Feeds

Apple argues that blogger can't protect source

It would, wouldn't it?

Choosing a cloud hosting partner with confidence

A US appeals court has been hearing arguments in a case that tests the right of a blogger to protect his sources. Apple Computer wants to know who leaked details of a product called 'Asteroid' and expects bloggers to reveal the names.

ADetails of Asteroid, a music device, were leaked two years ago by PowerPage.org and other blogs. The blog owners say they are journalists and should be protected from revealing their confidential sources.

ZDNet reports that, on Thursday, Presiding Justice Conrad Rushing questioned whether the leaked information even amounted to a trade secret. "You don't really claim this is a new technology?," he asked. "This is plugging a guitar into a computer."

But Apple's lawyer characterised the leak as "a very serious theft".

The Electronic Frontier Foundation is representing the online journalists. It contends that Apple has no right to force the bloggers to reveal their sources.

Apple has sued several unnamed individuals, called "Does" (as in "John Doe" and "Jane Doe"), for allegedly leaking the information. According to the EFF, as part of the lawsuit, Apple has subpoenaed Nfox, the ISP for PowerPage publisher Jason O'Grady, demanding that the ISP turn over the communications and unpublished materials O'Grady obtained while he was gathering information for his articles. Apple was also granted permission to issue subpoenas directly to PowerPage and AppleInsider for similar information.

A trial court ruled last year that if a journalist publishes information that a business claims to be a trade secret, this act destroys constitutional protection for the journalist's confidential sources and unpublished materials.

EFF Staff Attorney Kurt Opsahl told the appeals court on Thursday that the subpoena to Nfox violated the federal Stored Communications Act, which prohibits direct subpoenas of email communications held by email service providers. Opsahl also argued that O'Grady and other journalists are entitled to protect their confidential source information under both the California constitution and the US constitution.

A ruling is expected within 90 days.

Copyright © 2006, OUT-LAW.com

OUT-LAW.COM is part of international law firm Pinsent Masons.

Choosing a cloud hosting partner with confidence

More from The Register

next story
Facebook pays INFINITELY MORE UK corp tax than in 2012
Thanks for the £3k, Zuck. Doh! you're IN CREDIT. Guess not
Facebook, Apple: LADIES! Why not FREEZE your EGGS? It's on the company!
No biological clockwatching when you work in Silicon Valley
Happiness economics is bollocks. Oh, UK.gov just adopted it? Er ...
Opportunity doesn't knock; it costs us instead
Sysadmin with EBOLA? Gartner's issued advice to debug your biz
Start hoarding cleaning supplies, analyst firm says, and assume your team will scatter
YARR! Pirates walk the plank: DMCA magnets sink in Google results
Spaffing copyrighted stuff over the web? No search ranking for you
Don't bother telling people if you lose their data, say Euro bods
You read that right – with the proviso that it's encrypted
Apple SILENCES Bose, YANKS headphones from stores
The, er, Beats go on after noise-cancelling spat
prev story

Whitepapers

Cloud and hybrid-cloud data protection for VMware
Learn how quick and easy it is to configure backups and perform restores for VMware environments.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Three 1TB solid state scorchers up for grabs
Big SSDs can be expensive but think big and think free because you could be the lucky winner of one of three 1TB Samsung SSD 840 EVO drives that we’re giving away worth over £300 apiece.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.