====== 31 ======
Submitted byRichard RaysmanHolland & Knight LLP If you find this article helpful, you can learn more about the subject by going to www.pli.edu to view the on demand program or segment for which it was written. |
====== 35 ======
The secure establishment, in business and personal use, of the Internet and other modes of accessing information in digital form has raised novel and complex legal issues for today’s technology and intellectual property lawyers. The fast pace of this “information highway” stands in stark contrast to the traditional landscape of commercial transactional and intellectual property law. Many existing laws were not designed to deal with a technology that disseminates information at the speed, with the convenience, and to the mass audience now possible in the modern information age. Just as the number of Internet and wireless device users continues to multiply, the number of legal issues of first impression continues to make technology law an exciting and engaging area of practice.
The information technology industry is constantly changing, and its evolution continues apace. New data and media formats, new applications and services, and new methods to access and store data are constantly introduced into the business and consumer markets. It is not only important for the technology law attorney to keep abreast of these changes, but also to the changes in the law. As such, this white paper provides a concise resource of some of the latest legal developments in technology law, data security and privacy, and e-commerce and licensing. For a more thorough discussion and consideration of these issues, please refer to Computer Law: Drafting and Negotiating Forms and Agreements, co-authored by Richard Raysman and Peter Brown (Law Journal Press 1984-2014), Intellectual Property Licensing: Forms and Analysis (Law Journal Press 1999-2014), co-authored by Richard Raysman, Edward A. Pisacreta, Kenneth A. Adler and Seth H. Ostrow, and Emerging Technologies and the Law: Forms & Analysis (Law Journal Press 1994-2014), co-authored by Richard Raysman, Peter Brown, Jeffrey D. Neuburger and William E. Bandon, III.
For a compendium of recent articles and alerts that discuss technology law issues in greater depth, please visit the firm’s website at www.hklaw.com and the Digital Technology & E-Commerce Blog.
====== 37 ======
Copyright and Digital Content |
Information technology has revolutionized the methods for creating, reproducing, and disseminating copyrighted works and has consequently opened the door to instances of wide-scale copyright infringement. Combined with powerful software applications, the Internet is an ideal medium, in terms of its ease of use and wide audience, for replicating copyrighted works. With the simple push of a button or a click of a mouse, a user can upload information, making it available to a worldwide audience, or extract and download information posted on the Web. Services or products that facilitate access to websites throughout the world can significantly magnify the effects of otherwise immaterial infringing activities.
When copyrighted information is made available online without the permission of the copyright holder, two questions may arise: Who is liable? Under what legal theory (e.g., copyright infringement, DMCA violation, etc.)? A party who makes or distributes unauthorized copies of copyrighted works may be a direct infringer, but other participants, such as electronic bulletin board operators, website operators, bloggers, social network sites, peer-to-peer networks, video sharing sites, and ISPs, can potentially be liable as contributory or vicarious infringers.
|
When a widely-shared service or application is used to commit infringement, it may be impossible to enforce rights in the protected work effectively against all direct infringers. Often, the only practical alternative is to seek legal remedies against the creator or distributor of the infringing device for secondary liability on a theory of contributory or vicarious infringement. Contributory and vicarious infringement are predicated on a direct infringement. Generally speaking, “[o]ne infringes contributorily by intentionally inducing or encouraging direct infringement, and infringes vicariously by profiting from ====== 48 ====== However, certain legal doctrines, such as the fair use defense, permit the use of copyrighted works without the copyright owner’s consent under certain situations. As detailed below, a number of decisions have been issued recently that deal with a fair use defense raised in the context of digitizing books and permitting users to then search the books via databases.
|
The online practices of certain blogs and news-oriented websites have been reexamined, particularly the practice of news aggregation, ====== 53 ======
|
====== 56 ======
Infringement and Misappropriation of Software and Technology |
○ | Oracle America, Inc. v. Google, Inc. – In 2014, the Federal Circuit overturned the District Court for the Northern District of California and held in favor of Oracle in a copyright infringement dispute against Google over the latter’s use of packages of Oracle’s computer source code (API packages) in its Android mobile operating sys-tem.34 The Federal Circuit held that declaring code, structure, sequence and organization of the API Packages in question were entitled to copyright protection.35 First, with respect to the source code, the court found that Oracle’s API packages could be expressed in a number of ways, and therefore had not merged with the underlying source code.36 The scope of copyrightability is evaluated at the time of the creation of the potentially protected expression. Also, the Federal Circuit noted that the relevant test for determining whether short phrases are copyrightable is not whether the phrases are short, but whether they are creative.37 As such, because Oracle had “exercised creativity in the selection and arrangement” of the declaring code when creating the API Packages and wrote the relevant code, it contained protectable expression that is entitled to copyright protection. The Federal Circuit also rejected the District Court’s notion that the API Packages cannot be copyrighted under the Act because it is a “system or method of operation.”38 Rather, ====== 57 ====== |
○ | Apple, Inc. v. Psystar Corp. – A computer maker that licenses copies of its operating system for use only on its own computers did not misuse its copyright and appropriately used its license to prevent infringement and control use of its copyrighted material.40 ====== 58 ====== |
○ | Vernor v. Autodesk, Inc. – A software user is a licensee rather than an owner of a copy where the copyright owner (1) specifies that the user is granted a license; (2) significantly restricts the user’s ability to transfer the software; and (3) imposes notable use restrictions.41 The appeals court reversed the district’s court grant of summary judgment in favor of the plaintiff- reseller on the copyright claim, concluding that an individual that resold used copies of software the original customer acquired pursuant to a software licensing agreement, which contained restrictions on use and transfer committed infringement, was not entitled to invoke the first sale doctrine or the essential step defense. This principal issue before the court was ====== 59 ====== |
○ | The Compliance Source, Inc. v. GreenPoint Mortgage Funding, Inc. – A licensee that allowed its attorneys to access and use the licensed software to review and prepare real estate loan documents on its behalf may have breached the agreement because the license contained no provision that permitted the licensee to grant third-party access, whether or not such access would be on behalf of or for the benefit of the licensee.42 The appeals court reversed the lower court’s grant of summary judgment to the licensee and ====== 60 ====== |
○ | R.C. Olmstead, Inc. v. CU Interface, LLC – A software maker’s copyright infringement claim against a competitor is deficient when the software maker fails to show that any alleged similarities merely arose because both software programs were designed to address similar functions and evidence fails to identify any original, non-literal elements of the software copied by the competitor.43 The appeals court affirmed the lower court’s grant of summary judgment to the defendant on the copyright claim, concluding that the plaintiff’s substantial similarity inquiry failed. The court found that the plaintiff did not even begin to provide the kind of abstraction-filtration-comparison analysis that would filter elements of its software that were original from elements that were unprotected and present to the court a compelling case of infringement. |
○ | Cincom Systems, Inc. v. Novelis Corp. – A software licensee’s series of mergers as part of an internal corporate restructuring, which, by law, transferred its software license rights to the surviving entity, violated the non-exclusive software license’s express anti-assignment clause, resulting in liability for copyright infringement.44 The court found that where state law would allow for the transfer of a copyright license absent express authorization, it must yield to the federal common law rule prohibiting such unauthorized transfers. The court concluded that only the original licensee was authorized under the agreement and if any other legal entity held the software ====== 61 ====== |
○ | Safety Mgmt. Sys., Inc. v. Safety Software Ltd. – An exclusive licensing agent was not entitled to a preliminary injunction to require a software maker to deposit certain software in escrow with the plaintiff’s counsel pursuant to the terms of a previous agreement because the licensing agent failed to show the prospect of imminent irreparable harm to the licensees or any immediate threat of the software maker’s insolvency.45 The court denied the plaintiff’s motion for a preliminary injunction. The court found that to the extent that the licensing agent seeks to vindicate the rights of the licensees, the agent was not the proper party to raise such claims, particularly since none of the licensees appeared in this action or otherwise objected to the software maker having deposited the software into escrow under a different arrangement. The court also found that the action was a typical contract dispute and any harms could be redressed through monetary damages, as opposed to equitable relief. |
Generally speaking, open source software is software where the source code is made available to the public under a “public license,” such that the source code can be read, modified and redistributed by users, subject to certain conditions. The open source approach is the conceptual and practical opposite of the idea of software as a “closed,” proprietary product, distributed in the form of object code only, with the source code held privately by the owner. Much open source software is developed collaboratively by volunteer groups of programmers and typically is made available for download via the Internet. Many companies have chosen to incorporate open source software into their operations to achieve various goals such as cost savings, better control over software maintenance and modifications, or perhaps gain a competitive advantage. One example is the Linux operating system, one of the most well-known open source products. The Apache Web server product, which is estimated to power more ====== 62 ====== One of the most frequently encountered open source licenses is promulgated by the Free Software Foundation—the GNU General Public License—commonly referred to as the GPL. The GPL permits the use of licensed software, even by commercial entities. However, conditions are placed on the modification and distribution of GPL-licensed code, namely, that if a work is based, in whole or in part, or contains or is derived from any part of GPL-licensed software, the new program must be licensed under the GPL and therefore must itself become open source. This potential impact of the GPL has been referred to as the “viral nature” of the GPL. After an extensive drafting and comment period that began in 2006, the final draft of GPL Version 3 (“GPLv3”) was released in June 2007. GPLv3 makes several substantial changes from the earlier versions, particularly pertaining to patent rights, which were drafted to address issues driven not only by the execution of law and technology but by certain developments in the conduct of players in the software industry. Although the GPL is one of the most prominent open source licenses, it is not the only one, as other entities have produced their own licenses, which may or may not be compatible with the latest version of the GPL. The GPL itself has spawned an official variant—the GNU Lesser General Public License (LGPL) to address some of the concerns raised by the “viral” provisions of the GPL. The LGPL is intended for use with software function and data libraries that are made to be linked to separate application programs to form executable programs. The LGPL allows the licensee to maintain the proprietary nature of the applications that are linked to the licensed library.
