Blogs

Sep
05

Thursday, September 5, 2013, by Brittany Croom As transparency initiatives continue to infiltrate the nation following recent revelations of surveillance by US intelligence, some tech companies are already taking a stand.  Only a few days after social media giant, Facebook, revealed the US government has already made information requests for 20,000 users under the Foreign

Sep
03

Tuesday, September 3, 2013, by Daniel Choo With every scientific breakthrough, there comes the potential for misappropriate use—nuclear fission and the atomic bomb; Google Earth and the Mumbai terrorist attacks; the Internet and the increased incidences of cyberbullying and cyberstalking.  To discourage such misuse, laws relating to such technological innovations need to be tightly regulated,

Sep
03

Tuesday, September 3, 2013, by Will Blackton Before picking up a crayon, consider that you may be “trespassing” in an area of the visible spectrum. You may be in trouble if your box contains “Coca-Cola Red,” “Starbucks Green,” or “Ford Blue.” “T-Mobile Magenta” was a subject of litigation last week. Deutsche Telekom AG, the parent

Apr
22

Sunday, April 21, 2013, by Ken Jennings The Mosaic Theory of the Fourth Amendment has featured front-and-center in the continuing debate over the impact of the Supreme Court’s decision in United States v. Jones.  In Jones, law enforcement officials tracked the location of the defendant’s (borrowed) vehicle for 28 days via a GPS device installed

Apr
18

Thursday, April 18, 2013, by Drew Hargrove Trademark law allows an owner to “tack” an older form of mark if the owner makes slight alterations to the existing mark.   In order to “tack” the old form of a mark, both the old and new form of the mark must retain the same, “continuing commercial impression.” 

Apr
18

Tuesday, April 16, 2013, by Samantha Surles The Government’s ability to find and apprehend cyber criminals is one of the big features in the 2014 Defense budget. One of the Department of Defense’s top priorities in 2014 is “expanding the Cyber Forces” under U.S. Cyber Command and developing a system for “cyber security information sharing.”

Categories