Technology & Marketing Law Blog

Latest from Technology & Marketing Law Blog

More Bitcoin litigation . This time, malefactors hijacked popular YouTube channels and uploaded videos promoting Bitcoin scams:
First, scammers will breach YouTube’s security to unlawfully gain access to verified and popular YouTube channels with tens or hundreds of thousands of subscribers. The scammers then transfer ownership or control of the channel to themselves or a

As I’ve recently mentioned, ex parte proceedings are error-prone because the judge hears only one side of the story and doesn’t get enough context to spot the possible flaws. This systematic–and avoidable–risk of errors has materially contributed to the SAD Scheme’s success. For example, rightsowners claim that defendants are international, even if they aren’t, and

Music publishers sued Twitter for users’ alleged copyright infringement. The court says that three aspects of the contributory copyright infringement claim survive Twitter’s motion to dismiss.
Direct Copyright Infringement. The publishers argued that Twitter “transmitted” their works. The court says the tweeter does any “transmitting,” not Twitter or the viewer. This diverges from the Aereo

Texas passed a law (HB 1181) requiring pornographic websites to age-authenticate all users and then prevent minors from accessing online porn. If this sounds familiar, it’s because Congress passed functionally identical laws twice: the CDA in 1996 and the COPA in 1998. Both laws were struck down as unconstitutional. But to the Texas