Blog

Seeking a speaker for 2/19 event. Is it you?

Update: It’s going to be Dave Donoghue, who authors the very informative Chicago IP Litigation Blog. If you’re not already reading Dave’s blog, you should be. He does a bangup job of tracking intellectual property decisions coming out of the federal courts here in Chicago. At the 2/19 meeting, Dave will use his perspective gained from paying close attention to the local dockets to speak on the topic of “Northern District of Illinois Cyberlaw Trends”. If you’re in the area, or will be on Februray 19, please consider attending this noon-time event at the Chicago Bar Association building 321 S. Plymouth.

==============================

I’m the vice-chair of the Chicago Bar Association’s Cyberlaw and Data Privacy Committee, and we have a meeting coming up at noon on Tuesday, February 19, 2008. Problem is, our speaker prospects are falling through.

 If you can be in Chicago on 2/19 and would like to address a group of about 20-30 technology savvy attorneys on a topic of interest to you about law and technology, drop me a line [internetcases -at- gmail dot com]. I need to know ASAP, so please respond by the end of the day tomorrow (Friday, 2/1/08).

 CLE credit is of course available. Illinois rules allow you to get up to six hours credit for preparation time for each hour you talk.

Finding ATLAS COPCO and ATLAS CASPIAN confusingly similar, court awards in rem ACPA relief to unopposed plaintiff

Atlas Copco AB v. Atlascopcoiran.com, No. 07-1208, 2008 WL 149128 (E.D. Va. January 8, 2008)

Unable to hail the overseas registrants of domain names, including atlascaspian.com and atlascopcoiran.com into a U.S. court, plaintiff Atlas Copco AB sought in rem relief against the domain names under 15 U.S.C. §1125(d)(2)(a). After the defendants failed to answer the complaint, Atlas Copco moved for summary judgment, relying on the allegations of its verified complaint.

The court granted the motion and ordered the domain names transferred.

In finding that the defendants had engaged in cyberpiracy, the court looked at the “dominant or salient portions of the marks” at issue – the plaintiff’s mark and the marks comprising the offending domain names.

For you trademark experts out there, query whether you might characterize the following analysis as a bit of a stretch:

The dominant portion of each of the Defendant Domain Names is “ATLAS COPCO” or “ATLAS.” These “dominant” terms are paired with the generic terms “CASPIAN” and “IRAN,” which are generic geographic terms that do not distinguish the Defendant Domain Names from the ATLAS COPCO trademark. An internet user might reasonably assume that the geographic term “CASPIAN” and “IRAN” were added to the ATLAS COPCO trademark by the Plaintiffs to identify its geographic location.

It looks like another motivation for the court’s finding was some of the subterfuge on the sites at the offending domain names. Turns out some of them pointed to “copycat” websites bearing “Atlas Caspian” logos confusingly similar to the plaintiff’s trademark, and linked to phishing sites bearing the actual Atlas Copco mark.

Off topic: Sometimes I take this train

Click here if the video is not showing up in the RSS feed.

Night before last I spent three hours on the train ride home. The video above shows the reason for the delay. The train I took that night was backed up and delayed while they sorted out the mess in Hinsdale. Had I left work a few minutes earlier I would have been on the second train, i.e., the one that caused the minivan to burst into flames. Would have been pretty exciting/scary. Thank goodness no one was hurt.

Court rejects constitutional challenges to obscenity statutes in prosecution of adult website owner

U.S. v. Little, No. 07-170, 2008 WL 151875 (M.D. Fla. January 16, 2008)

The operator of the Max Hardcore website was indicted under 18 U.S.C. §§1462 and 1465 for distributing allegedly obscene video files which agents downloaded in Tampa, Florida. Max Hardcore moved to dismiss the indictment, raising a number of constitutional challenges to the prosecution. The court rejected each of the defendant’s arguments and denied the motion.

Statutes not facially unconstitutional

The court declined to accept the defendant’s argument that because of the evolving nature of substantive due process law, prior Supreme Court decisions upholding the federal obscenity statutes were no longer valid. It also refused the defendant’s argument that the constitutional right to privately posses obscene materials should translate into a corresponding right to distribute such material.

Statutes not unconstitutional as applied

The defendant also launched a couple of challenges to the application of the Miller test, set forth in the Supreme Court’s decision of Miller v. California, 413 U.S. 15, 93 S.Ct. 2607 (1973). Under the Miller test, the finder of fact determines whether material is obscene by applying the following test: (a) Whether “the average person, applying contemporary community standards’” would find that the work taken as a whole, appeals to prurient interest; (b) whether the work depicts or describes, in a patently offensive way, sexual conduct specifically defined by the applicable state law; and (c) whether the work, taken as a whole, lacks serious literary, artistic, political or scientific value.

Max Hardcore’s challenge to the Miller test dealt with the requirement that the works at issue be “taken as a whole.” The defendants argued that because of the interconnected nature of the Web, it would be impossible to know what the term “taken as a whole” means, and it would similarly be impossible to determine the community standards against which the works should be evaluated. At the very least, the defendant argued, the entire Max Hardcore site should be considered the work “taken as a whole,” and not just the individual video files.

With little analysis, the court sided with the government, holding that the individual files – and not the whole website – should be the works “taken as a whole.” And the court concluded that the absence of a universal community standard was okay. Citing to U.S. v. Bagnell, 679 F.2d 826 (11th Cir. 1982), it held that “[i]t is constitutionally permissible to subject defendants in obscenity prosecutions to varying community standards of the various judicial districts into which they transmit obscene material.”

Damage under CFAA must involve some diminution of the system to be actionable

Garelli Wong & Assoc. v. Nichols, No. 07-6227, 2008 WL 161790 (N.D. Ill. January 16, 2008)

A recent decision from the U.S. District Court for the Northern District of Illinois presents a pretty typical fact pattern (employee leaves with sensitive data to work for a competitor), but also gives some useful guidance on the scope of the Computer Fraud and Abuse Act, 18 U.S.C. 1030 et seq. (CFAA).

Plaintiff Garelli Wong and Associates provides temporary placement for accounting professionals. When defendant Nichols worked for Garelli, he signed an NDA and learned a lot about the company’s clients, employees and strategy.

So when Garelli learned that Nichols allegedly copied a bunch of information before jumping ship, it sued. In addition to breach of contract, Garelli claimed Nichols violated the CFAA.

Nichols moved to dismiss the CFAA claim pursuant to Fed. R. Civ. P. 12(b)(6). The court granted the motion. It held that the CFAA requires a plaintiff to plead both damage and loss, and that Garelli failed to sufficiently plead both.

The CFAA defines “damage” as “impairment to the integrity or availability of data, a program, a system, or information.” Citing approvingly to the unpublished case of ResDev v. Lot Builders, 2005 WL 1924743 (M.D. Fla. August 10, 2005), which held that the word “integrity” required “some diminution in the completeness or useability of data or information on a computer system,” the court sided with Nichols. He had contended that CFAA liability does not arise merely by copying data. A violation of the CFAA requires more — some adverse effect on the system.

Garelli’s loss allegation essentially got Twomblied. The court found that Garelli’s allegations of loss — essentially a formulaic recitation of the CFAA’s $5,000 threshold language — did not provide the grounds of the entitlement to relief with more than labels and conclusions.

Social networking evidence presents challenge in prosectuion over alleged threats made after Virgina Tech shootings

U.S. v. Voneida, 2008 WL 189667 (M.D. Pa. January 18, 2008)

Professor Goldman kindly emailed me a copy of the U.S. District Court for the Middle District of Pennsylvania’s decision in the case of U.S. v. Voneida. This criminal prosecution arose out of some postings that defendant Voneida is alleged to have made on his MySpace page about last April’s Virginia Tech shootings.

The court approached the case with all the awe for the Internet suitable for 1994:

[Voneida’s statements] did not occur in a moment, like words being spoken; nor were they sent from one place to another once and only once, like mailing a letter, broadcasting a message over television or radio, or even sending an email. Rather, Defendant’s comments were communicated, and had the potential to reach an audience, for at least nine days. This is one of the ways in which speech on the internet, and on social networking sites in particular, challenges existing methods of legal analysis.

In this case, the feds claimed that Voneida’s postings ran afoul of 18 U.S.C. 875(c), which prohibits the transmitting in interstate commerce of “any threat to injure the person of another.” Voneida filed a motion in limine requesting that several pieces of evidence be excluded at trial.

One of the pieces of evidence that Voneida wanted kept out was an email message that a student in Pennsylvania sent to university authorities to report the postings. The court denied Voneida’s request on this point.

The court held that in determining whether Voneida’s statements were “true threats,” it would be instructive for the jury to consider the effect of the statements on their audience. Addressing this point, the court observed the following about an online “audience”:

Even if [the student who reported the postings] was an unintended viewer, the context of the internet and social networking sites like Myspace.com may make her part of Defendant’s audience regardless of his intent to reach her as opposed to others. As a part of his audience, her response to his comments is relevant and properly considered when evaluating whether they are “true threats.”

A few more facts would be interesting. What if a social network participant adjusts his profile settings to allow only “friends” see the content? Would the so-called “audience” still be the world at large? To what extent can a publisher technologically constrain his or her audience?

Personal name must have trademark significance for protection under ACPA

Salle v. Meadows, No. 07-1089, 2007 WL 4463920 (M.D. Fla. December 17, 2007)

Defendant Meadows thought that Plaintiff Salle owed him about $9,500.  He was apparently having some trouble getting paid, so he registered the plaintiff’s personal name as a domain name – briansalle.com.  He then tried to sell it to Salle for the amount of the purported debt.  Being uninterested in the purchase, Salle filed a cybersquatting complaint against Meadows in federal court.

Salle asserted claims under both 15 U.S.C. §1125(d) and 15 U.S.C. §1129. Both parties moved for summary judgment. It was a mixed ruling, but largely a win for Salle.

The court addressed the §1129 claim first.  That portion of the Lanham Act provides:

Any person who registers a domain name that consists of the name of another living person, or a name substantially and confusingly similar thereto, without that person’s consent, with the specific intent to profit from such name by selling the domain name for financial gain to that person or any third party, shall be liable in a civil action by such person.

Meadows argued that in trying to sell the domain name and thus recover money owed to him, he was not trying to profit, and therefore not liable under §1129.  Despite some dispute over whether the debt was actually owed and to whom, the court ruled in Salle’s favor.  “[C]yber-extortion is not a permissible way to recover a debt,” the court warned.

As for the §1125(d) claim, the court ruled in Meadows’s favor.  Section 1125(d) provides, among other things, that a person shall be liable to the “owner of a mark, including a personal name which is protected as a mark under [§1125]” if that person has a bad faith intent to profit from that mark. 

Salle argued that §1125 provides that all personal names are subject to trademark protection. Meadows, on the other hand, argued that a personal name must have some sort of trademark significance, e.g., acquired distinctiveness, in order to fall with the protection of §1125. Agreeing with Meadows’s interpretation of the section, the court found that Salle failed to present enough evidence to survive summary judgment on the question of whether he had protectible trademark rights in his personal name.

Filter maker says Apple’s trademark threats a bunch of hot air

“Lowest perceptive capabilities.” Is that code for “a moron in a hurry“?

Chicago-based BlueAir, Inc. has apparently been getting some threats from Apple over BlueAir’s pending trademark registration for the mark AIRPOD, to be used in connection with desk top air purifiers. Apple says AIRPOD will infringe on the IPOD mark.

BlueAir has gone on the offensive, asking the U.S. District Court for the Northern District of Illinois to enter a declaratory judgment of no infringement.

The heart of BlueAir’s allegations are as follows:

“There is no reasonable likelihood of confusion, mistake, or error in the marketplace for persons of even the lowest perceptive capabilities who are seeking an iPod music player considering or buying an AIRPOD desktop air cleaner instead.”

This dispute has been going on for a few months, and it is interesting to see suit filed now, to essentially coincide with the introduction of the MacBook Air.

BlueAir, Inc. v. Apple, Inc., No. 08-427 (N.D. Ill. filed January 18, 2007)
[Download the Complaint]

Anonymous alleged infringer identified with little substantive inquiry into infringement claim

[In re Subpoena Issued Pursuant to the Digital Millennium Copyrigt Act to: 43SB.com, No. 07- 6236, 2007 WL 4335441 (D. Idaho, December 7, 2007).]

When the general counsel for Melaleuca, Inc. saw some negative content someone had posted about the company on the Web site 43rdstateblues.com, he sent a cease and desist letter demanding the content be removed. The letter, however, did not accomplish its intended purpose. Instead, the site owner posted the entire letter.

Melaleuca did not give up, but just adapted its strategy. It served a DMCA subpoena [see 17 U.S.C. §512(h)] on the site, seeking to identify the person who posted the letter “so that [Melaleuca] might seek redress for copyright infringement.” Melaleuca claimed that its copyright rights in the letter were infringed when it was posted online. (Claiming copyright in cease and desist letters is not a new tactic.  See, e.g., here and here.) 

The website moved to quash the subpoena, asserting, among other things, that the letter was not subject to copyright protection, and that the failure by Melaleuca to establish a prima facie case of copyright ownership was fatal to the subpoena.

The court denied the motion to quash. The Web site had argued that Melaleuca could not own a copyright in the letter, according to 17 U.S.C. 102(b)’s exclusion of “any idea, procedure, process, system, method of operation, concept, principle or discovery” form copyright protection. But the court rejected that argument.

Declining to “go into an in-depth analysis of the merits of a copyright infringement claim in determining whether to quash [the] subpoena,” the court found that Melaleuca’s copyright registration in the letter was sufficient to establish ownership of a valid copyright.  As for alleged copying, the court found that posting of the entire letter was sufficient.

There are a couple of interesting observations to be made from this decision.  First, unlike cases in which plaintiffs seek to uncover the identity of anonymous defendants accused of defamation [see here], this court gave – relatively speaking – little inquiry into the merits of the plaintiff’s case.  Perhaps it felt that such an analysis was not necessary given that the Copyright Office had already determined copyrightable subject matter to exist (when it issued the registration certificate).

A second interesting question arises when one considers how the court might have ruled had the defendant asserted fair use as a basis for the motion to quash. (Doesn’t it seem like posting a cease and desist letter on the Internet, ostensibly for eliciting public ridicule, is a transformative use?) Given the fact intensive inquiry of a fair use analysis, the court would have probably reached the same conclusion, if anything to put off the factfinding until later.  But would a court do that in other cases where the offending, anonymous use is more obviously fair?     

Scroll to top