I. Basic Internet Architecture a. Definitions of the Internet i. Technological: A worldwide, publicly accessible network of interconnected computer networks that communicate via TCP/IP 1. Every machine (or the network of machines) 2. that communicates using TCP/IP 3. that has an IP address ii. Business Relationships: Universe of IAPs (Internet Access Providers) who trade packets with each other 1. Upstream and downstream providers 2. [and their customers] 3. Web of contracts/quasi-contracts 4. A network of networks (Reno 1) iii. Functions: 1. Interactive Communications: Email (1:1 or lists), IM/Chat, Phone calls (VOIP), Boards/USENET, Games 2. Move Money: E-commerce, Banking, Gambling 3. Browse or Publish Content: Text, Pictures, Music, Video, Software b. ARPANET: Advanced Research Projects Agency Network created in 1969 by U.S. govt i. Goal: if Russia took down our telecommunications infrastructure, there would still be a way for generals and such to communicate c. Packet Switching: i. Every piece of info that goes out over the Internet goes out in this packet ii. Every packet has heading info; identifying info that identifies where the info is coming from and where it is going 1. The network reads the header and sends the info to where it is going. 2. Routers and switches move the packets along. iii. If one part of the network cant deliver the info, it tries another connection to get the info to where it needs to go. iv. Transmission control protocol/Internet Protocol (TCP/IP) network is what makes packet switching work v. 3 advantages of packet switching network: 1. Stable a. not reliant on any particular node b. cf. circuit switched network 2. Operationally efficient a. automatic load balancing b. all traffic keeps moving 3. Extensible a. easy to join b. easy to leave c. no centralized control INTERNET LAW OUTLINE
vi. IP Address 1. Every packet switch is looking to go to IP addresses 2. Organizer: IANA (Internet Assigned Numbers Authority) 3. Mnemonics for IP addresses are domain names a. Domain Name System (DNS) d. What is Internet Law? i. Law of the Horse: we dont have a separate class for everything that you can do with a horse, so why do we have a class for everything you can do with the Internet; why not just study it as it comes up in other classes just as we study things related to horses as they come up in classes? ii. Preexisting law encountering new technology iii. Cyberspace Exceptionalism: Must ask whether we need to develop whole new laws or do we have existing tools/laws to deal with the problem? Who is the best person to deal with this problem? iv. Unique Features of Cyberlaw 1. No real authentication (Reno 90) 2. No centralized control (Reno 11, 46) 3. Simple to communicate (Reno 79) 4. Powerful information resource v. Lessigs modalities of control 1. Law 2. Social norms 3. Markets 4. Architecture/design a. Codes in cyberspace can be made to constitute our values and traditions, or it can be made to constitute values against our tradition. Codes control what we do, so we are not free Trespass and CFAA: I. 3 principal laws that govern the use of personal property online: a. Common law trespass to chattels (TTC) b. State anti computer trespass statutes (e.g. IN Code 35-43-2-3) c. Federal Computer Fraud & Abuse Act (CFAA) II. Trespass to Chattels basic elements a. Intent b. Dispossession/use/intermeddling c. A chattel in the others possession d. Damage b/c i. Dispossession ii. Impairment of chattels condition, quality or value iii. Deprivation of use of chattel for substantial period iv. Harm to body, person, or thing which P has legally protected against e. Simple: Chattel interference + damage i. Damage must be more than nominal III. Bidders Edge and Hamidi (basic holdings, reasoning, and distinctions) INTERNET LAW OUTLINE
a. Ebay v. Bidders Edge i. Facts: new company that was using web robots to get info off of ebays website ii. Holding: any sort of intermeddling suffices, especially when there is actual or constructive notice that a certain use is unpermitted (For Ebay) iii. Reasoning: 1. interference w/o authorization a. Court basically says that you are granted access to visit servers, just b/c its on the web doesnt mean it is open and can be used anyhow b. Give the interferer or possible interferer notice of what they are authorized to do and what theyre not authorized to do. c. Holding: Bidder did interfere even if they werent using that much of Googles server. 2. Damages a. eBay didnt lose customers or revenues; it only matters that some bandwidth was used b. its as if the damage element doesnt even exist c. court is just concerned about unwanted use as the harm b. Intel Corp. v. Hamidi i. Facts: guy who was mad he got laid off and was sending hundreds of emails to employees ii. Holding: must be measurable loss to computer system resources (For Hamidi) iii. Reasoning: 1. Hamidi is using the chattel/servers, but theres no damage to the chattel/servers a. There was no broken computers, no server downtime. Lost productivity doesnt count b/c the employees are not chattel. The server is chattel. 