Showing posts with label spying. Show all posts
Showing posts with label spying. Show all posts

Sunday, January 03, 2021

Over Watch

Today's theme is about over-reach, surveillance, games, greed and naming rights... of a timepiece. Please decide for yourself which is which.

Tech expert and ethical website developer Ibrahim Diallo poses a very interesting question: "Why ask the user what they think if you can watch exactly what they are doing?"

He was watching over a friend's keystrokes, initially without her knowledge or consent, when he came to an ephiphany about how moral lines may be blurred for the sake of convenience.

"Mouseflow" is on the legal blogging radar. Allegedly, Blizzard, also WebMD, and Chevrolet use a particular spy technology to surveill everything a user does with his/her/their mouse when visiting their sites. Blizzard Entertainment and Mouseflow are allegedly being sued by a Californian resident for invasion of privacy.

According to the law suit, Mouseflow captures and records, "full activity, location, device type, referral source, duration of session, browser/operating system, and much more."

Legal blogger Rick Zou, for the law firm Frankfurt Kurnit Klein & Selz explains some of the ramifications for IP and Media Law.

Meanwhile, an Australian law suit is worth watching. A famous person attempted to monopolize a fairly common surname, including with regard to wristwatches, although that surname was already trademarked by an older watch-making company.

Shaun Creighton and Daniel Moulis for Moulis Law pose some questions that are interesting not only to purveyors of timepieces, but also to writers. 

For instance, "Can a famous person obtain monopoly rights over their common surname?"  and "Does a trade mark for a first name and last name prevent others from using just the last name on goods or services?" and "What legal rights do celebrities have in their names?" And more.

Disclaimer: the definition of Over Watch was taken from The Century Dictionary.

  • To watch to excess.
  • To exhaust or fatigue by long want of rest.
  • To watch over; overlook.
(It is also the name of a game which does not appear to be implicated in any of the stories reported on above.)

All the best, and Happy New Year!


Sunday, June 14, 2020

"The Width Of The Buttocks" (NOT!)

It all comes down to profitable voyeurism, or spying, and it is all rooted in the many possible meanings of "beaming".

If you have a mobile phone, and most people do, you beam a lot, whether you know it or not, and around the world, what you beam is of profit and interest to governments, Silicon Valley, advertisers, and more...especially if you have Bluetooth.

Writing for Privacy Zone, a blog of the law firm Rothwell, Figg, Ernst & Manbeck PC, legal blogger Jenny L. Colgate discusses Facebook's request to the Ninth Circuit to reconsider the question, "Are Targeted Ads The Result Of Wiretapping?"
https://www.theprivacylaw.com/2020/05/are-targeted-ads-the-result-of-wiretapping-facebook-asks-the-ninth-circuit-to-reconsider/#page=1

Is it "wiretapping" when Facebook spies on a person who is not logged in to Facebook, who might not even have a Facebook account and therefore has never agreed to Facebook's terms, and who does not visit Facebook or one of Facebook's businesses?

Allegedly, Facebook manages to beam up data about such a person via the ubiquitous Facebook "plugins" that litter the internet. If you see a "Like" symbol on any page on the internet, and then check what tracking cookies have been added to your device, you'll see Facebook ones, like nits, sucking up your power and memory and beaming messages to Zuck.

They're not alone, and Jenny L. Colgate's colleague Jennifer B. Maisel recently reported with especial scrutiny on Bluetooth beacon technology that enables carriers of mobile phones --and also of Covid-19-- to beam warnings to each other, albeit, apparently only after they have passed on another unnoticed like ships in the night.

More sinister is the rise of the tracking apps in Malaysia, Singapore and South Korea, as examined for law firm Tay & Partners by legal bloggers  Lee Lin Li and Chong Kah Yee.
http://www.taypartners.com.my/en/index.php/covid-19-20200528

There's a whole lot of beaming going on, also compulsory bracelet wearing, and one wonders whether someone who did not voluntarily own a mobile phone would be allowed to go anywhere or do anything. Apparently, it might be a condition of employment that a worker sets up their own QR code for themself.

