Skip to content


Brett Trout Designated Des Moines Patent Law “Lawyer of the Year”

Five Years Running
For the fifth year in a row, Brett J. Trout has been selected by his peers for inclusion in the annual edition of The Best Lawyers in America®. For 2014, Mr. Trout has been selected for inclusion in the area of Patent Law (Tier 2). The Best Lawyers in America® publication is the oldest peer-reviewed publication in the legal profession. Since 1983, Best Lawyers® continues to be regarded, by both professionals and the public, as the definitive guide to legal excellence in the United States.

Lawyer of the Year
For 2014, The Best Lawyers in America® has also designated Brett J. Trout Lawyer of the Year. Only one lawyer in each practice area and geographic area is honored as the “Lawyer of the Year.” The “Lawyer of the Year” designation reflects the abilities, professionalism, and integrity of the lawyer as judged by their peers. Each “Lawyer of the Year” is selected based upon exhaustive peer-review assessments conducted with thousands of leading lawyers each year.

The Best Lawyers in America
The 2014 Best Lawyers in America® publication covers the largest and most targeted audience of any legal profession peer-review listing. Excerpts from the Best Lawyers® publication appear in The Washington Post, The Los Angeles Times, New York Magazine, and more than dozens of other regional publications, reaching more than 18 million readers. Best Lawyers selection process is based upon exhaustive and rigorous peer-review surveys. Over four million confidential evaluations by leading legal professionals are considered in the process. The American Lawyer and Corporate Counsel magazine describes The Best Lawyers in America® as “the most respected referral list of attorneys in practice.”

Disclaimer
“The fact that a lawyer has been voted by his or her peers into Best Lawyers in a legal practice area does not signify that the lawyer has been certified by a state board of legal specialization in that practice area or specialty. A listing in Best Lawyers does not guarantee a desired legal result.” – Best Lawyers

Posted in Patent Law. Tagged with , .

The Right of Publicity

Hey, That’s Me!
You spend months working on your cosplay outfit, and it turns out perfect. You are the hit of the con, with everyone taking your picture. Then, all of a sudden, you see you and your outfit on all kinds of merchandise, ranging from coffee mugs to posters. Is that legal? What can you do?

The Right of Publicity
Unlike constitutionally protected rights, like the freedom of speech, the right of publicity is a hodge-podge of state and common laws. To be sure what is and what is not allowed under the right of publicity, it is important to check the laws of the state in which the use is occurring. Even though these laws differ from state to state, some general guidelines do emerge. The following is an amalgamation of various state laws:

Background on The Right of Publicity
The right of publicity is what prevents a company from using a photograph of someone in its advertisements without obtaining proper consent. The relatively new right of publicity has developed over the past one hundred years from the much older right of privacy. Not long after its initial recognition, the right of publicity developed into a separate interest, quite different from the old English common-law right of privacy. The right of publicity protects the commercial interest in one’s persona, name, and likeness and, in some jurisdictions, one’s nickname, voice, mannerisms, characterizations, and performing style. In 1903, the State of New York enacted a statute providing criminal and civil penalties for unauthorized use of the name, portrait, or picture of any living person for advertising or purposes of trade. The right was not identified as the right of publicity, however, until 1953 in Haelan Laboratories, Inc. v. Topps Chewing Gum, Inc.

Twenty-eight states have some form of protection for the right of publicity. Eighteen states have actual statutes protecting this right. The remaining ten states rely on common law, which is often broader and more comprehensive than most right of publicity statutes. Throughout the country, the duration of the right of publicity varies widely from state to state. The duration can be as short as the life of the individual or as long as commercial exploitation of the persona continues.

Types of Protection
Curiously, although the right of publicity began by extending the right of privacy to cover unauthorized use of a persona in advertising, the right now relates primarily to celebrities interested in promoting the “right” kind of publicity. Right of publicity laws have developed in conjunction with this country’s development of “celebrities” themselves, changing to accommodate the interests of these particular individuals. The key to any cause of action for right of publicity is whether the usage is identifiable by the public with the particular individual. Use of a celebrity’s voice, dance moves, or even fighting style may violate a celebrity’s right of publicity if the public identifies the appropriated usage with the celebrity.