|
Congress enacted the Digital Millennium Copyright Act (DMCA)52 to comply with international copyright treaties and to update domestic copyright law for the online world. The DMCA includes “anti-circumvention” provisions, which prohibit the circumvention of technological measures used by copyright owners to protect their works, as well as prohibitions against trafficking (that is, manufacturing and making available certain technologies or devices that are primarily designed to defeat technological protections that block unauthorized access). In conjunction, Congress also enacted Title II of the DMCA, the Online Copyright Infringement Liability Limitation Act (OCILLA),53 to facilitate cooperation among Internet service providers and copyright owners over issues of infringement and provide greater certainty to service providers concerning their legal exposure for infringements. ====== 66 ======
As the popularity of Web video continues to grow, so too does the potential for contributory copyright infringement on popular video-sharing websites. These websites invariably become venues for infringing behavior, not necessarily due to the site’s architecture or purpose, but simply due to the sheer number of users uploading new videos daily. Consequently, content owners continue to contend that such websites must take a greater role in stemming their users’ infringement. In response, website owners have countered that they need only follow the dictates outlined by the DMCA safe harbors that immunize qualifying service providers from copyright liability. Thus, both sides continue to dispute what it means to be compliant with the DMCA and who should bear the ultimate responsibility, the site owner or the content owner, for policing video-sharing sites for infringing content.
|
State trade secret law can help to secure proprietary protection for confidential formulas and processes and much of the valuable and confidential information that may be shared between the parties developing a new product. Trade secret protection can also help to secure proprietary, secret company information from being disclosed or misused by departing employees. Trade secret information can include many types of competitively valuable secret information, including financial information and technical data and design specifications and software.
|
Online Defamation |
Long before the digital age, the law wrestled with balancing the competing interests in compensating parties for attacks upon their reputations and protecting the First Amendment rights of journalists and individuals. Today, however, the Internet makes it easy to disseminate information and ideas anonymously, offering bloggers and users who post comments
====== 82 ======
○ | Seaton v. TripAdvisor, LLC – An online travel ratings site that created a Top Ten Dirtiest Hotels list based upon user comments and data is not liable for defamation because a reasonable person could not understand the list in question as an assertion of fact instead of merely “unverifiable rhetorical hyperbole” and the aggregated opinion of the site’s millions of online users.78 The court granted the defendant’s motion to dismiss. The court concluded that the plaintiff failed to plead any facts that showed the defendant made a statement of fact, or a statement of opinion that it intended readers to believe was based on facts. The court also noted that although the site’s method of arriving at its conclusions (i.e., unverified online user reviews) was “a poor evaluative metric,” it was not a “system sufficiently erroneous so as to be labeled ‘defamatory’ under the legal meaning of the term.” |
○ | SPEECH Act – In 2010, Congress passed the SPEECH Act, which, among other things, prohibits a domestic court from recognizing a foreign judgment for defamation unless the defamation law applied in the foreign court’s adjudication provided at least as much protection for freedom of speech as would be provided by the First Amend-ment.79 The Act also provides that any U.S. person, against whom a foreign judgment is entered on the basis of published speech, may bring an action in district court for a declaration that the foreign ====== 83 ====== |
○ | Sedersten v. Taylor – A website privacy policy that grants the site the right to disclose user information “in any way and for any purpose” did not act as waiver of the First Amendment rights of the anonymous non-party poster when nothing on the face of the privacy policy hinted that users may be waiving constitutional rights by posting comments to the site.80 The court denied the plaintiff’s motion to compel the identity of the anonymous website poster. The court also found that the plaintiff failed to make an adequate showing that this was an exceptional case that warranted disclosure of an anonymous non-party speaker’s identity, particularly given the political nature of the poster’s online speech. |
○ | Too Much Media LLC v. Hale – A self-proclaimed “information exchange” website operator who allegedly posted defamatory comments on Internet bulletin boards and forums for the purpose of informing the public of the plaintiff’s unlawful dealings may not refuse to divulge her sources by claiming protection under the New Jersey Shield Law, which expressly extends a privilege to a person engaged in, connected with, or employed by “news media.”81 The ====== 84 ====== |
○ | AF Holdings, LLC v. Does 1-1058 – A copyright owner of pornographic films brought an infringement action alleging that 1,058 unknown individuals had used a peer-to-peer file sharing application to download and distribute such copyrighted films.82 The district court granted the owner’s request for subpoenas to the Internet Service Providers (ISPs) that required the ISPs to identify customers associated with certain internet protocol (IP) addresses.83 In the first paragraph, the opinion noted that the copyright owner was “seek[ing] to manipulate judicial procedures to serve their own improer ends. This case calls upon us to evaluate – and put a stop to – one litigant’s attempt to do that.”84 The ISPs argued that the subpoenas designed to reveal the identities of the John Doe defendants were “unduly burdensome” as defined in the Federal Rules of Civil Procedure (FRCP) because venue is improper, personal jurisdiction ====== 85 ====== |
○ | Solers Inc. v. Doe – Before enforcing a subpoena seeking the identity of an anonymous defendant in a defamation action, a court must conduct a preliminary screening to ensure that there is a viable claim that justifies overriding an asserted right to anonymity.86 In a case of first impression, the D.C. appellate court, after surveying the various standards in other jurisdictions, adopted a test that closely resembled the “summary judgment” standard articulated in Doe v. Cahill, 884 A.2d 451 (Del. 2005). When presented with a motion to quash (or to enforce) a subpoena which seeks the identity of an anonymous defendant, courts should (1) ensure that the plaintiff has ====== 86 ====== In further proceedings, the appeals court reversed the lower court’s order compelling enforcement of the subpoena to identify the anonymous speaker.88 The court found that plaintiff failed to plead concrete damages suffered as a direct result of the alleged defamation (i.e., lost profits or customers, or even a general impairment of its reputation, beyond the costs expended to investigate the claims that it was using unlicensed software), and otherwise did not overcome John Doe’s right to speak anonymously. |
With the advent of mass communication, the single-publication rule was created to address the problem that arose from the general rule in defamation or right of publicity cases that each sale or delivery of a copy
====== 87 ======
○ | Christoff v. Nestle USA, Inc. – The California single-publication rule applies to not just libel and defamation but also causes of action for unauthorized commercial use of likeness.89 The California Supreme Court remanded the case to the trial court for further proceedings to determine when the statute of limitations was triggered for the plaintiff’s action and whether the defendant’s unauthorized uses of the plaintiff’s image (i.e. the printing of product labels and various advertisements for an instant coffee product over a five year period) constituted a “single integrated publication” within the meaning of the single publication rule. The court commented that this was an issue of first impression, namely whether an entire advertising campaign could be considered a single integrated publication, such that the defendant’s first use of the plaintiff’s image triggered the running of the state of limitations for all subsequent uses in whatever form or media format. |
○ | Yeager v. Bowlin – An aviation memorabilia website was a “single integrated publication” and protected against stale privacy claims by the single publication rule.90 The appeals court affirmed the lower ====== 88 ====== |
Section 230 of the Communications Decency Act (CDA) Act protects certain Internet-basedactors from certain kinds of lawsuits. Generally speaking, the statute is designed at once to promote the free exchange of information online and to encourage voluntary monitoring for offensive or obscene material. There are three essential elements that a party must establish in order to claim Section 230(c)(1) immunity: (1) it is a provider of an interactive computer service; (2) the cause of action treats the defendant as a publisher or speaker of information; and (3) the information at issue is provided by another information content provider. Under the statute, this grant of immunity applies only if the interactive computer service provider is not also “responsible, in whole or in part, for the creation or development of” the offending content. The CDA does not necessarily offer blanket immunity, as the statute does not provide immunity from federal criminal laws, laws “pertaining to intellectual property” and “communications privacy law.”91 The majority of federal courts have interpreted the CDA to grant qualifying service providers broad immunity from civil liability for information originating with a third-party content provider. Although a fair number of service providers who invoke CDA immunity do so to protect against defamation claims, the language of the statute does not limit its application to such cases. Indeed, many ====== 89 ======
However, while CDA immunity applies to a wide host of claims, some recent decisions have uncovered limitations on the scope of CDA Section 230.
While CDA Section 230(c)(1) protects qualifying providers from liability for third-party content, Section 230(c)(2)(B), on the other hand, covers actions taken to enable or make available to others the technical means to restrict access to objectionable material. This section of the CDA provides protection for “good Samaritan” blocking and screening of offensive material, such that no provider or user of an interactive computer service shall be held liable on account of any action taken to enable or make available the technical means to restrict access to offensive material. Thus, a provider of software or enabling tools that filter, screen, allow, or disallow content that the provider or user considers obscene, lewd, lascivious, filthy, excessively violent, harassing, or otherwise objectionable may not be held liable for any action taken to make available the technical means to restrict access to that material, so long as the qualifying provider enables access by multiple users to a computer server.
|
Social Networks and Online Advertising |
In recent years, online social network websites have received a fair amount of media coverage. The attention has not only concerned their rapid growth and enormous popularity, but also, and perhaps more importantly, has focused on the novel privacy issues that have emerged vis-à-vis the sites and their members, as well as what party should be responsible for the posting of offensive or infringing content or for offsite harms that result from social network interactions.
Broadly speaking, an online social network is a structure that allows its members to share personal information and enables personal contacts through a website or other Internet portal. Member pages of “core” social network sites usually contain information and audio and visual content of a personal nature, though such information may vary widely among individual users. Other interactive sites that allow for the viewing and sharing of media or bring together a community of like-minded users often contain social networking features. Often, this data includes the age, gender and personal interests and hobbies of the individual and is shared with others whom the member determines to be “friends.”
In some instances, the social network sites themselves have used this data in connection with marketers, albeit in different ways. In turn, this “sharing” has not only stoked the resentment of some social networking members and privacy advocates, but also has drawn the attention of the Federal Trade Commission (FTC), particularly with respect to online behavioral advertising. The FTC defines online behavioral advertising as the tracking of consumers’ online activities in order to deliver tailored advertising. The agency notes that in many cases, the information collected is not personally identifiable in the traditional sense – that is, the information does not include the consumer’s name, physical address, or similar
====== 101 ======
In response, the FTC Staff and industry groups, among others, have released best practices guides for this nascent advertising model. Indeed, with the proliferation of social networking sites and the marketing opportunities of behavioral advertising, it is likely that existing privacy issues will continue to emerge as the online public and the sites themselves determine when disclosure of personal information or online activities runs counter to user’s expectations, industry principles, and emerging law.
○ | FTC Report, “Protecting Consumer Privacy in an Era of Rapid Change: Recommendations for Businesses and Policymakers”(March 2012) – In December 2010, the FTC issued a preliminary staff report to address the privacy issues associated with new technologies and business models. The report outlined a proposed framework to guide policymakers and other stakeholders regarding the best practices for consumer privacy. Generally speaking, the proposed framework called on companies to build privacy protections into their business operations, offer simplified choice mechanisms that give consumers more meaningful control, and increase the transparency of their data practices. In its Final Report, the Commission adopted the staff’s preliminary framework with certain clarifications and revisions.113 The FTC recommends that Congress consider baseline privacy legislation and the industry implement the Report’s final privacy framework through individual company initiatives and enforceable self-regulation. To the extent the Report’s framework goes beyond existing legal requirements, it is not intended ====== 102 ====== The Final Report clarifies at least three important principles from the preliminary report. First, the FTC addressed concerns about undue burden on small business. The Final Report’s privacy framework applies to “all commercial entities that collect or use consumer data that can be ‘reasonably linked’ to a specific consumer, computer, or other device, unless the entity collects only non-sensitive data from fewer than 5,000 consumers per year and does not share the data with third parties.” Notably, the framework applies in all commercial contexts, both online and offline. As to the definition of “reasonably linked,” the Final Report clarifies that data is not “reasonably linkable” to the extent that a company: (1) takes reasonable measures to ensure that the data is de-identified; (2) publicly commits not to try to re-identify the data; and (3) contractually prohibits downstream recipients from trying to re-identify the data. Second, the FTC revised its approach to how companies should provide consumers with privacy choices. The preliminary report had set forth a list of five categories of “commonly accepted” information collection practices for which companies need not provide consumers with choice (product fulfillment, internal operations, fraud prevention, legal compliance and public purpose, and first-party marketing). Under the Final Report, the Commission set forth a modified approach that focuses on the context of the consumer’s interaction with the business. Under this approach, companies would not need to provide choice before collecting and using consumers’ data for “practices that are consistent with the context of the transaction, consistent with the company’s relationship with the consumer, or as required or specifically authorized by law.” Although many of the five “commonly accepted practices” previously identified in the preliminary report would generally meet this standard, there may be ====== 103 ====== Lastly, the Final Report announced that the agency would focus its future policymaking efforts on five main privacy items: (1) Do Not Track. The FTC summarized current industry efforts on this front, but stressed that it would continue to work with these groups to complete implementation of an easy-to use, persistent, and effective Do Not Track system; (2) Mobile Privacy. The Report calls on mobile service companies to establish standards that address data collection, transfer, use, and disposal, particularly for location data; (3) Data Brokers. To address the issue of transparency and consumer control over data brokers’ collection and use of consumer information, the FTC stated that it supports targeted legislation that would provide consumers with access to information about them held by a data broker. The agency also advocated for the creation of a centralized website where data brokers could detail the access rights and other choices regarding consumer data; (4) Large Platform Providers. The Report reemphasizes that large platforms (e.g., ISPs, operating systems, browsers, and social media) that seek to comprehensively track consumers’ online activities raise heightened privacy concerns; and (5) Promoting Enforceable Self-Regulatory Codes. The FTC will continue to facilitate the development of industry-specific codes of conduct and will use the FTC Act to take action against companies that engage in unfair or deceptive practices, including the failure to abide by self-regulatory programs they join. |
○ | FINRA Regulatory Notice 10-6 – In January 2010, the Financial Industry Regulatory Authority (“FINRA”), the independent regulator for securities firms doing business in the United States, issued Regulatory Notice 10-06, a guidance to securities firms and brokers regarding the use of social networking websites for business ====== 104 ====== |
○ | Self-Regulatory Principles for Online Behavioral Advertising (July 2009) – Leading industry associations developed a set of consumer protection principles for online behavioral advertising, meant to correspond with the FTC Staff Report on the issue.115 The industry’s Self-Regulatory Program is broken down into seven principles, which propose that participating organizations and sites, among other things, clearly disclose data collection and use practices with links and disclosures on the Web page where the ====== 105 ====== |
○ | Craigslist, Inc. v. 3Taps, Inc. – A classified ad web service may proceed with contract, trespass, CFAA, and limited copyright claims against several aggregators that scraped or reused Craigslist content without authorization contrary to the site’s Terms and in contravention of certain IP address blocks.116 The court denied the defendants’ motion to dismiss, except for copyright claims related to content outside of a two-month window where Craigslist arguably had “exclusive” rights to user content. The court stated that assuming that the CFAA encompasses information generally available to the public such as Craigslist’s website, the defendants’ continued use of Craigslist content after the clear statements regarding authorization in cease and desist letters and the introduction of technological blocking measures constituted unauthorized access under the statute. Regarding the copyright claims, the court ruled that while Craigslist could assert claims related to content during a two-month window where it had affirmatively acquired an exclusive license for user posts, it dismissed the remaining infringement claims because Craigslist’s license to user-created posts submitted outside that time period was pursuant to a license that did not use the phrase “all rights” and did not suggest that the rights granted were “exclusive.” Concerning common law trespass, the court found that it was plausible that the defendants’ scraping and use of content could have diverted sufficient computing resources to impair Craigslist’s website and server functionality, but ultimately, whether the defendants caused actual damage or impairment to Craigslist’s systems was a question of fact more appropriate for summary judgment. |
====== 106 ====== | |
