uncertainty” principle, whereby to better afford privacy for certain data, one in fact needs to know additional information about the data subject

Facebook Has to Identify Uploader of Revenge Porn, Says Dutch Court

A Dutch Court today ruled that Facebook has a duty to identify a person who has uploaded a revenge porn video on its social network. In this case, the video displays a woman, Chantal, performing oral sex on her now ex-boyfriend. A fake account bearing Chantal’s name was created and used to share the private video with her friends and others. Chantal’s ex-boyfriend, who recorded the video, has always denied uploading the video.

Brazilian Supreme Court Adopts Common Law Tests for Intermediary Liability in Copyright Case

Last month, the Superior Tribunal de Justiça (STJ), the highest appellate court in Brazil for non-constitutional questions of federal law, awarded a landmark decision in a case discussing the liability of the social networking site Orkut for copyright infringing user-generated content on its site. The Court ruled that content providers cannot be held liable for copyright violations committed by third parties if they do not profit from copyright infringement on the part of its users.


Subscribe to Stanford CIS Blog