14.09.2013 Views

e-commerce LAW & STRATEGY - Heymann & Partner, Rechtsanwälte

e-commerce LAW & STRATEGY - Heymann & Partner, Rechtsanwälte

e-commerce LAW & STRATEGY - Heymann & Partner, Rechtsanwälte

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>LAW</strong> JOURNAL<br />

NEWSLETTERS<br />

On the Razr’s<br />

Edge: Mobile<br />

Marketing<br />

Be Careful to Whom,<br />

And How, Your Mobile<br />

Campaign Is Directed<br />

By Luis Salazar<br />

You can see it and read about<br />

it everywhere: mobile-phone ad<br />

campaigns are the new frontier<br />

in marketing.<br />

Mobile marketing offers the<br />

best in advertising — a direct,<br />

personal, measurable and dynamic<br />

means of engaging, informing,<br />

and entertaining consumers. In<br />

fact, there are more than 2.4 billion<br />

mobile-phone subscribers<br />

worldwide exchanging over 350<br />

billion text messages each month,<br />

with an estimated 15% of those<br />

classified as commercial or marketing<br />

messages.<br />

But this mobile advertising<br />

frontier is hardly the Wild West.<br />

Plenty of federal and state laws<br />

regulate this direct-marketing<br />

vehicle. More than that, various<br />

industry groups — most notably<br />

the Mobile Marketing Association<br />

(“MMA”) — have developed best<br />

practices designed to maximize<br />

advertising impact while minimizing<br />

potential legal entanglements.<br />

While the rewards of mobilephone<br />

campaigns can be rich,<br />

it’s important not to lose sight of<br />

these restrictions.<br />

This article reviews some of<br />

the critical legal issues marketers<br />

should be aware of, and reviews<br />

the industry’s best practices.<br />

continued on page 6<br />

e -<strong>commerce</strong><br />

L A W & S T R A T E G Y ®<br />

Sale of Used Software Licenses in Germany<br />

Federal Court Expected to Decide a Hot Issue Soon<br />

That Will Affect Europe<br />

By Dr. Katharina Scheja<br />

Volume 24, Number 2 • June 2007<br />

Once in a while, something known as “new distribution forms” of software<br />

catch the attention of people in the tech market in Germany. But standard<br />

license agreements and provisions of German copyright law do not always<br />

match perfectly, and these discrepancies give rise to gaps and misunderstandings<br />

that courts must ultimately settle.<br />

Accordingly, a couple of landmark decisions have come down from the<br />

Bundesgerichtshof (“German Federal Court”) over the last few years. While the German<br />

Federal Court has refused to accept the once famous original equipment manufacturer<br />

(“OEM”) clause that set forth restriction of stand-alone sale of software without hardware<br />

in 1999 (BGH, July 6, 2000, File Number I ZR 244/97 (OEM)), it has decided, on<br />

the other hand, that network licenses must be accepted as a permissible use of software<br />

licenses (BGH Oct. 24, 2002, File Number I ZR 3/00 (CPU)). Even though these license<br />

forms have been subject to Federal Court evaluation, other concepts to circumvent<br />

software-licensing restrictions have come up, and have yet to be decided.<br />

RESELLING USED SOFTWARE LICENSES<br />

A hot topic in such licensing restrictions concerns the resale of “used” licenses.<br />

Since the Federal Court has decided that the stamped restriction on a Microsoft OEM<br />

product “for sale with a new PC only” is void under German law, the sale of fullpackaged<br />

software products cannot be made subject to usage restrictions if contractual<br />

provisions between customer and licensor have been put in place that aren’t<br />

valid (which is not typical). Such restrictions are not in line with the exhaustion<br />

principle as defined in §69 c Urhebergesetz (German Copyright Act) — a provision<br />

incorporated from the EU Software Directive (Directive 91/250/EWG) and is in force<br />

throughout Europe. The prohibition of distribution restrictions, however, once a<br />

work has been released to the market, applies only to physical incorporations of<br />

the work, according to the law’s literal wording. The question arises, though: Does<br />

continued on page 2<br />

In This Issue<br />

Sale of Used Software<br />

Licenses in Germany .1<br />

On the Razr’s Edge:<br />

Mobile Marketing . . .1<br />

When the CEO<br />

Wants His ‘Hotmail’ . .3<br />

Internet Expands<br />

Trademark<br />

Infringement . . . . . . .7<br />

e-Commerce<br />

Docket Sheet . . . . . .10<br />

Movers & Shakers . .11


Used Licenses<br />

continued from page 1<br />

this principle also apply, if for example,<br />

rights, but not products, are<br />

being sold?<br />

Yes is the answer, and some distributors<br />

have started to distribute<br />

freely defined numbers of application<br />

licenses purchased from a bulk<br />

of volume license agreements that<br />

their resellers (the first users) purchased<br />

from software manufacturers<br />

such as Microsoft and Oracle, but<br />

allegedly no longer need.<br />

An approach some others take is<br />

to “transfer” replication rights for<br />

software that the first customer was<br />

offered via download, has used, and<br />

then deletes and issues a sales document<br />

to the distributor — who then<br />

resells the “license.” Apparently, this<br />

approach makes use of some significant<br />

price deviations between fullpackaged<br />

product and software<br />

licenses that are priced more favorably<br />

as part of either volume license<br />

agreements or download offers. In<br />

the end, software manufacturers<br />

haven’t left the issue unattended, and<br />

have begun involving the courts,<br />

which have had to deal with this<br />

business model and have come to<br />

different conclusions. One can<br />

expect, then, that the Federal Court<br />

will have to decide the question. This<br />

article provides an overview of<br />

German precedents in the matter.<br />

ORACLE V. USEDSOFT GMBH<br />

Last year, the Munich Court of<br />

First Instance (Landgericht München,<br />

Jan. 1, 2006, File Number 7 0<br />

23237/05) and the Appellate Court<br />

(Oberlandesgericht München, Aug. 3,<br />

Dr. Katharina Scheja is a partner<br />

in the IT/IP Services Department<br />

of <strong>Heymann</strong> & <strong>Partner</strong>, Frankfurt,<br />

Germany. Dr. Scheja specializes in<br />

large IT transactions such as software<br />

and telecom projects, development,<br />

distribution and licensing contracts and<br />

outsourcing. She has also been active<br />

in anti-piracy. Among her memberships,<br />

Dr. Scheja counts the German<br />

Association for Computer Law and the<br />

German Association on IP Law. She<br />

joins the e-Commerce Law & Strategy’s<br />

Board of Editors with this issue. Reach<br />

her at k.scheja@heylaw.de.<br />

2<br />

2006, File Number 6 U 1818/06) decided<br />

a case brought by Oracle against<br />

software reseller usedSoft GmbH<br />

(“usedSoft”). The case dealt with software<br />

that Oracle offered via the<br />

Internet by download to its customers.<br />

usedSoft sold “used licenses” of this<br />

software to customers who had physical<br />

copies of the software and intended<br />

to enlarge their license portfolio,<br />

with the “licenses” having been purchased<br />

by the first customers who had<br />

downloaded the software from the<br />

Internet. The “transfer of license<br />

rights” was documented in a certified<br />

brief issued by a German notary public<br />

who verified having checked the<br />

delivery papers of the original license<br />

owner and the delivery to usedSoft,<br />

and confirmed that the original license<br />

owner had obtained the licenses legally,<br />

and did not continue to use them.<br />

Oracle argued that this offer of<br />

“used licenses” was infringing its<br />

copyright because Oracle hadn’t<br />

agreed to the transfer. Oracle<br />

applied for a preliminary injunction<br />

to cease and desist, and further<br />

refrain from, this offer. The Munich<br />

Court of First Instance granted the<br />

preliminary injunction, with the<br />

Appellate Court in Munich affirming<br />

the ruling. After that, in accordance<br />

with provisions of German<br />

Procedural Law, Oracle had to initiate<br />

main proceedings in which the<br />

legal issues would be checked thoroughly,<br />

and subject to collection and<br />

discussion of further facts and evidence.<br />

The Landgericht München<br />

this year upheld its earlier decision<br />

(see, Landgericht München, March<br />

15, 2007, File Number 7 O 7061/06).<br />

In their decisions, both Munich<br />

courts asserted that the exhaustion<br />

principle could not be applied to the<br />

resale of licenses and, accordingly,<br />

such resale needed the consent of<br />

the software manufacturer to be<br />

valid. In accordance with the wording<br />

of the law, both Munich courts<br />

clearly stated that the principle of<br />

exhaustion applies only to physical<br />

incorporation of protected works.<br />

These decisions have received<br />

enormous attention and been subject<br />

to intense discussion in the<br />

legal community. One of the most<br />

intensely discussed topics in German<br />

continued on page 6<br />

e-Commerce Law & Strategy ❖ www.ljnonline.com/alm?ecomm<br />

e-<strong>commerce</strong><br />

<strong>LAW</strong> & <strong>STRATEGY</strong> ®<br />

EDITOR-IN-CHIEF . . . . . . . . . .Michael Lear-Olimpi<br />

EDITORIAL DIRECTOR . . . . . .Wendy Kaplan Ampolsk<br />

MANAGING EDITOR . . . . . . . .Steven Salkin, Esq.<br />

MARKETING DIRECTOR . . . . .Jeannine Kennedy<br />

MARKETING<br />

COORDINATOR . . . . . . . . . . . .Beth Ann Montemurro<br />

GRAPHIC DESIGNER . . . . . . . .Louis F. Bartella<br />

BOARD OF EDITORS<br />

RICHARD BUCHBAND . . . .Juno Online Services Inc.<br />

New York<br />

JEFFREY P. CUNARD . . . . . .Debevoise & Plimpton<br />

Washington, DC<br />

WALTER A. EFFROSS . . . . . .American University<br />

Washington, DC<br />

D. REED FREEMAN JR. . . . .Claria Corp.<br />

Washington, DC<br />

ELIZABETH A. GAUDIO . . .Nat’l Federation of Ind. Bus.<br />

Legal Foundation<br />

Washington, DC<br />

PAUL R. GUPTA . . . . . . . . . .Mayer, Brown, Rowe & Maw<br />

New York<br />

THOMAS HEYMANN . . . . . .<strong>Heymann</strong> & <strong>Partner</strong><br />

Frankfurt, Germany<br />

STANLEY P. JASKIEWICZ . . .Spector Gadon & Rosen, P.C.<br />

Philadelphia<br />

PHILIPPA <strong>LAW</strong>SON. . . . . . .Canadian Internet Policy and<br />

Public Interest Clinic<br />

Ottawa<br />

EMILE LOZA . . . . . . . . . . . .Technology Law Group<br />

Boise, ID<br />

RONALD J. MANN . . . . . . .Mitts Milavec<br />

Philadelphia<br />

JULIAN S. MILLSTEIN. . . . . Thelen Reid Brown Raysman<br />

& Steiner LLP<br />

New York<br />

JEFFREY D. NEUBURGER. . .Thelen Reid Brown Raysman<br />

& Steiner LLP<br />

New York<br />

EDWARD A. PISACRETA. . . .Thelen Reid Brown Raysman<br />

& Steiner LLP<br />

New York<br />

LUIS SALAZAR . . . . . . . . . .Greenberg Traurig LLP<br />

Miami<br />

DR. KATHARINA SCHEJA . . .<strong>Heymann</strong> & <strong>Partner</strong><br />

Frankfurt, Germany<br />

J.T. WESTERMEIER, JR. . . . .DLA Piper Rudnick Gray Cary<br />

Northern Virginia<br />

JOSEPH P. ZAMMIT . . . . . . .Fulbright & Jaworski<br />

New York<br />

e-Commerce Law & Strategy® (ISSN 0747-8933) is published<br />

by Law Journal Newsletters, a division of ALM.<br />

© 2007 ALM Properties, Inc. All rights reserved. No reproduction<br />

of any portion of this issue is allowed without written permission<br />

from the publisher. Phone: 800-999-1916<br />

Editorial e-mail: ssalkin@alm.com<br />

Circulation e-mail: almcirc@alm.com<br />

The publisher of this newsletter is not engaged in rendering<br />

legal, accounting, financial, investment advisory or other<br />

professional services, and this publication is not meant to<br />

constitute legal, accounting, financial, investment advisory or<br />

other professional advice. If legal, financial, investment<br />

advisory or other professional assistance is required, the<br />

services of a competent professional person should be sought.<br />

e-Commerce Law & Strategy P0000-236<br />

Periodicals Postage Pending at Philadelphia, PA<br />

POSTMASTER: Send address changes to:<br />

ALM<br />

345 Park Avenue South, New York, NY 10160<br />

Annual Subscription: $395<br />

Published Monthly by:<br />

Law Journal Newsletters<br />

1617 JFK Boulevard, Suite 1750, Philadelphia, PA 19103<br />

www.ljnonline.com<br />

June 2007


When the CEO<br />

Wants His ‘Hotmail’<br />

Don’t Treat Your Business<br />

Records Like Presidential<br />

Correspondence<br />

By Stanley Jaskiewicz<br />

Many businesses today are conducted<br />

entirely by e-mail, sometimes<br />

through employees’ individual e-mail<br />

accounts.<br />

And you’ve most likely been in this<br />

spot: Often, the only place to find correspondence,<br />

contracts and other<br />

business records is in the electronic<br />

inboxes of everyone who works for a<br />

company.<br />

This is certainly convenient,<br />

because it lets all employees who<br />

need materials in their inboxes keep<br />

working, wherever they may be, without<br />

being tethered to a particular<br />

office and or cabinet full of paper files.<br />

But despite the convenience of<br />

working online, wouldn’t it be nice to<br />

have the luxury of an old-fashioned<br />

secretary to clean up your firm’s<br />

inboxes? Someone would maintain the<br />

traditional files, to store all messages<br />

arranged by client, subject and date.<br />

When something is needed, whether<br />

because a question arose about what<br />

a contract requires, a request is<br />

received to produce documents in ediscovery,<br />

or a copy of the latest or<br />

final draft of a contract is needed,<br />

it would be a simple matter of<br />

asking the secretary to assemble messages<br />

from that neatly sorted file.<br />

(Sophisticated document-management<br />

systems purport to create this result,<br />

but they are only as good as the documents<br />

that make it into the system.<br />

For reasons discussed in this article,<br />

many documents and e-mail messages<br />

might never make it there.) When all<br />

Stanley P. Jaskiewicz, a business<br />

lawyer, helps clients solve e-<strong>commerce</strong>,<br />

corporate contract and technology-law<br />

problems, and is a member<br />

of e-Commerce Law & Strategy’s<br />

Board of Editors. He can be reached<br />

at the Philadelphia law firm of<br />

Spector Gadon & Rosen P.C., at sjaskiewicz@lawsgr.com.<br />

business correspondence took place<br />

on paper, in a 9-to-5 work world, that<br />

system made perfect sense.<br />

Unfortunately, that world (and its<br />

secretaries) hasn’t existed for many<br />

years. Not only do most of us not<br />

have a secretary tidying up our email<br />

inbox each evening, but we also<br />

have many alternative inboxes for<br />

our business correspondence. For<br />

work, a busy executive may have an<br />

office e-mail account, a Blackberry<br />

for around-the-clock access and an<br />

online mail account (such as through<br />

Gmail, Hotmail or Yahoo!) for convenience<br />

when traveling. He or she<br />

probably also has a personal account<br />

for non-business e-mail that must be<br />

kept out of the firm’s accounts.<br />

Going through “the file” has become<br />

an exercise not only in finding the<br />

appropriate messages and attachments,<br />

but in simply identifying all<br />

places and accounts where “the file”<br />

might exist. Indeed, multiple accounts<br />

often are created by employees to<br />

bypass the hassles of security measures<br />

and record-retention policies<br />

diligently created by IT departments<br />

who often diligently enforce these<br />

polices and whose employees read<br />

and apply the information in publications<br />

like this one. (My IT staff<br />

would call those hassles “necessary<br />

inconveniences” to comply with the<br />

rules that lawyers perpetrate.) If the<br />

most convenient e-mail device —<br />

typically the Blackberry — is supplied<br />

by the employee herself, or by<br />

a third party, then the IT department<br />

might not know about all the<br />

accounts on which it is used, much<br />

less be able to monitor them, or<br />

apply the firm’s retention or other<br />

policies.<br />

Yet the rabbit-like multiplication of<br />

e-mail accounts has grave implications,<br />

not only for business, but, as<br />

we have seen in recent news, for<br />

anyone who uses e-mail — including<br />

even our government leaders. The<br />

pitfalls recently encountered by the<br />

politicos who apparently tried to<br />

keep secret their machinations about<br />

the replacement of various U.S.<br />

Attorneys, and dealings with lobbyists,<br />

by using private Republican<br />

National Committee (“RNC”)<br />

accounts, rather than White House<br />

e-mail accounts — with all their<br />

monitoring, recordkeeping and other<br />

oversight — mirror the risks businesses<br />

run when they allow employees,<br />

especially key employees, to<br />

bypass the company e-mail system.<br />

(See, http://online.wsj.com/article/<br />

SB117651545625969906.html?mod=<br />

googlenews_wsj; http://online.wsj.<br />

com/article/SB117615846511864432search.html?KEYWORDS=congress+f<br />

ollows+e-mail+trail&COLLEC-<br />

TION=wsjie/6month; and www.salon<br />

.com/opinion/blumenthal/2007/03<br />

/29/attorney_firings/.) The RNC’s email<br />

pratfalls provide an instructive<br />

lesson on what not to do when private<br />

businesses allow (or tolerate) an<br />

employee’s alternative online account,<br />

rather than the “official” employersanctioned<br />

one.<br />

RECENT DEVELOMENTS<br />

Even worse, consider how the<br />

White House’s and RNC’s problems<br />

with outside e-mail — and their<br />

staffers’ actual quotes about it —<br />

would appear if the situation involved<br />

your company, or a client’s, and you<br />

had to read about your employees<br />

and IT department defending your<br />

company’s e-mail snafus, using the<br />

same language as the widely reported<br />

actual quotes cited below. How it<br />

would play in the press and the concerns<br />

of unhappy clients would be<br />

the least of your worries, particularly<br />

compared to your legal headaches.<br />

You could have to give explanations<br />

to opposing counsel conducting discovery<br />

(and feeling misled by your<br />

formal responses), or worst of all,<br />

respond to subpoenas if the “alternative”<br />

e-mails trigger a regulatory<br />

investigation. (The following quotes<br />

all are actual statements reported in<br />

the press, but any of them could easily<br />

have come from well-meaning and<br />

bottom-line oriented employees — or<br />

IT staff who simply have not had adequate<br />

training on legal issues in<br />

records management, particularly as it<br />

applies to electronic records.)<br />

For example, an assistant to presidential<br />

advisor Karl Rove said in an<br />

e-mail (that was widely quoted in<br />

The Wall Street Journal, and other<br />

publications): “I now have an<br />

RNC blackberry which you can use<br />

continued on page 4<br />

June 2007 e-Commerce Law & Strategy ❖ www.ljnonline.com/alm?ecomm<br />

3


‘Hotmail’<br />

continued from page 3<br />

to e-mail me at any time. No security<br />

issues like my WH (White House) email.”<br />

Would your IT department tolerate<br />

that attitude from a staffer<br />

unhappy with the rules of your<br />

record-retention program or acceptable-use<br />

policy? Certainly not, since<br />

the reaction of opposing discovery<br />

counsel, or a court, might mirror that<br />

of the legislators who investigated<br />

the RNC, such as Rep. Henry<br />

Waxman (D-CA), who bluntly (but<br />

accurately) described the behavior of<br />

the White House staffers as “using<br />

the nongovernmental accounts<br />