Finally, an update from Brian Murphy on the Instagram issue, that is, whether putting a copyrighted work on instagram means that you unwittingly allow all the internet to exploit your work without permission or payment as long as they "embed" your work with a linkback to Instagram.  Maybe not so fast....
https://advertisinglaw.fkks.com/post/102g8ym/instagram-and-embedding-photos-an-update-and-a-bombshell-from-instagram

Not "finally".  In case you didn't hear it, "inamebooks" is allegedly a phishing site. It allegedly does not have books. It wants names, addresses, credit card numbers.

Another alleged bad actor, Brewster Kahle of the Internet Archive, has received two stern letters from Thom Tillis and a lawsuit from four publishers, so it is shutting down its piratical "Emergency Library".

All the best,
Rowena Cherry 
SPACE SNARK™ http://www.spacesnark.com/  

Sunday, May 24, 2020

In Dispraise of Haste

Which "haste-related" cautionary proverb comes first to your mind?  I thought of "Marry in haste, repent at leisure," which was a socially relevant warning in Britain and Europe for several generations thrust together and torn apart by World War I and World War II.

In recent eras of living together, and relatively easy divorce, there probably less need for "repenting at leisure," so that proverb has lost its power.... which may be why it is ranked #30/35.

Source: Inspirational Stories.com proverbs on haste.
https://www.inspirationalstories.com/proverbs/t/on-haste/

Are proverbs still taught in schools? For that matter, are the different names for the males and females of animal species still taught? "Tiger / Tigress", maybe but it seems doubtful that "Cob / Pen / Cygnet" for swans, or "Hart / Hind" (of red deer) and "Buck / Doe" (of roe deer) are taught.

Animal names
https://dictionary.cambridge.org/dictionary/english/doe

"Click-through in haste..." might be a modern day proverb.

The ever-interesting Mark Sableman, blogging for the law firm Thompson Coburn LLP, discusses online contracts (with a topical pun about contracting disease), and explains the different degrees of how inextricably to bind a visitor, or to be bound as a visitor, to a contract that --in their haste-- they have not read.

Original Link:
https://www.thompsoncoburn.com/insights/blogs/internet-law-twists-turns/post/2020-05-14/you-may-avoid-coronavirus-contacts-but-you-can-t-avoid-online-contracts#page=1

Lexology Link:
https://www.lexology.com/library/detail.aspx?g=6f1da6a7-56a4-4c18-8f3d-2c744f7b9a11

It reminds me a bit of a marital pre-nuptial contract!

Seriously, if you surf the internet a lot, or if you have your own website, or blog, you ought to read Mark Sableman's explanations of browse-wrap, click-wrap (or click-through), and sign-in wrap.

European readers of this blog should understand that the authors of this group blog do remind readers periodically that Blogspot will drop cookies on you, (it's browse-wrappy), and Google does post generic notices about the terms of use that you are inferred to agree with and to by sticking around.

Online contracts can be very secure, and safer than you would think, and they hold up well in court.  Thus, one should read an E-sign contract very carefully indeed, and not merely click merrily away to provide 7 (or however many) initials and 2 signatures in your choice out of 5 available fonts.

Legal blogger Tyler G, Newby, writing for Fenwick & West LLP, gives a fascinating historical overview of contracts, going back to the signet ring and hot sealing wax to the present day Docu-Sign (or its rivals such as Authentisign), and explains that such convenient services provide a time-and-date stamped audit trail  that may include the signer's IP address.

Of course, too, there is the clickwrap or click through and sign in protection for the professional who sends a link in an email to the expected signer.

