e-commerce LAW & STRATEGY - Heymann & Partner, Rechtsanwälte
e-commerce LAW & STRATEGY - Heymann & Partner, Rechtsanwälte
e-commerce LAW & STRATEGY - Heymann & Partner, Rechtsanwälte
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
<strong>LAW</strong> JOURNAL<br />
NEWSLETTERS<br />
On the Razr’s<br />
Edge: Mobile<br />
Marketing<br />
Be Careful to Whom,<br />
And How, Your Mobile<br />
Campaign Is Directed<br />
By Luis Salazar<br />
You can see it and read about<br />
it everywhere: mobile-phone ad<br />
campaigns are the new frontier<br />
in marketing.<br />
Mobile marketing offers the<br />
best in advertising — a direct,<br />
personal, measurable and dynamic<br />
means of engaging, informing,<br />
and entertaining consumers. In<br />
fact, there are more than 2.4 billion<br />
mobile-phone subscribers<br />
worldwide exchanging over 350<br />
billion text messages each month,<br />
with an estimated 15% of those<br />
classified as commercial or marketing<br />
messages.<br />
But this mobile advertising<br />
frontier is hardly the Wild West.<br />
Plenty of federal and state laws<br />
regulate this direct-marketing<br />
vehicle. More than that, various<br />
industry groups — most notably<br />
the Mobile Marketing Association<br />
(“MMA”) — have developed best<br />
practices designed to maximize<br />
advertising impact while minimizing<br />
potential legal entanglements.<br />
While the rewards of mobilephone<br />
campaigns can be rich,<br />
it’s important not to lose sight of<br />
these restrictions.<br />
This article reviews some of<br />
the critical legal issues marketers<br />
should be aware of, and reviews<br />
the industry’s best practices.<br />
continued on page 6<br />
e -<strong>commerce</strong><br />
L A W & S T R A T E G Y ®<br />
Sale of Used Software Licenses in Germany<br />
Federal Court Expected to Decide a Hot Issue Soon<br />
That Will Affect Europe<br />
By Dr. Katharina Scheja<br />
Volume 24, Number 2 • June 2007<br />
Once in a while, something known as “new distribution forms” of software<br />
catch the attention of people in the tech market in Germany. But standard<br />
license agreements and provisions of German copyright law do not always<br />
match perfectly, and these discrepancies give rise to gaps and misunderstandings<br />
that courts must ultimately settle.<br />
Accordingly, a couple of landmark decisions have come down from the<br />
Bundesgerichtshof (“German Federal Court”) over the last few years. While the German<br />
Federal Court has refused to accept the once famous original equipment manufacturer<br />
(“OEM”) clause that set forth restriction of stand-alone sale of software without hardware<br />
in 1999 (BGH, July 6, 2000, File Number I ZR 244/97 (OEM)), it has decided, on<br />
the other hand, that network licenses must be accepted as a permissible use of software<br />
licenses (BGH Oct. 24, 2002, File Number I ZR 3/00 (CPU)). Even though these license<br />
forms have been subject to Federal Court evaluation, other concepts to circumvent<br />
software-licensing restrictions have come up, and have yet to be decided.<br />
RESELLING USED SOFTWARE LICENSES<br />
A hot topic in such licensing restrictions concerns the resale of “used” licenses.<br />
Since the Federal Court has decided that the stamped restriction on a Microsoft OEM<br />
product “for sale with a new PC only” is void under German law, the sale of fullpackaged<br />
software products cannot be made subject to usage restrictions if contractual<br />
provisions between customer and licensor have been put in place that aren’t<br />
valid (which is not typical). Such restrictions are not in line with the exhaustion<br />
principle as defined in §69 c Urhebergesetz (German Copyright Act) — a provision<br />
incorporated from the EU Software Directive (Directive 91/250/EWG) and is in force<br />
throughout Europe. The prohibition of distribution restrictions, however, once a<br />
work has been released to the market, applies only to physical incorporations of<br />
the work, according to the law’s literal wording. The question arises, though: Does<br />
continued on page 2<br />
In This Issue<br />
Sale of Used Software<br />
Licenses in Germany .1<br />
On the Razr’s Edge:<br />
Mobile Marketing . . .1<br />
When the CEO<br />
Wants His ‘Hotmail’ . .3<br />
Internet Expands<br />
Trademark<br />
Infringement . . . . . . .7<br />
e-Commerce<br />
Docket Sheet . . . . . .10<br />
Movers & Shakers . .11
Used Licenses<br />
continued from page 1<br />
this principle also apply, if for example,<br />
rights, but not products, are<br />
being sold?<br />
Yes is the answer, and some distributors<br />
have started to distribute<br />
freely defined numbers of application<br />
licenses purchased from a bulk<br />
of volume license agreements that<br />
their resellers (the first users) purchased<br />
from software manufacturers<br />
such as Microsoft and Oracle, but<br />
allegedly no longer need.<br />
An approach some others take is<br />
to “transfer” replication rights for<br />
software that the first customer was<br />
offered via download, has used, and<br />
then deletes and issues a sales document<br />
to the distributor — who then<br />
resells the “license.” Apparently, this<br />
approach makes use of some significant<br />
price deviations between fullpackaged<br />
product and software<br />
licenses that are priced more favorably<br />
as part of either volume license<br />
agreements or download offers. In<br />
the end, software manufacturers<br />
haven’t left the issue unattended, and<br />
have begun involving the courts,<br />
which have had to deal with this<br />
business model and have come to<br />
different conclusions. One can<br />
expect, then, that the Federal Court<br />
will have to decide the question. This<br />
article provides an overview of<br />
German precedents in the matter.<br />
ORACLE V. USEDSOFT GMBH<br />
Last year, the Munich Court of<br />
First Instance (Landgericht München,<br />
Jan. 1, 2006, File Number 7 0<br />
23237/05) and the Appellate Court<br />
(Oberlandesgericht München, Aug. 3,<br />
Dr. Katharina Scheja is a partner<br />
in the IT/IP Services Department<br />
of <strong>Heymann</strong> & <strong>Partner</strong>, Frankfurt,<br />
Germany. Dr. Scheja specializes in<br />
large IT transactions such as software<br />
and telecom projects, development,<br />
distribution and licensing contracts and<br />
outsourcing. She has also been active<br />
in anti-piracy. Among her memberships,<br />
Dr. Scheja counts the German<br />
Association for Computer Law and the<br />
German Association on IP Law. She<br />
joins the e-Commerce Law & Strategy’s<br />
Board of Editors with this issue. Reach<br />
her at k.scheja@heylaw.de.<br />
2<br />
2006, File Number 6 U 1818/06) decided<br />
a case brought by Oracle against<br />
software reseller usedSoft GmbH<br />
(“usedSoft”). The case dealt with software<br />
that Oracle offered via the<br />
Internet by download to its customers.<br />
usedSoft sold “used licenses” of this<br />
software to customers who had physical<br />
copies of the software and intended<br />
to enlarge their license portfolio,<br />
with the “licenses” having been purchased<br />
by the first customers who had<br />
downloaded the software from the<br />
Internet. The “transfer of license<br />
rights” was documented in a certified<br />
brief issued by a German notary public<br />
who verified having checked the<br />
delivery papers of the original license<br />
owner and the delivery to usedSoft,<br />
and confirmed that the original license<br />
owner had obtained the licenses legally,<br />
and did not continue to use them.<br />
Oracle argued that this offer of<br />
“used licenses” was infringing its<br />
copyright because Oracle hadn’t<br />
agreed to the transfer. Oracle<br />
applied for a preliminary injunction<br />
to cease and desist, and further<br />
refrain from, this offer. The Munich<br />
Court of First Instance granted the<br />
preliminary injunction, with the<br />
Appellate Court in Munich affirming<br />
the ruling. After that, in accordance<br />
with provisions of German<br />
Procedural Law, Oracle had to initiate<br />
main proceedings in which the<br />
legal issues would be checked thoroughly,<br />
and subject to collection and<br />
discussion of further facts and evidence.<br />
The Landgericht München<br />
this year upheld its earlier decision<br />
(see, Landgericht München, March<br />
15, 2007, File Number 7 O 7061/06).<br />
In their decisions, both Munich<br />
courts asserted that the exhaustion<br />
principle could not be applied to the<br />
resale of licenses and, accordingly,<br />
such resale needed the consent of<br />
the software manufacturer to be<br />
valid. In accordance with the wording<br />
of the law, both Munich courts<br />
clearly stated that the principle of<br />
exhaustion applies only to physical<br />
incorporation of protected works.<br />
These decisions have received<br />
enormous attention and been subject<br />
to intense discussion in the<br />
legal community. One of the most<br />
intensely discussed topics in German<br />
continued on page 6<br />
e-Commerce Law & Strategy ❖ www.ljnonline.com/alm?ecomm<br />
e-<strong>commerce</strong><br />
<strong>LAW</strong> & <strong>STRATEGY</strong> ®<br />
EDITOR-IN-CHIEF . . . . . . . . . .Michael Lear-Olimpi<br />
EDITORIAL DIRECTOR . . . . . .Wendy Kaplan Ampolsk<br />
MANAGING EDITOR . . . . . . . .Steven Salkin, Esq.<br />
MARKETING DIRECTOR . . . . .Jeannine Kennedy<br />
MARKETING<br />
COORDINATOR . . . . . . . . . . . .Beth Ann Montemurro<br />
GRAPHIC DESIGNER . . . . . . . .Louis F. Bartella<br />
BOARD OF EDITORS<br />
RICHARD BUCHBAND . . . .Juno Online Services Inc.<br />