specifically to avoid creating a record<br />

of the communications.” He also<br />

cited an instance in which a lobbyist<br />

had warned against using the “official”<br />

White House e-mail system,<br />

because “to put this stuff in writing in<br />

their e-mail system ... might actually<br />

limit what they can do to help us.” A<br />

Clinton-era staffer with similar clarity<br />

labeled this behavior as “operating<br />

official business off the official systems”<br />

— the very risk run by private<br />

firms that allow use of personal email<br />

accounts for business. From a<br />

practical perspective, you would be<br />

lucky if an opposing counsel finding<br />

any of these land mines in discovery<br />

gave you a chance to call your carrier<br />

to discuss settlement before seeking<br />

sanctions from the court.<br />

HOW ‘CONVENIENCE’<br />

CAN CAUSE PROBLEMS<br />

In an era when firms adopt carefully<br />

drafted record-retention policies,<br />

and e-mail and Internet-usage,<br />

policies to protect the firm against<br />

improper use of those resources by a<br />

rogue employee, allowing your<br />

firm’s staffers and executives alike to<br />

bypass those protections, like the<br />

White House officials, would make it<br />

hard to persuade a court to grant<br />

your firm the benefits of those policies.<br />

After all, the White House and<br />

RNC had to cope only with the<br />

requirements of the 1978 Presidential<br />

Records Act, which requires that sufficient<br />

records be kept “to assure that<br />

the activities, deliberations, decisions,<br />

and policies that reflect the<br />

performance of (the President’s) con-<br />

4<br />

stitutional, statutory, or other official<br />

or ceremonial duties are adequately<br />

documented and that such records<br />

are maintained” (www.archives.gov/<br />

about/laws/presidential-records.<br />

html).<br />

Private businesses, in contrast,<br />

must adhere to the stringent<br />

demands of Sarbanes Oxley and<br />

other regulatory acts — not to mention<br />

the after-the-fact scrutiny of the<br />

class-action plaintiffs’ bar.<br />

In particular, the recently adopted<br />

amendments to the Federal Rules of<br />

Civil Procedure (“FRCP”) impose<br />

strict standards for the storage and<br />

destruction of e-mail, and duties to<br />

produce it in litigation. With all of<br />

this alternative e-mail, it is fortunate,<br />

on the one hand, that the rules do<br />

not impose a duty to locate every<br />

possible electronic record, such as a<br />

critical e-mail that is not on the firm’s<br />

own system. “A party need not provide<br />

discovery of electronically<br />

stored information from sources that<br />

the party identifies as not reasonably<br />

accessible because of undue burden<br />

or cost.” On the other hand, however,<br />

the rules’ protection for those<br />

unable to produce relevant information,<br />

particularly that which has been<br />

destroyed or which is not maintained,<br />

do not provide a defense for<br />

casual failure to maintain records.<br />

“Absent exceptional circumstances, a<br />

court may not impose sanctions<br />

under these rules on a party for failing<br />

to provide electronically stored<br />

information lost as a result of the<br />

routine, good-faith operation of an<br />

electronic information system.”<br />

(Emphasis added.) If a firm knowingly<br />

permits those generating potential<br />

evidence — that is, everyone in<br />

the business who uses e-mail — to<br />

avoid the firm’s own systems for<br />

assembling that evidence, whether<br />

intentionally or not, then those<br />

defenses might be unavailable. The<br />

oversight might have been what<br />

many people responding to inquiries<br />

about the oversight would call “routine,”<br />

but almost certainly not “good<br />

faith operation.” No one wants to fall<br />

into such a fact-specific question as<br />

to whether the cost of not requiring<br />

every employee to adhere to a<br />

record-retention policy requiring use<br />

e-Commerce Law & Strategy ❖ www.ljnonline.com/alm?ecomm<br />

of the company’s own e-mail system<br />

was an “undue burden.”<br />

In fact, beyond the impact of the<br />

new rules, consider the practical burdens<br />

on an IT department facing a<br />

discovery demand, if use of the firm’s<br />

information-management software,<br />

systems and procedures is “optional”<br />

for those who prefer not to deal with<br />

it, and instead choose to use a<br />

personal e-mail address outside<br />

the system for their business correspondence.<br />

As mentioned above,<br />

responding to discovery requests<br />

might require assembling information<br />

from outside providers, either<br />

voluntarily (such as by requiring the<br />

employee to back up everything<br />

from the outside system into the document-management<br />

system), or by<br />

subpoena to a third party (at an<br />

unnecessary expense). Busy employees<br />

might not even keep copies of<br />

recent e-mail, much less of older correspondence.<br />

Implementation of a<br />

retention policy cannot be handled<br />

on a single server, as the IT staff may<br />

prefer, but will require them, at a<br />

minimum, to clean manually the<br />

memory of each affected user’s computer<br />

to eliminate records of saved<br />

mail. Of course, that work won’t<br />

purge anything from the service<br />

provider’s own servers and stored email<br />

— all of which an adverse party<br />

can obtain with relative ease — or<br />

from employees’ home computers or<br />

laptops that haven’t been synchronized<br />

with the system.<br />

THINGS CAN GO<br />

BUMP IN THE NIGHT<br />

IT management also becomes a<br />

nightmare. Monitoring employees’<br />

communications for objectionable<br />

content or activity, or for unauthorized<br />

transmission of proprietary<br />

information, becomes something like<br />

trying to catch raindrops with a sieve.<br />

Restoring data after a disaster, or<br />

locating the work of an employee<br />

who maybe left the firm before data<br />

was needed for litigation, becomes<br />

problematic. Data restoration assumes<br />

that the IT department can reconstruct<br />

all of the third party e-mail<br />

sources that the departed staffer<br />

used (whether or not the former<br />

employee shared that information,<br />

continued on page 5<br />

June 2007


‘Hotmail’<br />

continued from page 4<br />

and passwords, with tech support),<br />

and obtain access to them (perhaps<br />

without passwords or subscriber<br />

IDs). Even scrupulous staffers who<br />

keep different accounts to separate<br />

work and personal e-mail may err at<br />

times, and use the personal account<br />

for business (and provide an opening<br />

for opposing counsel’s discovery<br />

fishing expedition).<br />

In fact, even so-called normal business<br />

can be compromised when<br />

employees rely on alternative e-mail<br />

services, whether an online one, or<br />

private accounts such as an AOL<br />

address. Such services often have limits<br />

on the size and types of messages<br />

that can be transmitted; a company<br />

account can also have limits, but at<br />

least the company can set them to<br />

permit the size and type of messages<br />

typically encountered in the business.<br />

While normal text messages would<br />

rarely be blocked for exceeding the<br />

permitted limits, attachments of the<br />

size common today — such as multimedia<br />

or .PDF files — may well be<br />

prohibited. While these limits can be<br />

worked around by breaking the file<br />

into smaller chunks, it is certainly less<br />

convenient. Worse, a critical message<br />

might be delayed or bounced unexpectedly.<br />

At best, time may be lost<br />

until the sender gets the error message,<br />

and arranges another way of<br />

sending it; at worst, business opportunities<br />

may be lost, or key dates<br />

missed.<br />

Another problem could occur when<br />

the company loses control of critical<br />

business information because that<br />

information is outside the company’s<br />

records and control. Channeling all<br />

work through a company-controlled<br />

account at least preserves the firm’s<br />

access to critical information, such as<br />

contact data for those with whom the<br />

employee — and her successors —<br />

must correspond. Customers and vendors<br />

might send business-related messages<br />

— or orders — to an employee’s<br />

own address, which the company<br />

might never see if the employee<br />

leaves, or chooses not to forward<br />

back to her former employer. Worse<br />

yet, those messages might be formal<br />

notices given under a contract —<br />

rarely a harbinger of good news —<br />

that require immediate action, which<br />

never comes because no one saw the<br />

message. The inability to monitor<br />

employee e-mail could be a particular<br />

concern with a disloyal employee,<br />

who might be contemplating leaving<br />

for a competitor because confidential<br />

information could go out the door<br />

unrestricted by any oversight software<br />

the company might have in place.<br />

(Again, alternative e-mail might be<br />

only the tip of the iceberg in protecting<br />

electronic assets — a determined<br />

thief could do the same damage with<br />

a $10 flash drive, or an omnipresent<br />

iPod holding business data rather than<br />

music on its massive hard drive.) At a<br />

minimum, using a “company” address<br />

for all formal notices, rather than an<br />

employee’s home address, could prevent<br />

some of these problems (as long<br />

as someone is checking the “notice”<br />

