Search This Blog

Thursday, March 12, 2009

Online auctions: Caveat Mercator Venditorque

The world vs. eBay
Network World logo

Security Strategies Alert

NetworkWorld.com | Security Research Center | Update Your Profile


Sponsored by Oracle
rule

Cost-Efficient IT Security.
Make the most of IT security and compliance dollars by ensuring your databases are secure. Get concrete tips and recommendations in this Live Webcast sponsored by Oracle, scheduled for Thursday, April 16, 2009 at 2:00 p.m. ET/11:00 a.m. PT. Learn how to cost-effectively safeguard sensitive and regulated information. Register for this Live Webcast now.

rule

Spotlight Story
Online auctions: Caveat Mercator Venditorque

M. E. Kabay By M. E. Kabay
Following up on the last newsletter, which reviewed legal conflicts over trademarks as keywords for targeted ads and dealt with a trademark infringement case between Louis Vuitton and Google, today I want to introduce an interesting question about the responsibility of online auctioneers - eBay in particular - for stopping unauthorized sales of trademarked materials or of their knockoffs. Read full story

M. E. Kabay, PhD, CISSP-ISSMP, specializes in security and operations management consulting services. CV online.

Related News:

Trademarks as keywords for targeted ads? I've been doing research for my annual review of intellectual property law and have had a great deal of fun learning about all sorts of interesting new developments. Here's a case that might interest readers who work in commercial organizations with valuable trademarks but that raises unexpected questions about freedom of speech.

Minding Online Store a Case of 'Not My Job' Last month, a federal judge ruled that eBay Inc. had fulfilled its obligations to investigate and control users who were trying to use its Web site to sell counterfeit Tiffany goods -- a decision that put the onus on Tiffany & Co. to monitor eBay's site itself.

Software group files lawsuits against eight eBay sellers The Software & Information Industry Association has filed eight new lawsuits against eBay-based software sellers, alleging that they are selling counterfeit products.

Google, Louis Vuitton face off in trademark spat Europe's highest court will hear a trademark infringement suit concerning Google's keyword advertising system, a case that ventures into an untested area of law that could impact the company's lucrative ad revenue.

Enter for a Microsoft training giveaway from New Horizons
New Horizons Computer Training is offering a free Microsoft training course worth up to $2,500 to be given to one lucky Microsoft Subnet reader. Deadline for entry is March 31.

Network World on Twitter Get our tweets and stay plugged in to networking news.


Best of the Tests 2009
Best of the Tests 2009Out of the more than 150 products tested, a baker's dozen rise to the top of the list.

Fave Raves
2009 Fave RavesSix readers dish on their must-have network products, from desktop systems to wireless access points.

Sponsored by Oracle
rule

Cost-Efficient IT Security.
Make the most of IT security and compliance dollars by ensuring your databases are secure. Get concrete tips and recommendations in this Live Webcast sponsored by Oracle, scheduled for Thursday, April 16, 2009 at 2:00 p.m. ET/11:00 a.m. PT. Learn how to cost-effectively safeguard sensitive and regulated information. Register for this Live Webcast now.

rule

Preparing for the Next Cyber Attack.
Ensure you are up-to-speed on the latest security technologies available to keep your network safe. Get a thorough assessment of the corporate security threat landscape. Protect your network with data leakage protection, NAC and other technologies.
Download this Executive Guide now.


Webcast: Data center server selection.
Forrester Research's Brad Day helps IT professionals refine their server selection criteria in this informative Webcast, "Beyond Systems Performance." Ensure you will make the right decision for your next-generation data center. Get Day's tips on creating a cost-efficient environment that delivers the performance and long-term resiliency you require.
Watch this Webcast now.

 

03/12/09

Today's most-read stories:

  1. Inexpensive scanners can 'fingerprint' paper
  2. Broadband stimulus funding timeline set by government
  3. Microsoft releases three updates for Windows
  4. Microsoft Windows on a mainframe?
  5. AT&T earmarks $11 billion for wireless, wireline broadband in '09
  6. Exchange alternatives: Pros and cons
  7. Google clarifies stance on paid apps
  8. Chinese newspaper says Apple prepping touch-screen netbook
  9. Gigabit Ethernet is the one bright spot
  10. Google blocks popular iPhone SMS app
  11. Microsoft TechFest: Commute UX dialog system for in-car infotainment


Network World on Twitter: Get our tweets and stay plugged in to networking news


The Need for an Adaptive Threat Management Architecture - Live March 31.
Create a more secure and efficient network. Find out how in this Live Webcast, "The Need for an Adaptive Threat Management Architecture." Join us on Tuesday, March 31, 2009, at 1:00 p.m. ET/10:00 a.m. PT. Get real-world advice from Jon Oltsik, senior analyst at consulting firm Enterprise Strategy Group.
Register today for this Live Webcast.



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues
of Network World Magazines, in print or
electronic format, free of charge, Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network
World newsletter, change your e-mail
address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: