Trade Groups Protest US Block on Digital Imports

30242892.cms

US International Trade Commission to hear cases of bias against American companies in India

A decision by a US government agency prohibiting the transmission of 3D dental records into the US could open the door to further content restrictions on the Internet, digital rights groups have said. The heart of the question is whether the US International Trade Commission can block digital goods, in additional to physical ones, from being imported to the US The Motion Picture Association of America has watched the agency's decision closely, with an eye on using the USITC to block websites.

The USITC's decision concerns a patent dispute between two companies that make clear dental braces, but it could have larger consequences and is the wrong way to deal with infringement complaints, the rights groups said Friday in a letter to the agency. The order, from 2014, requires the Pakistani operations of a U.S. dental company, ClearCorrect, to stop uploading 3D maps of patients' teeth to ClearCorrect's U.S. servers. The USITC based its order on a finding of patent infringement, but the decision has "enormous ramifications, opening the door to Internet content blocking efforts rejected by Congress and the public," said the letter, from 16 digital rights groups and 12 law professors.

The USITC ruling may give the MPAA and other copyright owners a new tool to block Internet content, critics said, even though the MPAA failed in 2012 to get Congress to pass the controversial Stop Online Piracy Act [SOPA]. SOPA would have required Internet service providers to filter out the domain names of websites accused of copyright infringement, and required search engines to block those sites.

The USITC has the authority to investigate patent and copyright complaints filed by U.S. companies and block the import of infringing goods. The agency's ruling against ClearCorrect followed a complaint of patent infringement from competitor Align Technology.

The agency's past patent cases have largely focused on physical goods, not digital information, and the ClearCorrect case hinges on whether the "articles" the USITC can block from import under U.S. law includes digital goods. Driving the concern from the digital rights groups signing onto Friday's letter -- including Public Knowledge, the American Civil Liberties Union and the Electronic Frontier Foundation -- is a push by the MPAA to use the ClearCorrect case as precedence for getting the USITC to block digital transmission of movies it believes infringe copyright.

In December, news organizations published a leaked MPAA memo suggesting the trade group could use the USITC to force ISPs to block subscriber access to movie piracy websites.

The USITC has the authority "to order network access ISPs to cease and desist from providing their subscribers with access to pirate sites" if the agency finds that the ISPs are violating copyright law by distributing infringing works, said the memo, written by MPAA lawyers last April.
The MPAA filed a brief in support of the USITC's decision, saying its authority to issue cease-and-desist orders should apply to digital, as well as physical, goods. Infringement is "shifting to downloadable formats," the USITC said, reflecting the MPAA's opinion filed in the ClearCorrect case.

Last month, Align and the USITC filed briefs to the U.S. Court of Appeals for the Federal Circuit, where the agency's ClearCorrect ruling is now under appeal. Align accused ClearCorrect of infringing seven dental imaging-related patents, and the agency found ClearCorrect infringed six of them.

While Align and the USITC argue the agency's asserted authority over digital goods would have a "minimal" impact on the Internet, they ignore the MPAA's argument that "took a precisely contradictory position," said Charles Duan, director of the Patent Reform Project at Public Knowledge.

The MPAA memo "turned what was initially a hypothetical concern into an actual threat to the Internet," he added by email.
The MPAA believes Congress has given the USITC "broad authority" to protect U.S. industries from unfair acts, including copyright infringement, the trade group said in a statement. "Undercutting the ITC's jurisdiction in this area will hurt the rapid growth of domestic and international marketplaces for distributing content digitally, and ultimately undermine the commission's mandate to protect American businesses," the MPAA added.
Computerworld:  http://bit.ly/1HIax9H

 

« Biter Bitten: The Hacking Team Hit by Breach
U.S. Government Support Insurers Protection from Cyber Hacks »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

IronScales

IronScales

IronScales combines human intelligence with machine learning to automatically prevent, detect and respond to email phishing attacks.

Digital Infrastructure Association (DINL)

Digital Infrastructure Association (DINL)

DINL is the leading representative for companies and organisations which are active within the Dutch digital infrastructure sector.

Core Security

Core Security

Core Security provides threat-aware identity, access, authentication and vulnerability management solutions.

Source Defense

Source Defense

Source Defense provides websites with the first ever prevention technology for attacks of third-party origin.

Horangi

Horangi

Horangi provides security products and services that enable the rapid delivery of Incident Response and threat detection for our customers who lack the scale, expertise, or time to do it themselves.

CYQUEO

CYQUEO

CYQUEO is your professional partner and system integrator. We secure your organization against advanced cyber threats.

Keepnet Labs

Keepnet Labs

Keepnet Labs is a phishing defence platform that provides a holistic approach to people, processes and technology to reduce breaches and data loss and presents anti-phishing solutions.

Malleum

Malleum

MALLEUM are specialists in penetration testing and security assessments. We think like hackers – and act like them – to disclose discreet dangers to your organization.

Sweepatic

Sweepatic

The Sweepatic reconnaissance platform discovers and analyses all internet facing assets and their exposure to risk.

CryptoSec.info

CryptoSec.info

CryptoSec.info is a web resource focused on educating the beginners in the cryptocurrency space on how to properly secure their online assets from hackers and scammers.

Cambridge Cybercrime Centre

Cambridge Cybercrime Centre

The Cambridge Cybercrime Centre is a multi-disciplinary initiative combining expertise from the Department of Computer Science and Technology, Institute of Criminology and Faculty of Law.

Glocomp Systems

Glocomp Systems

Glocomp Systems is one of Malaysia’s premier ICT infrastructure distributor offering a comprehensive portfolio of solutions including cybersecurity and privacy.

SharkStriker

SharkStriker

SharkStriker is a US based managed security services provider with SOCs and offices across the globe.

Execweb

Execweb

Execweb are a cybersecurity executive network, comprised of 400+ security practitioners who work at Fortune 500 and SME companies.

RiverSafe

RiverSafe

RiverSafe is a professional services provider specialising in Cyber Security, Data Operations and DevOps, putting security at the heart of everything we do.

Northern Computer

Northern Computer

Northern Computer provides comprehensive IT solutions that streamline your operations and help you achieve your business goals.