While I understand the post you are replying to is a troll post, I'm not sure if this is a troll post also. As Australia is a common law legal system country, and has common law precedents that trace back to English common law precedents set several hundred years before the British colonisation of Australia, there's no other way to read:
I'm sure LexisNexis would be interested in enquiring into what data New Orleans police allowed a 3rd party to hoover out of their systems.
Sounds a lot like the Cambridge Analytica hoovering of data from Facebook via a 3rd party (with the police being the 3rd party enabler, Palantir the equivalent of CA).
The FBI doesn't need to weaken encryption or mandate backdoors to help it catch serious criminals. They already have the resources and technical ability to penetrate the security of targeted criminals - see the Apple case where the feds in the end dropped the case because they 'found' an alternative way into the phone.
What they don't have the resources to do is monitor en-mass the general public or implement minority report-style pre-crime analytics to arrest those who might be about to commit a crime. Until, that is, they manage to mandate their blanket backdoors.
The ISDS is the international tribunal that corporations go to, therefore if the country chooses to ignore it there really isn't any where else to go unless the countries own court system recognises that the ISDS process is valid. In which case you could sue the government in its own federal courts to force them to conform to the ISDS ruling.
If, however, the nations national courts reject the entire ISDS process, which is exactly what happened here, then there are ecomonic tactics that the corporation can undertake, depending on the size of the corporation, the size of the country being targeted, and so on.
For example, a corporation has a factory in a tinpot country that provides 50% of the countries GDP/foreign exchange/employment has a huge lever over the government, it could pull its operations out entirely, destroying the economy of the country.
Or, if it doesn't have that big a lever, it could persuade other corporations or countries to engage in ecomonic sanctions.
Finally, if the foreign companies in general are unhappy with the results, the country ignoring ISDS rulings, then it could create a doubt about the safety in investing in that country, and future trade deals may not eventuate. No new investments happen. Just like if a country declares bankruptcy and cancels all foreign debt it owes.
Re: Re: Re: Intel's share of the processor market is already decreasing
The x86/x86-64 ISA is CISC, but the in-silicon processor architecture of the processing cores have been RISC for over a decade.
Their front-ends are CISCy, but the decode step in the pipeline breaks the instructions down into RISC instructions - what Intel calls micro-ops - for processing on the ALU/FPU. The actual processing cores - ALUs, FPUs, etc - are RISC engines.
Actually, on second thoughts (to my other reply), those may not be the exact words used by the NCCoA, but they fit within the meaning of the ruling.
By definition, publicly-accessible info is info that anyone is authorized to access.
Therefore that fits in with the "if you are authorized to access it" element of the ruling.
Therefore anyone can access public info, and any method used to access the info (manually, with a robot) is not illegal. (of course, this doesn't protect the accessor against harming the hoster, e.g. if the effect was to cause a DoS then they might still be committing an illegal act)
Therefore the legal precedent set (IANAL) would allow accessing publicly-available information in a manner not authorized by the hoster.
The headline was not a quote from the NCCoA ruling, it is a headline about the ruling, the effect of the ruling, a description of the ruling, one of the consequences of the ruling. So the headline is correct in its description of an effect of the ruling. So the author of the article chose a headline that they felt covered the most important consequence of the ruling for them and for their reader base.
The Ninth Circuit Court of Appeals has ruled [PDF] that accessing information that you are authorized to access but using a method that is not authorized by the hosting entity is not illegal.
Re: "Surprisingly, Bangladesh comes in second for duration on the site, and that's with a decent amount of traffic (over 10,000 visitors)."
Highly unlikely know American language
You mean English?
Since Bangladesh was part of the British Empire for ~200 years, wouldn't you think it likely that at least a few % of the population can speak, read and write English? As a country of 150 million people, even if only 1% could read English, that's still 1.5 million people.
However, after checking out wikipedia (something you could have done - but then, those who are wilfully ignorant don't tend to do any sort of research, do they?) , it is actually quite a sizeable % who can read/write English:
Bangla is the official language,[231] but English is sometimes used secondarily for official purposes (especially in the legal system). Although laws were historically written in English, they were not translated into Bangla until 1987. Bangladesh's constitution and laws now exist in English and Bangla.[232] English is used as a second language by the middle and upper classes, and is widely used in higher education.
I would suggest that there are many millions of Bangladeshi's who have a better understanding of English than you seem to have.
There are a few circumstances in which police can detain people for a *reasonable* amount of time - breathalyser tests, for example - without arrest.
But a lot of what you see on TV when police 'hold' people without letting them leave or issue statements like "don't leave town" have no legal basis or authority behind them.
If police hold someone for an extended period of time without arrest outside a few very constrained circumstances, they are exposing themselves to charges of false imprisonment or similar.
The way that companies at least attempt to get around that is that they don't sell software, they license it. So it becomes a contractual matter, not a copyright matter. The contract says that by paying this money, you have a license to do whatever the license conditions say you can do with the product. However that license is only valid while the contract is in force. If the contract is terminated you lose the license, if you don't have a license, you are now in breach of copyright if you continue to use the software.