New York<br />
JEFFREY P. CUNARD . . . . . .Debevoise & Plimpton<br />
Washington, DC<br />
WALTER A. EFFROSS . . . . . .American University<br />
Washington, DC<br />
D. REED FREEMAN JR. . . . .Claria Corp.<br />
Washington, DC<br />
ELIZABETH A. GAUDIO . . .Nat’l Federation of Ind. Bus.<br />
Legal Foundation<br />
Washington, DC<br />
PAUL R. GUPTA . . . . . . . . . .Mayer, Brown, Rowe & Maw<br />
New York<br />
THOMAS HEYMANN . . . . . .<strong>Heymann</strong> & <strong>Partner</strong><br />
Frankfurt, Germany<br />
STANLEY P. JASKIEWICZ . . .Spector Gadon & Rosen, P.C.<br />
Philadelphia<br />
PHILIPPA <strong>LAW</strong>SON. . . . . . .Canadian Internet Policy and<br />
Public Interest Clinic<br />
Ottawa<br />
EMILE LOZA . . . . . . . . . . . .Technology Law Group<br />
Boise, ID<br />
RONALD J. MANN . . . . . . .Mitts Milavec<br />
Philadelphia<br />
JULIAN S. MILLSTEIN. . . . . Thelen Reid Brown Raysman<br />
& Steiner LLP<br />
New York<br />
JEFFREY D. NEUBURGER. . .Thelen Reid Brown Raysman<br />
& Steiner LLP<br />
New York<br />
EDWARD A. PISACRETA. . . .Thelen Reid Brown Raysman<br />
& Steiner LLP<br />
New York<br />
LUIS SALAZAR . . . . . . . . . .Greenberg Traurig LLP<br />
Miami<br />
DR. KATHARINA SCHEJA . . .<strong>Heymann</strong> & <strong>Partner</strong><br />
Frankfurt, Germany<br />
J.T. WESTERMEIER, JR. . . . .DLA Piper Rudnick Gray Cary<br />
Northern Virginia<br />
JOSEPH P. ZAMMIT . . . . . . .Fulbright & Jaworski<br />
New York<br />
e-Commerce Law & Strategy® (ISSN 0747-8933) is published<br />
by Law Journal Newsletters, a division of ALM.<br />
© 2007 ALM Properties, Inc. All rights reserved. No reproduction<br />
of any portion of this issue is allowed without written permission<br />
from the publisher. Phone: 800-999-1916<br />
Editorial e-mail: ssalkin@alm.com<br />
Circulation e-mail: almcirc@alm.com<br />
The publisher of this newsletter is not engaged in rendering<br />
legal, accounting, financial, investment advisory or other<br />
professional services, and this publication is not meant to<br />
constitute legal, accounting, financial, investment advisory or<br />
other professional advice. If legal, financial, investment<br />
advisory or other professional assistance is required, the<br />
services of a competent professional person should be sought.<br />
e-Commerce Law & Strategy P0000-236<br />
Periodicals Postage Pending at Philadelphia, PA<br />
POSTMASTER: Send address changes to:<br />
ALM<br />
345 Park Avenue South, New York, NY 10160<br />
Annual Subscription: $395<br />
Published Monthly by:<br />
Law Journal Newsletters<br />
1617 JFK Boulevard, Suite 1750, Philadelphia, PA 19103<br />
www.ljnonline.com<br />
June 2007
When the CEO<br />
Wants His ‘Hotmail’<br />
Don’t Treat Your Business<br />
Records Like Presidential<br />
Correspondence<br />
By Stanley Jaskiewicz<br />
Many businesses today are conducted<br />
entirely by e-mail, sometimes<br />
through employees’ individual e-mail<br />
accounts.<br />
And you’ve most likely been in this<br />
spot: Often, the only place to find correspondence,<br />
contracts and other<br />
business records is in the electronic<br />
inboxes of everyone who works for a<br />
company.<br />
This is certainly convenient,<br />
because it lets all employees who<br />
need materials in their inboxes keep<br />
working, wherever they may be, without<br />
being tethered to a particular<br />
office and or cabinet full of paper files.<br />
But despite the convenience of<br />
working online, wouldn’t it be nice to<br />
have the luxury of an old-fashioned<br />
secretary to clean up your firm’s<br />
inboxes? Someone would maintain the<br />
traditional files, to store all messages<br />
arranged by client, subject and date.<br />
When something is needed, whether<br />
because a question arose about what<br />
a contract requires, a request is<br />
received to produce documents in ediscovery,<br />
or a copy of the latest or<br />
final draft of a contract is needed,<br />
it would be a simple matter of<br />
asking the secretary to assemble messages<br />
from that neatly sorted file.<br />
(Sophisticated document-management<br />
systems purport to create this result,<br />
but they are only as good as the documents<br />
that make it into the system.<br />
For reasons discussed in this article,<br />
many documents and e-mail messages<br />
might never make it there.) When all<br />
Stanley P. Jaskiewicz, a business<br />
lawyer, helps clients solve e-<strong>commerce</strong>,<br />
corporate contract and technology-law<br />
problems, and is a member<br />
of e-Commerce Law & Strategy’s<br />
Board of Editors. He can be reached<br />
at the Philadelphia law firm of<br />
Spector Gadon & Rosen P.C., at sjaskiewicz@lawsgr.com.<br />
business correspondence took place<br />
on paper, in a 9-to-5 work world, that<br />
system made perfect sense.<br />
Unfortunately, that world (and its<br />
secretaries) hasn’t existed for many<br />
years. Not only do most of us not<br />
have a secretary tidying up our email<br />
inbox each evening, but we also<br />
have many alternative inboxes for<br />
our business correspondence. For<br />
work, a busy executive may have an<br />
office e-mail account, a Blackberry<br />
for around-the-clock access and an<br />
online mail account (such as through<br />
Gmail, Hotmail or Yahoo!) for convenience<br />
when traveling. He or she<br />
probably also has a personal account<br />
for non-business e-mail that must be<br />
kept out of the firm’s accounts.<br />
Going through “the file” has become<br />
an exercise not only in finding the<br />
appropriate messages and attachments,<br />
but in simply identifying all<br />
places and accounts where “the file”<br />
might exist. Indeed, multiple accounts<br />
often are created by employees to<br />
bypass the hassles of security measures<br />
and record-retention policies<br />
diligently created by IT departments<br />
who often diligently enforce these<br />
polices and whose employees read<br />
and apply the information in publications<br />
like this one. (My IT staff<br />
would call those hassles “necessary<br />
inconveniences” to comply with the<br />
rules that lawyers perpetrate.) If the<br />
most convenient e-mail device —<br />
typically the Blackberry — is supplied<br />
by the employee herself, or by<br />
a third party, then the IT department<br />
might not know about all the<br />
accounts on which it is used, much<br />
less be able to monitor them, or<br />
apply the firm’s retention or other<br />
policies.<br />
Yet the rabbit-like multiplication of<br />
e-mail accounts has grave implications,<br />
not only for business, but, as<br />
we have seen in recent news, for<br />
anyone who uses e-mail — including<br />
even our government leaders. The<br />
pitfalls recently encountered by the<br />
politicos who apparently tried to<br />
keep secret their machinations about<br />
the replacement of various U.S.<br />
Attorneys, and dealings with lobbyists,<br />
by using private Republican<br />
National Committee (“RNC”)<br />
accounts, rather than White House<br />
e-mail accounts — with all their<br />
monitoring, recordkeeping and other<br />
oversight — mirror the risks businesses<br />
run when they allow employees,<br />
especially key employees, to<br />
bypass the company e-mail system.<br />
(See, http://online.wsj.com/article/<br />
SB117651545625969906.html?mod=<br />
googlenews_wsj; http://online.wsj.<br />
com/article/SB117615846511864432search.html?KEYWORDS=congress+f<br />
ollows+e-mail+trail&COLLEC-<br />
TION=wsjie/6month; and www.salon<br />
.com/opinion/blumenthal/2007/03<br />
/29/attorney_firings/.) The RNC’s email<br />
pratfalls provide an instructive<br />
lesson on what not to do when private<br />
businesses allow (or tolerate) an<br />
employee’s alternative online account,<br />
rather than the “official” employersanctioned<br />
one.<br />
RECENT DEVELOMENTS<br />
Even worse, consider how the<br />
White House’s and RNC’s problems<br />
with outside e-mail — and their<br />
staffers’ actual quotes about it —<br />
would appear if the situation involved<br />
your company, or a client’s, and you<br />
had to read about your employees<br />
and IT department defending your<br />
company’s e-mail snafus, using the<br />
same language as the widely reported<br />
actual quotes cited below. How it<br />
would play in the press and the concerns<br />
of unhappy clients would be<br />
the least of your worries, particularly<br />
compared to your legal headaches.<br />
You could have to give explanations<br />
to opposing counsel conducting discovery<br />
(and feeling misled by your<br />
formal responses), or worst of all,<br />
respond to subpoenas if the “alternative”<br />
e-mails trigger a regulatory<br />
investigation. (The following quotes<br />
all are actual statements reported in<br />
the press, but any of them could easily<br />
have come from well-meaning and<br />
bottom-line oriented employees — or<br />
IT staff who simply have not had adequate<br />
training on legal issues in<br />
records management, particularly as it<br />
applies to electronic records.)<br />
For example, an assistant to presidential<br />
advisor Karl Rove said in an<br />
e-mail (that was widely quoted in<br />
The Wall Street Journal, and other<br />
publications): “I now have an<br />
RNC blackberry which you can use<br />
continued on page 4<br />
June 2007 e-Commerce Law & Strategy ❖ www.ljnonline.com/alm?ecomm<br />
3
‘Hotmail’<br />
continued from page 3<br />
to e-mail me at any time. No security<br />
issues like my WH (White House) email.”<br />
Would your IT department tolerate<br />
that attitude from a staffer<br />
unhappy with the rules of your<br />
record-retention program or acceptable-use<br />
policy? Certainly not, since<br />
the reaction of opposing discovery<br />
counsel, or a court, might mirror that<br />
of the legislators who investigated<br />
the RNC, such as Rep. Henry<br />
Waxman (D-CA), who bluntly (but<br />
accurately) described the behavior of<br />
the White House staffers as “using<br />
the nongovernmental accounts<br />
specifically to avoid creating a record<br />
of the communications.” He also<br />
cited an instance in which a lobbyist<br />
had warned against using the “official”<br />
White House e-mail system,<br />
because “to put this stuff in writing in<br />
their e-mail system ... might actually<br />
limit what they can do to help us.” A<br />
Clinton-era staffer with similar clarity<br />
labeled this behavior as “operating<br />
official business off the official systems”<br />
— the very risk run by private<br />
firms that allow use of personal email<br />
accounts for business. From a<br />
practical perspective, you would be<br />
lucky if an opposing counsel finding<br />
any of these land mines in discovery<br />
gave you a chance to call your carrier<br />
to discuss settlement before seeking<br />
sanctions from the court.<br />
HOW ‘CONVENIENCE’<br />
CAN CAUSE PROBLEMS<br />
In an era when firms adopt carefully<br />
drafted record-retention policies,<br />
and e-mail and Internet-usage,<br />
policies to protect the firm against<br />
improper use of those resources by a<br />
rogue employee, allowing your<br />
firm’s staffers and executives alike to<br />
bypass those protections, like the<br />
White House officials, would make it<br />
hard to persuade a court to grant<br />
your firm the benefits of those policies.<br />
After all, the White House and<br />
RNC had to cope only with the<br />
requirements of the 1978 Presidential<br />
Records Act, which requires that sufficient<br />
records be kept “to assure that<br />
the activities, deliberations, decisions,<br />
and policies that reflect the<br />
performance of (the President’s) con-<br />
4<br />
stitutional, statutory, or other official<br />
or ceremonial duties are adequately<br />
documented and that such records<br />
are maintained” (www.archives.gov/<br />
about/laws/presidential-records.<br />
html).<br />
Private businesses, in contrast,<br />
must adhere to the stringent<br />
demands of Sarbanes Oxley and<br />
other regulatory acts — not to mention<br />
the after-the-fact scrutiny of the<br />
class-action plaintiffs’ bar.<br />
In particular, the recently adopted<br />
amendments to the Federal Rules of<br />
Civil Procedure (“FRCP”) impose<br />
strict standards for the storage and<br />
destruction of e-mail, and duties to<br />
produce it in litigation. With all of<br />
this alternative e-mail, it is fortunate,<br />
on the one hand, that the rules do<br />
not impose a duty to locate every<br />
possible electronic record, such as a<br />
critical e-mail that is not on the firm’s<br />
own system. “A party need not provide<br />
discovery of electronically<br />
stored information from sources that<br />
the party identifies as not reasonably<br />
accessible because of undue burden<br />
or cost.” On the other hand, however,<br />
the rules’ protection for those<br />
unable to produce relevant information,<br />
particularly that which has been<br />
destroyed or which is not maintained,<br />
do not provide a defense for<br />
casual failure to maintain records.<br />
“Absent exceptional circumstances, a<br />
court may not impose sanctions<br />
under these rules on a party for failing<br />
to provide electronically stored<br />
information lost as a result of the<br />
routine, good-faith operation of an<br />
electronic information system.”<br />
(Emphasis added.) If a firm knowingly<br />
permits those generating potential<br />
evidence — that is, everyone in<br />
the business who uses e-mail — to<br />
avoid the firm’s own systems for<br />
assembling that evidence, whether<br />
intentionally or not, then those<br />
defenses might be unavailable. The<br />
oversight might have been what<br />
many people responding to inquiries<br />
about the oversight would call “routine,”<br />
but almost certainly not “good<br />
faith operation.” No one wants to fall<br />
into such a fact-specific question as<br />
to whether the cost of not requiring<br />
every employee to adhere to a<br />
record-retention policy requiring use<br />
e-Commerce Law & Strategy ❖ www.ljnonline.com/alm?ecomm<br />
of the company’s own e-mail system<br />
was an “undue burden.”<br />
In fact, beyond the impact of the<br />
new rules, consider the practical burdens<br />
on an IT department facing a<br />
discovery demand, if use of the firm’s<br />
information-management software,<br />
systems and procedures is “optional”<br />
for those who prefer not to deal with<br />
it, and instead choose to use a<br />
personal e-mail address outside<br />
the system for their business correspondence.<br />
As mentioned above,<br />
responding to discovery requests<br />
might require assembling information<br />
from outside providers, either<br />
voluntarily (such as by requiring the<br />
employee to back up everything<br />
from the outside system into the document-management<br />
system), or by<br />
subpoena to a third party (at an<br />
unnecessary expense). Busy employees<br />
might not even keep copies of<br />
recent e-mail, much less of older correspondence.<br />
Implementation of a<br />
retention policy cannot be handled<br />
on a single server, as the IT staff may<br />
prefer, but will require them, at a<br />
minimum, to clean manually the<br />
memory of each affected user’s computer<br />
to eliminate records of saved<br />
mail. Of course, that work won’t<br />
purge anything from the service<br />
provider’s own servers and stored email<br />
— all of which an adverse party<br />
can obtain with relative ease — or<br />
from employees’ home computers or<br />
laptops that haven’t been synchronized<br />
with the system.<br />
THINGS CAN GO<br />
BUMP IN THE NIGHT<br />
IT management also becomes a<br />
nightmare. Monitoring employees’<br />
communications for objectionable<br />
content or activity, or for unauthorized<br />
transmission of proprietary<br />
information, becomes something like<br />
trying to catch raindrops with a sieve.<br />
Restoring data after a disaster, or<br />
locating the work of an employee<br />
who maybe left the firm before data<br />
was needed for litigation, becomes<br />
problematic. Data restoration assumes<br />
that the IT department can reconstruct<br />
all of the third party e-mail<br />
sources that the departed staffer<br />
used (whether or not the former<br />
employee shared that information,<br />
continued on page 5<br />
June 2007
‘Hotmail’<br />
continued from page 4<br />
and passwords, with tech support),<br />
and obtain access to them (perhaps<br />
without passwords or subscriber<br />
IDs). Even scrupulous staffers who<br />
keep different accounts to separate<br />
work and personal e-mail may err at<br />
times, and use the personal account<br />
for business (and provide an opening<br />
for opposing counsel’s discovery<br />
fishing expedition).<br />
In fact, even so-called normal business<br />
can be compromised when<br />
employees rely on alternative e-mail<br />
services, whether an online one, or<br />
private accounts such as an AOL<br />
address. Such services often have limits<br />
on the size and types of messages<br />
that can be transmitted; a company<br />
account can also have limits, but at<br />
least the company can set them to<br />
permit the size and type of messages<br />
typically encountered in the business.<br />
While normal text messages would<br />
rarely be blocked for exceeding the<br />
permitted limits, attachments of the<br />
size common today — such as multimedia<br />
or .PDF files — may well be<br />
prohibited. While these limits can be<br />
worked around by breaking the file<br />
into smaller chunks, it is certainly less<br />
convenient. Worse, a critical message<br />
might be delayed or bounced unexpectedly.<br />
At best, time may be lost<br />
until the sender gets the error message,<br />
and arranges another way of<br />
sending it; at worst, business opportunities<br />
may be lost, or key dates<br />
missed.<br />
Another problem could occur when<br />
the company loses control of critical<br />
business information because that<br />
information is outside the company’s<br />
records and control. Channeling all<br />
work through a company-controlled<br />
account at least preserves the firm’s<br />
access to critical information, such as<br />
contact data for those with whom the<br />
employee — and her successors —<br />
must correspond. Customers and vendors<br />
might send business-related messages<br />
— or orders — to an employee’s<br />
own address, which the company<br />
might never see if the employee<br />
leaves, or chooses not to forward<br />
back to her former employer. Worse<br />
yet, those messages might be formal<br />
notices given under a contract —<br />
rarely a harbinger of good news —<br />
that require immediate action, which<br />
never comes because no one saw the<br />
message. The inability to monitor<br />
employee e-mail could be a particular<br />
concern with a disloyal employee,<br />
who might be contemplating leaving<br />
for a competitor because confidential<br />
information could go out the door<br />
unrestricted by any oversight software<br />
the company might have in place.<br />
(Again, alternative e-mail might be<br />
only the tip of the iceberg in protecting<br />
electronic assets — a determined<br />
thief could do the same damage with<br />
a $10 flash drive, or an omnipresent<br />