○ | Facebook, Inc. v. Power Ventures, Inc. – A social network profile aggregating service may be liable for copyright infringement for gaining consent from users to make copies of their social network profile pages and then “scraping” the data from the social network for use on its own site.117 The court denied the defendant’s motion to dismiss, rejecting the defendant’s argument that no infringement was possible because the profile user pages were not protected by copyright and the social network site did not hold any rights to user content. The court conceded that the defendant correctly asserted that the social network site did not have a copyright on the user content the defendant sought, but found that if the defendant first had to make a copy of a user’s entire profile page in order to collect that user content, and that such action might violate the site’s terms of use, citing Ticketmaster L.L.C. v. RMG Techs, Inc.118 The court also refused to dismiss the “indirect” copyright infringement claims, finding that the defendant’s inducement of users to exceed their authorized usage and thereby allow the defendant to make copies of their profile pages may support a contributory claim. The court also let stand the social network’s DMCA claims for the defendant’s automated activities that allegedly circumvented certain anti-scraping technological measures on the site that were designed to protect copyrighted content. In further proceedings, the court granted the plaintiff’s motion for summary judgment on its CAN-SPAM and CFAA claims.119 The court rejected the defendant’s argument that because Facebook’s own servers sent the commercial e-mails at issue, the defendants did not “initiate” the e-mails as a matter of law. The court found that although Facebook servers did automatically send the emails at the instruction of the defendant’s software, it was clear that the defendants’ actions – in creating a friend referral promotion with ====== 107 ====== |
○ | Sambreel Holdings LLC v. Facebook, Inc. – Antitrust claims against a social network for disabling plaintiff’s browser add-on that operated on the Facebook platform and generated online advertising separate from Facebook’s own ad impressions were dismissed, with leave to amend, because the plaintiff failed to allege any anticompetitive effects in any forum outside of the Facebook website.120 The court found that just as Facebook has the right to determine the terms for application developers to use the Facebook platform, “it has a right to dictate the terms on which it will permit its users to use its network and is within its rights to require that its users disable certain products before using its website.” The court noted that the complaint did not sufficiently allege that any advertising partners were prohibited from advertising with the defendant outside of Facebook, or that Facebook users were prohibited from viewing the defendant’s advertisements or using the defendant’s products on other websites. |
○ | Pietrylo v. Hillstone Restaurant Group – A jury found that an employer violated federal and state computer privacy laws and was liable for back pay and damages for terminating two employees after gaining unauthorized access to a private MySpace page that was created by the plaintiffs and was critical of the company.121 The jury concluded that the company violated the federal Stored Communications Act and the New Jersey state computer privacy law when ====== 108 ====== |
○ | Yath v. Fairview Clinics, M.P. – The “publicity” element of a state law invasion of privacy claim, which required, in part, that the matter be made public by communicating it to the public at large, was satisfied when private healthcare information was posted on a publicly accessible social network website for 24 hours.122 |
○ | Romano v. Steelcase Inc. – A defendant is entitled to compel production of the plaintiff’s social network data (including current and historical, deleted pages and related information) based upon a review of the public portions of the plaintiff’s social network pages that allegedly revealed an active lifestyle that conflicted with the plaintiff’s injury claims.123 Rejecting the plaintiff’s objections to ====== 109 ====== |
○ | The Ass’n of the Bar of the City of New York, Comm. on Professional Ethics, “Obtaining Evidence From Social Networking Websites” – A lawyer may not attempt to gain access to a social networking website under false pretenses, either directly or through an agent.124 Rather, a lawyer should rely on discovery procedures sanctioned by the ethical rules and case law to obtain relevant evidence, such as the truthful “friending” of unrepresented parties or by using formal discovery devices such as subpoenas directed to non-parties in possession of information maintained on an individual’s social networking page. |
====== 110 ======
Trademark Infringement in the Online Environment |
The growth and sophistication of e-commerce sites, online auctions, and search engine sponsored advertisements has increased the possibilities of infringing activities, with trademarks being increasingly more susceptible to impermissible use, copying and linking. As a practical matter, few companies have the resources to stop every trademark violation, especially those corporations that have large portfolios of marks and finite resources for policing the marketplace for potential infringers.
On the one hand, the duty to police trademarks is not so weighty a burden that every infringer must be sued immediately or simultaneously; merely, each holder must reasonably undertake to enforce its rights in its mark.125 On the other hand, the failure to adequately police one’s mark can have unwanted consequences for both the mark itself and the owner, including lost revenue to the company, dilution or genericide of the mark, and lost cache of the brand, to name just a few.
As e-commerce continues to grow, so too does the potential for contributory trademark infringement on popular websites, which, due to the size and sheer number of transactions, can often provide fertile ground for others seeking to engage in the sale and marketing of counterfeit goods. Consequently, mark holders have begun to raise the question of whether these websites are required to assist in eradicating trademark infringement and, if so, to what degree.
○ | Tre Milano, LLC v. Amazon.com, Inc. – A major e-commerce site was not likely liable for contributory trademark infringement when it received notices about suspected counterfeit goods for sale ====== 111 ====== |
○ | Ascentive, LLC v. Opinion Corp. – A consumer gripe site is not likely liable for direct trademark infringement for its use of the plaintiff’s trademarks in subdomains (e.g., <ascentive.pissedconsumer. com>), website metatags, and in the text of its website served by a third-party ad network.128 The court denied the plaintiffs’ motion for a preliminary injunction because plaintiffs were unlikely to succeed on the merits of their Lanham Act and related state claims. The court found that there was no likelihood of confusion based upon the site’s use of the plaintiff’s trademarks in the PissedConsumer website text and subdomain names because, among other things, the parties were not competitors and the subdomain pages made it clear through their critical language that they were not affiliated with the trademark holders such that no reasonable visitor to the gripe pages would assume the sites were affiliated with the plaintiffs. Interestingly, the court stated that there was no need for the gripe pages to contain a disclaimer as it was evident from the domain name and content that the site was a third-party gripe site for “pissed” ====== 112 ====== |
○ | Louis Vuitton Malletier SA v. Akanoc Solutions, Inc., – A web host that ignored multiple takedown notices and knowingly enabled infringing conduct by leasing packages of server space, bandwidth and IP addresses to foreign-based websites that sold knockoff goods is joint and severally liable for a single award of statutory damages for contributory trademark infringement in the amount of $10.5M.130 The court rejected the defendant’s argument that the servers and internet services provided were not the “means of infringement,” rather the websites selling the infringing goods were the sole means of infringement. Instead, the appeals court stated that even though they exist in cyberspace, “websites are not ethereal” and would not ====== 113 ====== |
○ | Tiffany (NJ) Inc. v. eBay, Inc. – An online auction site that possessed generalized knowledge that counterfeit goods of a well-known brand were sold on its site, but was not willfully blind to infringement and undertook measures to root out and suspend infringing auctions, is not liable for contributory trademark infringement.131 The appeals court affirmed the judgment in favor of the defendant on the trademark and dilution claims, but remanded for reconsideration the plaintiff’s false advertising claim. The court applied the Supreme Court’s Inwood contributory trademark infringement standard, which requires that a plaintiff prove that the defendant “knows or has reason to know” that it is supplying its product to an infringer and continues to do so. The court rejected the plaintiff’s argument that generalized notice that some portion of the plaintiff’s goods being sold on the defendant’s site were counterfeit required the site to preemptively remedy the problem. The court concluded that: “For contributory trademark infringement liability to lie, a service provider must have more than a general knowledge or reason to know that its service is being used to sell counterfeit goods. Some contemporary knowledge of which particular listings are infringing or will infringe in the future is necessary.” Concerning the plaintiff’s “willful blindness” argument, the court reasoned that the defendant ====== 114 ====== |
○ | Beltronics USA, Inc. v. Midwest Inventory Distribution, LLC – The first sale doctrine, which generally limits the right of a producer to control distribution of its trademarked product beyond the first sale of the product, was not available for an eBay merchant that allegedly resold infringing trademarked goods that did not include the associated warranties and services.132 The court recognized that the unauthorized resale of a “materially different” trade-marked product can constitute trademark infringement and concluded that the appropriate test for materiality should not be strictly limited to physical differences, but could include other differences such as warranty protection or service commitments that may well render products non-identical in the relevant Lanham Act sense. |
Internet advertising remains a vital outlet for many businesses looking to reach a wide swath of consumers. To that end, search engine advertisers purchase terms or keywords, which, when entered as a search term, trigger the appearance of the advertiser’s online advertisement and link in a prominent place among the page of search results. Under the pay-per-click model, advertisers pay the search engine based on the number of times Internet users click on the advertisement. For example, a company (ABC Company) that sells old LPs can purchase the terms “vintage records” or “vintage LPs” in order to display its advertisement and link whenever a search engine user ====== 115 ====== According to advertisers and the search engine companies, the practice of selling trademarked keywords should be considered a permissible practice that does not cause consumer confusion or is merely a noncommercial use of a trademark that places an advertisement in front of a potential purchaser, which should be no different from other types of competitive/comparative advertising, particularly if the advertiser does not include the trademarked term in its online advertisement. Many trademark owners disagree and consider the use of their marks as keywords to constitute infringement or unfair competition that improperly diverts Internet traffic from their sites and confuses consumers about the source of the products they encounter via pop-up ads, banners and sponsored search results.