For readers interested in how much copyright infringement has increased during the Covid-19 shut down, MUSO has a free, downloadable "white paper". It comes with click wrap, you have to give them your name and email address... but it might be interesting enough to be worth giving them the data, and possibly receiving follow up emails from MUSO.

https://www.muso.com/white-paper-demand-discovery?utm_campaign=COVID-19%20Protect%20&utm_source=hs_email&utm_medium=email&utm_content=88156774&_hsenc=p2ANqtz-92B76dMP1rBc2xvht7vDqlzhChwXeYH-GGsTVaL3B6_aOiXEnexlgriwMhuv35_T2oUwbU8dyrNfvG9G1H767syhNUjQ&_hsmi=88156774

Talking of privacy, and marketing (which I do, often), Zarish S. Baig, blogging for Squire Patton Boggs, discusses the suspicions of some that third party marketers may listen in on private smart phone conversations.

https://tcpaworld.com/2020/05/13/googles-privacy-policy-cant-save-it-from-smartphone-spying-claim-california-privacy-laws-tested-in-suit-alleging-big-tech-is-letting-subcontractors-listen-in-on-your-conversations/#page=1

It would appear, the above average internet user is also expected to read any ISP's Privacy Policy, especially if they purchase and use a device capable of recording anything.

Apropos hastiness and insecurity, if Zooming, or Facetiming, or otherwise broadcasting a live video of yourself, bear in mind that more of your background than you might expect might be exposed.  We've all seen the accidentally-on-purpose naked roomies caught over the shoulders of vloggers; the over casual anchor without his trousers who spread his legs a little wide under his desk, and his bare thigh crept into view; and then there is the prince who did not realize that he had official secrets on an open file in his background.

Derek M. Stikeleather, for Goddell DeVries Leech and Dann LLP shares Kim Kardashian's tips for looking fabulous while teleconferencing, and much more.

https://www.gdldlaw.com/blog/what-kim-kardashian-and-prince-william-can-teach-us-about-remote-oral-arguments

All the best,
Rowena Cherry 

Sunday, December 22, 2019

Smart Christmas

For those who visit Pennsylvania and are unfortunate enough to be stopped by the police, the good news is that the authorities in that State do not have the right to look into your mind, and your password encrypted devices are considered an extension of your mind.

You do not have to reveal your password unless they have probable cause.

Andrew Crocker, writing for the Electronic Freedom Foundation explains that disclosing a password is the equivalent of giving self-incriminating testimony:
https://www.eff.org/deeplinks/2019/11/victory-pennsylvania-supreme-court-rules-police-cant-force-you-tell-them-your

On the other hand, if you are accused of copyright infringement, you may be punished if you are asked to preserve evidence, and you fail to save your text messages.

Writing for law firm Seyfarth Shaw's Carpe Datum blog, Tushar P. Vaidya and Jamila A. Hemmerich examine what happens when a defendant wipes, discards, and does not back up his, her, or their smartphone.
https://www.carpedatumlaw.com/2019/11/court-sanctions-defendant-for-failure-to-preserve-text-messages-in-copyright-infringement-suit-brought-by-princes-estate/#page=1

There are other ways of getting into your mind....

Is anyone else rendered uneasy when an online provider offers you "curated" news? Personally, I think it is creepy that Tim Cook's or Mark Zuckerberg's people claim to have such perfect insights into my mind and my interests that they can dish up to me "curated" news to match my interests.

Either they are spying on me and assuming that I only want more of whatever I've consumed in the past, or they are pushing what they want me to consume and not necessarily being truthful about how closely it matches my real interests. I infer.

Concerning spying and intrusion from the wrong side of the TV screen, the good bloggers at Bass Berry & Sims PLC ask whether my smart TV might be too smart, especially if I bought it recently.


Authors Robert L. Brewer, Anthony J. McFarland, and Elizabeth S. Warren  offer six, must-read, smart steps for owners of smart televisions to take this holiday season.

Original article:
https://www.bassberry.com/news/privacy-peril-is-your-smart-tv-too-smart/

Lexology article:
https://www.lexology.com/library/detail.aspx?g=b4a404c1-5ff4-4d33-b2f8-822ba2a2bb48

It seems that too many of the goodies that might be in your Christmas stocking this year are too smart for your own good and well being. Both the Federal Bureau of Investigations and the Federal Trade Commission have issued warnings to help consumers to protect themselves.

With the FBI and FTC warnings top of mind, legal blogger Linn Foster Freedman continues her excellent series of privacy tips for the Robinson & Cole LLP Data Privacy + Security blog (and you should check out #220 some time soon) with #219 on Holiday Shopping Tips.