It is not necessary to be a celebrity to assert the right of publicity. However, given the lower desirability of misappropriating a non-celebrity likeness, the higher likelihood of a non-celebrity noticing or even caring about the usage and the lower damages involved, non-celebrity misappropriations of likeness, while being no less violations of the right of publicity, often fly under the radar. Throughout the country, even if the unauthorized usage of a persona is not actionable under the right of publicity laws, these other causes of action may be available:

Implied endorsement
Trademark Laws
State Dilution Laws
Copyright Laws

Defenses
The primary defense to a claim of right of publicity is that the usage was non-commercial. The idea of financial vacuity, or that the party using the image is not making money from the image, etc., is particularly important on the Internet where most individuals setting up “fan” sites obtain no pecuniary benefit. To avoid liability, a defendant can also claim that the usage was for critical commentary or that the material was used in association with news reporting. To reduce or avoid liability, a defendant can claim that the usage was merely media promoting itself (use in advertising of actual front-page tabloid bearing plaintiff’s likeness), social commentary, or a parody of the individual. A blog post about a celebrity’s recent drunken escapades would likely be able to use the celebrity’s image in association with the post under a claim that the newsworthiness of the story and the use of the blog as a media outlet overrides the celebrity’s right of publicity.

Damages
The most common relief sought in a cause of action for right of publicity is injunctive relief. In addition, a plaintiff may collect the estimated value of an appropriate licensing agreement for the alleged usage, damages for deceptive marketing, and injury to emotion or reputation.

Transfer
Unlike trademarks, the right of publicity can be licensed or assigned “in gross” without the necessity of transferring business goodwill. Because goodwill is not a necessary component of assigning publicity, the right of publicity is also very different from the right of privacy, which cannot be assigned at all. When licensing or assigning a right of publicity, the grantor should reserve all rights not otherwise granted. Conversely, the recipient should attempt to obtain a future technologies clause. Such a clause would include authorization to use the likeness by any means, methods, and technologies now known or which become known.

The Right of Publicity Online
In the past, right of publicity cases have typically centered on using a person’s exact name or actual photograph. With the advent of sophisticated software, however, the image of an individual can be modified across a continuum from an easily recognizable form to one identifiable as a completely separate individual. Accordingly, it is difficult to determine at what point along the continuum usage would not constitute a violation of the individual’s right of publicity.

In Pesina v. Midway Mfg. Co., the plaintiff was used as a model for a video game character. The video game manufacturer then used the video game character in a subsequent video game without plaintiff’s permission. The case involved a martial arts game in which the plaintiff’s moves were computerized and associated with a video game character. The court dismissed the plaintiff on summary judgment. The court stated that there was no violation of plaintiff’s right of publicity, because plaintiff could not show his identity had become inextricably intertwined in the public mind with the video game character.

Michaels v. Internet Entertainment Group, Inc., involved a private videotape made by Pamela Anderson Lee and her then boyfriend, Bret Michaels. The rather blue videotape fell into the hands of the defendant, and the defendant intended to disseminate the videotape on the Internet. The court granted an injunction against the defendant’s distribution of the material, finding a likelihood of success on the merits. Courts will typically prevent any such unmitigated commercial distribution of a celebrity’s likeness outside of a news format.

Michaels v. Internet Entertainment Group, Inc., involved the same videotape. This case, however, also involved a tabloid television show as the defendant. The court balanced the plaintiff’s right of publicity against the television show’s First Amendment rights and rights under California Civil Code Section 3344(d). The court held that as the love lives of stars were indeed newsworthy and that the news organization’s right to air the material outweighed the plaintiff’s right of publicity. The court denied the injunction against the television show. The difference between this case and the last is the great deference courts show news organizations under the First Amendment. The court’s protection of news sources is an important consideration to take into account when deciding how a court might come out on a right of publicity issue, which may, at some point, involve your company.

In Astaire v. Best Film & Video Corp., the court held that inclusion of Fred Astaire‘s likeness on video tapes for Fred Astaire Dance Studios was not a violation of the plaintiff’s right of publicity in the deceased. Under California Civil Code Section 990(n), unauthorized use of a deceased personality’s name, voice, signature, photograph, or likeness is exempted from liability if such use is in a play, book, magazine, newspaper, musical composition, film, radio, or television program. The court held that the statute should obviously be extended to include videotapes, such as those distributed by the defendant.

Several actresses, including Carmen Electra, Alyssa Milano, Ami Dolenz, and Patricia Kotero (Apollonia), have pursued claims against various Internet hosts of pornographic sites displaying images of the actresses’ likenesses. At least one of these suits has resulted in a $238,000 judgment against a website owner. Several of the suits have settled under confidential terms. The right of publicity involves not only the questions of degree, commercial use, and newsworthiness, but the potential damage to the rightholder as well.