|
Many disputes have arisen over the rights to domain names that are identical or similar to existing trademarks. Unrelated companies, competitors, and disgruntled individuals register such domain names, often causing difficulty for the owners of non-famous and famous marks alike. Such registrations may be innocent, or they may be done deliberately in an attempt to gain an unfair commercial advantage over a competitor or obtain financial payment from the holder of the mark (i.e., domain name piracy or “cyberquatting”). Mark holders have sought relief in domain name disputes under federal law, such as the Anti-Cybersquatting Consumer Protection Act (ACPA) and domain name administrative policies adopted specifically to handle domain name disputes (e.g. the ICANN Domain Name Dispute resolution Policy (UDRP)), as well as under federal trademark laws and state unfair competition laws.
|
Privacy Rights and Data Security |
There is no comprehensive set of privacy rights or legislation in the United States addressing the collection, storage, transmission or use of personal information on the Internet or in other business environments. Instead, privacy has generally been protected by common law and by federal and state legislation enacted as new technologies develop, to target specific privacy-related issues.
For example, the Electronic Communications Privacy Act (ECPA) is the federal statute that updated wiretapping laws to include protection for electronic communications, such as emails. The Act further proscribes the intentional use of the contents of any wire, oral, or electronic communication, that was obtained through the interception of a communication and allows for both criminal penalties and civil causes of action for violations of its provisions. Specifically, the ECPA protects “point-to-point” electronic communications, or communications as they travel through cyberspace. The ECPA contains two sections: Title 1 amended the Wiretap Act, and Title II created the Stored Communications Act. Consequently, the ECPA established a two-tier system, creating separate categories of violations predicated upon whether the electronic communications are accessed while “in transit” or while “in storage.”
Although many privacy laws address the government’s use of personal information, many others address the use of personal information by private entities, whether it be financial, medical, or sensitive consumer information, commercial messages sent via email, facsimile or SMS, or electronic data intercepted during transmission or improperly accessed from data storage. Moreover, federal and state data security laws that impact electronic privacy concerns have recently been enacted to stem
====== 125 ======
Advances in Internet technology have also allowed website operators and advertisers to collect, compile and distribute personal information about users’ Internet browsing activities, both with and without the user’s consent. Such practices will almost always implicate privacy concerns.
○ | Riley v. California – In 2014, the Supreme Court held that the qualities of digital data, particularly data held on a cell phone, make them distinguishable from physical items for the purposes of the Fourth Amendment’s privacy protections.147 In one of the two cases consolidated on appeal, the petitioner was stopped for a traffic violation, upon which an officer searched his cell phone without a warrant. The officer accessed information on the phone and noticed the repeated use of a term associated with a street gang. At the police station two hours later, a detective specializing in gangs examined the phone and unearthed photos and video that tied the petitioner with a shooting that had occurred a few weeks earlier. Based on this information, the petitioner was charged, with a request for an enhanced sentence based on his purported gang affiliation, in connection with the shooting. The court noted that neither of the rationales for a search incident to lawful arrest: (1) harm to officers and (2) destruction of evidence, are applicable when the search is of digital data.148 Digital data cannot be used as a weapon nor can it serve as evidence that can be destroyed by the arrestee.149 ====== 126 ====== Moreover, cell phones and the digital data contained therein, allow for a more intrusive search, and therefore raises heightened privacy concerns. The term cell phone is “itself a misleading shorthand; many of these devices are in fact minicomputers that also happen to have the capacity to be used as a telephone.” Moreover, because of the “immense storage capacity” of modern cellphones, the intrusion on privacy is not physically limited in the same way. This storage capacity allows a person in possession of the phone to potentially reconstruct a person’s private life, or view apps that can serve as proxies for the interests or foibles of a person. |
○ | Joffe v. Google, Inc. – Plaintiffs filed putative class actions alleging that Google violated the ECPA and numerous state laws by collecting data from unencrypted wireless local area (Wi-Fi) networks. A primary exception to the ECPA provides that it is permissible to intercept an “electronic communication made through an electronic communication system” is the system is configured so that it is “readily accessible to the general public.”150 In 2013, the Ninth Circuit issued an amended opinion which held that payload data transmitted over unencrypted Wi-Fi networks did not constitute “electronic communications” within the meaning of the ECPA, therefore the acquisition of the payload data did not fall under the exception for data “readily available to the general public.”151 Specifically, the Wi-Fi payload data did not constitute a “radio communication” under 18 U.S.C. § 2510(16). Therefore, since “radio communication” is considered an “electronic communication,” if the payload data was not a “radio communication,” it could thus be considered for the exception for types of “electronic communications” that are allowed to utilize this exception. |
====== 127 ====== | |
○ | In re Google Inc. Privacy Policy Litig. – A search engine’s creation of a single, universal privacy policy that eliminated separate privacy policies and allowed it to cross- reference and use consumers’ personal information across its multiple online products did not result in a cognizable injury under federal or state privacy statutes. The court dismissed the plaintiff’s complaint for lack of standing, with leave to amend.152 The court found that plaintiffs failed to identify a concrete harm from the alleged combination of their personal information across Google’s products sufficient to create an injury, and noted that “nothing in the precedent of the Ninth Circuit or other appellate courts confers standing on a party that has brought statutory or common law claims based on nothing more than the unauthorized disclosure of personal information, let alone an unauthorized disclosure by a defendant to itself.” |
○ | Pirozzi v. Apple Inc. – A user who brought a putative class action against a mobile device manufacturer for failing to prevent third-party apps distributed through its online App Store from uploading user information from their mobile devices without permission lacks Article III standing because the complaint failed to allege specifics on purchased Apple devices, which company statements were misleading, or otherwise offer evidence that an app developer misappropriated her personal information.153 The court dismissed the complaint, with leave to amend. The court found that the plaintiff’s first claim – that she overpaid for her Apple device or was induced to purchase a device – was lacking because plaintiff failed to allege specifically which statements she found material to her decision to purchase an Apple device or app. On the plaintiff’s second claim - misappropriation of her personal information – the court stated that the plaintiff failed to plead that a third-party app developer actually misappropriated her personal information, only that her personal information was at a greater risk of being misappropriated, and concluded that such hypothetical allegations of future harm were insufficient to confer standing. Interestingly, the court refused to dismiss the action based upon CDA Section 230 immunity, finding that, at this early stage, plaintiff’s claims that Apple somehow misled Plaintiff as to the “nature and integrity of Apple’s products” and induced plaintiff to purchase an Apple device would not seek ====== 128 ====== |
○ | Patco Constr. Co. v. People’s United Bank – A bank’s security procedures provided to a commercial account holder that was the victim of fraudulent wire transfers were not commercially reasonable under UCC Article 4A.154 The appeals court reversed the lower court’s grant of summary judgment to the bank and remanded the case. The court concluded that the bank, whose security system prompted users logging in to answer challenge questions on any transaction over $1, increased the risk that such answers would be captured by keyloggers or other malware. Moreover, the court concluded that the bank’s failure to monitor and immediately notify customers of abnormal transactions that had been flagged by its security software was not commercially reasonable. The court stated that such collective failures taken as a whole rendered the bank’s security system commercially unreasonable under the UCC. The appeals court also reinstated some of the plaintiff’s common law claims, finding that while Article 4A displaced the plaintiff’s negligence claim, the plaintiff’s breach of contract and breach of fiduciary duty were not preempted by Article 4A because such claims were not inherently inconsistent or in conflict with the plaintiff’s overarching Article 4A claim. However, despite ruling that the bank’s security procedures were not commercially reasonable, the appeals court affirmed the denial of the plaintiff’s summary judgment claim. The court noted several disputed issues of fact surrounding the question of whether the plaintiff had satisfied its obligations and responsibilities under Article 4A, or at least to the question of damages. |
