Feeds

Bloggers must reveal sources - judge

Tech scoops not in the public interest

  • alert
  • submit to reddit

5 things you didn’t know about cloud backup

Apple won the green light to subpoena amateur publishers for their confidential sources, a Californian Judge ruled today. Apple Computer, which wants to discover who leaked product information to three web sites, can now proceed with its subpoena against one of the ISPs hosting two of the websites, Santa Clara county court Judge James Kleinberg has ruled, as well as the websites themselves.

"Unlike the whistleblower who discloses a health, safety or welfare hazard affecting all, or the government employee who reveals mismanagement or worse by our public officials, [the sites] are doing nothing more than feeding the public's insatiable desire for information," Kleinberg ruled.

A demand primarily stoked by the corporation itself, which wants as many members of the public as possible to buy its products - he failed to add.

Sidestepping the issue of whether amateurs deserved protection usually afforded to The Fourth Estate, Kleinberg wrote "Even if the movants are journalists, this is not the equivalent of a free pass." Kleinberg firmly defined the trade secret information as STOLEN property.

"The Court makes no findings as to the ultimate merits of Apple's claim, or any defenses to those claims," wrote the Judge. "Those issues remain for another day."

However the implications go far beyond the Swiftian debate of whether bloggers are journalists, an issue which exercises navel gazers in both fraternities.

"This is a broad-brush ruling that threatens journalists of all stripes," said Electronic Frontier Foundation legal director Cindy Cohn. The EFF is defending two of the sites, PowerPage and AppleInsider. ThinkSecret is being sued by Apple under trade secret legislation.

"Apple did not use this as a last resort, but did only a perfunctory investigation before going on to subpoena the journalists," said the EFF's Kurt Opsahl.

Writing at ZDNet Dan Farber warned that Apple founder Steve Jobs risked tarnishing his legacy by pursuing the confidential sources with such zeal. He has a point: journalists have longer memories than technophiliacs. Perhaps Jobs has given us something future historians will remember him by. ®

Related stories

Apple wins first round of 'secret' war
Apple founder urges company to drop bullying lawsuits
Apple suspends online hack subpoenas
Apple sues three journalists for emails
Casualties mount in Apple vs customers war
Mac rumour sites get it completely right

Secure remote control for conventional and virtual desktops

More from The Register

next story
BBC: We're going to slip CODING into kids' TV
Pureed-carrot-in-ice cream C++ surprise
6 Obvious Reasons Why Facebook Will Ban This Article (Thank God)
Clampdown on clickbait ... and El Reg is OK with this
Twitter: La la la, we have not heard of any NUDE JLaw, Upton SELFIES
If there are any on our site it is not our fault as we are not a PUBLISHER
Facebook, Google and Instagram 'worse than drugs' says Miley Cyrus
Italian boffins agree with popette's theory that haters are the real wrecking balls
Sit tight, fanbois. Apple's '$400' wearable release slips into early 2015
Sources: time to put in plenty of clock-watching for' iWatch
Facebook to let stalkers unearth buried posts with mobe search
Prepare to HAUNT your pal's back catalogue
Ex-IBM CEO John Akers dies at 79
An era disrupted by the advent of the PC
prev story

Whitepapers

Endpoint data privacy in the cloud is easier than you think
Innovations in encryption and storage resolve issues of data privacy and key requirements for companies to look for in a solution.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Advanced data protection for your virtualized environments
Find a natural fit for optimizing protection for the often resource-constrained data protection process found in virtual environments.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.