e-mail inbox regularly).<br />

INVENTION CAN BE THE<br />

MOTHER OF NECESSITY<br />

Yet there might be legitimate reasons<br />

for employees to occasionally<br />

use outside e-mail accounts for business,<br />

or at least to have them available<br />

as needed. During potential outages<br />

of the firm’s servers, whether<br />

due to technical bugs or natural<br />

problems (such as storm or power<br />

outage), an alternative e-mail<br />

account (despite the possible costs it<br />

may create for IT management and in<br />

litigation) is a much cheaper backup<br />

system than paying the certain costs<br />

of maintaining a full-blown backup<br />

capability 24/7. Traveling employees<br />

might find it easier to connect in<br />

public places or hotspots to an<br />

online account than to find an<br />

Internet provider capable of allowing<br />

access to the firm’s secure network<br />

through a protected connection<br />

(especially when traveling in remote<br />

areas where any Internet connection<br />

is welcome). Some employees might<br />

not have sufficient hardware or<br />

bandwidth to access the company email<br />

from home, so online accounts<br />

let them work during evenings and<br />

weekends despite those limitations.<br />

Of course, these arguments can be<br />

nothing but rationalizations — in the<br />

RNC case, the White House claimed<br />

that the RNC accounts had been created<br />

“to avoid using government<br />

resources for political purposes,”<br />

while its Democratic opposition saw<br />

the only purpose of the accounts as<br />

“an attempt to avoid scrutiny” when<br />

employees were discussing matters<br />

such as the firing of U.S. Attorneys.<br />

Also, just announcing a policy<br />

requiring that all e-mail be done<br />

through an account provided by the<br />

firm might not be enough to dissuade<br />

the CEO who really wants his<br />

or her Hotmail. For example, in the<br />

RNC case, the existence of a federal<br />

law, and oversight by the lawyers<br />

employed by the White House, was<br />

not enough to stop the human<br />

instinct to get business done in the<br />

easiest, cheapest, way, and the way<br />

that appears to be least regulated. It<br />

is human nature to do what must be<br />

done today — using a non-company<br />

e-mail account — and sort out the<br />

ramifications later.<br />

Similarly, even with policies in<br />

place to direct messages into the<br />

“official” e-mail, those who really<br />

want to avoid creating a record can<br />

simply turn to the “traditional” lowtech<br />

ways of avoiding leaving a trail<br />

of their activity. Crooks have always<br />

known to hold live conversations,<br />

face to face, rather than put something<br />

in writing (including an e-mail)<br />

or to speak on a phone (or leaving a<br />

voice-mail message) that might be<br />

recorded. (Voice-mail discovery itself<br />

has become a rapidly emerging discipline.)<br />

Policies against online<br />

accounts, then, simply become a way<br />

to educate unsophisticated employees<br />

who don’t know the problems<br />

created by the convenience of not<br />

using the firm’s systems, and to discourage<br />

them from such activity.<br />

WHEN IN DOUBT,<br />

JUST DON’T DO IT<br />

The RNC’s problems also highlight<br />

the importance, in an era of virtually<br />

perpetual storage of electronic<br />

communications and enhanced discovery<br />

rights under the recently<br />

revised federal rules, of simply not<br />

creating unnecessary documents: Just<br />

because it might be easier to e-mail<br />

someone, it may nonetheless not be<br />

wise, especially if a phone call will<br />

continued on page 12<br />

June 2007 e-Commerce Law & Strategy ❖ www.ljnonline.com/alm?ecomm<br />

5


Used Licenses<br />

continued from page 2<br />

copyright law is whether the distinction<br />

between physical incorporations<br />

and rights can still be upheld, and<br />

whether such a decision is justified in<br />

light of technical progress and the<br />

economic interests of consumers and<br />

businesses. In its thoroughly reasoned<br />

decision this year, the Munich<br />

Court of First Instance deals with<br />

these arguments in detail and says<br />

that the right-holders’ interests, for<br />

several reasons, can be properly protected<br />

only if physical works are<br />

treated differently from how license<br />

rights are treated, with one of these<br />

reasons being not only legitimate<br />

financial interests, but also necessary<br />

protection from pirated copies.<br />

Again, the judgment of the Munich<br />

Court of First Instance has been<br />

appealed, and once more it is up to<br />

the Oberlandesgericht to re-evaluate<br />

its earlier findings. It would be more<br />

than a surprise, however, if the<br />

Appellate Court deviates from its first<br />

decision and then — economic interests<br />

apparently being strong on both<br />

sides — the case certainly will go to<br />

the Federal Court and be decided<br />

soon, particularly as in Germany’s<br />

northern territories, courts have<br />

shown a partly different view.<br />

HAMBURG COURT DECISIONS<br />

ON AD FOR USED LICENSES<br />

While the Munich decisions rendered<br />

support to the software manufacturers’<br />

position regarding transfer<br />

of software licenses, they suffered<br />

a setback in Hamburg. The First<br />

Instance Court in Hamburg<br />

(Landgericht Hamburg, June 29, 2006,<br />

Mobile Marketing<br />

continued from page 1<br />

IS IT E-MAIL OR A CALL?<br />

Two different regulatory structures<br />

apply to mobile-marketing campaigns,<br />

depending on whether the<br />

campaign emphasizes phone or email<br />

messages. If your marketing message’s<br />

destination is an e-mail address<br />

— the traditional @ with a domain<br />

name — then treat it as an e-mail; but<br />

if a telephone number is the destination,<br />

then consider it a phone call.<br />

6<br />

File Number 315 O 343/06) had to<br />

decide on a case that a software dealer<br />

for Microsoft products brought<br />

against usedSoft (same defendant as<br />

in the Munich case). The plaintiff<br />

apparently felt pressured economically<br />

by usedSoft’s aggressive advertisement<br />

for the business model of used<br />

licenses, and filed for a preliminary<br />

injunction to prohibit this advertisement,<br />

which allegedly promoted a<br />

prohibited business. Microsoft was<br />

not a party to the case.<br />

In light of the Munich decisions, the<br />

Hamburg Court of First Instance surprisingly<br />

rejected the application and<br />

held that the business model of resale<br />

of “used” licenses does not infringe<br />

provisions of the copyright act. The<br />

Hamburg court applied the exhaustion<br />

principle and found that the resale of<br />

such licenses could not be restricted<br />

and does not require Microsoft’s consent.<br />

Advertisement for this business<br />

model, then, was not considered to be<br />

promoting illegal activity.<br />

The decision was confirmed by the<br />

Appellate Court (Hanseatisches<br />

Oberlandesgericht, Feb. 2, 2007, File<br />

Number 5 U 140/06), but the Court<br />

moved away from the application of<br />

the exhaustion principle and<br />

declared (probably in an attempt to<br />

avoid open collision with the Munich<br />

Court of Appeals) that the case needed<br />

only application of the provisions<br />

of fair advertisement in the law on<br />

unfair competition. Considering<br />

these provisions, advertisement for a<br />

business model could not be objected<br />

to if it fairly mentioned the legal<br />

dispute so that customers knew the<br />

potential risks. This declaration is in<br />

principle fully in line with the gener-<br />

If it’s an e-mail, then your campaign<br />

will be governed by the Controlling the<br />

Assault of Non-Solicited Porno- graphy<br />

and Marketing Act, (“CAN-SPAM”) (15<br />

U.S.C. §7701-7713) and the Federal<br />

Communications Commission’s Wireless<br />

E-mail Rule (64 C.F.R. §64.3100).<br />

If it’s a telephone call, then it will<br />

be governed by the Telemarketing<br />

and Consumer Fraud and Abuse<br />

Prevention Act (“TCFAP”) (15 U.S.C.<br />

§6101-6108), the Telephone Consumer<br />

Protection Act (“TCPA”) (47 U.S.C.<br />

§227) and, of course, the Tele-<br />

e-Commerce Law & Strategy ❖ www.ljnonline.com/alm?ecomm<br />

al requirements of advertisement<br />

law, but it is highly doubtful whether<br />

usedSoft has really mentioned the<br />

legal disputes (at all) and in a way<br />

that informs customers about the critical<br />

issue — whether purchasing<br />

such licenses means obtaining anything<br />

at all. If the Munich decisions<br />

should be upheld, all such “used”<br />

license transactions are void, if the<br />

consent of the rightholders cannot be<br />

established. In such a case, customers<br />

would be left with a compensation<br />

claim against usedSoft but<br />

could be subject to prosecution by<br />

software manufacturers.<br />

CONCLUSION<br />

The Hamburg decisions and their<br />

contradiction of the Munich courts’<br />

view will require the Federal Court to<br />

decide quickly, once the Munich<br />

case is handed over to the Federal<br />

Court. The legal community and the<br />

market participants eagerly await the<br />

decision. It will likely be a landmark<br />

decision on the exhaustion principle<br />

as laid down in the Software<br />

Directive. But there are more questions<br />

in the package, such as the crucial<br />

question of under which conditions<br />

the consent of software manufacturers<br />

