Posted on Categories electronic identification

The hash – a computer file’s digital fingerprint

One of the many uses of hash functions is the identification and verification of computer files.

Everyone has experienced having to frantically search for an important document that was saved “somewhere in the computer” but is needed immediately. In such situations, we usually resort to the search function built into the operating system; but in the end, we just have to browse through the files, one at a time, until we find (or not) the right one. But what if we need to find a file among hundreds of thousands of others?

Continue reading “The hash – a computer file’s digital fingerprint”

Posted on Categories judicatureTags

Outsourcing no escape from liability for telemarketing without consent

The Supreme Court of Poland ruled on 17 February 2016 that an entity conducting direct marketing using automated generating systems (in that case SMS ads) is liable for failure to obtain consent from recipients also when it has contracted out the marketing to an external firm.

Continue reading “Outsourcing no escape from liability for telemarketing without consent”

Posted on Categories IT, judicature

ERROR 451:Site unavailable for legal reasons

Can internet service providers be ordered to block a specific website?

Blocking websites has recently become a popular method for combating legal violations, particularly in the context of copyright protection. It’s enough to glance at the rulings from the last few months. In late May a court in Tel Aviv ordered Israeli ISPs to block access to a service where films and TV shows could be viewed without the consent of the copyright holders using the BitTorrent protocol. This followed in the trail of the English High Court, which less than a month earlier issued a very similar injunction. And shortly thereafter the same court order British ISPs to block access to portals offering e-books without authorisation.

Continue reading “ERROR 451:Site unavailable for legal reasons”