Feeds

ITC denies Apple an emergency ban on ALL HTC PHONES

Just one letter separates ITC and HTC. Coincidence?

The Power of One Infographic

US regulator the International Trade Commission has denied Apple's attempt to get an emergency ban on all HTC mobes.

The fruity firm is accusing HTC of violating an existing exclusion order that's been in effect since December. The ITC issued the ban after finding that HTC was infringing on a patent that allows folks to isolate data such as phone numbers in emails and then call the number.

HTC said the feature wasn't essential and claims to have removed all trace of the software from its phones. However, Apple alleges that the firm has been telling porkies to customs officials to slide its mobes past them.

The ITC said that it was launching an investigation into Apple's claims, but it wouldn't issue an emergency ban on all HTC units while it's looking into things.

"The Commission will not direct Customs to detain all subject HTC products because the Commission does not have the information necessary to determine whether the respondents are currently violating the Commission’s limited exclusion order," the ITC said on its website.

"The facts recited by Apple in its submission do not conclusively demonstrate that HTC’s representations were inaccurate at the time that they were made."

New phones from HTC, the One X and the EVO 4G LTE, were held up at customs for at least a month as officials checked the mobes for the naughty patent-infringing tech, but they were let through at the end of May.

An ITC judge will now have to set up a timetable for the investigation and the initial determination in the case. ®

Boost IT visibility and business value

More from The Register

next story
BBC goes offline in MASSIVE COCKUP: Stephen Fry partly muzzled
Auntie tight-lipped as major outage rolls on
You! Pirate! Stop pirating, or we shall admonish you politely. Repeatedly, if necessary
And we shall go about telling people you smell. No, not really
UK Parliament rubber-stamps EMERGENCY data grab 'n' keep bill
Just 49 MPs oppose Drip's rushed timetable
ITC: Seagate and LSI can infringe Realtek patents because Realtek isn't in the US
Land of the (get off scot) free, when it's a foreign owner
Samsung threatens to cut ties with supplier over child labour allegations
Vows to uphold 'zero tolerance' policy on underage workers
Dude, you're getting a Dell – with BITCOIN: IT giant slurps cryptocash
1. Buy PC with Bitcoin. 2. Mine more coins. 3. Goto step 1
There's NOTHING on TV in Europe – American video DOMINATES
Even France's mega subsidies don't stop US content onslaught
US freemium mobile network eyes up Europe
FreedomPop touts 'free' calls, texts and data
prev story

Whitepapers

Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.