Due to the sheer size of the Internet, monitoring the Internet for right of publicity violations is difficult if not impossible. Monitoring is especially difficult if the violator is intent on limiting access to the material or disguising the material to avoid detection. An additional obstacle is that a SYSOP may not be liable for third party postings of which the SYSOP was not aware. Using the analogy to defamation, it is unlikely that SYSOPs would be liable for postings by other users. Therefore, SYSOPs have little incentive to police their users’ postings that may include a violation of publicity.

An additional problem is that many of the Internet postings of personas come about when individuals post them on their non-commercial sites. In these situations, the right of publicity would not be useful in attempting to enjoin such activity. A commercial or defamatory component must be proven to engender legal action.

One last problem is the absence of any uniform law governing the right of publicity. Because the Internet is accessible in every state, plaintiffs likely will be forum shopping into states granting the broadest protection. Clearly, uniform laws are needed to clarify the issues and address these special concerns unique to Cyberspace.

A Single Keystroke
Never before has such widespread dissemination of information been so simple and so inexpensive. Prior to the Internet, such dissemination could only be supported by a large commercial enterprise. The Internet has now made large-scale, non-commercial dissemination feasible. Although the right of publicity may be expanded in the future to restrict the non-commercial sharing of an individual’s likeness and persona, it is much more likely that celebrities will have to continue suffering the boundless royalty-free proliferation of their persona at the hands of their adoring, and not-so-adoring, fans.

A single keystroke can lead to a right of publicity and/or defamation lawsuit costing your company hundreds of thousands of dollars in lost time and money. Every company should consider putting preventative policies down in writing. Distributing these written policies to your employees will not only reduce the likelihood of your company ever being hauled into court for defamation or right of publicity violations, but may also reduce your liability and damages in the event such an unfortunate event actually occurs.

HT: Derek Mahr
Brett Trout

Posted in Internet Law, Iowa Law, social media, Trademark Law. Tagged with .

What is the Difference Between ™, ®, and ©?

You see these symbols every day, but what do they mean? Here is a handy guide to help you understand the difference between ™, ®, and ©.


™ stand for “trademark.” When you see a ™ next to a word, it means that whoever put the ™ there is claiming they own the exclusive right to use that word in association with the good or service they are offering. They are claiming that word as their trademark. A trademark can be a word, logo, etc. that shows a good or service came from a particular source. You only obtain trademark rights by offering a good or service in commerce under the trademark. Once you offer a good or service in commerce under the trademark, you have common law trademark rights that extend to the boundaries of your sales market.

Apple is a trademark. Any computer related items with the Apple name or Apple logo either come from Apple, or from someone paying Apple a license fee to use the Apple trademark. But the Apple trademark only applies to specific goods and services. Apple cannot prevent you from using the word “apple” to sell apples. As applied to apples, “apple” is a generic term and, therefore, not protectable as a trademark on apples.

Using the ™ does not require any kind of registration. Therefore, you will sometimes see ™ used on words the “owner” would never be able to prove are actual trademarks. Usually ™ means the owner is unable, for cost or legal reasons, to register the trademark. But it could instead mean the owner is merely using the ™ until their federal trademark registration issues.

®
The use of ® indicates that the trademark is registered with the United States Patent and Trademark Office (USPTO). It means that the USPTO has examined the trademark, and determined that the trademark is valid and unlikely to cause confusion with other trademarks. For any trademark with a ®, you should be able to go to uspto.gov, search the trademark, and see what goods and/or services the trademark covers. The real advantage of the registration is that it automatically covers the entire United States, and provides for attorney fees and triple damages if an infringer willfully infringes the registered trademark.

Apple is an example of a trademark that is also a registered trademark. If your trademark is valuable and protectable, you want to register it with the USPTO, and use the ® to warn potential infringers to stay away. The ® serves as a warning to others that you have the resources to register your trademark, and will likely sue them for triple damages and attorney fees if they willfully infringe your registered trademark.

©
Use of the © indicates that the user is claiming copyright in the material to which the © is applied. You usually see the © along with the year of first publication, and the name of the copyright proprietor i.e.(© 2013 Brett J. Trout). Copyright protects original works of authorship, like books, plays, software, sculpture, etc. But copyright only protects the artistic elements of those works, not the functional elements. If you come up with a new invention that holds your eyeglasses and is shaped like a fish, copyright only protects the shaped like a fish aspect. You would need a patent to protect the functional nature of your new eyeglass stand.

As soon as you write something original down, or store it on a computer, or record it on video, you have a copyright in the artistic, or “aesthetic,” aspect of that work. Unlike trademarks, you do not have to offer something for sale to own a copyright on it. You do not have to register your copyright to own the copyright or use the ©. If you are a U.S. citizen however, you do have to register your copyright with the U.S. Copyright Office, if you ever want to sue anyone for infringing your copyright. Odds are, you hold the copyright to thousands of works, and did not even know it.

