Can Kris Jenner Trademark “Momager”?

kris_jenner By Denise Kim

We love them, or we hate them. Either way, we see them everywhere. I am referring to the one and only Kardashian family. Every month, members of the Kardashian-Jenner family are in the news for one reason or another. In May, Kris Jenner, the Kardashian matriarch filed legal documents to trademark the word “momager”. According to the Urban Dictionary, a “momager” is a manager that is your mom. Kris Jenner hopes to trademark the word in order to launch a new business platform and lifestyle brand to empower moms.

Kris Jenner would not be the first to capitalize on her celebrity status. Football player Tim Tebow successfully trademarked “Tebowing”, Paris Hilton trademarked the catchphrase “That’s hot”, and basketball player Anthony Davis trademarked “fear the brow” and “raise the brow”. In fact, this is not even the first time a member of the Kardashian-Jenner family registered a trademark. Earlier in May, Kylie and Kendall Jenner filed to trademark their names. Celebrities often seek trademark protection to protect their likeness and to prevent marketing that may dilute their image. However, Kris Jenner is attempting to trademark a new, hybrid word as opposed to her personal name. Continue reading

Will Congress Allow Consumers More Privacy?

NSABy Naazaneen Hodjat

The courts are redefining the hot topic of privacy law in today’s digital age. The most recent ruling, American Civil Liberties Union v. Clapper, came in the wake of a series of disclosures by Edward Snowden, a former National Security Agency (NSA) contractor. The Guardian revealed that the NSA had asked the Foreign Intelligence Surveillance Court to order Verizon to produce the telephone metadata for many of its subscribers. This order covered three months of information and included the numbers of both parties on a call, along with the location, time, and duration of the call. The Patriot Act classifies the contents as metadata, and the NSA can obtain the metadata without a warrant. The NSA network secured the telephone metadata indefinitely for its investigations.

The NSA Bulk Metadata Collection Program began shortly after the September 11th terrorist attacks. Section 215 of the Patriot Act permits the government “to make an application for an order requiring the production of any tangible things…for an investigation to obtain foreign intelligence information not concerning a US person or to protect against international terrorism….” The ACLU sought a preliminary injunction against the Government claiming that the bulk metadata collection program violates consumers’ First and Fourth Amendment rights. In response, the Government argued that bulk collection qualifies as business records and therefore falls within the ambit of Section 215 of the Patriot Act. Continue reading

“Mobile Justice”? or Risky Vigilante Journalism?

camera+phone By Andrew H. Fuller

The American Civil Liberties Union’s (ACLU) Oregon chapter and four other state chapters offer a smartphone app called Mobile Justice, which allows users to easily record interactions with the police. In addition to recording and transmitting footage, the app has a “Witness” button that sends out a user’s location to alert other Mobile Justice users in the area when they have been approached by the police. Once other Mobile Justice users have a user’s location, they can find that user and record their interaction with the police.

While this sort of Sousveillance activity is not unheard of—indeed, there are other apps that provide smartphone users with similar features—there are some serious concerns about these apps. Perhaps the most obvious concern is that a police officer may think that a user pulling out their phone to record is reaching for a weapon. In response to this concern, the ACLU of Oregon’s website for Mobile Justice has a portion of the page warning users on how to safely use the app. Continue reading

Telecoms’ Latest Attempt to Kill Net Neutrality

unnamed By Brennen Johnson

Last month, the Federal Communications Commission published its new net neutrality rules in the Federal Register. In response to the new rules, there has been an onslaught of legal challenges brought by telecom companies to defeat the rules before they go into effect mid-June. Within several days of publication, seven companies filed suit against the FCC over the rules. Rather than attacking the substance of the rules outright, the companies are instead seeking to block procedural aspects of the rules. The companies challenge both the FCC’s reclassification of the internet as a “public utility” as well as the legal standards and mechanisms that would allow the FCC to enforce the new rules.

By classifying broadband internet as a public utility, the FCC gains broader regulatory powers over internet providers under Title II of the Communications Act of 1934. The reclassification addresses the FCC’s January 2014 failed attempt to enforce net neutrality. The FCC’s rules at that time were struck down in large part because broadband internet was not classified as a public utility, implying that the FCC could not regulate internet providers in the same broad manner as other utility providers. Speaking for the Court in that case, D.C. Circuit U.S. Court of Appeals Judge David Tatel wrote: “[g]iven that the Commission has chosen to classify broadband providers in a manner that exempts them from treatment as common carriers, the Communications Act expressly prohibits the commission from nonetheless regulating them as such.” These broader powers significantly fortify the FCC’s position to protect its net neutrality rules from legal attack. However, if telecoms can successfully challenge the FCC’s reclassification of the internet as a public utility, then it seems a near certainty that the FCC’s current attempt at ensuring net neutrality will fail for the same reason it did in 2014.  Continue reading

Again? VMWare Accused of Violating Linux Kernel’s GPL license

penguinBy Chike Eze

Can’t we all just get along? At its core, an open source software license encourages software developers to share software with their community (i.e., the community of software developers). A software author grants a software copyright license to the public in exchange for requesting or requiring recipients to share their modifications with the public. Some open source licenses are permissive (i.e., the recipient may or may not share modifications), while others are restrictive (i.e., the recipient must share modifications).

The General Public License version 2 (“GPLv2”), a restrictive open source license, requires recipients of GPLv2 licensed software to share any modifications they make to the software with the community. This licensing model allows highly creative and intelligent software developers from all over the world to collectively author great solutions for the community. Sounds great, right? Well, in the real world, not everybody believes in sharing!  Continue reading