Original article:
https://www.dataprivacyandsecurityinsider.com/2019/12/privacy-tip-219-holiday-shopping-tip-for-internet-connected-gifts/#page=1

Lexology article:
https://www.lexology.com/library/detail.aspx?g=a230904f-0cdb-4a54-91df-ed1e1421af40


By the way, for anyone who might wonder why it's worth checking out different links to the same article, Lexology offers links to other copyright or other intellectual property related articles on similar subjects. The original websites or blogsites are more likely to focus on that law firm's own articles.

And so, Happy Christmas!

All the best,
Rowena Cherry 

Sunday, December 09, 2018

Trojan Horses For Kids, Rampant Scraping

Authors are warned not to "scrape" social media sites for the email addresses of potential readers. Since the GDPR, (Europe's General Data Protection Regulation) we are admonished to double-verify that a person affirmatively and enthusiastically wishes to receive an author's newsletter.

There are also strict rules about authors' contests.  All wise authors considering a promotion to build up a mailing list, or to attract social media approbation ("Likes"), should read this article.
https://www.frostbrowntodd.com/resources-1069.html

In nutshell, it might be illegal in your State, province or neck of the woods to run a "contest" where there is
1) a prize,
2) an element of chance in selecting the recipient of the prize,
3) a requirement that all contestants provide something of value to the contest organizer as a condition of entry.

This author has never yet seen another author sued for running an illegal sweepstakes where the prize is a free copy of an e-book, no skill is required to enter, and a chance to win the e-book is entirely conditional upon joining a Facebook group (or the like).

As for those Trojan Horses filled with geek warriors aiming to get the goods on little kids, PJ Media columnist Phil Baker shares some shocking data about forced scraping, dossiers, and data-mining.

https://pjmedia.com/trending/google-is-developing-dossiers-on-students-using-their-products-in-classrooms-disclosures-show/?fbclid=IwAR2l5F4eIr_UfNRasqBVXDzMWUv1uR0NfLFqYSkaue-6GTjPPsVxkPvcD8I

Allegedly, all too many schools force K-12 children to use certain products that are deliberately contaminated with the vendor/developer's spyware. The children and their parents have no choice, either they accept the devices and the risk to their children's privacy, or they have to home school.

Also allegedly, school employees in Pennsylvania have been given permission to remotely access school computers that have been provided to children... when those computers are being used in the students' homes, without the knowledge or consent of the children or their parents.

Maybe every parent should stick an address label over the camera hole in their offspring's school-issued
devices!

Scraping children is especially bad, because many of the credit monitoring products are not available for youngsters.

Targeting advertising at little children is also, in this author's opinion, immoral because children's brains and powers of critical reasoning are not fully developed, and won't be until the children are about 26 years old.

What about businesses scraping other businesses' data? Is that theft or fair game?  Without addressing the rights of a minor public figure who might wish to have a presence on book-lovers social media site X, but not on advertising-heavy social media site Y (and yet Site Y might create a presence for the public figure without permission), there have been legal skirmishes between businesses fighting over each other's inventory of members and their basic data.

Legal blogger Scott L. Satkin, writing for the law firm Newmeyer and Dillion LLP  discusses what, if anything, counts as "unauthorized access" to "publicly available" data.

https://www.lexology.com/library/detail.aspx?g=5e951f2d-55c7-42a3-a539-fbe88165ea5a&utm_source=Lexology+Daily+Newsfeed&utm_medium=HTML+email&utm_campaign=Lexology+subscriber+daily+feed&utm_content=Lexology+Daily+Newsfeed+2018-12-06&utm_term=

It is interesting to consider what, if any, rights a person or business that has collected "data" on members (or subscribers or users) might have over that data if that data is visible on the internet

Scott L Satkin and the lawsuits he discusses are about social media businesses and their subscribers. Authors seeking to build up a following might join a more successful author's social media group, and scrape the contact info and demographics of reader-members.

Scraping is rampant. Is it expected?

The authors of  this blog do not (to the best of this author's knowledge) collect or save or otherwise exploit any information about any readers or visitors. From time to time, we do warn visitors that our host (Blogger) does place tracking cookies on visitors' devices.

All the best,

Rowena Cherry