○ | Keller v. Electronic Arts, Inc. – A former college athlete may proceed with right of publicity claims against a video game maker ====== 129 ====== |
○ | Hayes v. SpectorSoft Corp. – An individual who was the victim of his ex-spouse’s installation of keylogging software on his computer cannot bring federal communications privacy or state law negligence claims against the software maker for his emotional distress ====== 130 ====== |
○ | Zheng v. Yahoo! Inc. – There is no language in the Electronic Communication Privacy Act (ECPA) itself, nor to any statement in the legislative history that indicates Congress intended that the statute apply to activities occurring outside the United States.157 The court dismissed the plaintiff’s federal electronic privacy-related claims stemming from an alleged disclosure of user information to Chinese authorities. The court also rejected the plaintiffs’ argument ====== 131 ====== |
○ | Quon v. Arch Wireless Operating Co., Inc. – Under the Stored Communications Act (SCA), a text message service is prohibited from disclosing contents of text messages, absent the consent of the addressee or intended recipient of such communications.158 The appeals court reversed the lower court’s ruling that the text message service permissibly released transcripts of the plaintiff-police officer’s text messages sent and received from his work-issued pager for the purpose of an audit by his employer. The court also ruled that the government employer had violated the employer’s reasonable expectation of privacy under the Fourth Amendment. The court found that, under the SCA, the text message service was an “electronic communication service” (i.e., any service which provides to users thereof the ability to send or receive wire or electronic communications). Accordingly, the text message service was prohibited from releasing the contents of a communication without the lawful consent of the addressee or intended recipient. In further proceedings, the Supreme Court granted certiorari on the sole issue of ruling on the Ninth Circuit’s holding that the city employer violated the Fourth Amendment.159 The Court was reticent to fashion a general principle about electronic privacy around text messages sent or received by government employees and decided the case on narrower grounds. The court stated that even assuming the city employee had a reasonable expectation of privacy in his text messages, the city did not necessarily violate the Fourth Amendment by obtaining and reviewing the transcripts of the messages because (1) there were reasonable grounds for suspecting that the search was necessary for a non-investigatory work-related purpose; (2) the review of the transcripts was an efficient and expedient way to determine whether the employee’s excess usage was due to personal use; and (3) even if the SCA forbade the cellular phone carrier from ====== 132 ====== |
○ | Boring v. Google, Inc. – Residents’ state privacy claims against a search engine that offered online “street view” mapping images from their private driveway, including images of the outside of the plaintiffs’ residence, are not cognizable because such conduct would not be highly offensive to a person of ordinary sensibilities.160 The appeals court affirmed the dismissal of privacy and negligence claims against the search engine, but reversed the lower court’s dismissal of the plaintiffs’ trespass claim. The court allowed the trespass claim to go forward because the plaintiffs alleged that the defendant entered their property without permission, which, if proven, would constitute a trespass. The court commented that there is no requirement under Pennsylvania law that damages be pled, either nominal or consequential, in trespass cases, even though “it may well be that, when it comes to proving damages from the alleged trespass, the [plaintiffs] are left to collect one dollar and whatever sense of vindication that may bring.” |
The Federal Trade Commission (FTC) has taken an active role with respect to protecting privacy rights in connection with the collection and use of personal information for commercial purposes. Most notably, the FTC has undertaken enforcement actions against entities that sold information to third parties for commercial purposes contrary to a website privacy policy, failed to keep consumer information secure, installed malicious spyware or adware onto unknowing consumers’ computers, or violated the federal do-not-call list with an unlawful telemarketing campaign. In addition, federal civil rights laws and the Health Insurance Portability and Accountability Act (HIPAA) Privacy Rule, together protect individuals’ rights of non-discrimination and health information privacy, with enforcement falling upon the Department of Health and Human Services’ Office of Civil Rights.
|
Among other things, the Computer Fraud and Abuse Act (CFAA)168 prohibits accessing a computer and obtaining information “without authorization” or by “exceeding authorized access.” The statute lists many different types of criminal “hacking” conduct punishable by fines or imprisonment. In relevant part, §1030(a)(2)(C) provides: “[Whoever] intentionally accesses a computer without authorization or exceeds authorized access and thereby obtains…information from any protected computer if the conduct involved an interstate or foreign communication…shall be punished,” and in related statutory language, §1030(a)(4) prohibits similar behavior with an intent to defraud.
Although principally a criminal statute, the CFAA also provides for a private civil right of action, allowing for awards of damages and injunctive relief in favor of any person who suffers a loss due to a violation of the act. Although the CFAA was enacted almost 25 years ago, courts continue to decide how the statute applies to new factual scenarios in a rapidly and ever-changing computerized world.
Most notably, the CFAA has been used increasingly in civil suits by employers to sue former employees and their new companies ====== 141 ======
Beyond federal law, a majority of states have enacted computer trespass and fraud statutes that allow claims for various degrees of unauthorized access and copying, schemes to defraud, and the unlawful destruction of proprietary data.
|
====== 144 ======
The CAN-SPAM Act,185 which imposes requirements on those who send commercial email messages to consumers and establishes civil and criminal penalties for the transmission of unsolicited commercial electronic mail, or spam, that does not comport with the Act’s requirements, continues to garner the public’s attention as spam remains a stubborn problem. Essentially, the CAN-SPAM Act protects consumers by offering them a legal right to “opt out” of future spam. In most situations, it is not required that a business get permission from a potential recipient before sending commercial email. Still, businesses are not permitted to send commercial emails to those who request to be removed from the businesses’ lists Notably, the act expressly preempts all state laws to the extent that they address the permissibility of unsolicited commercial email, except for those that apply “falsity or deception in any portion of a commercial electronic mail message or information attached thereto.” Courts have wrestled with the question of what constitutes falsity or deception under the statute, whether cognizable state claims must be based on the traditional tort theory of common law fraud and deceit, which usually requires a plaintiff to plead it with particularity, or whether state consumer or anti-spam laws may survive preemption for regulating something less than fraud. District courts to have addressed the issue have reached differing results
|
====== 147 ======
The Telephone Consumer Protection Act (TCPA) was originally adopted in 1991 to, among other things, protect the privacy of citizens by restricting the use of telephones for unsolicited advertising and, more specifically, curb telemarketers from using autodialers to make millions of unsolicited calls to residential and business telephone numbers, fax machines and cellular telephones. The TCPA also prohibits the use of any fax machine, computer, or other device to send unsolicited fax advertisements, absent certain consent requirements.
|
The First Amendment’s freedom of speech and the press provide protection for certain uses of content on the Internet or in a digital application and can limit rights of publicity in one’s name or likeness for newsworthy and other purposes.196 Moreover, in certain instances, ====== 151 ======
|
Technology-Related Patent Litigation |
A patent represents the grant of a property right from the federal government to the inventor (or his assigns) for a limited time. The grant of this patent right represents a quid pro quo exchange between the inventor and the United States government. The inventor must disclose in his application a detailed description of how to make and use the new invention; in exchange for this full public disclosure of the invention and how it works, the government confers temporally limited rights of exclusivity on the inventor. Following the expiration of the exclusive term of the patent, the invention becomes part of the public domain, where the public may benefit from its disclosure by making, using, or selling the invention as it is described in the patent without permission from the patentee. In this way, the inventor’s disclosure advances industry and furthers innovation. Importantly, the power of a patent does not oblige the patent holder to make, use, or sell the invention in his patent, but rather confers only the power to exclude others from doing so. What remedies a patent owner can be awarded in the instance of a successful infringement claim has become the subject of recent litigation at the Supreme Court level.