iPod holding business data rather than<br />
music on its massive hard drive.) At a<br />
minimum, using a “company” address<br />
for all formal notices, rather than an<br />
employee’s home address, could prevent<br />
some of these problems (as long<br />
as someone is checking the “notice”<br />
e-mail inbox regularly).<br />
INVENTION CAN BE THE<br />
MOTHER OF NECESSITY<br />
Yet there might be legitimate reasons<br />
for employees to occasionally<br />
use outside e-mail accounts for business,<br />
or at least to have them available<br />
as needed. During potential outages<br />
of the firm’s servers, whether<br />
due to technical bugs or natural<br />
problems (such as storm or power<br />
outage), an alternative e-mail<br />
account (despite the possible costs it<br />
may create for IT management and in<br />
litigation) is a much cheaper backup<br />
system than paying the certain costs<br />
of maintaining a full-blown backup<br />
capability 24/7. Traveling employees<br />
might find it easier to connect in<br />
public places or hotspots to an<br />
online account than to find an<br />
Internet provider capable of allowing<br />
access to the firm’s secure network<br />
through a protected connection<br />
(especially when traveling in remote<br />
areas where any Internet connection<br />
is welcome). Some employees might<br />
not have sufficient hardware or<br />
bandwidth to access the company email<br />
from home, so online accounts<br />
let them work during evenings and<br />
weekends despite those limitations.<br />
Of course, these arguments can be<br />
nothing but rationalizations — in the<br />
RNC case, the White House claimed<br />
that the RNC accounts had been created<br />
“to avoid using government<br />
resources for political purposes,”<br />
while its Democratic opposition saw<br />
the only purpose of the accounts as<br />
“an attempt to avoid scrutiny” when<br />
employees were discussing matters<br />
such as the firing of U.S. Attorneys.<br />
Also, just announcing a policy<br />
requiring that all e-mail be done<br />
through an account provided by the<br />
firm might not be enough to dissuade<br />
the CEO who really wants his<br />
or her Hotmail. For example, in the<br />
RNC case, the existence of a federal<br />
law, and oversight by the lawyers<br />
employed by the White House, was<br />
not enough to stop the human<br />
instinct to get business done in the<br />
easiest, cheapest, way, and the way<br />
that appears to be least regulated. It<br />
is human nature to do what must be<br />
done today — using a non-company<br />
e-mail account — and sort out the<br />
ramifications later.<br />
Similarly, even with policies in<br />
place to direct messages into the<br />
“official” e-mail, those who really<br />
want to avoid creating a record can<br />
simply turn to the “traditional” lowtech<br />
ways of avoiding leaving a trail<br />
of their activity. Crooks have always<br />
known to hold live conversations,<br />
face to face, rather than put something<br />
in writing (including an e-mail)<br />
or to speak on a phone (or leaving a<br />
voice-mail message) that might be<br />
recorded. (Voice-mail discovery itself<br />
has become a rapidly emerging discipline.)<br />
Policies against online<br />
accounts, then, simply become a way<br />
to educate unsophisticated employees<br />
who don’t know the problems<br />
created by the convenience of not<br />
using the firm’s systems, and to discourage<br />
them from such activity.<br />
WHEN IN DOUBT,<br />
JUST DON’T DO IT<br />
The RNC’s problems also highlight<br />
the importance, in an era of virtually<br />
perpetual storage of electronic<br />
communications and enhanced discovery<br />
rights under the recently<br />
revised federal rules, of simply not<br />
creating unnecessary documents: Just<br />
because it might be easier to e-mail<br />
someone, it may nonetheless not be<br />
wise, especially if a phone call will<br />
continued on page 12<br />
June 2007 e-Commerce Law & Strategy ❖ www.ljnonline.com/alm?ecomm<br />
5
Used Licenses<br />
continued from page 2<br />
copyright law is whether the distinction<br />
between physical incorporations<br />
and rights can still be upheld, and<br />
whether such a decision is justified in<br />
light of technical progress and the<br />
economic interests of consumers and<br />
businesses. In its thoroughly reasoned<br />
decision this year, the Munich<br />
Court of First Instance deals with<br />
these arguments in detail and says<br />
that the right-holders’ interests, for<br />
several reasons, can be properly protected<br />
only if physical works are<br />
treated differently from how license<br />
rights are treated, with one of these<br />
reasons being not only legitimate<br />
financial interests, but also necessary<br />
protection from pirated copies.<br />
Again, the judgment of the Munich<br />
Court of First Instance has been<br />
appealed, and once more it is up to<br />
the Oberlandesgericht to re-evaluate<br />
its earlier findings. It would be more<br />
than a surprise, however, if the<br />
Appellate Court deviates from its first<br />
decision and then — economic interests<br />
apparently being strong on both<br />
sides — the case certainly will go to<br />
the Federal Court and be decided<br />
soon, particularly as in Germany’s<br />
northern territories, courts have<br />
shown a partly different view.<br />
HAMBURG COURT DECISIONS<br />
ON AD FOR USED LICENSES<br />
While the Munich decisions rendered<br />
support to the software manufacturers’<br />
position regarding transfer<br />
of software licenses, they suffered<br />
a setback in Hamburg. The First<br />
Instance Court in Hamburg<br />
(Landgericht Hamburg, June 29, 2006,<br />
Mobile Marketing<br />
continued from page 1<br />
IS IT E-MAIL OR A CALL?<br />
Two different regulatory structures<br />
apply to mobile-marketing campaigns,<br />
depending on whether the<br />
campaign emphasizes phone or email<br />
messages. If your marketing message’s<br />
destination is an e-mail address<br />
— the traditional @ with a domain<br />
name — then treat it as an e-mail; but<br />
if a telephone number is the destination,<br />
then consider it a phone call.<br />
6<br />
File Number 315 O 343/06) had to<br />
decide on a case that a software dealer<br />
for Microsoft products brought<br />
against usedSoft (same defendant as<br />
in the Munich case). The plaintiff<br />
apparently felt pressured economically<br />
by usedSoft’s aggressive advertisement<br />
for the business model of used<br />
licenses, and filed for a preliminary<br />
injunction to prohibit this advertisement,<br />
which allegedly promoted a<br />
prohibited business. Microsoft was<br />
not a party to the case.<br />
In light of the Munich decisions, the<br />
Hamburg Court of First Instance surprisingly<br />
rejected the application and<br />
held that the business model of resale<br />
of “used” licenses does not infringe<br />
provisions of the copyright act. The<br />
Hamburg court applied the exhaustion<br />
principle and found that the resale of<br />
such licenses could not be restricted<br />
and does not require Microsoft’s consent.<br />
Advertisement for this business<br />
model, then, was not considered to be<br />
promoting illegal activity.<br />
The decision was confirmed by the<br />
Appellate Court (Hanseatisches<br />
Oberlandesgericht, Feb. 2, 2007, File<br />
Number 5 U 140/06), but the Court<br />
moved away from the application of<br />
the exhaustion principle and<br />
declared (probably in an attempt to<br />
avoid open collision with the Munich<br />
Court of Appeals) that the case needed<br />
only application of the provisions<br />
of fair advertisement in the law on<br />
unfair competition. Considering<br />
these provisions, advertisement for a<br />
business model could not be objected<br />
to if it fairly mentioned the legal<br />
dispute so that customers knew the<br />
potential risks. This declaration is in<br />
principle fully in line with the gener-<br />
If it’s an e-mail, then your campaign<br />
will be governed by the Controlling the<br />
Assault of Non-Solicited Porno- graphy<br />
and Marketing Act, (“CAN-SPAM”) (15<br />
U.S.C. §7701-7713) and the Federal<br />
Communications Commission’s Wireless<br />
E-mail Rule (64 C.F.R. §64.3100).<br />
If it’s a telephone call, then it will<br />
be governed by the Telemarketing<br />
and Consumer Fraud and Abuse<br />
Prevention Act (“TCFAP”) (15 U.S.C.<br />
§6101-6108), the Telephone Consumer<br />
Protection Act (“TCPA”) (47 U.S.C.<br />
§227) and, of course, the Tele-<br />
e-Commerce Law & Strategy ❖ www.ljnonline.com/alm?ecomm<br />
al requirements of advertisement<br />
law, but it is highly doubtful whether<br />
usedSoft has really mentioned the<br />
legal disputes (at all) and in a way<br />
that informs customers about the critical<br />
issue — whether purchasing<br />
such licenses means obtaining anything<br />
at all. If the Munich decisions<br />
should be upheld, all such “used”<br />
license transactions are void, if the<br />
consent of the rightholders cannot be<br />
established. In such a case, customers<br />
would be left with a compensation<br />
claim against usedSoft but<br />
could be subject to prosecution by<br />
software manufacturers.<br />
CONCLUSION<br />
The Hamburg decisions and their<br />
contradiction of the Munich courts’<br />
view will require the Federal Court to<br />
decide quickly, once the Munich<br />
case is handed over to the Federal<br />
Court. The legal community and the<br />
market participants eagerly await the<br />
decision. It will likely be a landmark<br />
decision on the exhaustion principle<br />
as laid down in the Software<br />
Directive. But there are more questions<br />
in the package, such as the crucial<br />
question of under which conditions<br />
the consent of software manufacturers<br />
to such transfer of license<br />
has to be declared — a subject that<br />
will depend on a competition-law<br />
evaluation of fair and equal treatment<br />
of applicants, as well as of<br />
requirements of transparency in<br />
license contracts.<br />
It’s not a certainty that the Federal<br />
Court will answer all these questions,<br />
but it is a certainty that the decision will<br />
receive interest throughout Europe.<br />
—❖—<br />
marketing Sales Rule (“TSR”) (16 CFR<br />
§310.1 et seq.), along with the Do<br />
Not Call Registry that the Federal<br />
Trade Commission (“FTC”) maintains<br />
and the Federal Communications<br />
Commission (“FCC”) enforces.<br />
E-MAIL REGULATIONS<br />
As with e-mails more generally,<br />
CAN-SPAM will govern text, or SMS<br />
(short message service) messages,<br />
and MMS (multi-media messaging<br />
services), which typically contain<br />
graphics, video or an audio<br />
continued on page 9<br />
June 2007
Internet Expands<br />
Trademark<br />
Infringement<br />
Novel Trademark Claims<br />
Spring from e-Commerce<br />
By Jonathan Bick<br />
It should strike no one as a surprise<br />
that the fluidity of using trademarks<br />
on the Internet expands the<br />
incidence of trademark-infringement<br />
claims and lawsuits. And along those<br />
lines, novel Internet trademark<br />
claims spring from the innovative but<br />
unlawful use of trademarks in e-<strong>commerce</strong>.<br />
Logically, then, it follows that<br />
Internet domain names, hyperlinks,<br />
meta tags and framing marks enlarge<br />
the number of trademark-infringement<br />
opportunities.<br />
While it’s true that as an information<br />
conduit, the Internet reduces the<br />
likelihood of confusion by allowing<br />
the buyer to approach an online purchase<br />
with more sophistication, the<br />
technology also bolsters the likelihood<br />
of confusion among consumers<br />
using the Internet by allowing new,<br />
unlawful uses of trademarks. Also,<br />
the traditional use of a mark on the<br />
Internet (to identify the source of<br />
goods) is likely to amplify certain<br />
trademark characteristics, including:<br />
• The strength of a mark;<br />
• The proximity of the products or<br />
services to a geographical location;<br />
and<br />
• Actual confusion.<br />
TRADEMARK PARTICULARS<br />
Trademarks connect a name or<br />
symbol with a good or service. They<br />
benefit owners by allowing them to<br />
profit from the goodwill associated<br />
with the mark. On the other side of<br />
the potential or actual transaction,<br />
trademarks benefit consumers by<br />
Jonathan Bick is of counsel to<br />
WolfBlock Brach Eichler of Roseland,<br />
NJ, and is an adjunct professor of<br />
Internet law at Pace Law School and<br />
Rutgers Law School. He is also the<br />
author of 101 Things You Need To<br />
Know About Internet Law (Random<br />
House 2000). He can be reached at<br />
bickj@bicklaw.com.<br />
memorializing a level of quality. U.S.<br />
trademark law is designed to prevent<br />
confusion in the marketplace and is<br />
enforced by preventing fraud<br />
through deception.<br />
The elements necessary to prove<br />
trademark infringement are well<br />
established under federal and state<br />
case law. These elements apply to<br />
Internet and traditional trademark<br />
infringement. A plaintiff in a trademark-infringement<br />
matter has the<br />
burden of proving that the defendant’s<br />
use of a mark has created a<br />
likelihood of confusion about the origin<br />
of the defendant’s goods or services.<br />
This proof is achieved by the<br />
plaintiff first showing that it has<br />
developed a trademark right worthy<br />
of protection, and then showing that<br />
the defendant is using a confusingly<br />
similar mark in such a way that it creates<br />
a likelihood of confusion, mistake<br />
or deception — or a combination<br />
of these misapplications —<br />
among the consuming public.<br />
Poloroid Corp. v. Polorad Elec.<br />
Corp., 287 F.2d 492 (2d Cir. 1961),<br />
details eight factors that a court must<br />
evaluate prior to finding that an entity<br />
has used a trademark in such a<br />
way that would result in a likelihood<br />
of confusion in the mind of a consumer<br />
regarding the source of a<br />
product. They are:<br />
1. The strength of the plaintiff’s mark;<br />
2. The degree of similarity between<br />
the plaintiff’s mark and defendant’s<br />
mark;<br />
3. The proximity of the products or<br />
services;<br />
4. The likelihood that the plaintiff<br />
will bridge the gap;<br />
5. Evidence of actual confusion;<br />
6. The defendant’s good faith in<br />
adopting the mark;<br />
7. The quality of defendant’s product<br />
or service; and<br />
8. The sophistication of the buyers.<br />
The Lanham Act (Federal<br />
Trademark Act of 1946) also provides<br />
rights for the trademark holder. In<br />
particular, the Act allows mark holders<br />
to take action to end deceitful<br />
practices in interstate <strong>commerce</strong><br />
involving the misuse of trademarks.<br />
Marks, for instance, gain rights<br />
when used. The Internet allows<br />
marks to be used in nontraditional<br />
ways that expand the use of the<br />
marks as well as the likelihood of<br />
confusion and, along with that<br />
increased or actual likelihood of confusion,<br />
an increase in infringement<br />
claims. The use of trademarks on the<br />
Internet has four major forms of<br />
alternative use besides their traditional<br />
form of use as a publication:<br />
1. Domain names;<br />
2. Meta tags;<br />
3. Hyperlinks; and<br />
4. Framing marks.<br />
MAJOR INTERNET ALTERNATIVE<br />
TRADEMARK USES<br />
Domain Names<br />
A domain name, of course, is the<br />
registered identifier that generally<br />
replicates a firm name, product or<br />
phrase. To acquire an Internet<br />
address, an entity need only pay a<br />
nominal fee to an Internet registrar,<br />
such as Network Solutions Inc., and<br />
file for a name not previously registered.<br />
Due to the ease with which<br />
domains can be registered, many<br />
trademarked domain names were initially<br />
registered by enterprising entities<br />
known as cybersquatters who<br />
knowingly reserved a trademark as a<br />
domain name merely to sell it for<br />
profit.<br />
Typo-squatting is another form of<br />
cybersquatting that relies on erroneous<br />
user input. Typo-squatting<br />
occurs when an entity registers a<br />
famous mark with misspellings,<br />
reversed letters or other common<br />
typos built into the domain name in<br />
an attempt to redirect an Internet<br />
user to the cybersquatter’s own Web<br />
site. Alternatively, a cybersquatter<br />
might try to get the famous mark’s<br />
owner to pay to redirect the<br />
mistyped Web address to the mark<br />
owner’s Web address.<br />
Another potential trademark issue<br />
involving domain names is those<br />
names that more than one person or<br />
entity could claim. In Nissan Motor<br />
Co. v. Nissan Computer Corp., 89 F.<br />
Supp. 2d 1154 (C.D. Cal. 2000), the<br />
Nissan car company (which was first<br />
to register its trademark) brought suit<br />
against the Nissan computer company<br />
(dubbed after the owner’s surname)<br />
for trademark infringement<br />
after the computer firm registered<br />
continued on page 8<br />
June 2007 e-Commerce Law & Strategy ❖ www.ljnonline.com/alm?ecomm<br />
7
Trademark<br />
continued from page 7<br />
domain names using the word<br />
Nissan. The court found that the<br />
computer firm’s registration resulted<br />
in consumer confusion for several<br />
reasons, including initial interest confusion<br />
and actual confusion.<br />
The court found initial interest<br />
confusion because the Nissan name<br />
might have led a consumer to believe<br />
that it was a Web site for Nissan cars,<br />
and that alone is enough to find consumer<br />
confusion. The court also<br />
found actual confusion because nearly<br />
all the computer company’s revenue<br />
stemmed from visitors to the<br />
Web site clicking on automobile<br />
advertisements displayed on it.<br />
Despite this, the court was careful to<br />
point out that there is a “judicial<br />
reluctance to enjoin use of a personal<br />
name” even when it apparently<br />
infringes on a trademark, but that it<br />
was still possible to limit the use with<br />
a “carefully tailored injunction.”<br />
This case and others resulted in the<br />
enactment of the Anti-Cybersquatting<br />
Consumer Protection Act.<br />
Additionally, the Internet Corporation<br />
for Assigned Names and Numbers<br />
(“ICANN”) adopted its Uniform<br />
Domain Name Dispute Resolution<br />
Policy to provide an alternative to litigation<br />
in dealing with abusive<br />
domain-name registrations.<br />
Meta Tags<br />
The second trademark infringement<br />
issue unique to the Internet<br />
entails meta tags, which provide<br />
Internet page-setting information that<br />
is normally invisible to a user. Meta<br />
tags are commonly used by search<br />
engines, such as Google, to index site<br />
content. The content of meta tags,<br />
when properly used, gives content<br />
some context. Four types of content<br />
are often used as a part of meta tags:<br />
• Resource type;<br />
• Key word;<br />
• Description; and<br />
• Distribution.<br />
The unauthorized use of another’s<br />
mark as an element of meta-tag content<br />
could result in infringement.<br />
The use of registered marks as part<br />
