Blog Posts Tagged with "Intellectual Property"
November 23, 2012 Added by:Electronic Frontier Foundation
As TPP talks trudge along with ever more Pacific nations participating in the meetings, our alarm over its intellectual property (IP) provisions has only grown. The IP language in this intricate trade agreement would harm users’ digital rights in profound ways, such as pressuring ISPs to become Internet cops...
October 18, 2012 Added by:Electronic Frontier Foundation
The Trans-Pacific Partnership agreement (TPP) threatens to regulate and restrict the Internet in the name of enforcing intellectual property (IP) rights around the world, yet the public and civil society continue to be denied meaningful access to the official text and are even kept in the dark...
September 08, 2012 Added by:Jeffrey Carr
Lockheed Martin has announced a contest which awards $50,000 to the winners of "Innovate The Future Challenge: How Might We Enable A More Secure Future For Our Planet?". They want you to share your ideas on how to solve that for free. Sound good? You'd better read the fine print...
August 29, 2012 Added by:Barrie Hadfield
As the cloud wields increasing influence on corporate environments, the traditional ecosystem becomes more antiquated. There’s some paradox in how the cloud is enabling productivity and collaboration while simultaneously eroding security protocols designed to protect intellectual property and corporate assets...
August 28, 2012 Added by:Electronic Frontier Foundation
The intellectual property (IP) chapter would have negative ramifications for freedom and innovation and second, the process has shut out multi-stakeholder participation and is shrouded in secrecy. The TPP is a threat because it rewrites global rules on IP enforcement and restrict the public domain...
August 27, 2012 Added by:Headlines
“Software apps have become an increasingly essential part of our nation’s economy and creative culture, and the Criminal Division is committed to working with our law enforcement partners to protect the creators of these apps and other forms of intellectual property from those who seek to steal it..."
August 26, 2012 Added by:Bill Gerneglia
Your company may not be the primary target, an attacker may use your organization as a stepping-stone to attack another. Don't be the weakest link in the supply chain. Information is power, the attackers know this, and successful attacks can result in significant financial loss...
August 13, 2012 Added by:Ben Rothke
Amazon is a prime feeding ground for the virtual-plagiarist given that Amazon makes a profit off everything sold, and they have no incentive to stop such practices as it would affect their profitability. Amazon takes a kid-gloves approach to plagiarism. That is all the more true for virtual-plagiarized text...
July 16, 2012 Added by:Headlines
Former Pentagon analyst F. Michael Maloof warns that the Chinese government has backdoor access to as much as eighty-percent of the worlds telecom traffic, giving the regime access to sensitive communications made possible by equipment from two Chinese based telecom giants - Huawei Technologies and ZTE...
July 10, 2012 Added by:Headlines
"Symantec placed the cost of IP theft to United States companies at $250 billion a year. Global cybercrime at $114 billion - nearly $388 billion when you factor in downtime. And McAfee estimates that $1 trillion was spent globally on remediation. And that's our future disappearing in front of us..."
July 05, 2012 Added by:Electronic Frontier Foundation
We don’t know what’s in the current version of the TPP’s IP chapter - the public has only seen a leaked version. Given what we've seen in this leak, we have every right to be furious that representatives are negotiating an agreement that will harm online expression, privacy, and innovation on the Internet...
July 04, 2012 Added by:Headlines
“Preventing the loss of critical U.S. information and technologies is one of the most important investigative priorities of the FBI. Our adversaries routinely target sensitive research and development data and intellectual property from universities, government agencies, manufacturers, and defense contractors..."
June 19, 2012 Added by:Jeffrey Carr
Russia plans to spend US$13B on UAS development over the next eight years. Part of that technology development strategy is almost certainly going to be acquiring intellectual property on related technology from foreign firms. Two good examples of companies at risk are Boeing and General Atomics...
June 18, 2012 Added by:Electronic Frontier Foundation
Judge Alsup, a coder himself, got it right when he wrote that “copyright law does not confer ownership over any and all ways to implement a function or specification of any and all methods used in the Java API.” It's a pleasure to see a judge so fundamentally understand the technology at issue...
May 23, 2012 Added by:Jayson Wylie
The US government’s Department of Defense had, and may still have, issues with counterfeit components being procured and used in military weapons, vehicles and equipment. It’s a national security issue when the supply chains are compromised by weaknesses and scams...
May 21, 2012 Added by:Scot Terban
By combining the military, the economic, and the political aspects of soft and hard power, and the gray’s in between, China has become a force to be reckoned with. In order to better understand the mosaic, we need to re-tool some of the ideas we have preconceived for ourselves...
Steps Toward Weaponizing the Android Platfor... Freid Jerome on 05-17-2013