○ | Octane Fitness, LLC v. ICON Health & Fitness, Inc. – In 2014, the Supreme Court took up the issue of attorneys’ fees awards in “exceptional” patent infringement cases.204 In determining the standard for “exceptional cases,” the Supreme Court abrogated the Federal ====== 155 ====== |
○ | TransCore, LP v. Electronic Transaction Consultants Corp. – A nonexclusive patent license is simply a promise not to sue for ====== 156 ====== |
○ | Wisconsin Alumni Research Found. v. Intel Corp. – A software company’s research grant to a university based upon contract language that gave the software company “unrestricted rights at no cost to the results of this research” did not give the software company the right to practice the hardware patent produced from the research.208 In ruling in favor of the university, the court stated that the contract was ambiguous as to a grant of patent rights and held that given the circumstances underlying the agreement, the parties did not intend to transfer to the software company an express or implied license to the patent in exchange for the funding. |
○ | Quanta Computer, Inc. v. LG Electronics, Inc. – The patent exhaustion doctrine prevents a patentee from further asserting its right in patented methods substantially embodied in products permissibly sold by its licensee to third-party downstream manufacturers.209 The Supreme Court reversed the Federal Circuit’s ruling that the patent exhaustion doctrine did not apply to method patents and held that the licensee’s authorized sale of computer ====== 157 ====== |
Congress has not enacted comprehensive patent law reform in more than 50 years. While Congress has considered patent reform legislation over the last decade, the need to modernize the patent laws has found expression in the courts as well. In recent years, the Supreme Court has reversed the Federal Circuit in at least a handful of patent-related cases. According to a Senate Judiciary Committee report, the Court’s decisions have moved in the direction of improving patent quality and making the determination of patent validity more efficient, with the Court’s decisions reflecting a growing sense that questionable patents are too easily obtained and are too difficult to challenge.
○ | Leahy-Smith America Invents Act – On September 16, 2011, the President signed patent reform legislation that amended the Patent Act in several important ways. Among other things, the patent reform law transitions the U.S. to a first-inventor-to-file patent system from a first-to-invent.210 The first-to-file provisions become effective 18 months following passage of the law (i.e., March 16, 2013). Moreover, 18 months from the date of passage, the existing on sale bar will be eliminated, leaving a limited one-year grace period for certain disclosures made by the inventor (or joint inventor or by another who obtained the subject matter disclosed directly or indirectly from the inventor or a joint inventor). In addition, effective upon passage of the new law, an accused infringer may avoid liability by asserting a prior commercial use defense, which expands the defense to all areas of technology beyond business methods, and requires a showing of both reduction to practice and commercial use at least one year before the effective filing date of the claimed ====== 158 ====== |
○ | Mayo Collaborative Servs. v. Prometheus Labs., Inc. – Patent claims covering medical processes that helped doctors monitor the effects of certain medications based upon blood tests are unpatentable applications of natural laws under §101.211 The Supreme Court reversed the Federal Circuit, which had held that the claimed medical treatment processes “transformed” human blood and satisfied the “machine or transformation” test. In a unanimous opinion, the Supreme Court found that the claimed processes were not patentable because they did not have additional features that provided practical assurance that the processes were genuine applications of those laws rather than drafting efforts designed to monopolize the correlations. The court stated that because methods for making such medical determinations were well known in the art, the patentee’s claims simply told doctors to engage in well-understood, routine, conventional activity, and as such, were not sufficient to transform an unpatentable law of nature into a patent-eligible application of such a law. From a policy standpoint, the court reiterated its concern that patent law “not inhibit further discovery by improperly tying up the future use of laws of nature,” particularly when a patented process “amounts to no more than an instruction to ‘apply the natural law’ or otherwise forecloses more future invention than the underlying discovery could reasonably justify.” Notably, the court rejected the position adopted in the Government’s amicus brief concerning the proper place of §101, stating that §101 was an established inquiry, and to shift the patent eligibility inquiry entirely to other patent law sections (e.g., §102 - novelty, §102 - obviousness, §112 - written description requirement) “risks creating greater legal uncertainty, ====== 159 ====== |
○ | Nautilus, Inc v. Biosig Instruments, Inc. – In this case, the Supreme Court rejected a standard to determine whether a patent claim was too indefinite, and therefore non-patentable.212 The previous standard, which tolerated some ambiguous claims, but not others, stated that such patent claims can meet the Patent Act’s definiteness requirement as long as such claims were “amenable to construction” and not “insolubly ambiguous.”213 standard on the grounds that it was insufficient to meet the standards of definiteness embodied in the Act The notion that a claim that is “amenable to construction” or not “insolubly ambiguous” could survive a definiteness challenge could “breed lower court confusion, for [these formulations] lack the precision the [Act] demands.” To tolerate such a standard would “diminish the definiteness requirement’s public-notice function and foster the innovation-discouraging ‘zone of uncertainty.’“ The court also noted that “it cannot be sufficient that a court can describe some meaning to a patent’s claims; the definiteness inquiry trains on the understanding of a skilled artisan at the time of the patent application, not that of a court viewing matters post hoc.”214 Accordingly, the appropriate standard for ascertaining whether a claim is sufficiently definite depends on if those skilled in the art can be informed of the scope of the invention with reasonable certainty. Although the definiteness requirement must ====== 160 ====== |
Business method patents have produced much commentary in recent years. At one time, courts rejected a method of doing business as not being within the class of patentable subject matter. The Federal Circuit then ruled that patentability does not turn on whether the claimed subject matter does “business” instead of something else and thus business method inventions would be considered like any other process claims. In recent years, however, courts and the U.S. Patent and Trademark Office have seemingly become stricter with regard to their scrutiny of business method patents.
○ | Alice Corp. Pty. Ltd. v. CLS Bank Intern. – During the 2014 Term, the Supreme Court issued a ruling that centered on whether using a computer system to mitigate “settlement risk” was an abstract idea, and thus not patentable.215 The Petitioner was an assignee of several patents that disclose a method of attenuating settlement risk, meaning that the patents were designed to facilitate the exchange of financial obligations between two parties via a computer system as a third-party intermediary.216 In light of Bilski, the District Court held that all claims were ineligible for patent protection as recitations of an abstract idea, and the Federal Circuit affirmed. The high court agreed. First, the court determined that the patent claims at issue are directed to a patent-ineligible concept like laws of nature, natural phenomena, and abstract ideas. The Petitioner’s claims were directed at abstract ideas, intermediated settlement, that like risk hedging, was deemed in Bilski to be a “fundamental economic practice long prevalent in our system of commerce.” As such, the Petitioner’s claims pertained to the abstract idea of intermediated settlement, and the court then turned to whether the method claims transformed the abstract idea into a patent-eligible invention.217 Specifically, the ====== 161 ====== |
○ | Ultramercial v. Hulu – In 2014, in light of Alice Corp., the Federal Circuit reversed its original decision in this case to hold that this method of contributing and monetizing copyrighted products via the Internet was no longer patent eligible under 35 U.S.C. § 101.219 Given the “added benefit of the Supreme Court’s reasoning in Alice Corp.,” the court followed the framework established in the case to determine that “the concept embodied by the majority of the limitations describes [in the patent application] only the abstract idea of showing an advertisement before delivering free content.”220 As for ====== 162 ====== |
○ | Bilski v. Kappos – The machine-or-transformation test is not the sole test for patent eligibility under §101 because any ordinary, contemporary meaning of “process” under the Patent Act would not necessarily require it to be tied to a machine or the transformation of an article.221 The Supreme Court affirmed the Federal Circuit’s holding of unpatentability and found the patentee’s claims, which sought to patent both the concept of hedging risk and the application of that concept to energy markets, were attempts to patent abstract ideas, not patentable processes. Most notably, the Court rejected the Federal Circuit’s holding222 that the “machine-or-transformation test” is the exclusive test for determining patentability of a process under §101, instead holding that the test remains a “useful and important clue,” but not the “sole test” for determining whether an invention is a patent-eligible process under §101. The Court also refused to interpret the Patent Act to categorically exclude business methods.223 The Court stated that the Act “leaves ====== 163 ====== |
Electronic Contracting |
In today’s technological world, any company may conduct some or all of its business electronically. Companies may enter into a contract via email or over the Internet, and just as messages sent using faxes, telex, telegraph, and other older communication methods can satisfy the Statute of Frauds, so too can emails exchanged between parties can form a valid contract. Companies and individuals may also contract by traditional or electronic means to license software, to buy or lease hardware, and/or to access or use a computer database. Whether the electronic element constitutes an incidental part of the subject matter of the contract, both traditional contract law concepts and issues specific to the electronic context may arise.