of a meta tag might result in consumer<br />
confusion and, as such, could<br />
8<br />
be a basis for infringement litigation;<br />
for example, the use of various<br />
“Playboy” trademarks in meta-tag<br />
lines. (See, Playboy Enter., Inc. v.<br />
Calvin Designer Label, 985 F. Supp.<br />
1220 (N.D. Cal. 1997) and Playboy<br />
Enter., Inc. v. Torri Welles, 7 F. Supp.<br />
2d 1098 (S.D. Cal. 1998)).<br />
The Seventh and Ninth District<br />
courts have ruled that meta-tag use<br />
might infringe on famous marks.<br />
(See, Promatek Indus. v. Equitrak<br />
Corp., 300 F.3d 808 (7th Cir. 2002);<br />
and Brookfield Communications v.<br />
West Coast Entertainment, 174 F.3d<br />
1036 (9th Cir. 1999)). Both courts<br />
have followed the same line of reasoning,<br />
holding that the “initial interest<br />
confusion” that consumers experience,<br />
regardless of whether it<br />
results in actual confusion once they<br />
are viewing the Web site, is adequate<br />
for the imposition of trademarkinfringement<br />
liability. It should be<br />
noted that the Promatek decision<br />
was amended to state that meta-tag<br />
usage by a defendant come into play<br />
only when the infringing company is<br />
actually using the trademark to<br />
deceive consumers.<br />
Hyperlinks<br />
Hyperlinks are the third trademarkinfringement<br />
issue unique to the<br />
Internet. A hyperlink is an element of<br />
an electronic document that links to<br />
another place in the same document<br />
or to an entirely different document.<br />
Users typically click on the hyperlink<br />
to follow the link to the document to<br />
which it is connected. Hyperlinks are<br />
an indispensable constituent of all<br />
hypertext systems, such as the World<br />
Wide Web. Hyperlink use, however,<br />
has the potential for trademark<br />
infringement, and allegations have<br />
been made that hyperlinks can cause<br />
trademark-infringement problems in<br />
the form of passing off, reverse passing<br />
off, and false advertising.<br />
Framing<br />
Framing is the fourth way that a<br />
trademark can be violated on the<br />
Internet. Framing occurs when one<br />
Internet site displaces another site’s<br />
content by surrounding or framing it<br />
with a portion of its own site. In the<br />
case of TotalNews (The Washington<br />
Post v. TotalNews, Southern District<br />
of New York, Civil Action Number<br />
e-Commerce Law & Strategy ❖ www.ljnonline.com/alm?ecomm<br />
97-1190), the Washington Post and<br />
other newspaper publishers brought<br />
suit against an Internet news site for<br />
using framing technology to display<br />
the news organizations’ information<br />
on the TotalNews site and surrounding<br />
the other content with its own<br />
advertising. This practice was found<br />
to be tantamount to trademark dilution<br />
because the framing practice<br />
was likely to confuse users in that<br />
they would be led to believe that the<br />
source of these advertisements was<br />
the plaintiffs’ newspapers.<br />
DOUBLE JEOPARDY<br />
The special trademark-infringement<br />
problems that the Internet presents<br />
(domain names, hyperlinks,<br />
meta tags and framing) are in addition<br />
to the amplification of traditional<br />
trademark infringement that results<br />
from the worldwide use of the<br />
Internet. Consider the international<br />
trademark-infringement difficulties<br />
faced by Playboy Enterprises. In<br />
Playboy Enter., Inc. v. Chuckleberry<br />
Publ’g, Inc., 687 F.2d 563 (2d Cir.<br />
1982), the Second Circuit Court of<br />
Appeals had granted an injunction,<br />
enjoining Chuckleberry from using<br />
the confusingly similar mark<br />
Playmen for the distribution of<br />
Chuckleberry’s Italy-based magazine.<br />
Despite this judicial result in a parallel<br />
suit brought to enjoin<br />
Chuckleberry’s use in Italy, the<br />
Italian court upheld the use of the<br />
Playmen mark.<br />
Subsequently, in Playboy Enter.,<br />
Inc. v. Chuckleberry Publ’g Inc., 939<br />
F. Supp 1032 (S.D.N.Y. 1996), when<br />
Chuckleberry published an Internet<br />
Web site for its magazine, again<br />
using the mark Playmen, based in<br />
Italy, Playboy brought suit for a violation<br />
of the injunctive order granted<br />
in the prior Playboy v. Chuckleberry<br />
case, citing that the worldwide<br />
continued on page 12<br />
<strong>LAW</strong> JOURNAL NEWSLETTERS<br />
REPRINT SERVICE<br />
Promotional article reprints of this article or any<br />
other published by <strong>LAW</strong> JOURNAL NEWSLETTERS<br />
are available.<br />
Call Matt Solomon at 212-545-6289 or<br />
e-mail msolomon@alm.com<br />
for a free quote.<br />
Reprints are available in paper and PDF format.<br />
June 2007
Mobile Marketing<br />
continued from page 6<br />
component. If the primary purpose of<br />
the message is commercial, then SMS<br />
and MMS messages will fall under the<br />
FCC’s Mobile Service Commercial<br />
Message (“MSCM”) definition.<br />
In fact, wireless service providers<br />
have established specific domains for<br />
sending and receiving “mobile service<br />
messages,” pursuant to CAN-SPAM.<br />
They are all listed on the FCC’s<br />
Wireless Domain Name Download<br />
Registry (www.fcc.gov/cgb/policy/<br />
DomainNameDownload.html). While<br />
CAN-SPAM does not prohibit transactional<br />
or relationship messages, it<br />
does otherwise prohibit messages to<br />
mobile devices — hence, the domains<br />
on the registry — absent “express<br />
prior authorization.” That authorization<br />
can be written — meaning via<br />
actual paper, an e-mail or a SMS message<br />
— or it can be oral; but in each<br />
case, the authorization is subject to<br />
sender verification.<br />
TELEPHONE REGULATIONS<br />
SMS and voice messages are covered<br />
by the TCPA and TSR. The TCPA<br />
prohibits calls to mobile devices<br />
(where the receiving party is<br />
charged) using an automatic telephone-dialing<br />
system, artificial and<br />
pre-recorded messages, or both of<br />
the last two. Florida has a similar law.<br />
The TCFAP empowered the FTC to<br />
issue the Telemarketing Sales Rule,<br />
which generally prohibits telemarketers<br />
from engaging in certain<br />
deceptive acts or practices. But it is<br />
more generally known for establishing<br />
the National Do Not Call Registry.<br />
If a wireless number is listed on that<br />
registry, then a marketer is barred<br />
from calling that number unless it<br />
has an “established business relationship<br />
with the consumer.” That is, a<br />
relationship based on:<br />
• “The consumer’s purchase,<br />
rental, or lease of the seller’s<br />
Luis Salazar is a shareholder with<br />
Greenberg Traurig, in Miami, and a<br />
member of the firm’s Privacy and<br />
Data Security Task Force. A member<br />
of e-Commerce Law & Strategy’s<br />
Board of Editors, Salazar can be<br />
reached at salazarl@gtlaw.com.<br />
goods or services or a financial<br />
transaction between the consumer<br />
and seller, within the<br />
eighteen (18) months immediately<br />
preceding the date of the telemarketing<br />
call”; or<br />
•“The consumer’s inquiry or application<br />
regarding a product or<br />
service offered by the seller,<br />
within three months immediately<br />
preceding the date of a telemarketing<br />
call.”<br />
Telemarketers must scrub their lists<br />
against the registry every 31 days.<br />
OTHER RESTRICTIONS<br />
A variety of other federal laws<br />
might also apply, depending on<br />
the type of marketing campaign<br />
undertaken. For example, if marketers<br />
are targeting children under 13, then<br />
the Children Online Protection Act<br />
(“COPA”) will control the manner and<br />
type of personal information collected.<br />
As another example, the FTC may<br />
bring an enforcement action against a<br />
mobile marketer if the Commission<br />
believes the marketer’s actions are<br />
unfair or deceptive.<br />
Likewise, a number of state laws<br />
can apply to mobile-marketing campaigns,<br />
including state Do Not Call,<br />
SPAM and unfair trade-practice<br />
statutes.<br />
BEST PRACTICES, BEST RESULTS<br />
Despite these regulations, there’s<br />
plenty of room for missteps and<br />
abuses in what is largely uncharted<br />
and self-policed territory. In an<br />
attempt to lead the industry, the<br />
MMA has developed an industry<br />
code of conduct and best practices<br />
that it has broken into six categories:<br />
1. Choice;<br />
2. Control;<br />
3. Customization;<br />
4. Consideration;<br />
5. Constraint; and<br />
6. Confidentiality.<br />
The categories are outlined below.<br />
Choice<br />
Consumers must opt in to a specific<br />
mobile-messaging program, either<br />
by text messaging, calling a voiceresponse<br />
unit, via a Web site or<br />
through a paper-based method. For<br />
premium services through which<br />
charges can accrue rapidly, double<br />
and even triple opt-in requirements<br />
are the norm.<br />
Control<br />
Customers must have the power to<br />
opt out of or terminate participation<br />
in programs.<br />
Customization<br />
Because mobile-messaging campaigns<br />
are most effective when<br />
appropriately targeted, consumers<br />
should be asked to volunteer demographic,<br />
preference and other information.<br />
This allows messages to the<br />
opt-in consumer to be what the consumer<br />
wants, and when he or she<br />
wants it.<br />
Consideration<br />
The MMA is advocating specific<br />
trust provisions on not renting, selling<br />
or sharing personal information<br />
with other people or non-affiliated<br />
companies, except to provide the<br />
product or services requested. But<br />