to such transfer of license<br />

has to be declared — a subject that<br />

will depend on a competition-law<br />

evaluation of fair and equal treatment<br />

of applicants, as well as of<br />

requirements of transparency in<br />

license contracts.<br />

It’s not a certainty that the Federal<br />

Court will answer all these questions,<br />

but it is a certainty that the decision will<br />

receive interest throughout Europe.<br />

—❖—<br />

marketing Sales Rule (“TSR”) (16 CFR<br />

§310.1 et seq.), along with the Do<br />

Not Call Registry that the Federal<br />

Trade Commission (“FTC”) maintains<br />

and the Federal Communications<br />

Commission (“FCC”) enforces.<br />

E-MAIL REGULATIONS<br />

As with e-mails more generally,<br />

CAN-SPAM will govern text, or SMS<br />

(short message service) messages,<br />

and MMS (multi-media messaging<br />

services), which typically contain<br />

graphics, video or an audio<br />

continued on page 9<br />

June 2007


Internet Expands<br />

Trademark<br />

Infringement<br />

Novel Trademark Claims<br />

Spring from e-Commerce<br />

By Jonathan Bick<br />

It should strike no one as a surprise<br />

that the fluidity of using trademarks<br />

on the Internet expands the<br />

incidence of trademark-infringement<br />

claims and lawsuits. And along those<br />

lines, novel Internet trademark<br />

claims spring from the innovative but<br />

unlawful use of trademarks in e-<strong>commerce</strong>.<br />

Logically, then, it follows that<br />

Internet domain names, hyperlinks,<br />

meta tags and framing marks enlarge<br />

the number of trademark-infringement<br />

opportunities.<br />

While it’s true that as an information<br />

conduit, the Internet reduces the<br />

likelihood of confusion by allowing<br />

the buyer to approach an online purchase<br />

with more sophistication, the<br />

technology also bolsters the likelihood<br />

of confusion among consumers<br />

using the Internet by allowing new,<br />

unlawful uses of trademarks. Also,<br />

the traditional use of a mark on the<br />

Internet (to identify the source of<br />

goods) is likely to amplify certain<br />

trademark characteristics, including:<br />

• The strength of a mark;<br />

• The proximity of the products or<br />

services to a geographical location;<br />

and<br />

• Actual confusion.<br />

TRADEMARK PARTICULARS<br />

Trademarks connect a name or<br />

symbol with a good or service. They<br />

benefit owners by allowing them to<br />

profit from the goodwill associated<br />

with the mark. On the other side of<br />

the potential or actual transaction,<br />

trademarks benefit consumers by<br />

Jonathan Bick is of counsel to<br />

WolfBlock Brach Eichler of Roseland,<br />

NJ, and is an adjunct professor of<br />

Internet law at Pace Law School and<br />

Rutgers Law School. He is also the<br />

author of 101 Things You Need To<br />

Know About Internet Law (Random<br />

House 2000). He can be reached at<br />

bickj@bicklaw.com.<br />

memorializing a level of quality. U.S.<br />

trademark law is designed to prevent<br />

confusion in the marketplace and is<br />

enforced by preventing fraud<br />

through deception.<br />

The elements necessary to prove<br />

trademark infringement are well<br />

established under federal and state<br />

case law. These elements apply to<br />

Internet and traditional trademark<br />

infringement. A plaintiff in a trademark-infringement<br />

matter has the<br />

burden of proving that the defendant’s<br />

use of a mark has created a<br />

likelihood of confusion about the origin<br />

of the defendant’s goods or services.<br />

This proof is achieved by the<br />

plaintiff first showing that it has<br />

developed a trademark right worthy<br />

of protection, and then showing that<br />

the defendant is using a confusingly<br />

similar mark in such a way that it creates<br />

a likelihood of confusion, mistake<br />

or deception — or a combination<br />

of these misapplications —<br />

among the consuming public.<br />

Poloroid Corp. v. Polorad Elec.<br />

Corp., 287 F.2d 492 (2d Cir. 1961),<br />

details eight factors that a court must<br />

evaluate prior to finding that an entity<br />

has used a trademark in such a<br />

way that would result in a likelihood<br />

of confusion in the mind of a consumer<br />

regarding the source of a<br />

product. They are:<br />

1. The strength of the plaintiff’s mark;<br />

2. The degree of similarity between<br />

the plaintiff’s mark and defendant’s<br />

mark;<br />

3. The proximity of the products or<br />

services;<br />

4. The likelihood that the plaintiff<br />

will bridge the gap;<br />

5. Evidence of actual confusion;<br />

6. The defendant’s good faith in<br />

adopting the mark;<br />

7. The quality of defendant’s product<br />

or service; and<br />

8. The sophistication of the buyers.<br />

The Lanham Act (Federal<br />

Trademark Act of 1946) also provides<br />

rights for the trademark holder. In<br />

particular, the Act allows mark holders<br />

to take action to end deceitful<br />

practices in interstate <strong>commerce</strong><br />

involving the misuse of trademarks.<br />

Marks, for instance, gain rights<br />

when used. The Internet allows<br />

marks to be used in nontraditional<br />

ways that expand the use of the<br />

marks as well as the likelihood of<br />

confusion and, along with that<br />

increased or actual likelihood of confusion,<br />

an increase in infringement<br />

claims. The use of trademarks on the<br />

Internet has four major forms of<br />

alternative use besides their traditional<br />

form of use as a publication:<br />

1. Domain names;<br />

2. Meta tags;<br />

3. Hyperlinks; and<br />

4. Framing marks.<br />

MAJOR INTERNET ALTERNATIVE<br />

TRADEMARK USES<br />

Domain Names<br />

A domain name, of course, is the<br />

registered identifier that generally<br />

replicates a firm name, product or<br />

phrase. To acquire an Internet<br />

address, an entity need only pay a<br />

nominal fee to an Internet registrar,<br />

such as Network Solutions Inc., and<br />

file for a name not previously registered.<br />

Due to the ease with which<br />

domains can be registered, many<br />

trademarked domain names were initially<br />

registered by enterprising entities<br />

known as cybersquatters who<br />

knowingly reserved a trademark as a<br />

domain name merely to sell it for<br />

profit.<br />

Typo-squatting is another form of<br />

cybersquatting that relies on erroneous<br />

user input. Typo-squatting<br />

occurs when an entity registers a<br />

famous mark with misspellings,<br />

reversed letters or other common<br />

typos built into the domain name in<br />

an attempt to redirect an Internet<br />

user to the cybersquatter’s own Web<br />

site. Alternatively, a cybersquatter<br />

might try to get the famous mark’s<br />

owner to pay to redirect the<br />

mistyped Web address to the mark<br />

owner’s Web address.<br />

Another potential trademark issue<br />

involving domain names is those<br />

names that more than one person or<br />

entity could claim. In Nissan Motor<br />

Co. v. Nissan Computer Corp., 89 F.<br />

Supp. 2d 1154 (C.D. Cal. 2000), the<br />

Nissan car company (which was first<br />

to register its trademark) brought suit<br />

against the Nissan computer company<br />

(dubbed after the owner’s surname)<br />

for trademark infringement<br />

after the computer firm registered<br />

continued on page 8<br />

June 2007 e-Commerce Law & Strategy ❖ www.ljnonline.com/alm?ecomm<br />

7


Trademark<br />

continued from page 7<br />

domain names using the word<br />

Nissan. The court found that the<br />

computer firm’s registration resulted<br />

in consumer confusion for several<br />

reasons, including initial interest confusion<br />

and actual confusion.<br />

The court found initial interest<br />

confusion because the Nissan name<br />

might have led a consumer to believe<br />

that it was a Web site for Nissan cars,<br />

and that alone is enough to find consumer<br />

confusion. The court also<br />

found actual confusion because nearly<br />

all the computer company’s revenue<br />

stemmed from visitors to the<br />

Web site clicking on automobile<br />

advertisements displayed on it.<br />

Despite this, the court was careful to<br />

point out that there is a “judicial<br />

reluctance to enjoin use of a personal<br />

name” even when it apparently<br />

infringes on a trademark, but that it<br />

was still possible to limit the use with<br />

a “carefully tailored injunction.”<br />

This case and others resulted in the<br />

enactment of the Anti-Cybersquatting<br />

Consumer Protection Act.<br />

Additionally, the Internet Corporation<br />

for Assigned Names and Numbers<br />

(“ICANN”) adopted its Uniform<br />

Domain Name Dispute Resolution<br />

Policy to provide an alternative to litigation<br />

in dealing with abusive<br />

domain-name registrations.<br />

Meta Tags<br />

The second trademark infringement<br />

issue unique to the Internet<br />

entails meta tags, which provide<br />

Internet page-setting information that<br />

is normally invisible to a user. Meta<br />

tags are commonly used by search<br />

engines, such as Google, to index site<br />

content. The content of meta tags,<br />

when properly used, gives content<br />

some context. Four types of content<br />

are often used as a part of meta tags:<br />

• Resource type;<br />

• Key word;<br />

• Description; and<br />

• Distribution.<br />

The unauthorized use of another’s<br />

mark as an element of meta-tag content<br />

could result in infringement.<br />

The use of registered marks as part<br />

of a meta tag might result in consumer<br />

confusion and, as such, could<br />

8<br />

be a basis for infringement litigation;<br />

for example, the use of various<br />

“Playboy” trademarks in meta-tag<br />

lines. (See, Playboy Enter., Inc. v.<br />

Calvin Designer Label, 985 F. Supp.<br />

1220 (N.D. Cal. 1997) and Playboy<br />

Enter., Inc. v. Torri Welles, 7 F. Supp.<br />

2d 1098 (S.D. Cal. 1998)).<br />

The Seventh and Ninth District<br />

courts have ruled that meta-tag use<br />

might infringe on famous marks.<br />

(See, Promatek Indus. v. Equitrak<br />

Corp., 300 F.3d 808 (7th Cir. 2002);<br />

and Brookfield Communications v.<br />

West Coast Entertainment, 174 F.3d<br />

1036 (9th Cir. 1999)). Both courts<br />

have followed the same line of reasoning,<br />

holding that the “initial interest<br />

confusion” that consumers experience,<br />

regardless of whether it<br />

results in actual confusion once they<br />

are viewing the Web site, is adequate<br />

for the imposition of trademarkinfringement<br />

liability. It should be<br />

noted that the Promatek decision<br />

was amended to state that meta-tag<br />

usage by a defendant come into play<br />

only when the infringing company is<br />

actually using the trademark to<br />

deceive consumers.<br />

Hyperlinks<br />

Hyperlinks are the third trademarkinfringement<br />

issue unique to the<br />

Internet. A hyperlink is an element of<br />

an electronic document that links to<br />

another place in the same document<br />

or to an entirely different document.<br />

Users typically click on the hyperlink<br />

to follow the link to the document to<br />

which it is connected. Hyperlinks are<br />

an indispensable constituent of all<br />

hypertext systems, such as the World<br />

Wide Web. Hyperlink use, however,<br />

has the potential for trademark<br />

infringement, and allegations have<br />

been made that hyperlinks can cause<br />

trademark-infringement problems in<br />

the form of passing off, reverse passing<br />

off, and false advertising.<br />

Framing<br />

Framing is the fourth way that a<br />

trademark can be violated on the<br />

Internet. Framing occurs when one<br />

Internet site displaces another site’s<br />

content by surrounding or framing it<br />

with a portion of its own site. In the<br />

case of TotalNews (The Washington<br />

Post v. TotalNews, Southern District<br />

of New York, Civil Action Number<br />

e-Commerce Law & Strategy ❖ www.ljnonline.com/alm?ecomm<br />

97-1190), the Washington Post and<br />

other newspaper publishers brought<br />

suit against an Internet news site for<br />

using framing technology to display<br />

the news organizations’ information<br />

on the TotalNews site and surrounding<br />

the other content with its own<br />

advertising. This practice was found<br />

to be tantamount to trademark dilution<br />

because the framing practice<br />

was likely to confuse users in that<br />

they would be led to believe that the<br />

source of these advertisements was<br />

the plaintiffs’ newspapers.<br />

DOUBLE JEOPARDY<br />

The special trademark-infringement<br />

problems that the Internet presents<br />

(domain names, hyperlinks,<br />

meta tags and framing) are in addition<br />

to the amplification of traditional<br />

trademark infringement that results<br />

from the worldwide use of the<br />

Internet. Consider the international<br />

trademark-infringement difficulties<br />

faced by Playboy Enterprises. In<br />

Playboy Enter., Inc. v. Chuckleberry<br />

Publ’g, Inc., 687 F.2d 563 (2d Cir.<br />

1982), the Second Circuit Court of<br />

Appeals had granted an injunction,<br />

enjoining Chuckleberry from using<br />

the confusingly similar mark<br />

Playmen for the distribution of<br />

Chuckleberry’s Italy-based magazine.<br />

Despite this judicial result in a parallel<br />

suit brought to enjoin<br />

Chuckleberry’s use in Italy, the<br />

Italian court upheld the use of the<br />

Playmen mark.<br />

Subsequently, in Playboy Enter.,<br />

Inc. v. Chuckleberry Publ’g Inc., 939<br />

F. Supp 1032 (S.D.N.Y. 1996), when<br />

Chuckleberry published an Internet<br />

Web site for its magazine, again<br />

using the mark Playmen, based in<br />

Italy, Playboy brought suit for a violation<br />

of the injunctive order granted<br />

in the prior Playboy v. Chuckleberry<br />

case, citing that the worldwide<br />

continued on page 12<br />

<strong>LAW</strong> JOURNAL NEWSLETTERS<br />

REPRINT SERVICE<br />

Promotional article reprints of this article or any<br />

other published by <strong>LAW</strong> JOURNAL NEWSLETTERS<br />

are available.<br />

Call Matt Solomon at 212-545-6289 or<br />

e-mail msolomon@alm.com<br />

for a free quote.<br />

Reprints are available in paper and PDF format.<br />

June 2007


Mobile Marketing<br />

continued from page 6<br />

component. If the primary purpose of<br />

the message is commercial, then SMS<br />

and MMS messages will fall under the<br />

FCC’s Mobile Service Commercial<br />

Message (“MSCM”) definition.<br />

In fact, wireless service providers<br />

have established specific domains for<br />

sending and receiving “mobile service<br />

messages,” pursuant to CAN-SPAM.<br />

They are all listed on the FCC’s<br />

Wireless Domain Name Download<br />

Registry (www.fcc.gov/cgb/policy/<br />

DomainNameDownload.html). While<br />

CAN-SPAM does not prohibit transactional<br />

or relationship messages, it<br />

does otherwise prohibit messages to<br />

mobile devices — hence, the domains<br />

on the registry — absent “express<br />

prior authorization.” That authorization<br />

can be written — meaning via<br />

actual paper, an e-mail or a SMS message<br />

— or it can be oral; but in each<br />

case, the authorization is subject to<br />

sender verification.<br />

TELEPHONE REGULATIONS<br />

SMS and voice messages are covered<br />

by the TCPA and TSR. The TCPA<br />

prohibits calls to mobile devices<br />

(where the receiving party is<br />

charged) using an automatic telephone-dialing<br />

system, artificial and<br />

pre-recorded messages, or both of<br />

the last two. Florida has a similar law.<br />

The TCFAP empowered the FTC to<br />

issue the Telemarketing Sales Rule,<br />

which generally prohibits telemarketers<br />

from engaging in certain<br />

deceptive acts or practices. But it is<br />

more generally known for establishing<br />

the National Do Not Call Registry.<br />

If a wireless number is listed on that<br />

registry, then a marketer is barred<br />

from calling that number unless it<br />

has an “established business relationship<br />

with the consumer.” That is, a<br />

relationship based on:<br />

• “The consumer’s purchase,<br />

rental, or lease of the seller’s<br />

Luis Salazar is a shareholder with<br />

Greenberg Traurig, in Miami, and a<br />

member of the firm’s Privacy and<br />

Data Security Task Force. A member<br />

of e-Commerce Law & Strategy’s<br />

Board of Editors, Salazar can be<br />

reached at salazarl@gtlaw.com.<br />

goods or services or a financial<br />

transaction between the consumer<br />

and seller, within the<br />

eighteen (18) months immediately<br />

preceding the date of the telemarketing<br />

call”; or<br />

•“The consumer’s inquiry or application<br />

regarding a product or<br />

service offered by the seller,<br />

within three months immediately<br />

preceding the date of a telemarketing<br />

call.”<br />

Telemarketers must scrub their lists<br />

against the registry every 31 days.<br />

OTHER RESTRICTIONS<br />

A variety of other federal laws<br />

might also apply, depending on<br />

the type of marketing campaign<br />

undertaken. For example, if marketers<br />

are targeting children under 13, then<br />

the Children Online Protection Act<br />

(“COPA”) will control the manner and<br />

type of personal information collected.<br />

As another example, the FTC may<br />

bring an enforcement action against a<br />

mobile marketer if the Commission<br />

believes the marketer’s actions are<br />

unfair or deceptive.<br />

Likewise, a number of state laws<br />

can apply to mobile-marketing campaigns,<br />

including state Do Not Call,<br />

SPAM and unfair trade-practice<br />

statutes.<br />

BEST PRACTICES, BEST RESULTS<br />

Despite these regulations, there’s<br />

plenty of room for missteps and<br />

abuses in what is largely uncharted<br />

and self-policed territory. In an<br />

attempt to lead the industry, the<br />

MMA has developed an industry<br />

code of conduct and best practices<br />

that it has broken into six categories:<br />

1. Choice;<br />

2. Control;<br />

3. Customization;<br />

4. Consideration;<br />

5. Constraint; and<br />

6. Confidentiality.<br />

The categories are outlined below.<br />

Choice<br />

Consumers must opt in to a specific<br />

mobile-messaging program, either<br />

by text messaging, calling a voiceresponse<br />

unit, via a Web site or<br />

through a paper-based method. For<br />

premium services through which<br />

charges can accrue rapidly, double<br />

and even triple opt-in requirements<br />

are the norm.<br />

Control<br />

Customers must have the power to<br />

opt out of or terminate participation<br />

in programs.<br />

Customization<br />

Because mobile-messaging campaigns<br />

are most effective when<br />

appropriately targeted, consumers<br />

should be asked to volunteer demographic,<br />

preference and other information.<br />

This allows messages to the<br />

opt-in consumer to be what the consumer<br />

wants, and when he or she<br />

wants it.<br />

Consideration<br />

The MMA is advocating specific<br />

trust provisions on not renting, selling<br />

or sharing personal information<br />

with other people or non-affiliated<br />

companies, except to provide the<br />

product or services requested. But<br />

aggregate, non-personally identifiable<br />

information may be shared with<br />

partners for research purposes.<br />

Constraint<br />

Marketers should implement a<br />

global throttling mechanism that controls<br />

the number of marketing messages<br />

directed to one consumer, even<br />

from different marketing campaigns.<br />

Optimally, the limit should default to<br />

two new campaigns per week.<br />

Confidentiality<br />

The MMA urges marketers to adopt<br />

Web-site privacy and online publicinterest<br />

watchdog firm TRUSTe’s specific<br />

provisions on not renting or sharing<br />

personal customer information,<br />

and establishing clear privacy policies<br />

that comport with TRUSTe’s standards.<br />

CONCLUSION<br />

As with any unexplored electronic<br />

frontier, mobile marketing presents<br />

entrepreneurs with apparently endless<br />

opportunities to stake new territory<br />

and find riches. At the same<br />

time, “lawless” behavior in any frontier<br />

can rouse government attention<br />

or, perhaps worse, drive the public to<br />

exact its own rough justice — by<br />

avoiding your products or services.<br />

So, it pays to mind the applicable<br />

laws and regulations, and to pursue<br />

best practices to ensure that you get<br />

the best return on your mobile-marketing<br />

investment.<br />

—❖—<br />

June 2007 e-Commerce Law & Strategy ❖ www.ljnonline.com/alm?ecomm<br />

9


FCC ORDER PREEMPTING<br />

STATE REGULATION<br />

OF VOIP IS UPHELD<br />

The determination of the Federal<br />

Communications Commission (“FCC”)<br />

determination that state regulation of<br />

VoIP services is preempted under federal<br />

law because it is currently impossible<br />

to separate the interstate and<br />

intrastate aspects of VoIP service was<br />

not arbitrary or capricious. Minnesota<br />

Public Utilities Commission v. Federal<br />

Communication Commission, 2007<br />

U.S. App. LEXIS 6448 (8th Cir. Mar. 21,<br />

2007). In upholding the agency’s<br />

order and denying various state regulatory<br />

agency petitions for review, the<br />

court ruled that the FCC could preempt<br />

state regulation of VoIP after<br />

determining it would be impractical to<br />

separate the intrastate portions of<br />

VoIP service from the interstate portions,<br />

particularly given the practical<br />

difficulties with determining the geographic<br />

location of “nomadic” VoIP<br />

phone calls (i.e., VoIP service via any<br />

available broadband connection) versus<br />

“fixed” VoIP service (i.e., service<br />

from a fixed location, such as home<br />

cable-TV equipment). Referencing the<br />

FCC’s previous E911 Order, which<br />

required VoIP providers to ensure that<br />

customers using VoIP have 911 emergency<br />

service, the court commented<br />

that the current preemption order had<br />

a potentially limited temporal scope,<br />

because it could be lifted if technology<br />

is developed to identify the geographic<br />

location of nomadic VoIP<br />

communications.<br />

USE OF PREVIOUSLY LICENSED<br />

PICTURES FOR ONLINE<br />

SELF-PROMOTION DISPLAY<br />

IS NOT FAIR USE<br />

A marketing agency’s inclusion of<br />

a brochure containing a previously<br />

licensed photograph in an online<br />

portfolio that promoted past advertising<br />

campaigns is not protected by<br />

the copyright fair-use doctrine.<br />

Straus v. DVC Worldwide, Inc., 2007<br />

U.S. Dist. LEXIS 20907 (S.D. Tex. Mar.<br />

23, 2007). In denying the agency’s<br />

motion for partial summary judg-<br />

10<br />

e-Commerce DOCKET SHEET<br />

ment, the court rejected the argument<br />

that posting past advertising<br />

materials containing copyrighted<br />

images for promotional purposes satisfies<br />

the criteria for fair use. The<br />

court found, among other things, that<br />

the defendant’s “transformative” use<br />

of the photo as commentary on its<br />

own advertising practice was “slight<br />

to non-existent” given that the use of<br />

the entire photograph was wholly for<br />

private commercial gain and outside<br />

the terms of the original license<br />

agreement. The court also declined<br />

to grant summary judgment in the<br />

agency’s favor on the theory that use<br />

of the photograph was subject to an<br />

implied license based on advertisingindustry<br />

custom, finding that the<br />

copyright owner’s expressed disapproval<br />

of the use of the photograph<br />

prior to the filing of the lawsuit created<br />

an issue of fact that could not be<br />

resolved on summary judgment.<br />

COMMERCIAL E-MAIL CONFORMS<br />

TO STATE SPAM <strong>LAW</strong>, EVEN<br />

THOUGH RECIPIENT CAN’T REPLY<br />

A commercial e-mail that otherwise<br />

conforms to the Washington state<br />

anti-spam law by providing accurate<br />

transmission path information and<br />

unsubscribe links is not in violation of<br />

the law simply because the e-mail<br />

recipient is unable to send a reply email<br />

to the sender. Benson v. Oregon<br />

Processing Service, Inc., No. 34195-6-<br />

II, 2007 Wash. App. LEXIS 31 (Wash.<br />

Ct. App. Jan. 9, 2007). The court<br />

noted that the plaintiff elected not to<br />

click on the “unsubscribe” links provided<br />

in the e-mails, nor use the physical<br />

address or phone number provided<br />

in the e-mails to unsubscribe. The<br />

appellate court affirmed the lower<br />

court’s dismissal of the plaintiff’s<br />

claim, finding that the defendant’s failure<br />

to provide “reply” functionality to<br />

the commercial e-mail did not “misrepresent”<br />

or “obscure” the point of<br />

origin or transmission path of the<br />

message. The appellate court concluded<br />

that the statute says nothing<br />

about how useful a commercial email’s<br />

point of origin or transmission<br />

path must be, does not require a com-<br />

e-Commerce Law & Strategy ❖ www.ljnonline.com/alm?ecomm<br />

mercial e-mail sender to acknowledge<br />

or respond to a recipient’s reply email,<br />

and does not require that e-mail<br />

replies be deliverable.<br />

U.S. COURT CAN<br />

PERMANENTLY ENJOIN<br />

RESIDENT FROM BUSINESS<br />

A federal district court did not<br />

abuse its discretion in giving the<br />

Lanham Act extraterritorial effect by<br />

permanently enjoining a U.S. resident<br />

from using the “Versace” name<br />

to sell commercial goods anywhere<br />

in the world or over the Internet.<br />

Gianni Versace, S.P.A. v. Alfredo<br />

Versace, 2007 U.S. App. LEXIS 705<br />

(2d Cir. Jan. 10, 2007). In rejecting<br />

the defendant’s argument that the<br />

district court failed to consider that<br />

he is a U.S. resident and not a citizen,<br />

the appellate court pointed to the<br />

defendant’s 40 years of residence<br />

and business activity in the United<br />

States, coupled with the lack of conflict<br />

with foreign law and “the existence<br />

of a substantial effect on <strong>commerce</strong>.”<br />

The court also noted the<br />

defendant’s violations of prior injunctions,<br />

which supported the district<br />

court’s refusal to permit the defendant<br />

to use the “Versace” name<br />

accompanied by a disclaimer.<br />

SUCCESSFUL DEFENDANT<br />

DENIED ATTORNEY’S FEES<br />

IN CAN-SPAM CASE<br />

A defendant in a CAN-SPAM Act<br />

case who won a motion to dismiss<br />

for lack of personal jurisdiction is not<br />

entitled to an award of attorney’s<br />

fees when there is no evidence of<br />

bad intentions or frivolousness on<br />

the plaintiff’s part, and when such an<br />

award would not be consistent with<br />

the purposes of the act. Phillips v.<br />

Worldwide Internet Solutions, 2007<br />

U.S. Dist. LEXIS 4974 (N.D. Cal. Jan.<br />

22, 2007). In adopting and affirming<br />

the magistrate judge’s recommendation,<br />

the court denied the defendant’s<br />

continued on page 11<br />

The publisher of this newsletter is not engaged in rendering<br />

legal, accounting, financial, investment advisory or other<br />

professional services, and this publication is not meant to<br />

constitute legal, accounting, financial, investment advisory or<br />

other professional advice. If legal, financial, investment<br />

advisory or other professional assistance is required, the<br />

services of a competent professional person should be sought.<br />

June 2007


M OVERS & SHAKERS<br />

PHILLY E-COMMERCE <strong>LAW</strong>YER<br />

QUOTED IN COPA ARTICLE<br />

The Christian Science Monitor<br />

recently featured comments by Carl<br />

Solano, a partner in the Philadelphia<br />

office of Schnader Harrison Segal &<br />

Lewis, on the Third Circuit’s decision<br />

on the Child Online Protection Act<br />

(“COPA”). The article, “Internet<br />

Filters Block Porn, But Not Savvy<br />

Kids,” quoted Solano, who practices<br />

e-<strong>commerce</strong> law and makes a specialty<br />

of First Amendment and appellate<br />

matters, as saying: “Just because<br />

you want to protect kids doesn’t<br />

mean you can ban the information<br />

from adults.”<br />

Solano has been counsel for<br />

domain-name registrars in litigation<br />

over the ownership and control of<br />

domain names, and has advised<br />

Internet publishers on regulating<br />

online content. He has also been an<br />

adjunct professor on e-<strong>commerce</strong><br />

and computer issues the Villanova<br />

University School of Law.<br />

FINNEGAN HENDERSON<br />

<strong>LAW</strong>YER NAMED TO TECH<br />

ASSOCIATION BOARD<br />

Finnegan Henderson Farabow<br />

Garrett & Dunner partner Lawrence<br />

R. Robins was recently elected to<br />