2. No damage, no tort c. Distinction b/w Bidders Edge and Hamidi i. eBay involved actual or threatened interference with the computers *efficient+ functioning 1. With Hamidi there was no appreciable effect on the operation of computer system ii. No likelihood that Hamidis actions will be replicated by others if found not to constitute a trespass 1. With ebay, other ppl would start using web robots constantly iii. Hamidis volume was miniscule compared to commercial spammers volume iv. eBay gave notice against web robots d. Lesson: be able to prove the interference w/the computer system and things u had to do to deal w/the interference will prove the damage. e. Remember, websites are considered private, not public IV. Computer Fraud and Abuse Act (CFAA) (basic provisions and application) a. Relevant Offenses i. knowingly accessing a computer without authorization (or exceeding authorized access), and obtaining information from any protected computer [(a)(2)(C)]; ii. knowingly accessing a protected computer with the intent to defraud and there by obtaining anything of value (5K/yr min.) [(a)(4)]; iii. knowingly causing the transmission of a program, information, code, or command that causes damage to a protected computer [(a)(5)(A)]; INTERNET LAW OUTLINE
iv. intentionally accesses a protected computer without authorization, and as a result of such conduct, recklessly causes damage [(a)(5)(B)]; v. intentionally accesses a protected computer without authorization, and as a result of such conduct, causes damage and loss [(a)(5)(C)]; b. Definitions i. Damage = impairment to integrity/availability of data, program, system or information ii. Loss = reasonable cost to victim, including cost of responding, conducting a damage assessment, and restoring the data/program/system/information to prior condition, and any revenue lost/cost incurred/consequential damages incurred because of interruption of service. iii. Protected computer = which is used in or affecting interstate or foreign commerce or communication --any computer connected to the Internet. c. Remedies i. (g): Anyone suffering damage or loss can maintain a civil action ii. but only if (c)(4)(A)(i) subsections (I)-(V) are satisfied: 1. loss of at least $5k/yr 2. [medical harm] 3. physical injury 4. threat to public health/safety 5. damage to government computer d. Application i. Accessing a schools email system to view and delete email messages is unauthorized access (Whitby School) ii. If action exceeds the authority granted by the websites Terms of Use, it exceeded authorized access. (EF Cultural Travel) 1. Using a scraper to grab prices off competitors website in order to undercut the prices iii. Us of a search robot to obtain info or use derived info for mass solicitation is unauthorized use (Register.com) iv. Breaching an online K, can be considered accessing a pc server in excess of authorization depending on the terms of the K. Causing the death of someone is considered damage. (Lori Drew) 1. Cannot elevate CFAA to the point of making breach of terms of use a federal criminal offense Defamation and Communications Decency Act (CDA) (47 U.S.C. 230): I. Defamation: a statement that injures someones reputation or exposes them to public hatred, contempt, ridicule, shame, disgrace, or affects business adversely. a. The Internet deals with libelwritten defamation (slander=verbal) II. Truth is always a defense to defamation III. Elements: a. False and defamatory statement about P b. Published to one or more 3 rd parties w/o privilege c. Which results in damage, actual or presumed, and d. D was at fault IV. The defamed INTERNET LAW OUTLINE
a. Public official/figure: P must prove actual malice=publication w/ knowledge that the statements was false or w/reckless disregard if whether the statement was false b. Private figure: P need only demonstrate that D was at fault in publishing false statement (showing negligence usually suffices) V. Who to sue: individual speaker/uploader, ISP (website), IAP, other Internet intermediaries VI. The Defendant a. Publishers: legally responsible for any libelous material they publish b. Distributors: not liable unless they know or have reason to know of the defamatory statement c. Common carriers: not liable unless they have participated in preparing defamatory material VII. CDA 230 main provisions, definitions, exceptions, scope, comparison to 512 a. Main Provisions i. No provider or user ii. of an interactive computer service iii. shall be treated as the publisher or speaker iv. of any information provided by another information content provider. b. Definitions i. Interactive Computer Service (ICS): provides or enables computer access 1. Definitely IAPs; Usually websites, bulletin boards, interactive blogs, web hosts, email list operators, chat room operators, and many others ii. Internet Content Provider (ICP): any person/entity responsible, in whole or in part, for the creation or development of information provided through the Internet or any other [ICS]. 1. in whole or in part a. Reading 1: As long as the ICS is responsible in any part for the development of the content, then the ICS is an ICP and 230 is not available. b. Reading 2: As long as any third party ICP was responsible for any part for the content's development, the ICS is not liable for it. c. Exceptions/Limitations i. CDA 230 cant be construed to impair enforcement of Federal criminal statute ii. CDA 230 cant effect federal intellectual property law iii. CDA cant effect communications privacy law d. Scope i. Websites are not liable for 3 rd party content ii. Applies to defamatory info., private info., false info., pornographic info. VIII. CDA 230 case law: a. Zeran v. AOL i. Facts: Zeran falsely represented as OK City bombing slogan t-shirt maker. Sued AOL for the defamatory content. ii. Holding: CDA 230 creates federal immunityISPs immune from liability for exercising a publishers traditional functionssuch as deciding whether to publish, withdraw, postpone or alter content. (For AOL) b. Majority & Minority views i. Majority: 1. Online providers can respond to non-IP complaints however they want to 2. 230 applies to all claims/legal theories INTERNET LAW OUTLINE
3. ICS is not responsible for any info a 3 rd party provided in part a. Even if the ICS owns it, edits it, and receives and ignores a complaint about it b. ICS can exercise traditional editorial function (construed broadly) ii. Minority 1. Notice-Based Liability: 230 is not available when the ICS knows or should know of a problem 2. 230 only applies to defamation claims 3. With sufficient involvement by the ICS, third party content can be converted into an ICS own content; immunity lost. c. Recent trends (Roommates.com, Craigslist) i. Roomates: 3 rd party content can become 1 st party content if the website directs the user-inputs too much, especially with a nexus to illegal activity ii. Craigslist: cannot sue the messenger just b/c the message reveals a 3 rd partys plan to engage in unlawful activity iii. Reconciling Roomates w/Craigslist: 1. Roommates.com provided structured categories for user content 2. Roommates.com had mandatory inputs iv. Claim promissory estoppel (quasi-contract), when site promises to remove third party content then doesnt (Barnes v. Yahoo) v. Sue over websites own marketing representations, using standard contracts and false advertising doctrines (Mazur v. eBay) IX. 230 Strategies a. Plaintiffs i. Plead an I.P. claim 1. (Avoid 230 entirely; make D navigate the tricky waters of 512) ii. Other 230 plead-arounds (e.g. marketing reps) iii. Argue that D is not an ICS provider or user iv. Argue that the ICS is actually an ICP v. Argue promissory estoppel b. Defendants i. Reject plead-arounds ii. Move to dismiss (will 230 support a 12b6?) iii. Rule 11 Contracts: I. Types (shrinkwrap/clickwrap/browsewrap) a. Best type to have on your website=Mandatory Non-leaky Clickthrough Agreement i. Mandatory= all users go through the same process ii. Non-leaky= process cant be bypassed iii. Clickthrough= consumer affirmatively clicks I agree to the terms b. Shrinkwrap: can only be read and accepted by the consumer after opening the product c. Clickwrap: user must click I agree to use/access the content/product d. Browsewrap: an agreement that by browsing the website the user assumes. User doesnt have to ever look at the contract to access the material. INTERNET LAW OUTLINE
II. General rules of enforceability a. Browsewraps i. The user is provided with adequate notice of the existence of the proposed terms. ii. The user has a meaningful opportunity to review the terms. iii. The user is provided with adequate notice that taking a specified action manifests assent to the terms. iv. The user takes the action specified in the latter notice. b. For more, see the cases below III. UETA, E-SIGN (basic) a. Electronic signature vs. digital signature (see definitions section above) b. UETA =Uniform Electronic Transactions Act i. A record or signature may not be denied legal effect or enforceability solely because it is in electronic form. ii. A contract may not be denied legal effect or enforceability solely because an electronic record was used in its formation. iii. If a law requires a record to be in writing, an electronic record satisfies the law. iv. If a law requires a signature, an electronic signature satisfies the law. c. E-Sign= Electronic Signatures in Global National Commerce Act i. with respect to any transaction in or affecting interstate or foreign commerce 1. a signature, contract, or other record relating to such transaction may not be denied legal effect, validity, or enforceability solely because it is in electronic form; and 2. a contract relating to such transaction may not be denied legal effect, validity, or enforceability solely because an electronic signature or electronic record was used in its IV. Online Ks governed by UCC Article 2 (sale of goods), common law (Intangible items), and UCITA (Va. and Md.) V. Common Law of K elements: a. Formation, i. Intention (offer/acceptance/consideration) ii. Manifestation of intent through actions or words (expressed or implied) iii. Unambiguous evidence of assent b. Interpretation, c. Defenses, d. Remedies VI. Unique features of online Ks: increased risk of being deemed unconscionable, statute of frauds, mailbox rule, and mountain of parol evidence VII. Specht, Register.com, Blockbuster a. Specht v. Netscape i. Standard: Assent requires a reasonably prudent offereewould necessarily have known or learned of the existence of the SmartDownload license agreement prior to acting. ii. Facts: Ps claim that the SmartDownload reported to Netscape what they were browsing on the Internet w/o notifying the customer iii. Holding: For Specht; Netscapes K wasnt validly formed iv. Reasoning: The agreement was located at bottom of page, but button to start download was at top of the page; no action indicating consent b4 downloading or using; b/c Netscape has disconnected knowledge from action, they lost INTERNET LAW OUTLINE
1. please review and agree is an invitation rather than saying you must agree in order to use the software; this is insufficient notice b. Register.com v. Verio i. Facts: Verio is a domain name registrar and it was using daily search robots on its competitors (Register.com) website to look for new customers for solicitation purposes; Register.com says Verios action is against Register.coms site usual agreement. Type of agreement: browsewrap ii. Holding: For Register.com; when benefit offered subject to stated conditions w/knowledge, the taking constitutes an acceptance of the terms iii. Reasoning: Verio repeatedly used the database w/knowledge of the terms. Verio conceded knowledge; Verio programmed its robots; Verio received a cease and desist letter, and still continued the action c. Reconciling Register.com and Specht i. With Specht, the users only downloaded the software once, which means they only had on chance to view the K. 1. With Register.com, there was repeated visits of the site allowing enough chances to see the K ii. Register.com involved commercial user of the site; Specht involved non-commerical user iii. The D in Register.com admitted to knowledge; Specht Ds didnt d. Harris v. Blockbuster i. The Unilateral Right to Amend i. Facts: Blockbuster, through FB, posting their customers rentals and purchases; all of blockbusters users clicked I agree to this; in addition, blockbuster had a right to amend clause ii. Holding: the ability to change contract w/o consent (aka unilateral right to amend) makes a contract invalid; This invalidation means that all the terms, including arbitration clause, are void Copyright: I. How copyright arises II. Who owns a copyright (basic) III. Elements of copyright infringement (direct, contributory, vicarious) IV. Netcom case V. The 512 safe harbors VI. How fair use works VII. How search engines work, Robot Exclusion Protocol/Robots.txt VIII. Search engine liability and defenses (Field, P10 v Amazon) IX. P2P (Sony, Napster, Grokster, Fung) (reasoning and results) TRADEMARK: I. Basic trademark law: subject matter, how trademarks arise, hierarchy of trademark distinctiveness, etc. a. TM Defined: A device (word, name, phrase, symbol, product shape, logo, etc.) used by a maker or seller to identify its goods, to distinguish those goods from those made or sold by another, and to indicate the maker/seller as the source of those goods. b. 3 principal elements: i. Identifies INTERNET LAW OUTLINE
ii. Distinguishes iii. Indicates source c. Purposes of TM Law: 1.) protect public from consumer confusion and 2.)protect TM owner from misappropriation of valuable property d. The Brand Rule: TMs are proper adjs. and should be followed by generic terms i. Form: Mark [brand], generic identifier of good/serives 1. Exs.: KLEENEX brand facial tissue, EBAY brand online auction service, etc. e. Governing Tool: Lanham Act f. A mark cannot be registered in the U.S. until it has been engaged in interstate commerce i. Any good that is marked for sale online is engaged in interstate commerce ii. Even if TM owner primarily sells things in one state, if he makes a bonafide sell out of state, that counts as being engaged in interstate commerce qualifying the registration of TM. g. Requirements for TM Acquisition i. Use - TM must be used (or an intent-to-use application filed); ii. In commerce - use must be commercial in trade evidenced by specimens of labels, displays, etc.; iii. Distinctive - TM must be capable of identifying the source of a particular good. h. How TM Rights Arise i. Common Law: use in commerce 1. Mark is inherently distinctive, or mark has acquired secondary meaning through use 2. Common law rights limited to geographic area 3. Can mark with TM or SM
ii. Register with USPTO 1. 2 bases: a. mark actually in use, or b. mark intended to be used soon (ITU intent to use) 2. Provides several benefits, including super-common law rights (entire U.S.) 3. Mark with or Reg. U.S. Pat. & Tm. Off. i. Rights of the TM Owner i. Exclusive use of the mark to identify the source of a good or service ii. Can prevent others from using the same or confusingly similar mark in connection with specific goods or services iii. Geographic Scope: 1. Unregistered: TM right in geographic trading area only 2. Registered: TM right in entire U.S. a. Registration is not required, but very beneficial for super-common-law rights j. Hierarchy of TM Distinctiveness i. Most Distinctive from greatest to least: 1. Fanciful: inherently distinctive (Exxon, Kodak) 2. Arbitrary: real words used out of context that are specifically assigned; inherently distinctive (Apple for computers) 3. Suggestive: dictionary words that suggest what the product is; inherently distinctive (Coppertone) ii. Least Distinctive from greatest to least: INTERNET LAW OUTLINE
1. Descriptive: mark itself describes the product/service; not inherently distinctive; must have acquired secondary meaning through use (Holliday Inn, Vision Center) 2. Generic: unprotectable (Apple for apples) iii. Relation to TM protection 1. The more distinctive the TM, the more protection is awarded 2. Fanciful, Arbitrary, and Suggestive trademarks get protection; Descriptive and Generic require use of time to market the product/service to create a secondary meaning in order to obtain a TM. 3. Some marks suffer genericide, meaning the TM has moved from adj. to verb and is now being used as a generic term. 4. Refer to TM Protection graphic k. Priorities i. First to use or register: TM rights vest with the first entity or person to use a mark in commerce or federally register a mark. Registration can be based on actual use, or intent to use. ii. Carve-out for first actual user: If a senior user uses a mark prior to a junior user federally registering the mark, the senior user retains rights in the mark for the geographic region in which she used the mark in commerce prior to registration. This region is carved out from the registrant/junior users ownership rights. l. Losing TM Rights i. Abandonment (assumed after 5 years of non-use); ii. Improper licensing or assignment (insufficient supervision); iii. Genericide II. TM Infringement a. Types of Infringement i. If registered, 32 of LA; 1114(1) ii. If unregistered (or registered), can use 43a of LA; 1125(a) 1. 1125(a): the source of federal unfair competition law 2. 1125(c): TM dilution 3. 1125(d): cybersquatting (cyberpiracy) b. Prima Facie Case for TM Infringement i. P has a valid mark entitled to protection under the Lanham Act; ii. P has priority rights in the mark; iii. D has used the mark in commerce; iv. Such use is likely to cause confusion / mistake / deception (Likelihood of consumer confusion) 1. as to the affiliation, connection, or association of such person with another person, 2. or as to the origin, sponsorship, or approval of his or her goods, services, or commercial activities by another person. c. Tests: 32/1114 and 43(a)/1125(a) i. Consumer Confusion Test 1. likelihood of consumer confusion standard a. Whether the reasonably prudent consumer is likely to be confused as to the origin of the good or service bearing one of the TMs 2. Notes: INTERNET LAW OUTLINE
a. Multiple parties may use the same mark only where the goods of the parties are not similar as to cause confusion among consumers b. Where a mark is protected only under common law TM rights, the same marks can be used where there is no geographic overlap in the use of the marks ii. LA 32/1114 1. without the consent of the registrant 2. use in commerce 3. of a registered mark 4. such use is likely to cause confusion, or to cause mistake, or to deceive (LOCC) a. Can be bypassed by applying the Initial Interest Confusion (IIC) Standard; see Lamparello case below) iii. LA 43/1125 1. any goods or services 2. uses in commerce 3. any word, term, name, symbol, or deviceor any fals*ity+, which a. likely to cause confusion or b. misrepresent iv. Note: 32 requires the mark to be registered while 32 does not require registration v. Contributory TM Infringement/Inwood Standard 1. 'intentionally induces another to infringe a TM,' or 2. 'continues to supply its product to one whom it knows or has reason to know is engaging in TM infringement.' a. Reason to know: Narrower in TM than CR i. Generalized knowledge is insufficient ii. Willful Blindness Rule: When *a service provider+ has reason to suspect that users of its service are infringing a protected mark, it may not shield itself from learning of the particular infringing transactions by looking the other way. b. to one= identified individuals 3. Website liability for user-caused TM infringements may be (implicitly) governed by a notice-and-takedown regime 4. Best practice for websites is to act in good faith and employ voluntary infringement suppression practices d. Remedies provided in 1117 i. Ds profits ii. Ps damages iii. Costs (filing fees) iv. Attorneys fees in exceptional cases III. Defenses to TM infringement (including descriptive & nominative fair use, comparative ad., noncommercial use) a. Geographic limitations (common law) b. Noncommercial Use: no goods offered; term being used in a literary sense. c. Noncompeting or non-confusing use d. Truthful Product Comparison e. News Reporting INTERNET LAW OUTLINE
f. Parody g. Descriptive Fair Use: Use of primary descriptive meaning of mark, i. e.gs., this cereal is all bran; juice described as sweet and tart or sweet-tart, vs. SWEETARTS h. Nominative Fair Use: Use of Ps mark in a way that doesnt imply sponsorship, affiliation, or promotion. (see Playboy v. Welles below for the Test) i. 1114(2): limited defense to innocent printers and publishers i. Limit to injunction (no damages) if: 1. engaged solely in the business of printing/violating for others 2. innocent infringer/violator ii. Underused in online context IV. Trademark Dilution (generally, 43(c)/1125(c)) a. Basic Idea: Certain marks are so big, we are going to draw a huge protection around them to protect against infringement. i. Use of a similar word or image, dilutes the value of the original brand/willows away the distinctive power of the brand b. A famous mark owner (e.g., Disney) may sue for dilution of its marks distinctive quality i. blurring; ii. tarnishment c. no requirement of likelihood of confusion or economic damage. d. Exclusions (1125(c)(3)) e. Ex.: candy land game vs. candyland.com porn site f. All you have to show is: i. Im famous ii. You started after me iii. Your product is diluting my product g. Defenses: same as any other TM infringement defense h. There is no such thing as contributory liability in TM dilution V. Tiffany v. eBay a. No direct liability for TM infringement based on advertising activities (nominative use doctrine) (u can call item by name) b. No secondary liability for counterfeit sales because generalized knowledge is not enough and eBay followed a notice-and-takedown procedure c. No direct liability for TM dilution based on the (unadopted) nominative use doctrine VI. Domain Name System and Registration a. Domain Names v. TMs i. Domains are not trademarks b/c a domain is not an indication of online goods or services ii. Domains are Quasi-TMs; they perform similar functions iii. Differences in how obtained: Use(TM) vs. Registration (Domain) iv. Differences in scarcity b. Types of Domain Conflicts i. Trademark owners with legitimate competing claims to a domain name 1. e.g. <gateway.com> ii. Using domain name for harmful purposes 1. Domain identical to anothers trademark <candyland.com> INTERNET LAW OUTLINE
2. Domain name similar, but not identical, to anothers trademark <adultsRus.com> 3. Cybersquatting (demanding ransom from TM owner) 4. Typosquatting (capitalizing on typos) VII. Domain Cybersquatting and ACPA/UDRP (elements, remedies, procedure, and differences) a. Anticybersquating Consumer Protection Act (ACPA) i. Imposes liability on a person who: 1. registers, traffics in, or uses a domain name that is identical or confusingly similar to a distinctive mark (or dilutes a famous mark), AND 2. has a bad-faith intent to profit from the domain name ii. Notes: 1. ACPA applies only to domain names, which means ACPA cant be used to remedy registrations of things like facebook/unitedairlines b/c those arent domain names, theyre usernames 2. there is no commercial use requirement a. there is no regard to goods or services of the parties 3. identical or confusingly similar is NOT same thing as likelihood of causing confusion iii. Factors court may consider in determining bad faith 1. the IP rights that D has in the domain name; 2. the extent to which the domain name is the same as Ds name or nickname; 3. Ds prior lawful use of the domain name in making an offer of goods or services; 4. Ds noncommercial or fair use of the mark in the website; 5. Ds intent to divert customers to a website that could harm the goodwill of the mark; 6. whether D has offered to assign the domain name for monetary gain without use or whether D intended to use the name; 7. whether D provided false contact information when applying for the domain name; 8. whether D registered multiple domain names that are confusingly similar to distinctive marks or dilute famous marks; and 9. whether the mark is famous or distinctive iv. Good Faith Defense 1. Bad faith intent will not be found in any case in which the court determines that the person a. believed and b. had reasonable grounds to believe c. that the use of the domain name was a fair use or otherwise lawful 2. Also creates a safe harbor for registration bodies so long as they act in good faith through the process v. Remedies 1. Forfeiture, cancellation or transfer of the domain name [1125(d)(1)(C)] 2. Actual or statutory damages (from $1,000 to $100,000 per domain name), 1117(d) 3. Attorneys fees and costs, 1117 b. Uniform Domain Name Dispute Resolution Policy (UDRP) i. governs disputes concerning most TLDs 1. all .com, .net, .org, .aero, .biz, .coop, .info, .jobs, .museum, .name, .pro and .travel domain names, INTERNET LAW OUTLINE
2. > 50 country-code TLDs ii. Mandatory, by contract iii. Required Showings: 1. the domain name is identical or confusingly similar to a trademark or service mark in which the complainant has rights; 2. the domain name registrant has no rights or legitimate interests with respect to the domain name; and 3. the domain name was registered and is being used in bad faith. iv. Bad Faith Factors: 1. whether the domain name was registered primarily for the purpose of selling it for profit to a trademark owner or its competitors; 2. whether the name was registered to prevent the trademark owner from using the mark in its domain name, provided the registrant has engaged in a pattern of this behavior; 3. whether registration was intended primarily to disrupt the business of a competitor; or 4. whether the registrant used the domain name in an intentional attempt to attract users to a site, for commercial gain, by creating a likelihood of confusion as to the source of the site or a product on the site. v. No legitimate right or interest 1. 3 defenses to the legitimate interest element: a. D has made preparations for the bona fide use of the domain name prior to notice of complaint b. D is commonly known by the domain name; i.e., the domain name is a nickname for the domain name holder c. D has a legitimate, noncommercial, or fair use of the domain name, without a corresponding intent of commercial gain, market confusion or tarnishment d. Exs. Of won: <corvette.com>; <talk-city.com> e. Exs. Of lost: i. <spiritairlines.com>: by Australian airline, incorporated under the name Spirit Airlines before registering the domain name or being aware of complainant; ii. <windor.com>: respondent had been doing business using the domain name for many years iii. Amazoh.com; qmazon.com; smszon.com vi. Authorized Dispute Resolution Service Providers 1. World Intellectual Property Organization (WIPO) 2. National Arbitration Forum (NAF) 3. CPR Institute for Dispute Resolution 4. Asian Domain Name Dispute Resolution Centre vii. Note: the UDRP is a plaintiff-friendly procedure viii. See printout for a comparison b/w UDRP and ACPA ix. The TM owner can choose to do a ACPA claim or use the UDRP; if u use the UDRP, the registrant has agreed to be bound by it/use it through some form of K. x. Remedy: cancel or transfer a domain registration. No damages. xi. UDRP is very quick and easy, so ppl like to choose it over a lawsuit INTERNET LAW OUTLINE
VIII. Lamparello v. Falwell a. Facts: Lamparello doesnt like Jerry Falwell; He creates Fallwell.com (falwell spelt incorrectly purposefully) to talk about how much he dislikes Jerry Falwell. Falwell sues under TM. b. TM Infringement Holding: For Lamparello i. Valid TM: There is a valid TM here b/c you get a common law TM in your name if you use it in commerce to generate money for yourself ii. Priority iii. Use in Commerce: court says it need not resolve based on the PETA precedent iv. LOCC: 1. Court bypasses LOCC by applying initial interest confusion(IIC) doctrine. a. Hard to apply LOCC in noncommercial setting. 2. IIC Theory: initially attracted ur attention and got u diverted. U never shouldve been aware of vendor #2; they only got ur interest b/c they dangled a misleading product in front of u; vendor got in ur line of sight, and they shouldnt have a. The IIC tries to manage the consumer process early on in the process b. The confusion shouldve never happened in the 1 st place 3. IIC application to this case: websites look different; services are different. Undisputed record = no LOCC. D did not use another's mark to capture the markholder's customers and profits c. ACPA Holding: For Lamparello i. The domain name <www.fallwell.com> is identical or confusingly similar to, or dilutive of the distinctive and famous [Falwell] mark? Yes ii. D had a bad faith intent to profit from using the <www.fallwell.com> domain name? No 1. Gripe site doesnt=bad faith iii. Both elements must be met IX. Metatags and Initial Interest Confusion a. Metatags are codes in the html of a website that tell the title, description, robots, and/or keywords for the site (see printout for a description of the types of metatags) b. PlayBoy v. Welles i. Facts: Terri Welles was named playmate of the year, so she created a website. Playboy owns TM in Playboy and Playmate, which wells had in her metatags, masthead, banner ads, and watermark. To make sure ppl knew that the site was not from Playboy, she had a statement denouncing affiliation. ii. Welles Defense=Nominative Fair Use, Test: 1. The product or service cannot be readily identified without using the trademark (e.g. trademark is descriptive of a person, place, or product attribute) 2. The user only uses so much of the mark as is necessary for the identification (e.g. the words but not the font or symbol) 3. The user does nothing to suggest sponsorship or endorsement by the trademark holder. iii. Nominative Fair Use Holding: For Welles in the metatags; there is no other way Welles can identify/describe herself 1. *T+here *can+ be no trademark infringement where a defendant has used the plaintiff's trademarks in good faith to index the content of her web site." INTERNET LAW OUTLINE
2. Against Welles for Wallpaper; it was not necessary for her to put PMOY repeadtly as her wallpaper, so therefore not nominative fair use iv. TM Dilution Holding: nominative uses, by definition, do not dilute TMs. A nominative use, by definition, refers to the trademark holder's product. It does not create an improper association in consumers' minds between a new product and the trademark holder's mark. c. Promatek v. Equitrac i. Facts: Promatek owns TM Copitrak; D, Equitrac puts Copitrack (misspelling Copitrak) its keyword metatag; Promatek sued Equitrac and won in the D.C. Circuit, which required Equitrac to put a notice on its page that said if you were directed to their website from the word copitrak, it was a mistake. This case is Equitracs appeal to that decision. ii. Holding: For Promatek; metatag created initial interest confusion; it divert*ed+ consumers 1. Duration doesnt matter; momentary confusion is not allowed; the moment user lands on page, TM infringement occurred b/c the user shouldnt be on the page to begin w/. 2. Court does not discuss use in commerce element d. North American Medical Corp. Axiom Worldwide, Inc. i. Facts: P, NAMC manufactures and distributes spinal/ traction device; D, Axiom is a competitor of NAMC; P owns the TMs IDD Therapy and Accu-Spina, and D uses the TMs in metatags ii. Holding: For NAMC; infringement through metatags 1. UIC=Yes; LOCC=Yes 2. Reasoning: Axiom included the terms within its meta tags to influence Internet search engines. Axiom showed up on Google as 2 nd most relevant search result for Ps TMs and Axioms Google search description included the TMs 3. Apparently you can get LOCC from something that a consumer cant seea metatag 4. Court says that if this was a search result in merely a listing and/or an explicit comparative advertisement, the D may have a legitimate reason to use the TMs e. Lessons about Metatags: i. Rid your keyword metatags of competitive trademarks ii. Scrub the text of description metatags iii. Needs to be a comparative use/nominative fair use iv. Educate (yourself and) courts about current technology and the clients objective X. Keyword Advertising (technology, lines of reasoning, trends) a. Sponsored Link: Text-based ads that often appear as a result of a keyword search either on a search engine or associated site. b. Invisible Triggers: Keywords that trigger ads to appear; the keyword trigger may be a TM but the ad does not include the TM c. Visible Text: The ads themselves contain TM terms; visible ad text. d. Hearts on Fire v. Blue Nile i. Facts: P, Hearts on Fire owns TM Hearts on fire, and D, Blue Nile uses TM in triggering ads for itself and in ad text ii. UIC Holding: For Hearts on Fire Selling a TM term is use in commerce 1. UIC: Ds purchase of the mark was use in commerce 2. Rescuecom: Commerce means something different when you are enforcing the rights than it does when you are obtaining the right. INTERNET LAW OUTLINE
a. The use in commerce definition is for obtaining rights, not for proving infringement. b. UIC post- Rescuecom: i. Displaying 3 rd party TM in ad copy=UIC ii. Selling TMed Keywords to trigger ads 1. Not UIC when adware vendors sell categories, not specific TMs (1-800 Contacts) 2. Yes UIC when a search engine sells specific TMs iii. Keyword-triggered ad buys: 1. Outside 2 nd Cir.= UIC 2. In 2 nd Cir.= unknown iv. Rescuecom effectively ends the UIC defense to online infringement. 3. LOCC Holding: For Blue Nile; there is no suggestion that diverted consumers inadvertently believed they were purchasing Hearts on Fire diamonds at Blue Nile's website. e. Rhino Sports v. Sport Court, Inc. i. Facts: Rhino had K w/Sport Court, Inc. not to use TM Sport Court on the Internet. Rhinos ad pops up in response to Google search for Sport Court even though Rhino never bought the keyword b/c of Googles Broad Matching. ii. Holding: Rhino has no control over Googles algorithm; broad matching using permissible terms is OK. f. State Legislative Efforts i. Utah SB 236 (the Trademark Protection Act, March 19, 2007) 1. Electronic Registration Mark" = "word, term, or name that represents a business, goods, or a service 2. Infringement to use an ERM to cause the delivery or display of an advertisement for a business, goods, or a service: (i) of the same classother than the *ERM registrants business]; or (ii) if that advertisement is likely to cause confusion between the [two businesses+ if ad displayed in Utah or advertiser/keyword vendor located in Utah. 3. Legal challenges a. Dormant Commerce Clause i. If congress has the power to regulate interstate commerce, then conversely, states dont have the power to do so b. First Amendment 4. Repealed 2008 5. 2009 reattempt XI. More on LOCC a. Remember the tests to measure LOCC i. Multi-factor LOCC test ii. Initial Interest Confusion b. Results so far i. TMs appearing in ad copy=LOCC ii. Keyword triggering only LOCC XII. Selected Defenses INTERNET LAW OUTLINE
a. Descriptive fair use (15 U.S.C. 1115(b)(4)) b. Nominative fair use c. For keyword sellers: i. Argue no contributory liability (Test: advertiser infringement + keyword seller directly controls/monitors instrumentality used to infringe) ii. Try the limited printer/publisher remedies (15 U.S.C. 1114(2)) Cybercrime: I. Any questions should be obvious from having attended Mr. DeBrotas presentation.