Remove Blog Remove Confidentiality Remove Copying Remove Privacy
article thumbnail

Minnesota’s Attempt to Copy California’s Constitutionally Defective Age Appropriate Design Code is an Utter Fail (Guest Blog Post)

Technology & Marketing Law Blog

by guest blogger Jess Miers, Legal Advocacy Counsel at Chamber of Progress [Eric’s intro: last year I blogged about Minnesota’s flirtation with mandatory age verification. In an attempt to address this concern, Minnesota offers some protection by maintaining the confidentiality of information subject to attorney-client privilege.

Copying 127
article thumbnail

Checklist of Issues on Generative IP

Kluwer Copyright Blog

It involves several IP rights, some of which overlap in some cases: copyright, trademarks, patents, trade secrets/confidential information, and the right of publicity (and similar rights with different names). Singapore (computational data analysis; user must not “use the copy for any other purpose”) f. Japan (Art. 47 septies ) e.

IP 118
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Potential Risks of ChatGPT and Other Generative AI

LexBlog IP

Third, there are potential confidentiality issues to consider. Allowing a third party such as OpenAI to have access to otherwise protected information without a confidentiality agreement in place could constitute a “public disclosure” and risk the loss of protection for the disclosed information. [5]

article thumbnail

The Legal Boundary of Data Scraping in Light of Van Buren v. United States

JIPEL Copyright Blog

This blog will delve into the reasoning of Van Buren and predict the final decision of HiQ v. LinkedIn sent a C&D letter, asking HiQ to stop accessing and copying the data based on the User Agreement. LinkedIn , 938 F.3d 3d 985 (9th Cir. United States , 141 S. 1648 (2021). To begin, let’s recall the basic facts of HiQ v.

article thumbnail

Proctorio v Linkletter – Part 2

IPilogue

Proctorio did not dispute the fact that the ongoing debate of the impact of its software was of public interest; rather, it focused on Linkletter’s supposed malicious intent and sharing of confidential links.

article thumbnail

LIVE! FROM A COURTHOUSE NEAR YOU: HOW SHOULD WE ADDRESS PRIVACY CONCERNS FROM LIVESTREAMING COURT?  

JIPL Online

While the option of moving in-person proceedings to a virtual format can be even more convenient to the conventional model, this “new normal” poses a new threat to privacy. [4] This blog proposes public policy arguments and concrete solutions to the laissez-faire approach to privacy in criminal court proceedings.

Privacy 52
article thumbnail

What is Blockchain Technology and has it been Patented?

Biswajit Sarkar Copyright Blog

The nodes authenticate transactions, add the data to their copy of the common ledger and transfer the ledger additions to all other nodes. It is basically a distributed database that can achieve independent verification of the ownership chain of any or every cryptocurrency (amount) as each node stores its own copy of the blockchain.