How well that will stand up in court is a different matter tho.
Unfortunately, according to the article, Szakaly no longer owns the business. If the business was sold/transferred in its entirety (as the articles imply) then the new owners are the ones who face the possibility of bankruptcy, not Szakaly himself.
When a business is transferred to a new owner, the new owner takes on all responsibilities for any existing assets and liabilities - financial, legal - of the business.
Those look like pretty standard enterprise agreements to me.
I work for a large enterprise, we use IBM software, and as part of the license agreement we must install on all servers - whether they use IBM software or not - an IBM piece of auditing software that periodically scans the server for copies of IBM software - and the hardware configuration of the server since most IBM software is licensed per CPU - which is then reported back to IBM so that IBM can charge license fees.
They also have clauses that let them come in and audit us to ensure we are in compliance with their license conditions.
And WRT to section 15, again that is pretty standard. As soon as your licensing rights are terminated, you no longer have the right to use their software. You don't have to delete your data, but you do have to delete the software. E.g. if Oracle terminates your rights to use their DBMS, you must delete all copies of their DBMS, not the data files themselves. There are utilities that allow you to export the data directly from the Oracle-formatted files to other formats (even just straight data exports).
On the post: In 'N Out Uses A Bullshit Pop-Up Every Five Years Strategy Just To Lock Up Its Australian Trademark
Re: Ain’t no common law down under you dipshit.
Ain’t no common law down under you dipshit.
as anything but a troll.
On the post: New Orleans' Secret Predictive Policing Software Challenged In Court
Re:
Sounds a lot like the Cambridge Analytica hoovering of data from Facebook via a 3rd party (with the police being the 3rd party enabler, Palantir the equivalent of CA).
On the post: Both Facebook And Cambridge Analytica Threatened To Sue Journalists Over Stories On CA's Use Of Facebook Data
Re: Re: Re: Re: Re: Re: Re:
On the post: The Future The FBI Wants: Secure Phones For Criminals, Broken Encryption For Everyone Else
The FBI doesn't need to weaken encryption or mandate backdoors to help it catch serious criminals. They already have the resources and technical ability to penetrate the security of targeted criminals - see the Apple case where the feds in the end dropped the case because they 'found' an alternative way into the phone.
What they don't have the resources to do is monitor en-mass the general public or implement minority report-style pre-crime analytics to arrest those who might be about to commit a crime. Until, that is, they manage to mandate their blanket backdoors.
On the post: Both Facebook And Cambridge Analytica Threatened To Sue Journalists Over Stories On CA's Use Of Facebook Data
Re: Re: Re: Re: Re:
On the post: Both Facebook And Cambridge Analytica Threatened To Sue Journalists Over Stories On CA's Use Of Facebook Data
Re: Re: FACEBOOK USER = BRAIN DEAD IDIOT
You don't have to visit sites that require Facebook logins to read (and/or comment on), just move on if they do.
Also, some sites at least, have had bad experiences with requiring Facebook logins, see Techcrunch's post on giving up Facebook comments.
On the post: Top Court Throws Out Corporate Sovereignty For All Trade Deals Within EU; Those Involving Other Nations Likely To Suffer Same Fate
Re: Re:
The ISDS is the international tribunal that corporations go to, therefore if the country chooses to ignore it there really isn't any where else to go unless the countries own court system recognises that the ISDS process is valid. In which case you could sue the government in its own federal courts to force them to conform to the ISDS ruling.
If, however, the nations national courts reject the entire ISDS process, which is exactly what happened here, then there are ecomonic tactics that the corporation can undertake, depending on the size of the corporation, the size of the country being targeted, and so on.
For example, a corporation has a factory in a tinpot country that provides 50% of the countries GDP/foreign exchange/employment has a huge lever over the government, it could pull its operations out entirely, destroying the economy of the country.
Or, if it doesn't have that big a lever, it could persuade other corporations or countries to engage in ecomonic sanctions.
Finally, if the foreign companies in general are unhappy with the results, the country ignoring ISDS rulings, then it could create a doubt about the safety in investing in that country, and future trade deals may not eventuate. No new investments happen. Just like if a country declares bankruptcy and cancels all foreign debt it owes.
On the post: Classified Cabinet Docs Leak Down Under Via An Actual Cabinet Sale... Just As Aussies Try To Outlaw Leaking
I wish someone would drill out the fucking cabinet in Australia, incompetent, self-serving corrupt loonies the lot of em.
On the post: Public School Board Member Threatens Boss Of Woman Who Spoke Out Against School Book Banning
Re:
My favourite line of the Harris' reply e-mail is:
On the post: FBI Director Chris Wray Says Secure Encryption Backdoors Are Possible; Sen. Ron Wyden Asks Him To Produce Receipts
Re: Re: Re: Intel's share of the processor market is already decreasing
The x86/x86-64 ISA is CISC, but the in-silicon processor architecture of the processing cores have been RISC for over a decade.