Brett Trout

Posted in Copyright Law, Trademark Law.

Frequently Asked Questions About Patents

What is a patent?

A patent is a legal document. It defines the scope of your invention. A patent allows you to prevent others from making, using or selling your invention without paying you. You can see what a patent looks like here.

Is everything patentable?

No. You cannot get a patent on ideas, obvious combinations of pre-existing devices, illegal or immoral matter, pure research, or anything that is simply a novelty or curiosity. You can get a patent on new and useful processes, machines, manufactures, or compositions of matter, as well as any new and useful improvement thereof.

Are all patents valuable?

Just like the inventions they protect, some patents are valuable, and some are not. A patent is like a safe, in which you keep your valuables. There are good safes and bad safes. A patent does not make an invention better. A patent does not even mean that an invention has any value at all. A patent merely increases the value of a valuable invention, by giving you a monopoly on sales of the invention, allowing you to charge a higher price. If the invention does not sell, a patent is not going to help.

Should I get a patent on my invention?

The real question is will the invention sell. If it will, a patent can be very valuable. By keeping others out of the market, you can use a patent to make large profits on the sale of your invention, or negotiate with a third party to pay you royalties on every sale. If the invention is novel and lots of people are willing to pay a premium over the manufacturing costs to get it, you probably need a patent.

How long does a patent last?

While patents formerly remained in force for 17 years from the date of their issuance, patents now expire 20 years from the date of their filing. Bear in mind that a patent does not allow you to actually make your invention, only to prevent others from making, using, or selling your invention.

What is in a patent?

Examples of patents can be found at the Patent Office website. You can search for other patents at Google Patents. Patents typically include a brief description of the background and pre-existing technology, a detailed description of the invention, drawings and/or flowcharts associated with the invention, an abstract of the invention, and one or more claims. The claims are each a one-sentence description of the invention taht, preferably, are broad enough to differentiate the invention over any pre-existing devices or obvious combinations thereof. The claims must be narrow enough so as not to include any extraneous matter, which would serve as a limitation to the enforceable scope of the patent.

Are all patents created equal?

No. In fact, if you hired 50 patent attorneys to write a patent covering your invention, no two would be the same. Some would be good, and some would be bad. The value of a patent is often closely correlated with the skill and knowledge of the patent attorney drafting it. Drafting a narrow patent is easy and relatively inexpensive. Maximizing the protection available in a patent is a skill which, not surprisingly, translates into more time and more money to get the patent issued. The novelty of the invention also plays a hand in the breadth of the patent. It is not difficult to gain broad patent protection on a truly pioneering invention. By the same token, it is hard to gain more than minimal patent protection on an incremental improvement over the way things were done before.

Will the Patent Office grant me a patent on an invention they know infringes someone else’s patent?

Possibly. As noted above, a patent does not give you the right to DO anything, only the right to prevent others from doing something. The Patent Office does not care if your invention infringes an existing patent, as long as your invention is an improvement over the other invention. Why would you want a patent on an invention that infringes someone else’s patent? Well, if an inventor were to invent a chair and receive a patent thereon, a subsequent inventor could file and obtain a patent on a chair with arms. Neither the first patent owner nor the second patent owner could make the chair with arms without infringing the other’s patent. However, the parties could negotiate a cross-license where both parties pay each other a royalty in exchange for being allowed to manufacture the improved device.

Can I get money if someone is infringing my patent?

Yes, but you may have to prove infringement in court. Available remedies include an injunction (getting them to stop infringing), as well as the patent holder’s damages. Treble damages and attorney fees (which may be $1 Million or more) are also available in the case of willful infringers.

Where do I start if I want to patent my idea?

You may wish to start searching Google Patents to check if there is already a patent on your idea. Although it is difficult to determine definitively from the Google Patent database if your idea is already patented, you may get lucky, or unlucky as the case may be, and stumble upon your idea in another patent. If the Google Patent search turns up nothing, you can have a patent attorney do a search for you. While patent attorney searches are much more comprehensive, they are still not guaranteed. Even a search by a patent attorney is likely to miss relevant patents, and most patent applications are not searchable immediately after filing. If the patent search doe not turn up anything similar, you may wish to have the patent attorney prepare and file a patent application on your behalf. Although the process is long and costly, if the invention is a winner, a patent can mean the difference between millions in profits and having the invention stolen out from under you.

Brett Trout

Other Related Topics:
, , , ,

Posted in General, Patent Law.

Brett Trout Selected For Inclusion in The Best Lawyers in America® 2013

For the fourth year in a row, Brett J. Trout has been selected by his peers for inclusion in the annual edition of The Best Lawyers in America®. For 2013, Mr. Trout has been selected for inclusion in the specialties of both Information Technology Law and Patent Law. The Best Lawyers in America® publication is the oldest peer-reviewed publication in the legal profession. Since 1983, Best Lawyers® continues to be regarded, by both professionals and the public, as the definitive guide to legal excellence in the United States.

The 2013 Best Lawyers in America® publication covers the largest and most targeted audience of any legal profession peer-review listing. Excerpts from the Best Lawyers® publication appear in The Washington Post, The Los Angeles Times, New York Magazine, and more than dozens of other regional publications, reaching more than 18 million readers.

Best Lawyers selection process is based upon exhaustive and rigorous peer-review surveys. Over four million confidential evaluations by leading legal professionals are considered in the process. The American Lawyer and Corporate Counsel magazine describes The Best Lawyers in America® as “the most respected referral list of attorneys in practice.”

Posted in General.

So You Want to Protect Your Trademark?

Your Company’s Most Valuable Asset
Trademarks are often the most valuable asset of a company. They are what consumers use to associate your product with your company. Trademarks embody the goodwill of your company. Everyone talks about what makes a good trademark, but what makes a bad trademark? Knowing what makes a bad trademark can be just as important as what makes a good trademark. You do not want to pin the goodwill of your company on a bad trademark.

Good vs. Bad Trademarks
What makes a good or bad trademark to a trademark lawyer is quite different than what makes a good or bad trademark to a marketing consultant. Trademarks do not exist in a vacuum. Trademarks only exist in their association with a particular good or service. Merely descriptive terms like “Yellow Delicious” for bananas, or generic terms like “Bananas” are not registrable trademarks for bananas. Basically, any terms your competition would normally use in its identification or description of the product or service is something you are not allowed to take out of the public domain and slap a trademark on. “Yellow Delicious” or “Bananas” may be a perfectly registrable trademark for a record company, just not for bananas themselves.

Forbidden Trademarks
Other types of “bad” trademarks, that are not allowed to be federally registered, include immoral, deceptive or scandalous trademarks. What constitutes an immoral or scandalous trademark today, is quite a bit different than what might have been considered immoral or scandalous in the 1950′s. Trademarks depicting a name, portrait, or signature of a living person who has not given their consent to the trademark are also not available for federal registration. You also cannot register the name, portrait, or signature of a deceased united States President without the written consent of his widow. You cannot register trademarks that disparage or falsely suggest a connection with persons, living or dead, institutions, beliefs, or national symbols, or bring them into contempt, or disrepute. Trademarks that include a true representation of the flag of the United States, any state, municipality or foreign nation, or is a simulation thereof, are also out.

Test the Waters
Before you invest thousands of dollars behind a marketing campaign for your new trademark, contact a trademark attorney to make sure you are not running afoul of any obvious trademark no-nos. While no trademark attorney is going to thoroughly vet your trademark against all existing registrations for free, you might be able to find a trademark attorney who will give you a little free advice over the phone regarding whether your trademark runs afoul of any obvious prohibitions. You might even find one willing to run a free trademark search through the Patent and Trademark Office while you are on the phone to see if anyone has already registered your proposed trademark.For more information on trademarks, check out our FAQ.

Brett Trout

Posted in Iowa Law, Trademark Law. Tagged with , .

Congress Just Threw You Under a Bus

What Just Happened?
Yesterday, the House of Representatives passed a bill entitled Cyber Intelligence Sharing and Protection Act (H.R.3523), or CISPA for short. CISPA is a bill that allows the government to obtain your private information from companies without a warrant. Oddly, under the guise of making CISPA less abusive, the House actually slipped in some language at the last minute that made CISPA even worse. What SOPA was to online censorship, CISPA is to online privacy. Whereas SOPA was about stripping away your First Amendment rights (free speech); CISPA is about stripping away your Fourth Amendment rights (freedom from unreasonable search and siezure).

The House ostensibly passed CISPA to “provide for the sharing of certain cyber threat intelligence and cyber threat information between the intelligence community and cybersecurity entities.” Privacy advocates fear that the government will use CISPA to exploit your private and personal information in unconstitutional ways, far beyond those outlined in CISPA.

What Does CISPA Do?

The language of CISPA is pretty difficult to understand. CISPA states that any business that provides goods or services for cybersecurity purposes to itself may use its cybersecurity systems to identify and obtain cyber threat information to protect the rights and property of such self-protected entity and share such cyber threat information with any other entity, including the Federal Government. But what does that mean? Based upon my reading of the definitions contained within CISPA, it means any business that does anything online can share your private information with the government. It also means no state can enact a law preventing the business from sharing your personal information in this manner. As long as the company handed over your private information in “good faith,” CISPA also prohibits you from suing a company for handing over the wrong information.

What Does That Mean for Me?
CISPA contains no effective oversight of what private information the government is requesting and receiving. This opens the door to companies handing over all of your private information to the government and the government misusing that information once received. According to Rep. Jared Polis, a Colorado Democrat and onetime Web entrepreneur, CISPA will “waive every single privacy law ever enacted in the name of cybersecurity.” Rep. Polis went on to state that “[a]llowing the military and NSA to spy on Americans on American soil goes against every principle this country was founded on.” While addressing online security concerns is a laudable goal, there is absolutely no proof CISPA would result in a net increase in online security. Even if CISPA were to increase online security, it is not worth trampling over the Constitution to reach such a speculative goal.

CISPA guts the Fourth Amendment to the United States Constitution, eliminating the need for the government to show probable cause, or get a warrant to obtain your personal information. The FBI, BATF, Secret Service or any federal agency would simply ask the company holding your private information and the company could hand it over. As long as the exchange has some tangential relationship to the intentionally inscrutable phrase “cyber threat,” the CISPA insulates both the government agencies and the companies from liability as they exchange your private information. Not surprisingly, CISPA does very little in the way of protecting you or your constitutional rights from mistakes, overreaching and lack of oversight in the transaction.

Can I Find Out What Information of Mine the Government Obtains Under CISPA?
No. Cyber threat information shared in under CISPA is exempt from disclosure under section 552 of title 5 of the United States Code. This means that not only will the government not tell you what information of yours they request or receive, but you cannot even get this information pursuant to a Freedom of Information Act (FOIA) request.

Who is Behind CISPA?

The U.S. government, mainly. The government argues that it needs access to your personal and private information to stop online security threats. The government has also brought many large companies on board, companies, not surprisingly, who hold massive amounts of your personal information. Companies like AT&T, Boeing, Facebook, IBM, Intel, Microsoft, Symantec and Verizon are just a few of the 800+ companies supporting CISPA.

Who is Against CISPA?
Dozens of privacy groups, including: The Electronic Frontier Foundation; The American Civil Liberties Union; The American Library Association; The American Association of University Professors, Consumer Watchdog, Demand Progress, Government Accountability Project, Patient Privacy Rights, and the U.S. Bill of Rights Foundation are all strongly opposed to CISPA. Their main concern is that CISPA will allow companies holding our most sensitive and personal information to share that information with the government, and that lack of oversight will lead the government to use this information for purposes completely unrelated to cybersecurity.

What Can I Do?
Time is running short. Once the Senate passes CISPA and President Obama signs it it will be too late. President Obama said he would not sign CISPA, but he said the same thing about NDAA (indefinite detention of U.S. citizens) right before he signed it. Contact your state senators. You can find out their contact information here. Introduce yourself to the person who answers the phone as a constituent of the senator. Ask them about their office’s stance on CISPA. They will ask for yours and report those number to the senator. If you know enough about CISPA to address the particulars, ask to speak with a legislative assistant. If one is not available, leave your number and have them call you back. Ask them about the status of CISPA and the parts of CISPA about which you have a particular concern. If you do not feel up to speaking with a legislative assistant, follow up your phone call with an email and/or letter outlining your objections to CISPA. Most importantly, make your senators aware of your objections to the unconstitutional privacy invasions inherent in CISPA. Do it today.

Brett Trout

Posted in General, Internet Law. Tagged with .

Judge Rules Bloggers Do Not Have to Be Paid

Consideration
Under American jurisprudence, for a contract to be legal, each side must provide what is called “consideration.” That means that each side promises to do something, or not do something, in return for the other side agreeing to do something or not do something. If I sign a contract agreement agreeing to give you $1,000, that contract is not enforceable unless you promise to give me something in return, or do something in reliance upon my promise. Given that parties to contracts, by definition, value what they are getting more than what they are giving, courts do not get involved with the comparative values of the promises. As long as each side gives at least something, the contract is valid. As Lord Somervell noted in Chappell v Nestlé, half a century ago “A peppercorn does not cease to be good consideration if it is established that the promisee does not like pepper and will throw away the corn.”

The Huffington Post
The Huffington Post is a news website, distributing posts from over 9,000 unpaid bloggers. As noted in The Huffington Post Terms and Conditions:

(b) By posting or submitting content on or to our site (regardless of the form or medium with respect to such content, whether text, videos, photographs, audio or otherwise), you are giving us, and our affiliates, agents and third party contractors the right to display or publish such content on our site and its affiliated publications (either in the form submitted or in the form of a derivative or adapted work), to store such content, and to distribute such content and use such content for promotional and marketing purposes. Without limiting the generality of the foregoing, with respect to any video submissions to us made by you from time to time, you understand and agree that (unless you and we agree otherwise) we may, or may permit users to, based solely on functionality provided and enabled by our website, compile, re-edit, adapt or modify your video submission, or create derivative works therefrom, either on a stand-alone basis or in combination with other video submissions, and (unless you and we agree otherwise) you shall have no rights with respect thereto and we or our licensees shall be free to display and publish the same (as so compiled, re-edited, adapted, modified or derived) for any period.

Nowhere are the terms, consideration, fee, payment or compensation mentioned in the Terms of Use.

The Lawsuit
On February 7, 2011, AOL announced it had agreed to acquire The Huffington Post for $315 million. In response, a group of The Huffington Post bloggers brought a class action lawsuit against AOL, Inc., asserting the roughly 9,000 Huffington Post bloggers deserved to split $105 million of that purchase price. The lawsuit alleged The Huffington Post engaged in deceptive business practices, deceiving the bloggers as to the popularity of their posts, and was unjustly enriched by the revenue generated therefrom. The lawsuit alleged that “Unlike social networking internet platforms, micro-blogging internet sites, and other digital media sites, such as TheDailyKos.com, TheHuffingtonPost.com selects its content providers and does not allow content from non-vetted providers. [...] Plaintiff and the Classes were not officious contributors to the TheHuffingtonPost.com and, rather, were carefully selected, and in some cases recrutited, by TheHuffingtonPost.com to perform services for it.”

Dismissal
Yesterday, U.S. District Judge John Koeltl dismissed the bloggers’ lawsuit, ruling “No one forced the plaintiffs to give their work to The Huffington Post for publication and the plaintiffs candidly admit that they did not expect compensation.” The Judge went on to note “[t]he principles of equity and good conscience do not justify giving the plaintiffs a piece of the purchase price when they never expected to be paid, repeatedly agreed to the same bargain, and went into the arrangement with eyes wide open.” In response to the dismissal, the bloggers’ attorney stated “We are reviewing the decision and considering our options.”

Content, Content, Content

Social media is all about the content. Bloggers leverage better content to convince bigger content distributors to distribute that content to a wider audience. Most bloggers never attract the eye of a content distributor with a million plus unique visitors a day, like TheHuffingtonPost.com. Often, it is only when a content distributor generates large amounts of revenue, that the blogger begins to think about compensation. The bloggers may become indignant “That distributor is generating huge amounts of revenue our work, and we are not receiving any money.” But the bloggers are getting some compensation, at least according to Judge Koeltl. The fact that the bloggers are only getting publication in return for their work does not matter, as long as they are getting something in return, even if that is only a peppercorn.

Negotiate Before, Not After

If you are a blogger, website developer, graphic designer or other content provider, negotiate the terms of your service up front, in writing. You may decide that the opportunity to garner you work some exposure is worth the cost of creating it. If so, that is fine. Just be prepared if your work starts generating revenue for some third party, beyond your wildest expectation. The increased exposure of your work is likely the only additional compensation you will receive, which is nothing to sneeze at.

Brett Trout

Posted in Internet Law. Tagged with , .

Trademark Office Warns of Unscrupulous Companies Requesting Deceptive Fees

The Deceptive Letters
The United States Patent and Trademark Office has just released a warning that unscrupulous companies are attempting to deceive trademark owners into paying unnecessary trademark fees. Using confusing names, like “United States Trademark Registration Office,” these companies send out thousands of letters, attempting to collect necessary “Processing Fees.” The letters use language like: “WARNING: YOUR REGISTRATION WILL BE CANCELLED IF YOU DO NOT FILE THE DOCUMENTS ABOVE DURING THE SPECIFIED TIME PERIOD.” They also incorporate publicly available trademark application and registration information from the United States Patent and Trademark Office, making them appear like official government documents. While the failure to pay certain fees and file certain documents may result in the abandonment of the owner’s trademark, none of the “Processing Fees” requested in these letters go toward paying the government fees required to prevent abandonment of the owner’s trademark.

The Trademark Office
So many of these deceptive letters have gone out to so many trademark owners, that the United States Patent and Trademark Office has stepped in, posting an official warning on its website. The Office of the Solicitor of the United States Patent and Trademark Office even sent a cease and desist letter to the outfit calling itself the “United States Trademark Registration Office.” The United States Patent and Trademark Office is warning trademark owners to be on the lookout for deceptive letters that appear to be sent from the United States Patent and Trademark Office.

What Can You Do?
The most important thing you can do is to not pay these unnecessary fees. If you had a trademark attorney file your federal trademark application for you, the Trademark Office will not send you anything directly. All official correspondence will go directly to your attorney. If you are unsure whether a letter is legitimate, contact your attorney. If you do not have a trademark attorney, contact a local trademark attorney. Trademark attorneys will often give you a few free minutes on the phone to answer questions regarding potential scams. If you have received a deceptive letter requesting fees associated with a trademark, contact your state’s Attorney General. You should also file an on-line consumer complaint with the Federal Trade Commission (“FTC”), at www.FTC.gov and email the United States Patent and Trademark Office at TMFeedback@uspto.gov.

Brett Trout

Posted in Trademark Law. Tagged with , .

The New Business Identity Theft

Identity Theft vs. Business Identity Theft
Almost everyone is familiar with identity theft. A criminal obtains your personal information, and uses that information to steal, leaving you to mop up your decimated credit. Business identity theft can also involve criminals using private business information to create fake financial accounts to defraud third parties. Not all business identity theft requires the thief to obtain your private business information or set up fake financial accounts. There is a growing trend of cybercriminals spoofing small businesses, using publicly available information to create look-alike or sound-alike businesses to steal customer information.

The Spoof and the Scrape
Spoofing involves criminals mimicking various aspects of a legitimate business to mislead people into providing the criminal with personal information. A criminal may spoof a legitimate company’s name, its trademark, its website, its advertising or any other public presence the legitimate business has. The criminal may steal, or scrape, the pictures, text and layout from the legitimate business’ website and post that information to a fake website. With a seasoned spoofer, it can be very difficult to distinguish the spoofed website from the real thing. The criminal may even set up a phone number using a local area code or a brick and mortar address to fool the small business’ customers. The criminal relies on lazy customers who might not notice the website they are visiting, or the yellow page advertisement they are reading is just a knock-off. Customers may contact the criminal, thinking it is the trusted business, and provide personal or financial information, that the criminal then exploits. The criminal may even offer to supply sub-standard goods or services under the legitimate company’s name.

Stopping the Spoofing
With ordinary identity thieves, freezing financial accounts usually curtails the ongoing damage. With spoofers, the ongoing damage may not be so easy to stop. Since spoofers are only using publicly available information, and are not using the legitimate businesses’ private information, or creating financial accounts using the legitimate business’ credit, it can be difficult to convince law enforcement to take action. As no private information is being used, law enforcement may view the spoofing as a civil matter, rather than a criminal one. Adding to the problem are privacy laws, that can prevent a legitimate business from finding out who or where the spoofing identity is. This forces the legitimate business to seek out an attorney with experience in this area to bring an end to the ongoing fraud.


Get Your Ducks in a Row

The best time to defend against business identity theft is before a problem arises. Be sure you have the appropriate trademark and copyright registrations in place. If you wait until a criminal starts spoofing your business identity and defrauding your customers, you may have to wait months to obtain a copyright or trademark registration. Registering your trademark prior to an attack allows you to sue in federal court, and to ask a federal judge to order any phone numbers and domain names associated with the spoofer be turned over to you. Registering your copyright prior to an attack and registering your Digital Millennium Copyright Act (DMCA) agent with the Copyright Office allows you to shut down any website using copyrighted material scraped from your website.

Time is of the Essence
As businesses become more adept at addressing existing criminal threats, criminals continue to innovate novel scams, stealing tens of billions of dollars every year. Many businesses are simply not prepared for a scam that law enforcement refuses to pursue. By the time an unprepared business takes remedial action, so many of its customers may have been scammed that the company may never recover from the long-term damage done to the company’s goodwill. Thwarting business identity spoofing theft is not as hard as it seems. Small business identity spoofers tend to prey on the weakest and least knowledgeable victims. Simply protecting your trademarks and copyrights, and indicating the protection on your website, may be enough to convince a cyber identity thief to pursue a less well-prepared and less knowledgeable victim.

Brett Trout

Posted in Internet Law, Trademark Law. Tagged with , .