With the advent of mass-market software and Internet computer sales, individually negotiated contracts have largely been abandoned for practical reasons. On the Internet, Web pages or pre-installation screens often contain standardized clickwrap agreements, which are intended to take the place of any direct bargaining between the parties. These clickwrap agreements generally require online users to indicate their assent to the terms of an online agreement by means of conduct, such as by clicking
====== 164 ======
○ | Nguyen v. Barnes & Noble Inc. – A consumer brought a putative class action against a large retailer after his online order of a tablet computer at a discounted price during a liquidation period was cancelled.226 The retailer then filed motion to compel arbitration of any claims arising from the putative class action based on a provision in its website Terms of Use mandating arbitration of any disputes arising from an alleged breach of such Terms. The Terms of Use, which were hyperlinked in the bottom left-hand corner of every page on the Barnes & Noble website alongside hyperlinked copyright notices and privacy policy. The plaintiff had not clicked on the “Terms of Use” hyperlink nor actually read the Terms of Use. Precedents required that since Nguyen had not read the Terms of Use, and therefore did not have actual knowledge of them, the validity of the agreement turns on whether the website puts a reasonably prudent user on inquiry notice of the terms of the contract.227 Such inquiry notice depends on the design and content of the website and the agreement’s webpage. Although the court conceded that Barnes & Noble had made its Terms of Use available via a conspicuous hyperlink on every page of the website, it ultimately refused to enforce the arbitration provision as the site otherwise provided no notice to users nor prompts them to any affirmative action to demonstrate assent. |
○ | Asch Webhosting Inc. v. Adelphia Business Solutions Investment LLC – An ISP that terminated a service contract with a small downstream Internet access provider because of spam-related complaints may rely on an exculpatory clause to escape any liability ====== 165 ====== |
○ | Surplus.com, Inc. v. Oracle Corp. – A software development agreement that included provisions for maintenance and technical support did not render the software a “service” instead of a “good” such that the agreement is governed under UCC Article 2.229 The court granted the defendant’s motion to dismiss, finding that the four-year statute of limitations for breach of contract under the UCC applied to the plaintiff’s claims. The court found that although the custom software development entailed the provision of services–even software development services that were performed by an outside entity–those services were ancillary to the software that was the heart of the relevant agreement. The court concluded that the agreement’s provision for maintenance and technical support did not render the software a “service” rather than a “good” under the UCC. |
○ | In re Zappos.com, Inc. – An arbitration clause contained in a browsewrap agreement that could be accessed via an inconspicuous ====== 166 ====== |
○ | Defontes v. Dell – An arbitration clause in a computer purchase shrinkwrap license was deemed unenforceable where the language of the terms and conditions agreement included with the goods did not reasonably inform the consumer class that they could reject the terms simply by returning the goods.231 The Rhode Island Supreme ====== 167 ====== |
○ | AT&T Mobility LLC v. Concepcion – Because it stands as an obstacle to placing arbitration agreements on an equal footing with other contracts, California’s Discover Bank rule – which held that class action waivers in consumer arbitration agreements were unconscionable if the agreement was in an adhesion contract, disputes between the parties were likely to involve small amounts of damages, and the party with inferior bargaining power alleged a deliberate scheme to defraud – is preempted by the Federal Arbitration Act.232 |
○ | Anderson v. Bell – A candidate may use electronic signatures to satisfy the signature requirement that Utah law imposes on those unaffiliated with a political party who wish to run for statewide office.233 The state supreme court granted the plaintiff’s petition to compel state election officials to count the electronic signatures submitted in support of his candidacy for governor. The court found that while the legislature designed the Election Code with a paper format in mind, the legislature also left open the possibility that a signor may lend his name to a certificate for nomination in electronic ways when it passed the Uniform Electronic Transactions Act (UETA), which “applies to electronic records and electronic signatures relating to a transaction.” The court found that UETA’s list of exceptions was silent on the topic of elections and campaigning. The court also rejected the state agency’s argument that as a party ====== 168 ====== |
Jurisdiction and Procedure |
As plaintiffs increasingly have urged courts to exercise jurisdiction over non-resident parties based on their Web presence, two lines of analysis have arisen in the judicial opinions. One line of reasoning developed from the opinion in Zippo Manufacturing Co. v. Zippo Dot Com Inc., 234 where the court proposed that “the likelihood that personal jurisdiction can be constitutionally exercised is directly proportional to the nature and quality of commercial activity that an entity conducts over the Internet.” The Zippo court established a “sliding scale” of Internet activity. On one end of the scale lie passive sites that only provide information and do not allow any interaction between a user and the website, and thus, are unlikely to provide a basis for the exercise of jurisdiction. On the other end of the scale are fully interactive websites where a defendant conducts business over the Internet, a site much more likely to provide a basis for the exercise of jurisdiction.
Another line of cases follow the reasoning of the Supreme Court’s decision in Calder v. Jones,235 a pre-Internet defamation case in which the Court held that jurisdiction could be premised on the intentional conduct of defendants outside the forum state that is calculated to cause injury to the plaintiffs within the forum state. Courts typically apply the Calder “effects test” in cases involving defamation or some other intentional tort, including trademark infringement.
○ | Guffey v. Ostonakulov – In 2014, the Oklahoma Supreme Court held that a Tennessee-based used car dealer that used eBay to sell a ====== 169 ====== |
○ | Zynga Game Network Inc. v. Does – An online videogame company that sought discovery from third-party web hosting companies and other websites seeking the identity of domain name holders who are allegedly operating infringing websites must narrow the scope of its subpoenas to information related to the identify and name the John Doe defendants.238 The court granted the plaintiff’s motion to conduct limited discovery, but narrowed the scope of the subpoenas, stating that the plaintiff’s request for items such as server logs, website content transaction histories and correspondence remotely linked to the defendants was overbroad. The court ultimately limited the reach of the subpoena to “all documents necessary to obtain the name, current and permanent addresses, telephone numbers, and valid email addresses of the owner(s) of [the defendant’s allegedly infringing website] or similar information suitable for identification and location of defendants.” |
○ | Penguin Group (USA) Inc. v. American Buddha – In copyright infringement cases involving the uploading of a copyrighted printed literary work onto the Internet, the situs of injury for purposes of determining long-arm jurisdiction under C.P.L.R. § 302(a)(3)(ii) is the location of the principal place of business of the copyright ====== 170 ====== |
○ | Internet Solutions Corp. v. Marshall – A nonresident defendant commits the tortious act of defamation in Florida for purposes of Florida’s long-arm statute when the nonresident makes allegedly defamatory statements about a Florida resident by posting those statements on a website, provided that the website posts containing the statements are accessible in the forum and accessed in the forum.240 ====== 171 ====== |
○ | Consulting Engineers Corp. v. Geometric Ltd. – Foreign software developers were not subject to personal jurisdiction in a Virginia forum based upon email and telephone contacts concerning a project in India, particularly since no agreement to perform work was ever reached.241 |