Dutch court bans Samsung Galaxy S, SII and Ace in Europe starting Oct. 15
But judge says issue can be resolved if Samsung updates its phones with Android 3.x software used on tablets
Computerworld - A court in The Hague on Wednesday banned the shipping of three Samsung Galaxy smartphones to Europe as of Oct. 15, ruling that the company has infringed an Apple photo management patent.
The Samsung Galaxy S, SII and Ace were banned because Samsung infringes on Apple's EP 2.058.868 patent, the court found. The patent is titled "Portable Electronic Device for Photo Management" and describes a way to scroll through a photo gallery using finger gestures on a touchscreen.
Samsung infringes the Apple patent by using Android 2.3 in the three phones, according to the ruling by Judge E.F. Brinkman. Android 3.x that is used for tablets does not infringe this patent. The patent issue can be fixed by updating the Android software on the phones to Android 3.x, Samsung said in court earlier this month and that point was also noted by the judge in the ruling.
If Samsung fails to do this, the consequences can be very big for the European smartphone market. The Dutch infringement could block the import of all Samsung phones to Europe, since Samsung's distribution centers are located in the Netherlands, Dutch ICT news site Webwereld revealed. That is the main reason why Apple is suing Samsung in The Hague.
The judge denied all the other grounds on which Apple tried to ban the import of Samsung products into Europe. Samsung does not infringe on two other patent claims about intellectual copyright and design, the judge ruled. Further, according to the court, Samsung does not "slavishly copy" Apple's iPad and iPhone.
Read more about Legal in Computerworld's Legal Topic Center.
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- Mobile Policy Checklist Here's what to consider when putting together a mobile policy designed to support a highly productive workforce.
- Securing BYOD Mobile computing is becoming so ubiquitous that people no longer bat an eye seeing someone working two devices simultaneously. Individuals and organizations are...
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts