E-Commerce in Iowa Legal and Business Issues

Download Report

Transcript E-Commerce in Iowa Legal and Business Issues

E-Commerce in Iowa
Legal and Business Issues
Bretttrout.com
© 2001 Brett J. Trout
What is Intellectual
Property
A useful invention
A brand name
The expression of an idea
A commercially valuable secret.
Why Worry About IP
Marlboro trademark is worth $31 billion
$909 Million patent infringement judgment
against Kodak
Formula for Coke Invaluable
IP is the most valuable asset of most
Information Technology companies
Intellectual Property Laws




Patent
Trademark
Copyright
Trade Secret
Patent
New and useful
Processes
Machines
Manufactures
Compositions of matter
Improvements thereof
Patents Do Not Protect
Ideas
Obvious combination
of prior art
Illegal or immoral
matter
Pure research
Novelty or curiosity.
Infringement Remedies
Injunction
Damages and Infringer’s profits
Treble damages

Willful
Attorney fees

Willful
“Internet” Patents
State Street Bank Decision (July 23, 1998)




Court of Appeals for the Federal Circuit
Allows patenting business method.
Examination no longer begins by determining
if claim recites a mathematical algorithm.
1998 USPTO revisions to computer related
examination guidelines reflect this decision.
Business Method
Applications
Amazon.Com

One-Click Shopping
AskJeeves.com

Plain English search service
Lycos

Spider technology
Cybergold

Cash for eyeballs.
Business Method
Applications
1996-2000
First Upheld in 1998
U.S. now files over
50% of European
Business Method
Applications
8000
7000
6000
5000
4000
3000
2000
1000
0
1996
1997
1998
Year
1999
2000
Why the Rush
Often the primary asset of an IT company
Delays competitors
Provides potential revenue stream
Marketing advantage
Increases the value of the company
Great bargaining chip in litigation
Problems
Internet developed using public domain
information
USPTO has weak database and few
patents in this area
Many applications will incorporate public
domain information
Patent may be invalid, but will be difficult
to prove
Is it a Protectable Business Method
Novel

Are you aware of it being done before?
Non-obvious


Given the problem, would the solution be
obvious to a colleague?
Not whether colleague understands solution
Useful

Typically not an issue.
Patent Do’s






Keep accurate records
Determine if method meets patent criteria
Determine if method is worth protecting
Take immediate steps to protect method
Determine all potential alternatives
Give patent attorney ALL of the information
you have
Patent Don’ts



Disclose
Third parties
Offer for sale
Delay
Make decision not to pursue patent
without input from others in company
Patent Limitations




Expensive $5K-$20K
Slow 18-48 months
Does not protect you from infringement
Expires 20 years after filing
Advantages of Patents



Covers various alternatives
Provides triple damages and attorneys fees
Covers items subject to reverse engineering
Signs You May be an IT
Redneck
Your old computers are up on
cinder blocks in the front yard
A word, name or phrase, or symbol used
to identify the source or origin of a good or
service provided through commerce.
Infringement Remedies
Injunction
Damages and Infringer’s profits
Treble damages
Attorney fees

Must be an exceptional case
Types of Trademarks
Fanciful – Qwing
Arbitrary – Royal
Suggestive – NoDoze
Descriptive – red
Generic - apple
Types of Trademarks
Color – pink for fiberglass
Sound – NBC chimes
Scent – floral scent for yarn
Types of Trademarks
Domain names - Amazon.Com

Over 30,000 pending
Animated browser icon – Netscape
“E” marks – eVideo, eMusic
Correct Usage
Use ® only for federally registered
trademarks
Use TM or SM for all non-registered marks
ALWAYS use trademark as adjective


Correct “Hand me that Firewire cable”
Incorrect “Hand me that Firewire”
Incorrect Usage
Destroys valuable trademarks

thermos- King Seely

escalator- Otis Elevator

cellophane- E.I. Du Pont

yo-yo- F. Duncan
Xerox spends over $100,000/yr making
sure people do not say “Xerox this for me”
Types of Protection
Common law
State registration
Federal registration
Infringement
Similarity of marks
 Similarity of goods or services
 Similarity of trade channels
 Sophistication of buyer
 Strength of mark
 Actual confusion or lack thereof

Cybersquatting
Uniform Dispute Resolution
Policy
 Anticybersquatting Consumer
Protection Act.

Uniform Dispute Resolution Policy
Created by ICANN
Adopted by all Registrars
Mediation (6-8 weeks)
 Only transfer or cancellation of name
Registrant must respond within 20 days
Requires showing of bad faith
Do not have to have federal registration
Trademark owner wins 80% of disputes.
Anticybersquatting Consumer
Protection Act
Federal Court
Statutory Damages $1K to $100K
 Available only if name
registered after law enacted
Like UDRP, requires bad faith.
Typical State Anitdilution
Requires proof mark is both


Famous
Distinctive
Only concerns likelihood of dilution
Only concerns distinctiveness loss per se
Federal Trademark Dilution Act of
1995
15 U.S.C. §§ 1125(c) (1998)
Effective January 16, 1996
Amends Section 43 of the
Lanham Act
Provides a federal cause of
action for trademark dilution
Proving Federal Dilution
Famous Mark
Dilution
What makes a mark famous
inherent or acquired distinctiveness
duration and extent of use with the goods or
services
duration and extent of advertising and publicity
geographical extent of the trading area
channels of trade
recognition of the mark in the trading areas
nature and extent of use of the same or similar
marks
whether the mark is federally registered
Trademark Infringement





Same criteria on or off line
Similarity of the marks
Relatedness of the goods or services
Simultaneous use by competing companies of
the web as a marketing channel
Addition of “.Com” typically not a factor
Invisible Infringement



Metatags
Playboy and playmate
Court does not differentiate visible from
invisible infringement
Stealthing




Words same color as background
Invisible to viewer
Visible to search engines
Likely viewed the same as metatag
infringement
Banner Ad Linking

Playboy
Summary Judgment for Defendant
Playboy used as English word

Estee Lauder
Settled-links removed

Lexis/Innovator -pending
“Suck” sites



Walmartsucks.Com
Very difficult to get name back
First Amendment/Free Speech issues
Trademark Do’s




Choose unique trademarks
Investigate domain name availability
Report all infringements
Use all trademarks as adjectives
Trademark Don’ts

Allow unauthorized use of trademarks
Even as metatags



Use trademarks of others without permission
Use a trademark similar to that of a
competitor
Use trademarks as nouns
Trademark Limitations
For non-famous trademarks, rights only
extend to association with goods or
services
No trademarks rights without actual use
Requires docketing for renewal of
trademark registrations
No protection for generic or merely
descriptive terms
Advantages of Trademarks
Potentially indefinite duration
Mere use provides common law rights
Federal registration provides


Treble Damages
Attorney Fees
Protects against mere “likelihood of
confusion”
Signs You May be an IT
Redneck
You have a camouflage mouse pad
Copyright
Original works of
authorship
Fixed in a tangible
medium
©
Copyright Protects
Literary works
Musical works
Dramatic works
Choreographic works
Pictorial, graphic and sculptural
Motion pictures
Sound recordings
Architectural works
Exclusive Rights





Reproduce the copyrighted work
Prepare derivative works
Distribute copies by sale or other
transfer
Perform the copyrighted work publicly
Display the copyrighted work publicly.
Damages For Infringement
Your damages and Infringer’s profit
Injunction
Statutory damages


$30K
$150K if willful and malicious
Attorney fees and costs


Available to either side
Frivolous or unreasonable
Copyright Duration
Sonny Bono Copyright Term Extension Act
 Last surviving author's life plus 70 years
 Works for hire and anonymous
95 years from publication
120 years from creation.
Copyright Does Not Protect
Ideas
Procedures
Processes
Systems
Federal
publications
Methods of
operation
Concepts
Principles
Public Domain
Material.
Copyright Does Not Protect
Certain aspects of software


Items dictated by efficiency
Aspects required by external factors
Scenes a faire
Industry demands, etc.

Items taken from the public domain
Avoiding Infringement
Clean Room
 Programmers have no access
Copyrighted program
Public Domain
 OK to use
 Avoid Open Source and Freeware
Unless you are absolutely sure
Could have been taken from
protectable material
Watch Out!
Much of the information relating to
copyright law on the Internet is inaccurate.
Using a small amount of material or
modifying the work, does not avoid
infringing the author’s copyright.
The poster of infringing work on the
Internet typically must pay damages and
remove the material from the Website.
ALWAYS Obtain an Assignment
Paying contractor for project

Not sufficient to transfer copyright
Get assignment from “author”



Custom software
Website design
Logo or graphic art
Get assignment up front.
Fair Use
Purpose and character or work
 Commercial use of copy
Nature of copyrighted work
 Form book
Amount of work taken
Economic impact of taking
Usually ok
 Parody
 Critical commentary
Fair Use
Very rarely applicable
Do Not rely on fair
use protection
Rarely upheld in
commercial context
unless
 Parody
 News
 Critical
Commentary
Infringement of Software
Abstract


Source code protectable
Idea not protectable
Filter

Non-protectable elements
Compare

Substantial Similarity
Proper Copyright Notice
Copyright Notice

© or Copyright
Year of first publication

Include all years new material published
2001
1997, 1998, 2001
1997-2001
Name of Copyright Owner
Use of Notice
© 2001 ABC Corp., Inc.
Apply to all
 Original works of authorship
Software
Documentation
Graphics
 Created by your company, its
employees or copyrighted work
assigned to your company
Deep Linking
Ticketmaster v. Microsoft




Microsoft Seattle sidewalk website
Deep linked to Ticketmaster order page
Skips home page and several layers of
advertising banners
Settled
Deep Linking
Shetland times v. Shetland news



Deep linking to news story
Framed story with linker’s advertising
Can link to story, but must give proper
attribution
Deep Linking
Bernstein v. J.C. Penney


Linked Arden perfume page to page which
displayed infringing photographs of Elizabeth
Taylor
Court dismissed case as too tenuous
Always Obtain
Permission
Copyright Limitations
Registration required to bring suit
 Does not protect functionality
 Vesting of original ownership often
confusing

Advantages of Copyright





Registration not required
Inexpensive
Protection automatically attaches
Statutory Damages
Non-willful – up to $30K
Willful - up to $150K
Provides for attorney fees and court
costs
Signs You May be an IT
Redneck
There is a farm animal on your screen
saver
Trade Secret
Is It a Trade Secret?
Information which:


Derives independent economic value,
actual or potential, from not being generally
known to, and not being readily ascertainable
by proper means by a person able to obtain
economic value from its disclosure or use.
Is subject to reasonable efforts to keep secret
Trade Secrets
Formula
Pattern
Compilation
Device
Method
Technique
Process
Trade Secrets
Customer Lists
Vendor Information
Anticipated Return on Investment
Software Architecture
Functional Specifications
Module Interactivity
Alpha/Beta/Full Releases
Trade Secret Misuse
Posting trade secrets on the internet
Using trade secrets you should have
known were protected
Damages For Infringement
Injunction
Compensation
Punitive damages

Willful and malicious
Attorney fees

Willful and malicious
State Trade Secret Law
Iowa enacted uniform trade secrets act in
1990 (Iowa Code Chapter 550)
Enacted by about 40 states
Remaining states use common law
theories
Church of Scientology
Former members posting church secrets
on the internet
Court held
 Fair use
 Documents no longer trade secrets after
being disclosed in prior court proceeding
Trade Secret Don’ts



Disclose Trade Secrets to anyone who has
not signed a confidentiality agreement
Attempt to extract trade secrets from others
under confidentiality agreement with third
party
Misappropriate Trade Secrets
Criminal penalties
Punitive damages
Attorney Fees
Trade Secret Do’s



Maintain secrecy
Follow all security protocols
Appropriately mark all trade secret material
Limitations of Trade Secrets



Could be gone tomorrow
Not applicable if you can reverse engineer
Must take precautions to prevent disclosure
Trade Secret Advantages




No need to disclose
Potentially indefinite duration
Inexpensive
Covers Ideas
Signs You May be an IT
Redneck
You have ever used a CD-Rom as a beer
coaster
www.DomainNames.com
What is a Domain Name
A domain name is an alphanumeric string
representing a numerical Internet Protocol
Domain names represent numerical
addresses
Domain Name Servers (DNS) translate
these names into numbers using a huge
database
www.lockergnome.com = 216.246.17.205
Top Level Domain Names
.com (for commercial endeavors)
.org (for non-profit organizations)
.net (for network providers)
.mil (for military organizations)
.gov (for government organizations)
.edu (for educational organizations)
.ca .uk .to etc. (for various countries)
Domain Names as Trademarks
Do not register http:///www portion
Must indicate source
Not merely address
Not primarily a surname unless secondary
meaning
Not primarily geographically descriptive or
misdescriptive
Not selling only your own goods or
services over the site
Domain Name Disputes
Domain name rights are obtained by
registering with a domain name registrar.
There are four dispute resolution
providers:




World Intellectual Property Organization
National Arbitration Forum
E-Resolution Consortium
CPR Institute for Dispute Resolution
Signs You May be an IT
Redneck
Your Outlook program has a “Reply Y’all”
button
Digital Millennium
Copyright Act
(DMCA)
Enacted on October 28, 1998
Addresses the impact of electronic
commerce on the existing legal
framework
Does not affect the rights, remedies,
limitations or defenses to copyright
infringement.
(DMCA)
Limits liability of Internet Service Providers
Prohibits circumventing anti-piracy
software
Requires rebroadcasters of copyrighted
material to pay royalties.
Internet Service Providers
Shielded from Liability if:

No knowledge
that material is
infringing


No receipt of
financial benefit
from the
infringing activity
Moves
expeditiously to
remove the
material that is
claimed to be
infringing.
Anti-Circumvention
Under Section 1201
of the DMCA, no
person shall
circumvent a
technological
measure that controls
access to a
copyrighted work.
Prohibits trafficking in
any technology
product, service, or
device designed to
circumvent a
technological
measure that controls
access to a
copyrighted work.
Signs You May be an IT
Redneck
Your instant messages have ever begun
with “Howdy”
Defamation and Publicity
Defamation
Invasion of another’s interest in reputation
or good name
Twin torts


Slander
Libel
Slander
Verbal defamatory statement made with
malice and causing damage to its victim
Two types


Slander per se – specific categories
Slander
Slander per se
Slander per se




Sexual misconduct
Lack of business acumen
Communicable disease
Criminal conduct
Presumed



Proof of falsity
Malice
damage
Slander
Must prove



Falsity
Made with malice
Damage
Question of law as to whether statement
could be interpreted as defamatory
Libel
Malicious publication tending to injure the
reputation of another
Two types


Libel per se
Libel per quod
Libel per se
Defamatory of their face
Presumptions



False
Made with malice
Damaging
Most actions brought as Libel per se
Libel per quod
Capable of defamatory interpretation when
considered with other extrinsic evidence
No presumptions
Plead anyway in case Libel per se case
gets dismissed
Other Factors
Must prove malice if figure is public figure
Publication-single third party, not subject
to privilege is enough
Identification-must be corporation,
partnership or living person
Damages-detail prior reputation and extent
statement distributed
Malice
Required if


Public figure
Punitive damages
Made with knowledge it was false
Made with reckless disregard of its truth or
falsity
Defenses
Truth


Must be substantial
Damages cannot be the result of the
inaccuracies
Privilege


Qualified
Absolute
Qualified Privilege
Must be


Made in good faith
Without malice
Types
Self interest

Giving description to police
Interest of others

Telling daycare worker is felon
Common venture

Boss details performance
Public interest

Statement to prevent a crime
Types
Report of public proceeding

Covers false statements
Fair comment



Plaintiff held out for public comment
Entertainer
Public official
Absolute Privilege
If done in judicial
proceeding
Judges
Jurors
Lawyers
Witnesses
Parties
If not in judicial
proceeding
State officials in
execution of their duty
Local officials only
receive qualified
privilege
Mitigation
Impugn character


Can only show allegations
Cannot show bad acts
Argue pure motive
Spoken in passion
Cases
Chubby



Compuserve provided website forum and
subcontracted operation to third party
Defamatory posting
Ruling
Compuserve had no reason to know of falsity
Compuserve more like a newstand vendor than
publisher
Prodigy
SYSOP provided editing and screening of
bulletin board
Defamatory posting
Preliminary ruling


Prodigy could be liable
More like a publisher
Communications Decency Act
(CDA)
Codification of Chubby
Reaction to Prodigy case
SYSOP liable only if it knew or had reason
to know of defamatory nature of statement
Zeran
Bulletin board poster used plaintiff’s name
to sell OK city bombing t-shirts
Ruling

SYSOP AOL not liable even if aware of the
falsity of at least some of the postings
Drudge
Drudge stated Blumenthal had history of
spousal abuse


Paid a salary
SYSOP could control content
Ruling

No liability of SYSOP
Lunney
Third party sent offensive e-mail through
SYSOP
Court said SYSOP more like a telephone
distributor than a telegraph operator

No liability
In re iPrimus
Anonymous e-mail
Allegedly disclosed confidential info
Allegedly defamed toy company president
Canadian Court ordered ISP to divulge
identity of sender


Requires more than spurious claim
Plaintiff must prove legitimate need
Hvide v. ACLU
Eight message posters
CEO claimed postings led to his firing
Florida Appeals Court held ISPs had to
disclose identity of posters
John Doe Cases
CDA led to increases in defamatory
statements
Reasons for defamations



Rush to print
Manipulate stock
Disgruntled employee
ISPs insulated from liability


Little incentive to self-police
Companies cannot get name of defamer
Why Bring a John Doe Case
Rarely seeks monetary relief
Confirms to Shareholders that statements
are false
Usually leads to self-imposed injunction
John Doe Case Issues
1st Amendment Defense
Opinion Privilege
John Doe Plaintiffs
1st Amendment Defense
Media vs. non-media speech


Most protected-Public policy website postings
Least Protected-e-mail to specific company
Public figure


Defamation requires proof of malice
Corporations as public figure
Does corporation have communication channel
Did corporation put itself into public controversy
Matter of public concern


Can override first two
Not personal prurient interest of CEO
Opinion Privilege
Statements not capable of being proven
false; or

Outlook for bond repayment is negative
Cannot reasonably be interpreted as
stating actual facts


Sex with your own mother
Look at context
Internet opinion privilege is very broad.
John Doe Plaintiffs
AOL v. Anonymous Publicly Traded
Company
Plaintiff remaining anonymous requires:
 More than proof of harm
 Must show
Social Stigma
Extraordinary Economic Retaliation
Signs You May be an IT
Redneck
Installing minesweeper would double the
value of your PC
RIGHT OF PUBLICITY
History
Developed from right of privacy
Protects commercial interest in one’s
persona, name and likeness
Some jurisdictions extend to




Nickname
Voice
Mannerisms
Performing style
States
25 protect right


15 have statutes
10 use common law
Alternatives
Implied endorsement
Trademark
State dilution laws
Copyright laws
Defenses
Non-commercial use
News reporting
Critical commentary
Parody
Remedies
Injunction
Value of licensing agreement
Transfer
Can be made “in gross”
Cases
Pesina
Model for video game character
No showing character inextricably linked to
his identity
Michaels I
Pamela Anderson’s “private” tape
Court ruled likelihood of success on the
merits
Michaels II
Hard Copy wanted to air excerpts
Court held 1st amendment rights trumped
right of publicity in this case
Astaire
Use of likeness on cover for video tapes of
Fred Astaire Dance Studios
Court upheld and extended California
statute to cover video tapes
Pornographic Sites
Alyssa Milano
Amy Dolenz
Carmen Electra
$238,000 judgment against at least one
website host
Signs You May be an IT
Redneck
Your Computer is worth more than your
trailer
Uniform Electronic Transactions Act
(UETA)
Created to promote uniformity in state laws
regarding electronic transactions
Iowa’s UETA
Iowa Code Chapter 554D
Effective July 1, 2000
Transaction where both parties agree to
transact by electronic means
Iowa’s UETA
Contract or signature shall not be denied
effect simply because of electronic format
Electronic document qualifies as writing
Electronic signature qualifies as signature
Iowa’s UETA Does Not Cover
Transactions covered by specific
consumer transaction chapters of Code
Creation or execution of Will or Trust
Iowa’s UCC transactions
Transactions where instrument presumed
to confer title
ATM transactions
Transactions where construction of law is
repugnant
Signs You May be an IT
Redneck
You have a bumper sticker on your PC
that says “My other computer is a laptop
E-Sign Legislation
Designed to address discrepancies
among the 37 states that have enacted
one or more aspects of UETA.
E-sign
Preempts conflicting provisions of state
UETAs
Specifies consent requirements for
electronic consumer transactions
E-Sign Excluded
Transactions
Notice of termination of utility services;
Foreclosure or eviction;
Termination of health insurance
Product recall notices; or
Documents relating to hazardous
materials.
Signs You May be an IT
Redneck
You have ever visited
www.Jerryspringer.com
Uniform Computer Information
Transactions Act (UCITA)
Developed to address computer
information the way the Uniform
Commercial Code addresses tangible
goods.
UCITA
NOT the law of Iowa
Iowa has adopted “anti-UCITA” legislation
Adopted only in Maryland and Virginia.
UCITA
Controversy is that UCITA supports “click
wrap” and “shrink wrap” agreements to
detriment of general public
Signs You May be an IT
Redneck
You have a “Down Homepage”
No Electronic Theft Act
Amends United States Code
Titles17 and Title 18
 Copyright and Trademark Laws

No Electronic Theft Act
(NETA)
Strengthens existing trademark and
copyright laws
Makes the willful distribution of
copyrighted works a federal crime.
NETA © Penalties
Value of works < $1000

Exempted if non-willful
Value of works > $1000

Misdemeanor- up to 1 yr/$100K
Value of works > $25,000

Felony- up to 3 yrs/$250,000
Additional NETA
Provisions
Penalties increase for subsequent
offenses
Extends statute of limitations from 3-5 yrs
Provides for victim impact statement
Signs You May be an IT
Redneck
You have ever pulled a road-kill recipe off
the net
The ADA and the Internet
Covers companies using the Internet for
communications regarding



Programs
Goods
Services
ADA
Applies to “covered entities”




Employers
Employment agencies
Labor organizations
Etc.
Requires offering communication via
accessible means
Unless “undue burden”

Significant difficulty or expense
ADA Cases
Hooks v. OKBridge

ADA applies to Internet company even if
services performed at customers’ homes,
rather than at company’s facilities
National Federation of the Blind v. AOL


Argued ADA required AOL to use available
screen-access software for the blind
Settled
Rehabilitation Act
Mandates accessibility standards for
federal government web pages and
technology
Section 508
Effective 2/20/2001
Private enforcement began 6/21/2001
Rehabilitation Act Covers
Websites
Telephones
Info Kiosks
Computers
Fax
Copiers
etc.
Rehabilitation Act Does
Not Cover
Military command systems
Weaponry
Cryptologic activities
Rehabilitation Act
States

Must comply if using Assistive Technology Act
State Grants
Contractors – Federal and State

May have to represent and warrant
compliance with Section 508
Signs You May be an IT
Redneck
You have more mouse buttons than teeth
Spam
Iowa Code Chapter 714 E

Unlawful to send of bulk e-mail
Allows Attorney General to get
 Actual Damages
 Statutory Damages
 Injunction
Spam Under Iowa Law
Unauthorized use of third party in address
Misrepresents point of origin
Fails to identify the point of origin
Fails to provide e-mail declination
Unsolicited advertisement to a recipient
who has declined such e-mail.
Signs You May be an IT
Redneck
You have a “Protected by Smith &
Wesson” sticker on your laptop
Thank You