Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.
Federal law generally prohibits Internet service providers (ISPs), i.e., "cable operators," from disclosing personally identifiable information concerning a subscriber without the prior written or electronic consent of the subscriber. Moreover, under the law, ISPs must "take such actions as are necessary" to prevent unauthorized access to a subscriber's personally identifiable information by a person other than the subscriber or the cable operator. See, 47 U.S.C. §551(c)(1). An ISP, however, may disclose a subscriber's personally identifiable information in a number of specific circumstances, including pursuant to a court order authorizing the disclosure. See, 47 U.S.C. §551(c)(2)(B).
Plaintiffs in an increasing number of lawsuits filed in federal district courts in New York, the busiest jurisdiction for copyright infringement litigation, are relying on that provision to seek court orders requiring ISPs to disclose subscribers personally identifiable information soon after such plaintiffs file their actions against anonymous "John Doe" defendants. The goal: to learn the names and addresses of those defendants and, therefore, to be able to serve them with the complaints.
This article focuses on a recent federal court decision, among a number of these decisions, to explain how the well-developed law in this area provides plaintiffs asserting a wide range of claims with the ability to proceed while protecting ISPs and, correspondingly, how it ultimately means that defendants who otherwise could remain anonymous may have to defend themselves in court.
ENJOY UNLIMITED ACCESS TO THE SINGLE SOURCE OF OBJECTIVE LEGAL ANALYSIS, PRACTICAL INSIGHTS, AND NEWS IN ENTERTAINMENT LAW.
Already a have an account? Sign In Now Log In Now
For enterprise-wide or corporate acess, please contact Customer Service at [email protected] or 877-256-2473
This article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.
With each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.
The Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.
In Rockwell v. Despart, the New York Supreme Court, Third Department, recently revisited a recurring question: When may a landowner seek judicial removal of a covenant restricting use of her land?
As businesses across various industries increasingly adopt blockchain, it will become a critical source of discoverable electronically stored information. The potential benefits of blockchain for e-discovery and data preservation are substantial, making it an area of growing interest and importance.