aggregate, non-personally identifiable<br />
information may be shared with<br />
partners for research purposes.<br />
Constraint<br />
Marketers should implement a<br />
global throttling mechanism that controls<br />
the number of marketing messages<br />
directed to one consumer, even<br />
from different marketing campaigns.<br />
Optimally, the limit should default to<br />
two new campaigns per week.<br />
Confidentiality<br />
The MMA urges marketers to adopt<br />
Web-site privacy and online publicinterest<br />
watchdog firm TRUSTe’s specific<br />
provisions on not renting or sharing<br />
personal customer information,<br />
and establishing clear privacy policies<br />
that comport with TRUSTe’s standards.<br />
CONCLUSION<br />
As with any unexplored electronic<br />
frontier, mobile marketing presents<br />
entrepreneurs with apparently endless<br />
opportunities to stake new territory<br />
and find riches. At the same<br />
time, “lawless” behavior in any frontier<br />
can rouse government attention<br />
or, perhaps worse, drive the public to<br />
exact its own rough justice — by<br />
avoiding your products or services.<br />
So, it pays to mind the applicable<br />
laws and regulations, and to pursue<br />
best practices to ensure that you get<br />
the best return on your mobile-marketing<br />
investment.<br />
—❖—<br />
June 2007 e-Commerce Law & Strategy ❖ www.ljnonline.com/alm?ecomm<br />
9
FCC ORDER PREEMPTING<br />
STATE REGULATION<br />
OF VOIP IS UPHELD<br />
The determination of the Federal<br />
Communications Commission (“FCC”)<br />
determination that state regulation of<br />
VoIP services is preempted under federal<br />
law because it is currently impossible<br />
to separate the interstate and<br />
intrastate aspects of VoIP service was<br />
not arbitrary or capricious. Minnesota<br />
Public Utilities Commission v. Federal<br />
Communication Commission, 2007<br />
U.S. App. LEXIS 6448 (8th Cir. Mar. 21,<br />
2007). In upholding the agency’s<br />
order and denying various state regulatory<br />
agency petitions for review, the<br />
court ruled that the FCC could preempt<br />
state regulation of VoIP after<br />
determining it would be impractical to<br />
separate the intrastate portions of<br />
VoIP service from the interstate portions,<br />
particularly given the practical<br />
difficulties with determining the geographic<br />
location of “nomadic” VoIP<br />
phone calls (i.e., VoIP service via any<br />
available broadband connection) versus<br />
“fixed” VoIP service (i.e., service<br />
from a fixed location, such as home<br />
cable-TV equipment). Referencing the<br />
FCC’s previous E911 Order, which<br />
required VoIP providers to ensure that<br />
customers using VoIP have 911 emergency<br />
service, the court commented<br />
that the current preemption order had<br />
a potentially limited temporal scope,<br />
because it could be lifted if technology<br />
is developed to identify the geographic<br />
location of nomadic VoIP<br />
communications.<br />
USE OF PREVIOUSLY LICENSED<br />
PICTURES FOR ONLINE<br />
SELF-PROMOTION DISPLAY<br />
IS NOT FAIR USE<br />
A marketing agency’s inclusion of<br />
a brochure containing a previously<br />
licensed photograph in an online<br />
portfolio that promoted past advertising<br />
campaigns is not protected by<br />
the copyright fair-use doctrine.<br />
Straus v. DVC Worldwide, Inc., 2007<br />
U.S. Dist. LEXIS 20907 (S.D. Tex. Mar.<br />
23, 2007). In denying the agency’s<br />
motion for partial summary judg-<br />
10<br />
e-Commerce DOCKET SHEET<br />
ment, the court rejected the argument<br />
that posting past advertising<br />
materials containing copyrighted<br />
images for promotional purposes satisfies<br />
the criteria for fair use. The<br />
court found, among other things, that<br />
the defendant’s “transformative” use<br />
of the photo as commentary on its<br />
own advertising practice was “slight<br />
to non-existent” given that the use of<br />
the entire photograph was wholly for<br />
private commercial gain and outside<br />
the terms of the original license<br />
agreement. The court also declined<br />
to grant summary judgment in the<br />
agency’s favor on the theory that use<br />
of the photograph was subject to an<br />
implied license based on advertisingindustry<br />
custom, finding that the<br />
copyright owner’s expressed disapproval<br />
of the use of the photograph<br />
prior to the filing of the lawsuit created<br />
an issue of fact that could not be<br />
resolved on summary judgment.<br />
COMMERCIAL E-MAIL CONFORMS<br />
TO STATE SPAM <strong>LAW</strong>, EVEN<br />
THOUGH RECIPIENT CAN’T REPLY<br />
A commercial e-mail that otherwise<br />
conforms to the Washington state<br />
anti-spam law by providing accurate<br />
transmission path information and<br />
unsubscribe links is not in violation of<br />
the law simply because the e-mail<br />
recipient is unable to send a reply email<br />
to the sender. Benson v. Oregon<br />
Processing Service, Inc., No. 34195-6-<br />
II, 2007 Wash. App. LEXIS 31 (Wash.<br />
Ct. App. Jan. 9, 2007). The court<br />
noted that the plaintiff elected not to<br />
click on the “unsubscribe” links provided<br />
in the e-mails, nor use the physical<br />
address or phone number provided<br />
in the e-mails to unsubscribe. The<br />
appellate court affirmed the lower<br />
court’s dismissal of the plaintiff’s<br />
claim, finding that the defendant’s failure<br />
to provide “reply” functionality to<br />
the commercial e-mail did not “misrepresent”<br />
or “obscure” the point of<br />
origin or transmission path of the<br />
message. The appellate court concluded<br />
that the statute says nothing<br />
about how useful a commercial email’s<br />
point of origin or transmission<br />
path must be, does not require a com-<br />
e-Commerce Law & Strategy ❖ www.ljnonline.com/alm?ecomm<br />
mercial e-mail sender to acknowledge<br />
or respond to a recipient’s reply email,<br />
and does not require that e-mail<br />
replies be deliverable.<br />
U.S. COURT CAN<br />
PERMANENTLY ENJOIN<br />
RESIDENT FROM BUSINESS<br />
A federal district court did not<br />
abuse its discretion in giving the<br />
Lanham Act extraterritorial effect by<br />
permanently enjoining a U.S. resident<br />
from using the “Versace” name<br />
to sell commercial goods anywhere<br />
in the world or over the Internet.<br />
Gianni Versace, S.P.A. v. Alfredo<br />
Versace, 2007 U.S. App. LEXIS 705<br />
(2d Cir. Jan. 10, 2007). In rejecting<br />
the defendant’s argument that the<br />
district court failed to consider that<br />
he is a U.S. resident and not a citizen,<br />
the appellate court pointed to the<br />
defendant’s 40 years of residence<br />
and business activity in the United<br />
States, coupled with the lack of conflict<br />
with foreign law and “the existence<br />
of a substantial effect on <strong>commerce</strong>.”<br />
The court also noted the<br />
defendant’s violations of prior injunctions,<br />
which supported the district<br />
court’s refusal to permit the defendant<br />
to use the “Versace” name<br />
accompanied by a disclaimer.<br />
SUCCESSFUL DEFENDANT<br />
DENIED ATTORNEY’S FEES<br />
IN CAN-SPAM CASE<br />
A defendant in a CAN-SPAM Act<br />
case who won a motion to dismiss<br />
for lack of personal jurisdiction is not<br />
entitled to an award of attorney’s<br />
fees when there is no evidence of<br />
bad intentions or frivolousness on<br />
the plaintiff’s part, and when such an<br />
award would not be consistent with<br />
the purposes of the act. Phillips v.<br />
Worldwide Internet Solutions, 2007<br />
U.S. Dist. LEXIS 4974 (N.D. Cal. Jan.<br />
22, 2007). In adopting and affirming<br />
the magistrate judge’s recommendation,<br />
the court denied the defendant’s<br />
continued on page 11<br />
The publisher of this newsletter is not engaged in rendering<br />
legal, accounting, financial, investment advisory or other<br />
professional services, and this publication is not meant to<br />
constitute legal, accounting, financial, investment advisory or<br />
other professional advice. If legal, financial, investment<br />
advisory or other professional assistance is required, the<br />
services of a competent professional person should be sought.<br />
June 2007
M OVERS & SHAKERS<br />
PHILLY E-COMMERCE <strong>LAW</strong>YER<br />
QUOTED IN COPA ARTICLE<br />
The Christian Science Monitor<br />
recently featured comments by Carl<br />
Solano, a partner in the Philadelphia<br />
office of Schnader Harrison Segal &<br />
Lewis, on the Third Circuit’s decision<br />
on the Child Online Protection Act<br />
(“COPA”). The article, “Internet<br />
Filters Block Porn, But Not Savvy<br />
Kids,” quoted Solano, who practices<br />
e-<strong>commerce</strong> law and makes a specialty<br />
of First Amendment and appellate<br />
matters, as saying: “Just because<br />
you want to protect kids doesn’t<br />
mean you can ban the information<br />
from adults.”<br />
Solano has been counsel for<br />
domain-name registrars in litigation<br />
over the ownership and control of<br />
domain names, and has advised<br />
Internet publishers on regulating<br />
online content. He has also been an<br />
adjunct professor on e-<strong>commerce</strong><br />
and computer issues the Villanova<br />
University School of Law.<br />
FINNEGAN HENDERSON<br />
<strong>LAW</strong>YER NAMED TO TECH<br />
ASSOCIATION BOARD<br />
Finnegan Henderson Farabow<br />
Garrett & Dunner partner Lawrence<br />
R. Robins was recently elected to<br />
the International Technology Law<br />
Association (“ITechLaw”) board.<br />
Robins, of the firm’s Cambridge, MA,<br />
Docket Sheet<br />
continued from page 10<br />
