Feeds

Apple shot first, asked question later, say sued sites

Trigger-happy lawyers

The Power of One Infographic

Apple sent its lawyers after two amateur-run Mac news sites without conducting a serious internal company investigation first to demand who leaked trade secrets, court documents show. The Electronic Frontier Foundation, which bid to have the documents unsealed, claims it deals a crucial blow to Apple's attempt to silence the webstes.

Apple is suing AppleInsider and O'Grady's PowerPage, claiming that they published leaked product information on 'Asteroid', an audio hardware interface. It's seeking to compel the websites to identify unknown parties, 'John Does', who provided the information. Apple has yet to sue a professional news organisation for publishing similar scoops.

Apple's legal eagles failed to take depositions or subpoena its own employees, and didn't examine telephone records or individuals' computers. It made only a cursory examination of a single email server. The testimony was provided by Robin Zonic and Al Ortiz, senior manager of investigations, and senior investigator in the corporate security department at Apple, back in February. Apple had attempted to keep the details of its non-investigation under seal.

Courts are sympathetic to trade secrets cases, but may be wary of the power of subpoena, when deployed to threaten first amendment rights.

Bootnote

The unsealed document refers to Apple's John Doe suits against AppleInsider and O'Grady's PowerPage - and not to its litigation against Think Secret as an earlier draft of this story suggested. Apple is seeking damages from Think Secret.

Mobile application security vulnerability report

More from The Register

next story
Airbus promises Wi-Fi – yay – and 3D movies (meh) in new A330
If the person in front reclines their seat, this could get interesting
There's NOTHING on TV in Europe – American video DOMINATES
Even France's mega subsidies don't stop US content onslaught
UK Parliament rubber-stamps EMERGENCY data grab 'n' keep bill
Just 49 MPs oppose Drip's rushed timetable
BBC goes offline in MASSIVE COCKUP: Stephen Fry partly muzzled
Auntie tight-lipped as major outage rolls on
Want to beat Verizon's slow Netflix? Get a VPN
Exec finds stream speed climbs when smuggled out
Samsung threatens to cut ties with supplier over child labour allegations
Vows to uphold 'zero tolerance' policy on underage workers
Dude, you're getting a Dell – with BITCOIN: IT giant slurps cryptocash
1. Buy PC with Bitcoin. 2. Mine more coins. 3. Goto step 1
US freemium mobile network eyes up Europe
FreedomPop touts 'free' calls, texts and data
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.