Monday, July 14, 2014

ABA IPL Publishes White Paper on Online Piracy and Counterfeiting

On July 7, 2014, the ABA Intellectual Property Law (IPL) Section released its comprehensive white paper, outlining the results of its research and analysis of continuing concerns about online pirates and counterfeiters based overseas.  The white paper coins a term to describe the malfeasors:  Predatory Foreign Websites.
More information about the white paper, including a summary of the conclusions and recommendations it makes, can be found in its Press Release and in the copy of the White Paper available on the ABA IPL Section’s site.

Wednesday, April 16, 2014

Recent Presentations and Articles

More articles on IP and privacy issues will be posted here soon, but in the meantime, here are several recent articles that have published in other media:
  • Participated in a panel discussion on Shutting Down Rogue Websites:  International and Domestic Solutions, before the ABA Section of Intellectual Property Law’s 29th Annual IP Conference, on April 3, 2014.  An article previewing the session was published by our law student reporter, Anna Oakes, who live-tweeted during the presentation (in accordance with the law student reporter program).  I re-tweeted relevant posts about our session that she and other law student reporters tweeted (see @PaTmLawyer).   An article and presentation slides were published in connection with this session, but they are only available to meeting attendees.
  • Interviewed by Smart Business Magazine, How to protect data security and customers’ trust, published on March 31, 2014.  This article briefly describes ways that companies can begin to plan ahead for potential breaches so that their response(s) to breaches can be carefully considered and (hopefully) well-executed.
In addition, on May 9, I will be presenting during the DRI’s Intellectual Property Litigation Seminar on the ability to recover attorney fees in copyright and trademark cases.  The article and presentation slides developed on this topic will be available to meeting attendees.

Following these presentations, more blog posts will begin to appear again.  What can I say?  It’s been a busy spring.
Stay tuned – more soon.

Tuesday, January 28, 2014

Today is Data Privacy Day!

January 28 is “Data Privacy Day.”  In honor of the day, below are several links relating to efforts to protect the privacy of personal data and some tools for small businesses:

Council of Europe’s explanation of the purpose Data Privacy Day (now in its eighth year):
* Note that the Council of Europe published its “Handbook on European data protection law” (prepared in cooperation with the European Union Agency for Fundamental Rights (FRA) and the European Court of Human Rights) on January 28, which is available here:    
European Union’s Data Protection Day initiatives, including promoting the reform of EU Data Protection laws: (see embedded video).

Federal Communications Commission’s Cyber Security Planner:, which the FCC describes as a “a tool for small businesses to create customized cyber security planning guides.”  (More information about this tool can be found here:
Federal Trade Commission’s Data Security (for Businesses):  

Microsoft’s Data Privacy Day resources:

Stay Safe Online’s Data Privacy Day Site: -- and specifically their library:
Online Trust Alliance’s Data Privacy Day Site: -- includes for example, its 2014 Data Protection & Breach Readiness Guide.

Monday, January 27, 2014

New “Personal Information Privacy” Legislation Introduced

On January 8, 2014, Sen. Patrick Leahy (D-Vt) re-introduced a personal privacy protection bill intended “to prevent and mitigate identity theft, to ensure privacy, to provide notice of security breaches, and to enhance criminal penalties, law enforcement assistance, and other protections against security breaches, fraudulent access, and misuse of personally identifiable information.”  Personal Data Privacy and Security Act of 2014, S. 1897 at preamble (introduced Jan. 8, 2014).  Sen. Leahy introduced prior versions of this bill in 2005, and in each of the four Congresses since.  Press Release, “Leahy Reintroduces Data Privacy Legislation,” Jan. 8, 2014.

Sen. Leahy’s published summary of the bill provides a detailed list of the key components.  There are two principal titles in this bill:  1) Enhancing Punishment for Identity Theft and Other Violations of Data Privacy and Security; and 2) Privacy and Security of Personally Identifiable Information (“PII”).  (There is a third title, relating to compliance with a statutory Pay-As-You-Go Act, but the text is a short paragraph and just relates to budget compliance.)  See Leahy’s Section-By-Section Analysis of the Bill.
Punishment Enhancement:  The Bill adds expands the definition of racketeering activity (18 U.S.C. § 1961(1)) to include violations of the Computer Fraud and Abuse Act (“CFAA,” 18 U.S.C. § 1030); criminalizes the knowing concealment of a security breach that requires notice (and provides for either a fine or imprisonment up to 5 years); enhances the penalties for fraud and related activities under the CFAA; provides the same penalties for conspiracy to commit computer hacking as for completed, substantive offenses; clarifies the criminal forfeiture requirements; creates a civil forfeiture provision (providing that gross, not net, proceeds may be forfeited under this section); precludes civil actions based on violations of acceptable use policies or terms of service agreements; and adds a new criminal provision making it a felony to damage a computer that manages critical infrastructure systems, such as national security, transportation or public health and safety (imprisonment would be between 3 and 20 years if convicted).

