Court allows U.S. lawsuit over video posted on Mexican website

Rapper 50 Cent’s Lanham Act claim against Cancun night club survives motion to dismiss

Jackson v. Grupo Industrial Hotelero, S.A., No. 07-22046, 2008 WL 4648999 (S.D. Fla. October 20, 2008)

Defendant owns Coco Bongo, a popular Cancun nightclub. Coco Bongo allegedly used rapper 50 Cent‘s likeness as well as one of his registered trademarks in some Spring Break 2007 video advertisements posted to the web. 50 Cent sued under the Lanham Act in federal court here in the United States alleging trademark infringement as false designation of origin.

Coco Bongo moved to dismiss, arguing a lack of subject matter jurisdiction. It contended that the alleged acts occurred outside of the United States, thus an extraterritorial application of the Lanham Act would violate Supreme Court and Eleventh Circuit authority. The court denied the motion.

The fact that the offending advertisements were on the web was key to the court’s finding that the court had subject matter jurisdiction. 50 Cent was seeking enforcement of his United States trademark rights in the United States. Although the Coco Bongo website was located in Mexico, and even though the website and its advertisements might be viewable by numerous other countries, it was the availability of the allegedly infringing advertisement within the United States that gave rise to an alleged violation of the Lanham Act.

See also Rogers v. Wright for analysis of the extraterritorial application of the Lanham Act.

Expedited electronic discovery includes subpoena to ISP and imaging of defendants’ hard drives

Allcare Dental Management, LLC v. Zrinyi, No. 08-407, 2008 WL 4649131 (D. Idaho October 20, 2008)

Plaintiffs filed a defamation lawsuit against some known defendants as well as some anonymous John Doe defendants in federal court over statements posted to Complaintsboard.com. The plaintiffs did not know the names or contact information of the Doe defendants, so they needed to get that information from the Does’ Internet service provider.  But the ISP would not turn that information over without a subpoena because of the restrictions of the Cable Communications Policy Act, 47 U.S.C. § 501 et seq. [More on the CCPA.]

Under Federal Rule of Civil Procedure 26(d)(1), a party generally may not seek discovery in a case until the parties have had a Rule 26(f) conference to discuss such things as discovery. Because of the Rule 26(d)(1) requirement, the plaintiffs found themselves in a catch-22 of sorts: how could they know with whom to have the Rule 26(f) conference if they did not know the defendants’ identity.

So the plaintiffs’ filed a motion with the court to allow a subpoena to issue to the ISP prior to the Rule 26(f) conference. Finding that there was good cause for the expedited discovery, the court granted the motion. It found that the subpoena was needed to ascertain the identities of the unknown defendants. [More on Doe subpoenas.] Furthermore, it was important to act sooner than later, because ISPs retain data for only a limited time.

The Plaintiffs also contended that that the known defendants would likely delete relevant information from their computer hard drives before the parties could engage in the ordinary process of discovery. So the plaintiffs’ motion also sought an order requiring the known defendants to turn over their computers to have their hard drives copied.

The court granted this part of the motion as well, ordering the known defendants to turn their computers over to the plaintiffs’ retained forensics professional immediately. The forensics professional was to make the copies of the hard drives and place those copies with the court clerk, not to be accessed or reviewed until stipulation of the parties or further order from the court.

No damage under Computer Fraud and Abuse Act for merely copying customer list

Sam’s Wines & Liquors, Inc. v. Hartig, 2008 WL 4394962 (N.D.Ill. September 24, 2008)

Hartig worked for Sam’s Wines & Liquors and had access to a password-protected customer list. Hartig left Sam’s in June 2005 and went to work for Plinio Group. Some two and a half years after leaving Sam’s, Hartig sent an email to customers appearing on Sam’s list, soliciting business for Plinio.

Sam’s claimed that Hartig used his password to access and copy the customer list prior to the time he resigned. So Sam’s sued Hartig for a number of things, including violation of the Computer Fraud and Abuse Act (CFAA), 18 U.S.C. 1030 et seq. Hartig moved to dismiss the CFAA claim under Rule 12(b)(6) for failure to state a claim upon which relief can be granted. The court granted the motion.

Hartig put forth three arguments why the CFAA claim should be thrown out. First, he argued that Sam’s had not and could not adequately allege that Hartig accessed a protected computer without authorization, or that he exceeded his authorized access. Second, he argued that Sam’s had not and could not allege that it suffered “damage” under the CFAA from Hartig’s conduct. Finally, he argued that Sam’s had not and could not allege that it suffered “loss” under the CFAA from Hartig’s conduct.

The court held that Sam’s adequately pled unauthorized access to a protected computer (applying the agency principles Judge Posner set forth in Intl. Airport Centers v. Citrin, 440 F.3d 418 (7th Cir. 2006)). It also held that the expenses Sam’s incurred in responding to Hartig’s alleged conduct were properly pled as “loss” under the CFAA. But the claim failed on the damage element: merely accessing the information and allegedly using it while working for a competitor was not “impairment to the integrity or availability of data, a program, a system, or information.”

See Garelli Wong & Assoc., Inc. v. Nichols, 551 F.Supp.2d 704 (N.D.Ill. 2008) for a similar analysis.

Divorce spyware case moves forward

Court refuses to dismiss ECPA, SCA and CFAA claims against ex-spouse accused of delivering malicious code.

Becker v. Toca, No. 07-7202, 2008 WL 4443050 (E.D. La. September 26, 2008)

Plaintiff Becker sued his ex-wife, one Ms. Toca, claiming that Toca installed on Becker’s home and office computers a Trojan Horse that could steal passwords and send them to a remote computer. Becker claimed violations of the Electronic Communications Privacy Act (ECPA), the Stored Communications Act (SCA), the Computer Fraud and Abuse Act (CFAA), and Louisiana’s Electronic Surveillance Act.

Toca moved to dismiss for failure to state a claim upon which relief can be granted. The court dismissed the Louisiana state claim, but allowed the federal claims under the ECPA, SCA and CFAA to move forward.

In denying Toca’s motion on the ECPA claim, the court nodded to the general consensus established by cases such as Steve Jackson Games, Inc. v. United States Secret Service, 36 F.3d 457 (5th Cir. 1994), United States v. Seiger, 318 F.3d 1039, 1047 (11th Cir. 2003), Konop v. Hawaiian Airlines, Inc., 302 F.3d 868 (9th Cir.2001), and Bailey v. Bailey, 2008 WL 324156 (E.D. Mich. 2008) that ECPA liability requires the electronic communication to be intercepted contemporaneously with its transmission. Toca had argued that merely sending the Trojan Horse could not be considered an “interception” of an “electronic communication” under the ECPA. But the court held that allegations of stealing the passwords and transmitting them elsewhere, in conjunction with Becker’s computers being connected to the Internet, made it “reasonable … to infer that the Trojan Horse program may have collected information contemporaneous to its transmission.”

As for the SCA claim, Toca had argued Becker’s allegedly infected computers were not “a facility through which an electronic communication service is provided,” and thus not within the protection of the SCA. The court declined to dismiss the claim at the pleading stage because it was unclear to what extent the Trojan Horse may have accessed or retrieved information stored with an electronic communication service provider.

The court denied the motion to dismiss the CFAA claim, rejecting Toca’s arguments that the affected computers were not “protected” computers under the CFAA, and that the allegations were insufficient to show Toca intended to cause “damage.” The allegations that the Trojan Horse caused error messages and slow processing were sufficient on this point. Toca argued that an intent to damage the computers would be incompatible with a desire to retrieve information from them. But the court rejected this all-or-nothing damage approach.

The Louisiana statute claim failed simply because the court held that the statute covered only wire and oral communications, leaving electronic communications of the type at issue within the case outside its scope.

No injunction against transferring student over violent YouTube video

O.Z. v. Board of Trustees of Long Beach Unified School Dist., 2008 WL 4396895 (C.D. Cal. Sept. 9, 2008)

While school was out of session for spring break, seventh grader O.Z. collaborated with a classmate to make a slide show video dramatizing the murder of the students’ English teacher. Though O.Z. says she did not intend to share the slide show to anyone outside her home, she posted the video to YouTube. A couple months later, while doing a vanity search on YouTube, the English teacher encountered the video. Naturally distressed by the work, the teacher notified school authorities. Administrators suspended O.Z. and transferred her to a different school for her eighth grade year.

O.Z. filed suit and sought a preliminary injunction requiring the school district to re-enroll her at her former school. She argued that the slide show was protected speech under the First Amendment, and that the school’s discipline for it was unconstitutional. The court denied the motion for preliminary injunction.

In evaluating the likelihood of O.Z.’s success on her First Amendment claim, the court applied the standard set forth in Tinker v. Des Moines Ind. Comm. School Dist., 393 U.S. 503 (1969). The Tinker test provides that discipline over student speech is appropriate if school officials reasonably conclude that the speech will “materially and substantially disrupt the work and discipline of the school.”

O.Z. argued that the slide show was merely a joke and not a true threat. But the court found that the school could reasonably forecast substantial disruption of school activities given the violent language and unusual photos comprising the video slide show. Further, the decision to transfer O.Z. served not only to discipline her, but to protect the safety of the teacher.

The fact that O.Z. created the slide show outside of school was of little import in the circumstances. Comparing the present situation with Wisniewski v. Board of Educ. of Weedsport Cent. School Dist., 494 F.3d 34 (2nd Cir. 2007) and other cases involving off-campus conduct, the court found that the slide show created a foreseeable risk of disruption within the school. Such a finding was no doubt influenced by the ability of social media platforms like YouTube to facilitate wide distribution of content.

Court enjoins transfer of trademarks associated with domain name booty

1st Technology v. Bodog Entertainment Group, S.A., No. 08-0872, (W.D. Wash. September 30, 2008).

After plaintiff 1st Technology won a $46 million default judgment against defendant BEGSA, 1st Technology began its collection efforts by seeking to obtain possession of thousands of BEGSA domain names registered through the Washington-state based registrar eNom. A state court ordered the domain names transferred to a receiver, but the judge, unsure of the degree of the state court’s jurisdiction, did not transfer the ownership of the corresponding federally-registered trademarks associated with the domain names.

Thereafter, BEGSA purported to assign the trademarks to various subsidiaries and related entities. 1st Technology filed a federal lawsuit against BEGSA and these other entities, asking the court to set aside the later transfers as fraudulent conveyances. 1st Technology sought a preliminary injunction to prevent further transfer of the trademarks, and to prevent defendants from using the trademarks in connection with online gambling.

The court granted the motion inasmuch as it sought prevention of further transfer. But it denied the motion as to the use in connection with online gambling.

BEGSA argued, among other things, that the court could not order the forced sale of the trademarks and their goodwill, and that federal trademark law preempted the state fraudulent conveyance law under which 1st Technology sought relief. The court rejected both of these arguments, citing to Seventh Circuit authority providing that the “assertion that a trademark is not subject to an involuntary judicial sale is incorrect.” Adams Apple Distrib. Co. v. Papeleras Reunidas, S.A., 773 F.2d 925, 931 (7th Cir. 1985). On the preemption question, the court noted the absence of any authority cited by BEGSA providing for preemption, and looked to the language of 15 U.S.C. §1119, which gives the court broad authority to affect the federal trademark register.

In denying injunctive relief against the use of the trademarks in connection with online gambling, the court concluded that at such an early stage in the litigation, it was not prepared to distinguish which conduct on the part of the defendants was illegal or legal. Of significant importance was the likelihood of harm to both parties if the trademarks could not be used in the way they traditionally had (that is, for online gambling). Defendants argued that “disjoining the marks from their most commonly known use hopelessly dilutes them and destroys their value – to anyone.”

Interactive websites supported exercise of personal jurisdiction

Plaintiff sued a California corporation in federal court in Utah. Defendant moved to dismiss, asserting, among other things, lack of personal jurisdiction. The court denied the motion.

The court found that it had specific personal jurisdiction over defendant. Plaintiff provided evidence that defendant ran a number of highly interactive websites, including at least two online stores. Defendant provided visitors with a shopping cart feature that allowed them to select multiple products for purchase. Visitors to defendants’ sites could purchase items over the website using Google checkout or a number of major credit cards. Defendant offered to sell products into Utah through its multiple internet stores. In short, defendant purposefully used its website to reach a large number of potential buyers, including those in Utah, and benefited from that exposure.

Citing to Dedvukaj v. Maloney, 447 F.Supp.2d 813 (E.D.Mich. 2006), the court observed that “[s]ellers cannot expect to avail themselves of the benefits of the internet-created world market that they purposefully exploit and profit from without accepting the concomitant legal responsibilities that such an expanded market may bring with it.”

A.L. Enterprises Inc. v. Sebron, 2008 WL 4356958 (D. Utah, September 17, 2008) 

 

Subpoena to university in P2P case must give time to notify parents

UMG Recordings, Inc. v. Doe, No. 08-3999, 2008 WL 4104207 (N.D.Cal. September 4, 2008)

Plaintiff record companies, using Media Sentry, found the IP address of a John Doe file-sharing defendant, and filed suit against Doe in federal court for copyright infringement. As in any case where a defendant is known only by his or her IP address, the record companies needed some discovery to ascertain the name and physical address matching that IP address. But the federal rules of procedure say that without a court order, a party cannot seek discovery until the parties have conferred pursuant to Fed. R. Civ. P. 26(f).

So the record companies sought the court order allowing them to issue a subpoena to Doe’s Internet service provider prior to the 26(f) conference. The court granted the order, but with a caveat.

The evidence showed that Doe was a student at the University of California, Santa Cruz. Under the Family Educational Rights and Privacy Act at 20 U.S.C. § 1232g, a college generally cannot disclose “any personally identifiable information in education records other than directory information.” There’s an exception to that rule when the college is answering a lawfully issued subpoena, provided that “parents and the students are notified of all such … subpoenas in advance of the compliance therewith by the educational institution or agency.”

The court granted the record companies’ motion for leave to serve the subpoena prior to the Rule 26(f) conference, but required that the subpoena’s return date “be reasonably calculated to permit the University to notify John Doe and John Doe’s parents if it chooses prior to responding to the subpoena.”

No CDA immunity for letting co-defendant use computer to post material

Capital Corp. Merchant Banking, Inc. v. Corporate Colocation, Inc., No. 07-1626, 2008 WL 4058014 (M.D.Fla., August 27, 2008)

Professor Goldman points us to a recent decision in a case where the plaintiff alleged that one of the individual defendants “allowed [a co-defendant] to use ‘a computer registered in her name’ to make . . . defamatory statements.” The defendants filed a 12(b)(6) motion to dismiss, arguing that the Communications Decency Act (CDA) at 47 U.S.C. 230 barred the claims. The court denied the motion.

With little analysis, the court cited to the 9th Circuit’s Roommates.com decision, holding that “[t]he CDA provides immunity for the removal of content, not the creation of the content.” While that is not an incorrect statement, it is troublesome in this context inasmuch as it tells half the story.

Yes, 47 U.S.C. 230(c) does provide protection to “Good Samaritan” operators of interactive computer services who remove offensive content. The user whose content has been removed would not have a cause of action against the operator who took down the content in good faith. See 47 U.S.C. 230(c)(2).

But 47 U.S.C. 230(c)(1) provides that no provider of an interactive computer service shall be treated as a publisher or speaker of any information provided by a third party. Courts have usually held that when a defamation plaintiff brings a claim against the operator of the computer service used to post defamatory content (who was not responsible for creating the content), such a claim is barred, as the plaintiff would not be able to satisfy the publication element of a defamation prima facie case.

Maybe in this situation the court found that the defendant who let a co-defendant use her computer did not meet the definition of a service provider as contemplated by the CDA. But it would have been nice to see that analysis written down, rather than having to merely surmise or speculate.

Scroll to top