Deeplinks Blog posts about DMCA
Copyright is a poor tool for making embarrassing information disappear from the Internet. It rarely succeeds, and often draws more attention to whatever was embarrassing or harmful. Copyright isn’t designed for keeping secrets (in fact, it was generally meant to do the exact opposite by encouraging disclosure). Yet people keep trying to use copyright law, in part because takedown notices under the Digital Millennium Copyright Act are quick and easy, and because the rhetoric of “theft” and threats of ridiculously large penalties can be quite scary.
Security researchers Charlie Miller and Chris Valasek have once again exposed automobile security flaws that allow attackers to take over a vehicle’s crucial systems. In their latest work, they learned how an attacker could remotely control a car over the Internet.
Vehicle manufacturers dismissed prior warnings about flawed security by claiming [PDF] that the exploits relied on physical access to the car. But it has long been known that vehicles’ wireless systems (such as Bluetooth) contain vulnerabilities that would allow a malicious hacker to gain access to critical vehicle functions.
Security researchers Charlie Miller and Chris Valasek have once again exposed automobile security flaws that allow attackers to take over a vehicle’s crucial systems. In their latest work, they learned how an attacker could remotely control a car over the Internet.
Vehicle manufacturers dismissed prior warnings about flawed security by claiming [PDF] that the exploits relied on physical access to the car. But it has long been known that vehicles’ wireless systems (such as Bluetooth) contain vulnerabilities that would allow a malicious hacker to gain access to critical vehicle functions.
Striking a blow against the continuing effort to force service providers to serve as IP police, CloudFlare and EFF have pushed back against a court order that would have required CloudFlare to monitor its service to enforce a trademark held by a group of music labels. Last week, Judge Alison J. Nathan of the U.S. District Court for the Southern District of New York ruled that CloudFlare does not have to search out and block customers who use variations on the name “grooveshark.” Instead, CloudFlare must take action only if it has “knowledge of an infringement” (for example, when the labels send a takedown notice). Given that this is essentially what US law already requires, Judge Nathan’s order puts paid to the latest strategy to institute trademark- and copyright-related filtering – at least in this case.
If you operate your own website, be glad that you don't host it in South Korea (or if you do, you might want to rethink that). Whereas in the United States, an important law called CDA 230 protects you from liability for comments contributed by users to your website, South Korea has some of the toughest liability rules in the world that can leave intermediaries such as website owners carrying the can for content they didn't even know about.
First, they are required to remove content for a minimum of 30 days on receipt of a complaint, without it being assessed by a court or judge—under the U.S. DMCA a similar obligation applies only to complaints of copyright infringement, but in South Korea it applies to other speech such as alleged defamation, and the takedown obligation is imposed independently, rather than merely as a method of gaining safe harbor from potential liability.
Pages
Subscribe to EFF Updates
Deeplinks Archives
Deeplinks Topics
- Fair Use and Intellectual Property: Defending the Balance
- Free Speech
- Innovation
- International
- Know Your Rights
- Privacy
- Trade Agreements and Digital Rights
- Security
- State-Sponsored Malware
- Abortion Reporting
- Analog Hole
- Anonymity
- Anti-Counterfeiting Trade Agreement
- Biometrics
- Bloggers' Rights
- Broadcast Flag
- Broadcasting Treaty
- CALEA
- Cell Tracking
- Coders' Rights Project
- Computer Fraud And Abuse Act Reform
- Content Blocking
- Copyright Trolls
- Council of Europe
- Cyber Security Legislation
- CyberSLAPP
- Defend Your Right to Repair!
- Defending Digital Voices
- Development Agenda
- Digital Books
- Digital Radio
- Digital Video
- DMCA
- DMCA Rulemaking
- Do Not Track
- DRM
- E-Voting Rights
- EFF Europe
- Encrypting the Web
- Export Controls
- FAQs for Lodsys Targets
- File Sharing
- Fixing Copyright? The 2013-2015 Copyright Review Process
- FTAA
- Genetic Information Privacy
- Hollywood v. DVD
- How Patents Hinder Innovation (Graphic)
- ICANN
- International Privacy Standards
- Internet Governance Forum
- Law Enforcement Access
- Legislative Solutions for Patent Reform
- Locational Privacy
- Mandatory Data Retention
- Mandatory National IDs and Biometric Databases
- Mass Surveillance Technologies
- Medical Privacy
- National Security and Medical Information
- National Security Letters
- Net Neutrality
- No Downtime for Free Speech
- NSA Spying
- OECD
- Online Behavioral Tracking
- Open Access
- Open Wireless
- Patent Busting Project
- Patent Trolls
- Patents
- PATRIOT Act
- Pen Trap
- Policy Analysis
- Printers
- Public Health Reporting and Hospital Discharge Data
- Reading Accessibility
- Real ID
- RFID
- Search Engines
- Search Incident to Arrest
- Section 230 of the Communications Decency Act
- Social Networks
- SOPA/PIPA: Internet Blacklist Legislation
- Student and Community Organizing
- Stupid Patent of the Month
- Surveillance and Human Rights
- Surveillance Drones
- Terms Of (Ab)Use
- Test Your ISP
- The "Six Strikes" Copyright Surveillance Machine
- The Global Network Initiative
- The Law and Medical Privacy
- TPP's Copyright Trap
- Trans-Pacific Partnership Agreement
- Travel Screening
- TRIPS
- Trusted Computing
- Video Games
- Wikileaks
- WIPO
- Transparency
- Uncategorized