Their front-ends are CISCy, but the decode step in the pipeline breaks the instructions down into RISC instructions - what Intel calls micro-ops - for processing on the ALU/FPU. The actual processing cores - ALUs, FPUs, etc - are RISC engines.
On the post: It Kind Of Looks Like Crytek Sued Star Citizen Developer By Pretending Its Engine License Says Something It Doesn't
Re:
The whole point of CIGs submission is that that is not what the contract says.
Therefore there is no "these kind of" because this isn't one of those contracts.
On the post: Appeals Court Says Accessing Data In A Way The Host Doesn't Like Doesn't Violate Computer Crime Laws
Re: Not quite right...
Actually, on second thoughts (to my other reply), those may not be the exact words used by the NCCoA, but they fit within the meaning of the ruling.
By definition, publicly-accessible info is info that anyone is authorized to access.
Therefore that fits in with the "if you are authorized to access it" element of the ruling.
Therefore anyone can access public info, and any method used to access the info (manually, with a robot) is not illegal. (of course, this doesn't protect the accessor against harming the hoster, e.g. if the effect was to cause a DoS then they might still be committing an illegal act)
Therefore the legal precedent set (IANAL) would allow accessing publicly-available information in a manner not authorized by the hoster.
The headline was not a quote from the NCCoA ruling, it is a headline about the ruling, the effect of the ruling, a description of the ruling, one of the consequences of the ruling. So the headline is correct in its description of an effect of the ruling. So the author of the article chose a headline that they felt covered the most important consequence of the ruling for them and for their reader base.
On the post: Appeals Court Says Accessing Data In A Way The Host Doesn't Like Doesn't Violate Computer Crime Laws
Re: Not quite right...
The Ninth Circuit Court of Appeals has ruled [PDF] that accessing information that you are authorized to access but using a method that is not authorized by the hosting entity is not illegal.
On the post: Techdirt 2017: The Stats.
Re: "Surprisingly, Bangladesh comes in second for duration on the site, and that's with a decent amount of traffic (over 10,000 visitors)."
You mean English?
Since Bangladesh was part of the British Empire for ~200 years, wouldn't you think it likely that at least a few % of the population can speak, read and write English? As a country of 150 million people, even if only 1% could read English, that's still 1.5 million people.
However, after checking out wikipedia (something you could have done - but then, those who are wilfully ignorant don't tend to do any sort of research, do they?) , it is actually quite a sizeable % who can read/write English:
I would suggest that there are many millions of Bangladeshi's who have a better understanding of English than you seem to have.
On the post: Sheriff's Office To Pay $3 Million For Invasive Searches Of 850 High School Students
Re: Re: Re: Re: Re:
There are a few circumstances in which police can detain people for a *reasonable* amount of time - breathalyser tests, for example - without arrest.
But a lot of what you see on TV when police 'hold' people without letting them leave or issue statements like "don't leave town" have no legal basis or authority behind them.
If police hold someone for an extended period of time without arrest outside a few very constrained circumstances, they are exposing themselves to charges of false imprisonment or similar.
On the post: Germany Accuses Chinese Intelligence Services Of Using Fake LinkedIn Profiles To Recruit Informants And Extract Sensitive Information
Re: Re: Re:
How well that will stand up in court is a different matter tho.
On the post: Hotel That Charged Guest $350 For A Negative Review Now Facing A Lawsuit From State Attorney General
Re:
When a business is transferred to a new owner, the new owner takes on all responsibilities for any existing assets and liabilities - financial, legal - of the business.
On the post: Germany Accuses Chinese Intelligence Services Of Using Fake LinkedIn Profiles To Recruit Informants And Extract Sensitive Information
Re:
Those look like pretty standard enterprise agreements to me.
I work for a large enterprise, we use IBM software, and as part of the license agreement we must install on all servers - whether they use IBM software or not - an IBM piece of auditing software that periodically scans the server for copies of IBM software - and the hardware configuration of the server since most IBM software is licensed per CPU - which is then reported back to IBM so that IBM can charge license fees.
They also have clauses that let them come in and audit us to ensure we are in compliance with their license conditions.
And WRT to section 15, again that is pretty standard. As soon as your licensing rights are terminated, you no longer have the right to use their software. You don't have to delete your data, but you do have to delete the software. E.g. if Oracle terminates your rights to use their DBMS, you must delete all copies of their DBMS, not the data files themselves. There are utilities that allow you to export the data directly from the Oracle-formatted files to other formats (even just straight data exports).
On the post: Sheriff's Office To Pay $3 Million For Invasive Searches Of 850 High School Students
Re: Re: Re:
If the students were held outside school hours on such a condition, that would be false imprisonment.
On the post: DRM Strikes Again: Sonic Forces Just Plain Broken Thanks To Denuvo
Re:
Next >>