Feeds

Cybersitter firm sues China, Lenovo for Green Dam code lift

Solid Oak swings legal baton

The Power of One Infographic

A US firm is taking legal action against seven PC makers and the Chinese government alleging much of the code for China's Green Dam scheme was stolen from their products.

Solid Oak software, which makes Cybersitter, wants $2.2bn in damages from Sony, Lenovo, Toshiba, Acer, Asus, BenQ and the Chinese government.

Greg Fayer, Cybersitter's attorney said: "This lawsuit aims to strike a blow against the all-too-common practices of foreign software manufacturers and distributors who believe that they can violate the intellectual property rights of small American companies with impunity without being brought to justice in US courts."

The Chinese government proposed compulsory installation of Green Dam filtering on all computers sold in the country. The scheme was eventually abandoned in the face of criticism that its real purpose was to strengthen government control of information and services available to Chinese citizens rather than protecting children from unsuitable content.

Although we can't see the Chinese government coughing up damages any time soon the lawsuit should not be seen as just a publicity stunt.

Cybersitter has long complained that its intellectual property had been infringed - it sent cease and desist letters to Dell and HP back in June to stop them pre-installing Green Dam filters.

It also took action against CBS for providing a link to a download site for the software. The company complains that some 3000 lines of code within Green Dam come from its Solid Oak software.

The complaint, which CNet has here, accuses the defendants of conspiracy as well as copyright offences. It names two Chinese distributors along with the OEMs and the People's Republic of China.

Solid Oak also alleges several thousand attempts were made to access its servers from computers based in China - including one attempted intrusion in May 2009 which saw 2,500 access attempts within 27 minutes from within China's Ministry of Health. ®

The Power of One Brief: Top reasons to choose HP BladeSystem

More from The Register

next story
Sit back down, Julian Assange™, you're not going anywhere just yet
Swedish court refuses to withdraw arrest warrant
UK Parliament rubber-stamps EMERGENCY data grab 'n' keep bill
Just 49 MPs oppose Drip's rushed timetable
MPs wave through Blighty's 'EMERGENCY' surveillance laws
Only 49 politcos voted against DRIP bill
EU's top data cops to meet Google, Microsoft et al over 'right to be forgotten'
Plan to hammer out 'coherent' guidelines. Good luck chaps!
Delaware pair nabbed for getting saucy atop Mexican eatery
Burrito meets soft taco in alleged rooftop romp outrage
British cops cuff 660 suspected paedophiles
Arrests people allegedly accessing child abuse images online
LightSquared backer sues FCC over spectrum shindy
Why, we might as well have been buying AIR
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.