Privacy and Security of PII.  It covers detailed requirements for data privacy and security programs; enforcement for data breach events (although this specifically denies a private right of action); security breach notifications (to whom made, method, contents, timing, notice to law enforcement, permitting delays by Secret Service or FBI where notice could impede active criminal investigations or national security); and preemption of state law on breach notification; and enforcement (it appears to provide only agency enforcement (by federal or state agencies) or criminal enforcement, and not a private right of action). 
Bill Status

This version of the legislation comes close on the heels of the data breach at Target retail stores, involving the “debit and credit card data of as many as 40 million customers during the Christmas holidays.”  Id. (quoting Sen. Leahy).  Once introduced, the bill was read twice, and referred to the Senate Judiciary Committee.  Bill Status (last visited on Jan. 26, 2014); see also Detailed Summary.  Sen. Leahy also announced that the bill “will be” the focus of a hearing before the Senate Judiciary Committee this year.  Id.  (Sen. Leahy is chair of the Senate Judiciary Committee.)
Senate Hearing:  February 4, 2014 (To be Webcast in Real Time)

A related hearing has already been announced, to be held before the full Judiciary Committee.  The hearing notice does not specifically mention this bill, but is undoubtedly related:  "Privacy in the Digital Age: Preventing Data Breaches and Combating Cybercrime," scheduled for February 4, 2014, at 10:15 am in the Dirksen Senate Office Building, Room 226.  
Two panels of testifying witnesses are currently scheduled.  Panel 1 includes John J. Mulligan, EVP and CFO of Target Corporation and Delara Derakhshani, Policy Counsel of Consumers Union (publishers of Consumer Reports).  Panel 2 includes The Honorable Edith Ramirez, Chairwoman of the Federal Trade Commission, William Noonan, Deputy Special Agent in Charge at the Criminal Investigative Division of the U.S. Secret Service and Mythili Raman, Acting Assistant Attorney General in the Criminal Division at the U.S. Department of Justice.

If prior hearings are any indication, then it is likely this hearing, which has been announced as a webcast, will also broadcast live.  Visit the Judiciary Committee’s Hearing Notice to access the video feed.
Other Data Privacy Legislation

Sen. Leahy’s Bill is not the only one proposed in the current Congress relating to data security breaches and notifications to customers.  Indeed, there are 303 other bills pending with the words “privacy” in their title.  See Search Results. One particularly noteworthy is the Data Security Act of 2014 (S. 1927), introduced by Sen. Thomas Carper (D-DE) and Sen. Blunt (R-MO) on January 15, 2014.  It seems to also be responsive to the Target data breach notification problem in December 2013.  It was read twice and referred to the Senate Committee on Banking, Housing, and Urban Affairs.

Tuesday, December 31, 2013

Index of Articles in 2013

Well, 2013 turned out to be a very busy year (on a personal level, so there aren't as many articles posted here during the year!), and 2014 promises to be very interesting. Given the public debates about copyright reform, we will probably be covering copyright law more than previously. However, the 1976 version of the Copyright Act took over two decades to finalize ("In fact, former Register of Copyrights Barbara Ringer, who had worked closely with Congress for much of the 1976 revision process, later called it a 'good 1950 copyright law.'" from March 20, 2013 Speech By Maria Pallante), so I do not expect that all of the issues raised about digital publication and distribution (among others) will be resolved overnight.

We expect to see more proposals on the trademark side as well, although it's likely that members of Congress may avoid controversial issues this year. As a result, it is hard to predict whether we expect to see any revisions to the COICA/PIPA/SOPA drafts (relating to counterfeiting by predatory foreign websites), given that these proposals each had their own challenges in public debate.

I look forward to your comments in the coming year, and wish you all the best in your own practices!

Chronological Index of Articles Posted in 2013: