Website terms of service provide basis for exercise of personal jurisdiction

CoStar Realty Information, Inc. v. Field, — F.Supp.2d —-, 2009 WL 841132 (D.Md. March 31, 2009)

Personal jurisdiction cases — even ones that involve the internet — are generally not all that interesting. But the case of CoStar Realty Information, Inc. v. Field is worth noting because of the way the personal jurisdiction analysis was tied to a provision found in online terms of service.

CoStar provides its paying customers with access to a proprietary database via the web. It claimed that certain defendants, who were residents of Texas and Florida, accessed the database using another customer’s password. So CoStar sued these defendants in federal court in Maryland.

These defendants moved to dismiss arguing, among other things, lack of personal jurisdiction. The court denied the motion.

It found that in the four or so years that the defendants accessed the database without authorization, they would have been presented with the online terms of service from time to time. Those terms of service contained a clause which provided that any litigation over use of the database would be conducted in Maryland. The court found that the defendants assented to these terms, and that the forum selection clause was valid and enforceable.

Map photo courtesy Flickr user Marxchivist under this Creative Commons license

Technology ethics: Seminar on responsible telephone use

As an attorney I feel an obligation to preach to you about what’s right and what’s wrong. People routinely trivialize this important duty by characterizing the subject matter as “ethics” or “professionalism.”

As a technology attorney, especially as one cool enough to use Twitter and be on Facebook, I feel a special obligation to instruct you on responsible use of social media. I’ll get to that.

First we need to address some of the basics concerning wise use of technology. Starting with the telephone.

In this downturned economy, I’m looking for every opportunity I can to supplement my income. So I’m offering a one day seminar called Telephone Ethics: Avoiding the Pitfalls Inherent in Voice Communications Technology. Registration is $995 dollars. Email me to sign up. But hurry, only a few seats are still available!

With the advent of the telephone, lawyers are threatened with almost certain peril and inevitable claims of malpractice. In this full day, in-depth course, we will look at the issues that arise each day as lawyers adopt this frightening intriguing technology. Subjects will include:

  • Diligence: Avoid violating Rule 1.3 — which requires a lawyer to be diligent in representing a client — by promptly returning phone calls.
  • Confidentiality: Oops! Did I just spill the beans and violate Rule 1.6 by forgetting to shut the door of that phone booth?
  • Polite Ambulance Chasing: What to say when phoning the victim of that bad accident you saw on the freeway. How to delicately let him know you’re a lawyer while navigating the Rule 7.3 minefield.
  • Much, much more!

And we’ll also have some fun. I’m lining up a special telephone expert TBA who will give some practical tips on how to better monetize your telephone use. That session will be called “Dialing for Profit: Let Your Fingers Do The Walking to a Successful Law Practice.” Check back at this Web page later for more details.

Future seminar topics will include Responsible Faxing: How to Keep the Disciplinary Committee Off Your Line, and Appropriate PowerPoint Obfuscation: Making Sure Your Bullet Points Aren’t Too Sparse.

CLE accreditation will be requested if there is sufficient interest. Heaven knows we need those ethics credits. Oh, and happy April 1.

Telephone photo courtesy Flickr user smudie under this Creative Commons license.

Facebook message was not witness tampering

Maldonado v. Municipality of Barceloneta, 2009 WL 636016 (D. Puerto Rico March 11, 2009)

Diaz was a defendant in a federal case in which Febus was a witness for the plaintiff. Diaz invited Febus to join a Facebook group, but Febus declined. Later Diaz sent a message through Facebook which, after translation, read as follows:

If you want to see the evidence that exists against the municipality let me know so that you can inform yourself well and please consult with a lawyer your civil responsibilities as far as defamation. Soon we will be filing a lawsuit and you could be included. My only request is that you are objective when mentioning my name.

Febus sought a protective order under the federal witness tampering statute, 18 U.S.C. 1512 which provides, in relevant part, that “[w]hoever knowingly uses intimidation, threatens, or corruptly persuades another …, or attempts to do so, … with [the] intent to … cause or induce any person to … withhold testimony … from an official proceeding[,]” is guilty under the statute.

The court denied the motion for protective order, finding that there was no evidence, neither raised by the plaintiff nor observable through inference, that Diaz intended to intimidate Febus. “This court can only see one threat in his Facebook message: the threat of future litigation. This is an insufficient basis for finding witness tampering.”

Cybersquatter hit with maximum penalty

Citigroup, Inc. v. Shui, 2009 WL 483145 (E.D. Va. Feb. 24, 2009)

Court enjoins use of citybank.org, orders defendant to pay $100,000 in statutory damages and to pay Citibank’s attorneys’ fees.

Defendant Shui registered the domain name citybank.org and established a site there promoting financial services, sometimes using the mark CITIBANK. The real Citibank, armed with its trademark registrations in over 200 countries and over 50 years of use of its CITIBANK mark, filed suit against Shui under the Anticybersquatting and Consumer Protection Act, 15 USC 1125(d) (“ACPA”).

Citibank moved for summary judgment on its ACPA claim and also asked the court to enter an injunction against Shui. Citibank also sought $100,000 — the maximum amount of statutory damages available under the ACPA, plus payment of Citibank’s attorneys’ fees. The court granted all of Citibank’s requested relief.

To prevail on the ACPA claim, Citibank had to show that (1) Shui had a bad faith intent to profit from using the domain name, and (2) that the domain name at issue was identical or confusingly similar to, or dilutive of, Citibank’s distinctive or famous mark.

Finding of bad faith

The court found Shui registered the domain name in bad faith because:

  • Shui did not have any trademark or other intellectual property rights in the domain name, and the registration of the domain name was not sufficient to establish any rights.
  • The domain name consisted of the legal name of Citibank (with one letter difference) and not the legal name of, nor any name that was otherwise used to identify Shui.
  • Shui had not engaged in prior use of the disputed domain name in connection with the bona fide offering of any goods or services prior to registering the domain name.
  • Shui’s use of the domain name was commercial in nature. Notably, some of the advertisements on Shui’s site were exact replicas of the marks CITIBANK and CITI. Each clickthrough provided Shui with advertising revenue, even though clicking on a link with Citibank in the title did not redirect the user to any website affiliated with the real Citibank.
  • Shui clearly intended to confuse, mislead and divert internet traffic from Citibank’s official website to his own in order to garner more clickthrough revenue from the misleading “citibank” advertisements.
  • Subsequent to the filing of the complaint, Shui sold the domain name for financial gain to a third-party in an apparent effort to avoid liability.
  • Shui registered other internet domain names which were identical or similar to Citibank’s marks, and the CITIBANK mark was distinctive and famous at the time Defendant registered the disputed domain name.

Confusing similarity

On the issue of confusing similarity, the court observed the strength of Citibank’s mark and the fact that the parties both offered financial services. Taking those facts in combination with the bad faith demonstrated by Shui, the court found the disputed domain name to be confusingly similar to Citibank’s marks.

The remedy

Accordingly, the court found in favor of Citibank on the ACPA claim. The court was stern in its remedy. It found that Shui’s registration of the confusingly similar domain name was “sufficiently willful, deliberate, and performed in bad faith to merit the maximum statutory award of $100,000 and an award of attorney’s fees.”

$100K photo courtesy Flickr user Ricardo (Kadinho) Villela under this Creative Commons license.

Maryland Court of Appeals addresses important question of internet anonymity

Independent Newspapers, Inc. v. Brodie, — A.2d —, 2009 WL 484956 (Md. February 27, 2009)

Maryland’s highest state court has issued a comprehensive opinion setting out the proper framework trial courts should use when evaluating whether a plaintiff should be permitted to learn the identity of an anonymous (or pseudonymous) internet speaker. After considering the varying standards courts across the country have applied in balancing the First Amendment right to anonymity against the right of a plaintiff to seek redress, the court adopted, in large part, the standard put forth in the New Jersey case of Dendrite, Int’l. v. Doe, 775 A.2d 756 (N.J. Super. Ct. App. Div. 2001) which requires, among other things, a prima facie showing by the plaintiff before compulsory discovery concerning the identity of an unknown defendant will be had.

One of the great things about the internet is that users can easily speak anonymously or through a pseudonym. This right to remain unidentified is a free speech right guaranteed by the First Amendment. But that right has limits which start to show when an anonymous speaker goes too far by venturing from the realm of protected speech into that of unprotected defamation.

An aggrieved party going after an unknown defamer must first figure out who the defendant is. This usually involves a subpoena to the operator of the service through which the offending content was transmitted, to the unknown John Doe’s internet service provider, or both. This use of compulsory judicial process to reveal the identity of an unknown speaker pits the speaker’s First Amendment right to anonymity against the defamation plaintiff’s right to seek redress for the tort that has been committed.

It is up to the courts to weigh the competing interests so that:

  • a defendant’s First Amendment right to anonymity is not violated by wrongful compelled disclosure in connection with an unmeritorious case; while
  • aggrieved subjects of harmful defamatory speech are not deprived of the remedies due to them in a civil society.

This weighing of competing interests illustrates why the scale is a good metaphor for justice.

The Brodie case

Plaintiff Brodie learned that certain participants in an online forum board were saying negative things about him. Three users identified as “CorsicaRiver,” “Born & Raised Here” and “chatdusoleil” engaged in an online public conversation about Brodie’s sale of an historic farmhouse. Two other users, who went by the monikers “RockyRaccoonMD” and “Suze” criticized the way Brodie ran the local Dunkin Donuts shop.

Brodie sued Independent Newspapers (the operator of the forum) and John Does CorsicaRiver, Born & Raised Here and chatdusoleil for defamation. Absent from the list of defendants were RockyRaccoonMD and Suze.

Independent Newspapers moved to dismiss, arguing, among other things, that it was immune from suit under 47 U.S.C. §230. It also moved to quash the subpoena Brodie had served, which sought the identities of CorsicaRiver, Born & Raised Here and chatdusoleil. The court dismissed Independent Newspapers from the case, but ordered it to identify those three pseudonymous posters.

Immediately thereafter, Independent Newspapers asked the court to reconsider its order directing that the pseudonymous speakers be identified. The court granted that motion and dismissed the portion of the case dealing with the discussion of the historic farmhouse. The claims relating to the Dunkin Donuts stayed in, and the court required Independent Newspapers to disclose information concerning that.

Notwithstanding the fact that the farmhouse defamation claims had been tossed, Brodie sent a subpoena to Independent Newspapers seeking the identity of CorsicaRiver, Born & Raised Here, chatdusoleil, RockyRaccoonMD and Suze. Brodie also conceded that the only posters responsible for discussions about the Dunkin Donuts were RockyRaccoonMD and Suze. Independent Newspapers filed another motion to quash this subpoena which the court denied.

The Maryland Court of Appeals granted certiorari to hear the case. (Here’s some trivia for you: in Maryland, the Court of Appeals is the highest court. For some reason they don’t call it the Supreme Court.) On review, the court reversed the denial of the motion to quash. It held that Brodie did not have a sufficient claim of defamation against any of the pseudonymous speakers to justify revealing their actual identities.

Which standard applied

The court gave thorough and comprehensive analysis on the question of when it is appropriate for a trial court to order that an unknown defendant be unmasked. It recognized the important interests that must be balanced, and observed that courts have applied various standards regarding what a plaintiff must show before discovery of an unknown speaker will be permitted.

For example, the Delaware Supreme Court in Doe v. Cahill put forth a rigorous requirement that in addition to providing notice of the discovery being sought, a plaintiff must come forward — at the pleading stage — with facts sufficient to survive a motion for summary judgment. Other courts, such as the U.S. District Court for the Northern District of California, have set the threshold lower. In Columbia Insurance Co. v. Seescandy.com, 185 F.R.D. 573 (N.D. Cal. 1999), the plaintiff was only required to plead facts sufficient to survive a motion to dismiss.

The New Jersey appellate court in Dendrite, Int’l. v. Doe took a more moderate approach. That court held that a plaintiff seeking the identification of an anonymous internet speaker must establish facts sufficient to maintain a prima facie case.

The Maryland court in the present case joined in the more moderate Dendrite approach, holding that when a trial court is confronted with a defamation action in which anonymous speakers or pseudonyms are involved, it should:

  • require the plaintiff to undertake efforts to notify the anonymous posters that they are the subject of a subpoena or application for an order of disclosure, including posting a message of notification of the identity discovery request on the message board;
  • withhold action to afford the anonymous posters a reasonable opportunity to file and serve opposition to the application;
  • require the plaintiff to identify and set forth the exact statements purportedly made by each anonymous poster, alleged to constitute actionable speech;
  • determine whether the complaint has set forth a prima facie defamation per se or per quod action against the anonymous posters; and
  • if all else is satisfied, balance the anonymous poster’s First Amendment right of free speech against the strength of the prima facie case of defamation presented by the plaintiff and the necessity for disclosure of the anonymous defendant’s identity, prior to ordering disclosure.

The Independent Newspapers case is an important case not necessarily because of any groundbreaking jurisprudence that it establishes, but because of the comprehensive way it treats the issue of unmasking unknown internet speakers. The opinion is a nearly exhaustive look at the current state of this question of law.

Anonymous photo courtesy Flickr user Neil Carey under this Creative Commons license.

Made in onto ABC World News Tonight

The Sheriff of Cook County (that means Chicago) has sued Craigslist claiming that the site is a public nuisance. [Here’s the Complaint. ABC News interviewed me this afternoon to get my comments on the case. I enjoyed talking about it for about 20 minutes on camera. As these things usually go, most of my flashes of insight comments ended up on the proverbial cutting room floor, but one complete sentence made it onto ABC World News tonight. Click here to see the segment.

Click for video
(Click for video)

Professor Goldman has this rundown of the case.

Clickwrap binding despite claim of no opportunity to read terms

Via Viente Taiwan, L.P. v. United Parcel Service, Inc., 2009 WL 398729 (E.D. Tex. February 17, 2009)

A federal court in Texas held the clickwrap agreement between United Parcel Service and one of its customers was binding. After plaintiff Via Viente sued UPS in Texas, UPS moved to transfer venue to the Northern District of Georgia, citing to a forum selection clause in a license agreement governing Via Viente’s use of a UPS-provided software program that allowed Via Viente to print labels and manage product shipments.

Via Viente argued that the clickwrap agreement (and by extension the forum selection clause) was not binding because a UPS technician installed the application on a Via Viente computer, and therefore Via Viente never had a chance to agree to the terms. The court rejected that argument for the following three reasons:

  • Via Viente was a sophisticated company and “should have been aware that terms of service were forthcoming” after having signed the general Carrier Agreement with UPS that required the use of the software;
  • It was “difficult to believe” that Via Viente would have left the UPS technician installing the software unsupervised. Moreover, it was not UPS’s practice to install the software unsupervised;
  • Via Viente had kept the benefit of the bargain (convenience and “palatable” shipping costs) so it would have been inequitable to allow it to disavow provisions it did not like.

After finding the clickwrap agreement to be binding, the court went on to find the forum selection clause enforceable, and transferred the matter to the Northern District of Georgia.

EULA photo courtesy Flickr user johntrainor under this Creative Commons license.

Open source software and the covenant-condition dichotomy

[Note: This is a short essay I have written in conjunction with an upcoming presentation I will give at John Marshall Law School here in Chicago next week. I invite your feedback in the comments to this post. For formatting purposes, footnotes (which are mainly to case citations) have been omitted.]

Some of the peculiarities of open source software, like the requirement of author attribution, create intriguing questions about how an open source license should be enforced in the event of its violation. Though software distributed under a “free” or open source model has existed in some form for more than a quarter century, only in the past couple of years have some of the basic questions concerning the import of terms in an open source license been litigated. The Federal Circuit’s recent decision in Jacobsen v. Katzer addressed the question of whether the owner of the copyright in software distributed under an open source license may successfully pursue a claim of infringement against a party using the software in violation of the license. Answering that question in the affirmative, the court relied upon the distinction between conditions and covenants in an open source license. This essay examines that distinction’s effect on how an open source license may be enforced.

The Framework for the Analysis: Breach or Infringement?

Because software licenses (both open source and proprietary) are in the nature of a contract, one must look to principles of contract law when examining how the licenses apply. Which cause of action will be appropriate for a violation of the terms of a license depends on the legal relations between the parties. Has the licensee committed copyright infringement by its violation of the license? Or is there merely an action for breach of contract? Since the remedies available for breach of contract versus copyright infringement can differ greatly (i.e., expectation damages versus potential statutory damages, costs and attorney’s fees plus injunctive relief), an evaluation of the right way to proceed is important.

The licensor of software generally waives its right to sue the licensee for copyright infringement. Stated another way, “a licensee cannot be liable for infringing the copyright rights conveyed to it.” For a licensee to have infringed the copyright in the licensor’s software, the licensee must exercise a copyright right not granted to the licensee. We characterize this kind of use as being outside the scope of a license.

Covenants and Conditions in Software Licenses

The authority to exercise the copyright rights in software (like the right to distribute the source code and make derivate works), is established in the licensee through the operation of the license. The grant of authority is an “operative fact,” one that changes the legal relations of the parties. Drawing a familiar term from the lexicon of contract law, the authority for another to use software is a condition precedent – the operative fact that must exist prior to the existence of the legal relation of licensor and valid licensee. If this condition is not satisfied, the licensee’s authority to use the software is not there. Use of the software by another party in the absence of this authority will be an exercise of a right not granted, and, as already noted, a use of the software outside the scope of a license.

Covenants (also known as promises) in a license agreement can also affect the legal relations of the parties. Covenants are quite different from conditions precedent, however, because they refer to an intention related to a future event, not to an operative fact that must be present for authorization to exist. In the software licensing context, a covenant does not affect the authorization of the licensee to exercise the copyright rights in the software. In other words, a covenant in a software license does not define or alter the scope of the authorization.

So if a licensee merely violates a covenant of the software license agreement, the use is still within the scope of the license, and the licensor merely has a cause of action for breach of contract. But if the violation is a failure to satisfy a condition of the license, the use of the software is outside the scope (i.e., is the exercise of a right not granted). Under copyright law, exercise of rights without authorization is called infringement.

Appropriate Causes of Action in the Open Source Context

In a certain sense, the entire legitimacy of the open source model depends on the ability to successfully pursue an action for infringement of copyright. Since most open source software is distributed without the requirement for payment of a fee, a licensor would, for all practical purposes, be left remediless against unauthorized use of the software if the only avenue for recovery were for breach of contract. The appropriate measure of damages would be the amount of licensing fees that would have been collected. In the case of software distributed free of charge, that amount would be zero – not a strong deterrent to unauthorized use.

So for there to be any practical effect on how the source code is actually used, modified and distributed, the violator of an open source license must suffer liability for copyright infringement. This cause of action provides a much more robust (and therefore meaningful) set of remedies, including injunctive relief.

The Jacobsen v. Katzer Decision

Plaintiff Jacobsen wrote some software and made it available under an open source license known as the Artistic License. This open source license granted broad rights to members of the general public to do certain things with the software, including the right to distribute and create derivative works from the software and to use the software in a commercial product, provided that the licensee attribute the original creators.

Jacobsen sued defendant Katzer for copyright infringement, claiming that without permission or consent, Katzer copied the software into a commercial application without attributing the original creators. The district court denied Jacobsen’s motion for injunctive relief, finding that the terms allegedly violated were merely covenants and not conditions. The district court found the scope of the Artistic License to be “intentionally broad,” and that the requirement to insert a prominent notice of attribution did not affect the scope of the license. Therefore, the only viable cause of action was for breach of contract (for which injunctive relief was not appropriate).

Jacobsen sought review with the Federal Circuit. On appeal, the court vacated and remanded, holding that the Artistic License’s terms created conditions which Katzer failed to satisfy. The appellate court found that the license established conditions through the use of the term “provided that.” Further, the appellate court found that the district court’s interpretation did not credit the explicit restrictions found in the license that governed the right to modify and distribute the software. These restrictions successfully defined the scope of the license, and modification and distribution inconsistent with the requirements was unauthorized and therefore outside the scope. Such out-of-scope usage supported a claim for copyright infringement.

Reconciling Jacobsen

The Federal Circuit opinion in Jacobsen contains extensive praise of the open source model, noting that it “serves to advance the arts and sciences in a manner and at a pace that few could have imagined just a few decades ago.” The court went on to observe that through the collaboration inherent in open source software development, “software programs can often be written and debugged faster and at lower cost than if the copyright holder were required to do all the work independently.” One is tempted to speculate whether such a positive attitude to the concept of open source influenced the court’s decision, because there is other authority to support the proposition that an obligation to attribute does not define the scope of a license.

In Graham v. James, the Second Circuit held that the removal of a copyright notice (essentially a failure to attribute) was merely a breach of covenant and therefore did not support a claim for copyright infringement. It is difficult to ascertain how the licensor in Graham would have, in reality, viewed the use of his software without a copyright notice as being authorized (and therefore within the scope of the license). Perhaps the most plausible explanation for the contrary holding in Graham was the absence of a written agreement, and a presumption arising under New York law that the parties intend a covenant and not a condition.

Conclusion

The distinction between conditions and covenants is difficult to perceive. So much can depend on draftsmanship, as one can easily articulate the same set of circumstances to be rendered as a covenant, then a condition. The Artistic License in Jacobsen contained the magic “provided that” language. And it is a good thing it did, for the continued hope in the open source philosophy depended on the court deciding the way it did.

Retrospective: Graham v. James

I’m speaking about open source at John Marshall Law School’s 53rd Annual Intellectual Property Law Conference on February 27. More info here (warning – PDF!).

To prepare, I’m going over some important cases dealing with copyright licensing in general, that is, cases that deal with copyright licensing but not open source. In case you’re interested, here’s a writeup I just did of the classic case of Graham v. James, 144 F.3d 229 (2d Cir. 1998):

Graham contracted with James for James to develop a custom file retrieval program for use in connection with a CD-ROM compilation that Graham published. The two had an oral agreement whereby Graham would pay $1,000 to James for each new version of the CD-ROM, plus $1 for each disc sold.

After Graham and James had a falling out, Graham continued to use the program James wrote in subsequent versions of the CD-ROM. Graham had removed a copyright notice from the program’s source code, and did not pay the promised royalties. The two ended up in litigation against each other with James accusing Graham of infringing the copyright in the program.

After a bench trial, the lower court found in favor of James on the copyright infringement claim. Graham sought review with the Second Circuit. On appeal, the court vacated the judgment and remanded.

There was no dispute that a license agreement had been formed. Graham argued that at best, James could recover for breach of contract for the removal of the copyright notice and the failure to pay royalties, but not copyright infringement. James presented a number of arguments in an attempt to show there was no license that authorized the use.

One argument that James made was that Graham breached the conditions of the license agreement (and thereby used the program outside the scope of the license) by removing the copyright notice and failing to pay royalties. The court rejected this argument, holding that such activities were mere breaches of contractual covenants between the parties and not a failure to satisfy conditions of the license agreement.

Citing to Nimmer, the court easily held that one does not have a cause of action for infringement when one fails to attribute the author. So there was no infringement resulting from that.

Under the circumstances, the nonpayment of royalties was not the failure of a condition for authorized use. Under New York law, there is a presumption that terms of a contract are covenants and not conditions. In this case, James turned over the program for use before any royalties were paid. Contract obligations that are to be performed after partial performance are not treated as conditions, but as promises (i.e., covenants).

Another argument James made (which the court also rejected) was that assuming, arguendo, the nonpayment of royalties and the failure to attribute were breaches of covenants and not failures to satisfy a condition of the license, the breach of the covenant was so material that the contract was terminated by rescission.

But rescission does not happen automatically upon a substantial breach. The nonbreaching party must “manifest his intention to rescind within a reasonable time.” In this case, the record did not show that James rescinded the license to Graham.

Since James failed to show the absence of a licensing agreement or a failure to satisfy a condition of the agreement, the court vacated the copyright infringement judgment.

Scroll to top