motion for attorney’s fees, finding no<br />
evidence that the plaintiff’s suit was<br />
“frivolous” or “objectively unreasonable,”<br />
in the factual and legal components<br />
of the case. The court found that<br />
an award of attorney’s fees in this case<br />
would not be consistent with the<br />
purposes of the CAN-SPAM Act, name-<br />
e-Commerce Docket Sheet was written<br />
by Julian S. Millstein, Edward A.<br />
Pisacreta and Jeffrey D. Neuburger,<br />
partners in the New York office of<br />
Thelen Reid Brown Raysman &<br />
Steiner LLP (www.thelen.com).<br />
office, handles intellectual-property<br />
issues, with a focus on strategic development<br />
of trademark portfolio,<br />
according to Finnegan Henderson.<br />
He’s also active in matters concerning<br />
management and protection of the<br />
portfolios, trademark litigation, copyright<br />
disputes, and computer and technology<br />
legal issues. The ITechLaw<br />
board is working on educating professionals<br />
on established and emerging<br />
worldwide technology markets.<br />
PITTSBURGH DIVERSITY<br />
ATTORNEYS MOVE ON<br />
Carl Cooper, one of the first chief<br />
diversity officers of any large firm<br />
when he took the position at K&L<br />
Gates in January 2003, has left the<br />
firm to start his own consultancy,<br />
working with other firms on similar<br />
issues.<br />
Cathy Bissoon has left Reed<br />
Smith’s Pittsburgh office for Cohen &<br />
Grigsby. She’d been director of diversity<br />
since 2001. Reed Smith said last<br />
month that it has appointed<br />
Washington, DC-based partner Tyree<br />
P. Jones Jr. as its new director of<br />
diversity.<br />
TEXAS <strong>LAW</strong>YER NAMED<br />
SOCIAL JUSTICE CRUSADER<br />
Kathleen J. Wu, a partner with<br />
Andrews Kurth LLP in Dallas, has<br />
been designated a “Women of Spirit”<br />
ly to “protect the convenience and<br />
efficiency of e-mail” and to “prevent<br />
time and monetary losses to individuals<br />
and internet service providers.”<br />
PROVIDER OF ANTI-SPAM<br />
OPEN RELAY DATABASE<br />
GETS CDA IMMUNITY<br />
A Web site owner who created a<br />
spam “block list” that identified<br />
open-relay servers useful to spammers<br />
is immune from liability under<br />
the “Good Samaritan” provision of<br />
the Communications Decency Act<br />
(“CDA”) for incorrectly listing the<br />
plaintiff’s IP address on the block list.<br />
Pallorium, Inc. v. Jared, 2007 Cal.<br />
App. Unpub. LEXIS 241 (Cal. Ct.<br />
award recipient by the American<br />
Jewish Congress Southwest Region.<br />
Women judged to have been diligent<br />
and spirited pursuing social justice<br />
are eligible for the award.<br />
“I’m humbled to be in such great<br />
company, and I deeply appreciate<br />
this recognition from the American<br />
Jewish Congress,” Wu said in an<br />
Andrews Kurth news release posted<br />
on the firm’s Web site.<br />
Wu writes a column dealing with<br />
issues women face in the legal profession<br />
for our ALM affiliate newspaper<br />
Texas Lawyer. She often speaks<br />
about how diversity benefits the<br />
workplace.<br />
MORRISON MAKES SOME<br />
CHAIRPERSON CHANGES<br />
Steven Kaufmann, a partner in the<br />
Denver office of Morrison & Foerster<br />
who has been with the firm for more<br />
than 20 years, was recently named the<br />
new chair of Morrison & Foerster’s litigation<br />
department. He leads a group<br />
of 490 attorneys in 18 offices in<br />
the United States, Europe and<br />
Asia. Kaufmann takes over from<br />
San Francisco-based partner Lori<br />
Schechter, who had been practice<br />
chair since 2003. Schechter continues<br />
her own active case work in consumer<br />
class actions and antitrust matters.<br />
continued on page 12<br />
App. Jan. 11, 2007) (unpublished).<br />
The appellate court upheld a trialcourt<br />
judgment finding the owner<br />
immune under Section 230(c)(2)(B)<br />
as a “provider” of an “interactive<br />
computer service” who made available<br />
“technical means” to restrict<br />
access to material that the provider<br />
thought was “harassing or otherwise<br />
objectionable.” The court also found<br />
that the fact that the owner’s block<br />
list might have been over-inclusive<br />
was irrelevant so long as the owner<br />
deemed the material he sought to<br />
block (i.e., offensive spam e-mails)<br />
as harassing and objectionable.<br />
—❖—<br />
June 2007 e-Commerce Law & Strategy ❖ www.ljnonline.com/alm?ecomm<br />
11
Movers & Shakers<br />
continued from page 11<br />
THELEN CONTINUES BUILDING<br />
CONSTRUCTION PROFILE<br />
Thelen Reid Brown Raysman &<br />
Steiner LLP has been named the<br />
2007 “Global Construction Law Firm<br />
of the Year” by Who’s Who Legal, the<br />
firm reported on its Web site.<br />
The annual Law Firm of the Year<br />
awards are determined based on<br />
nominations made by clients of the<br />
firm and fellow professionals. Only<br />
the most exceptional performance<br />
receives this distinction in each of 27<br />
practice areas.<br />
“For many years, our firm has been<br />
recognized as having the ‘preeminent<br />
Construction Law Practice in the<br />
‘Hotmail’<br />
continued from page 5<br />
do. One must assume that anything,<br />
and everything, created will eventually<br />
be discovered, and disclosed to<br />
the public, whether that was the<br />
intention of the person who wrote it<br />
or not. As Sen. Patrick Leahy (D-VT),<br />
chairman of the Senate Judiciary<br />
Committee, noted in connection<br />
with its investigation of the RNC fiasco,<br />
“You can’t erase e-mails, not<br />
today. They’ve gone through too<br />
Trademark<br />
continued from page 8<br />
nature of access to Internet Web sites<br />
was a violation of the court<br />
order. The court agreed, stating that<br />
the Web site was the same as the circulation<br />
of a magazine (a “use”)<br />
within U.S. territory and ordered<br />
Chuckleberry to block U.S. access to<br />
the Web site.<br />
12<br />
For even FASTER service, call:<br />
1-877-ALM-CIRC<br />
United States,’” Thelen Construction<br />
Chair John Heisse said. “This distinction<br />
shows that the industry is aware<br />
of our continued growth and now<br />
sees us as a global leader.”<br />
SIMPSON THACHER<br />
<strong>LAW</strong>YER NAMED AS<br />
TOP WOMAN LITIGATOR<br />
Simpson Thacher litigation associate<br />
Deborah Stein was recently named<br />
one of the Top 75 Women Litigators in<br />
California by the Daily Journal,<br />
according to a news release on the<br />
law firm’s Web site. The firm provided<br />
the following description. The award<br />
honors women who have litigated a<br />
major victory in the last year, set<br />
records in the legal community, play a<br />
prominent role in their practice area,<br />
many servers. Those e-mails are<br />
there – they just don’t want to produce<br />
them. It’s like the infamous 18<br />
minute gap in the Nixon White<br />
House tapes.”<br />
From that perspective — that anything<br />
created will be found — perhaps<br />
the best way to maintain the<br />
controls required by the developing<br />
laws of e-<strong>commerce</strong> and e-discovery<br />
is to eliminate the incentives to<br />
bypass those controls. Instead, firms<br />
should encourage use of their systems<br />
by designing them to be so<br />
OTHER CASES APPLY<br />
Other cases have similarly expanded<br />
the application of U.S. trademark<br />
law involving the Internet. In the<br />
case of Levi Strauss & Co. v. Sunrise<br />
Int’l Trading Inc., 51 F.3d 982, 984<br />
(11th Cir. 1995), for instance, a confusingly<br />
similar product to that of<br />
Levi Strauss’ was sold from China,<br />
though never actually within the<br />
United States. Based on the fact that<br />
Yes! I’d like to order e-Commerce Law & Strategy® today!<br />
Now just $325* (regularly $395…save $70!)<br />
e-Commerce Law & Strategy ❖ www.ljnonline.com/alm?ecomm<br />
and are generally involved in the legal<br />
community. Stein, based in the firm’s<br />
Los Angeles office, was selected based<br />
on her lead role in two significant<br />
cases: CalPERS v. Banc of America<br />
Securities LLC, et al., a suit brought by<br />
the largest pension fund in the United<br />
States arising out of the collapse of<br />
Enron, and Insurance Company of the<br />
State of Pennsylvania v. Central<br />
Garden & Pet Company, et al., a case<br />
in which a federal court in California<br />
squarely held on cross-motions for<br />
summary judgment that the firm’s<br />
client was entitled to withdraw from<br />
the defense of ongoing claims and<br />
was also entitled to reimbursement of<br />
defense costs.<br />
—❖—<br />
user-friendly that online accounts<br />
and other alternatives do not provide<br />
any real conveniences to attract<br />
the casual user. That way, when the<br />
CEO demands, “I want my Hotmail,”<br />
IT can respond, paraphrasing singersongwriter<br />
Mark Knopfler, founder<br />
of the band Dire Straits, that using<br />
the company account is so easy that<br />
it “ain’t workin’, that’s the way you<br />
do it.”<br />
—❖—<br />
the quality of these goods could<br />
reflect poorly on the mark owner, the<br />
court applied the Lanham Act<br />
extraterritorially.<br />
e-Commerce enterprises are well<br />
advised to have their counsel pay the<br />
closest attention to how trademarks<br />
might be used online — other companies’<br />
and their own.<br />
—❖—<br />
On the Web at:<br />
www.ljnonline.com<br />
*Offer valid to new subscribers only<br />
Publisher’s Guarantee! You may cancel your subscription at any time, for any reason, and receive a full refund for all unmailed issues.<br />
3038-2007<br />
June 2007