the International Technology Law<br />

Association (“ITechLaw”) board.<br />

Robins, of the firm’s Cambridge, MA,<br />

Docket Sheet<br />

continued from page 10<br />

motion for attorney’s fees, finding no<br />

evidence that the plaintiff’s suit was<br />

“frivolous” or “objectively unreasonable,”<br />

in the factual and legal components<br />

of the case. The court found that<br />

an award of attorney’s fees in this case<br />

would not be consistent with the<br />

purposes of the CAN-SPAM Act, name-<br />

e-Commerce Docket Sheet was written<br />

by Julian S. Millstein, Edward A.<br />

Pisacreta and Jeffrey D. Neuburger,<br />

partners in the New York office of<br />

Thelen Reid Brown Raysman &<br />

Steiner LLP (www.thelen.com).<br />

office, handles intellectual-property<br />

issues, with a focus on strategic development<br />

of trademark portfolio,<br />

according to Finnegan Henderson.<br />

He’s also active in matters concerning<br />

management and protection of the<br />

portfolios, trademark litigation, copyright<br />

disputes, and computer and technology<br />

legal issues. The ITechLaw<br />

board is working on educating professionals<br />

on established and emerging<br />

worldwide technology markets.<br />

PITTSBURGH DIVERSITY<br />

ATTORNEYS MOVE ON<br />

Carl Cooper, one of the first chief<br />

diversity officers of any large firm<br />

when he took the position at K&L<br />

Gates in January 2003, has left the<br />

firm to start his own consultancy,<br />

working with other firms on similar<br />

issues.<br />

Cathy Bissoon has left Reed<br />

Smith’s Pittsburgh office for Cohen &<br />

Grigsby. She’d been director of diversity<br />

since 2001. Reed Smith said last<br />

month that it has appointed<br />

Washington, DC-based partner Tyree<br />

P. Jones Jr. as its new director of<br />

diversity.<br />

TEXAS <strong>LAW</strong>YER NAMED<br />

SOCIAL JUSTICE CRUSADER<br />

Kathleen J. Wu, a partner with<br />

Andrews Kurth LLP in Dallas, has<br />

been designated a “Women of Spirit”<br />

ly to “protect the convenience and<br />

efficiency of e-mail” and to “prevent<br />

time and monetary losses to individuals<br />

and internet service providers.”<br />

PROVIDER OF ANTI-SPAM<br />

OPEN RELAY DATABASE<br />

GETS CDA IMMUNITY<br />

A Web site owner who created a<br />

spam “block list” that identified<br />

open-relay servers useful to spammers<br />

is immune from liability under<br />

the “Good Samaritan” provision of<br />

the Communications Decency Act<br />

(“CDA”) for incorrectly listing the<br />

plaintiff’s IP address on the block list.<br />

Pallorium, Inc. v. Jared, 2007 Cal.<br />

App. Unpub. LEXIS 241 (Cal. Ct.<br />

award recipient by the American<br />

Jewish Congress Southwest Region.<br />

Women judged to have been diligent<br />

and spirited pursuing social justice<br />

are eligible for the award.<br />

“I’m humbled to be in such great<br />

company, and I deeply appreciate<br />

this recognition from the American<br />

Jewish Congress,” Wu said in an<br />

Andrews Kurth news release posted<br />

on the firm’s Web site.<br />

Wu writes a column dealing with<br />

issues women face in the legal profession<br />

for our ALM affiliate newspaper<br />

Texas Lawyer. She often speaks<br />

about how diversity benefits the<br />

workplace.<br />

MORRISON MAKES SOME<br />

CHAIRPERSON CHANGES<br />

Steven Kaufmann, a partner in the<br />

Denver office of Morrison & Foerster<br />

who has been with the firm for more<br />

than 20 years, was recently named the<br />

new chair of Morrison & Foerster’s litigation<br />

department. He leads a group<br />

of 490 attorneys in 18 offices in<br />

the United States, Europe and<br />

Asia. Kaufmann takes over from<br />

San Francisco-based partner Lori<br />

Schechter, who had been practice<br />

chair since 2003. Schechter continues<br />

her own active case work in consumer<br />

class actions and antitrust matters.<br />

continued on page 12<br />

App. Jan. 11, 2007) (unpublished).<br />

The appellate court upheld a trialcourt<br />

judgment finding the owner<br />

immune under Section 230(c)(2)(B)<br />

as a “provider” of an “interactive<br />

computer service” who made available<br />

“technical means” to restrict<br />

access to material that the provider<br />

thought was “harassing or otherwise<br />

objectionable.” The court also found<br />

that the fact that the owner’s block<br />

list might have been over-inclusive<br />

was irrelevant so long as the owner<br />

deemed the material he sought to<br />

block (i.e., offensive spam e-mails)<br />

as harassing and objectionable.<br />

—❖—<br />

June 2007 e-Commerce Law & Strategy ❖ www.ljnonline.com/alm?ecomm<br />

11


Movers & Shakers<br />

continued from page 11<br />

THELEN CONTINUES BUILDING<br />

CONSTRUCTION PROFILE<br />

Thelen Reid Brown Raysman &<br />

Steiner LLP has been named the<br />

2007 “Global Construction Law Firm<br />

of the Year” by Who’s Who Legal, the<br />

firm reported on its Web site.<br />

The annual Law Firm of the Year<br />

awards are determined based on<br />

nominations made by clients of the<br />

firm and fellow professionals. Only<br />

the most exceptional performance<br />

receives this distinction in each of 27<br />

practice areas.<br />

“For many years, our firm has been<br />

recognized as having the ‘preeminent<br />

Construction Law Practice in the<br />

‘Hotmail’<br />

continued from page 5<br />

do. One must assume that anything,<br />

and everything, created will eventually<br />

be discovered, and disclosed to<br />

the public, whether that was the<br />

intention of the person who wrote it<br />

or not. As Sen. Patrick Leahy (D-VT),<br />

chairman of the Senate Judiciary<br />

Committee, noted in connection<br />

with its investigation of the RNC fiasco,<br />

“You can’t erase e-mails, not<br />

today. They’ve gone through too<br />

Trademark<br />

continued from page 8<br />

nature of access to Internet Web sites<br />

was a violation of the court<br />

order. The court agreed, stating that<br />

the Web site was the same as the circulation<br />

of a magazine (a “use”)<br />

within U.S. territory and ordered<br />

Chuckleberry to block U.S. access to<br />

the Web site.<br />

12<br />

For even FASTER service, call:<br />

1-877-ALM-CIRC<br />

United States,’” Thelen Construction<br />

Chair John Heisse said. “This distinction<br />

shows that the industry is aware<br />

of our continued growth and now<br />

sees us as a global leader.”<br />

SIMPSON THACHER<br />

<strong>LAW</strong>YER NAMED AS<br />

TOP WOMAN LITIGATOR<br />

Simpson Thacher litigation associate<br />

Deborah Stein was recently named<br />

one of the Top 75 Women Litigators in<br />

California by the Daily Journal,<br />

according to a news release on the<br />

law firm’s Web site. The firm provided<br />

the following description. The award<br />

honors women who have litigated a<br />

major victory in the last year, set<br />

records in the legal community, play a<br />

prominent role in their practice area,<br />

many servers. Those e-mails are<br />

there – they just don’t want to produce<br />

them. It’s like the infamous 18<br />

minute gap in the Nixon White<br />

House tapes.”<br />

From that perspective — that anything<br />

created will be found — perhaps<br />

the best way to maintain the<br />

controls required by the developing<br />

laws of e-<strong>commerce</strong> and e-discovery<br />

is to eliminate the incentives to<br />

bypass those controls. Instead, firms<br />

should encourage use of their systems<br />

by designing them to be so<br />

OTHER CASES APPLY<br />

Other cases have similarly expanded<br />

the application of U.S. trademark<br />

law involving the Internet. In the<br />

case of Levi Strauss & Co. v. Sunrise<br />

Int’l Trading Inc., 51 F.3d 982, 984<br />

(11th Cir. 1995), for instance, a confusingly<br />

similar product to that of<br />

Levi Strauss’ was sold from China,<br />

though never actually within the<br />

United States. Based on the fact that<br />

Yes! I’d like to order e-Commerce Law & Strategy® today!<br />

Now just $325* (regularly $395…save $70!)<br />

e-Commerce Law & Strategy ❖ www.ljnonline.com/alm?ecomm<br />

and are generally involved in the legal<br />

community. Stein, based in the firm’s<br />

Los Angeles office, was selected based<br />

on her lead role in two significant<br />

cases: CalPERS v. Banc of America<br />

Securities LLC, et al., a suit brought by<br />

the largest pension fund in the United<br />

States arising out of the collapse of<br />

Enron, and Insurance Company of the<br />

State of Pennsylvania v. Central<br />

Garden & Pet Company, et al., a case<br />

in which a federal court in California<br />

squarely held on cross-motions for<br />

summary judgment that the firm’s<br />

client was entitled to withdraw from<br />

the defense of ongoing claims and<br />

was also entitled to reimbursement of<br />

defense costs.<br />

—❖—<br />

user-friendly that online accounts<br />

and other alternatives do not provide<br />

any real conveniences to attract<br />

the casual user. That way, when the<br />

CEO demands, “I want my Hotmail,”<br />

IT can respond, paraphrasing singersongwriter<br />

Mark Knopfler, founder<br />

of the band Dire Straits, that using<br />

the company account is so easy that<br />

it “ain’t workin’, that’s the way you<br />

do it.”<br />

—❖—<br />

the quality of these goods could<br />

reflect poorly on the mark owner, the<br />

court applied the Lanham Act<br />

extraterritorially.<br />

e-Commerce enterprises are well<br />

advised to have their counsel pay the<br />

closest attention to how trademarks<br />

might be used online — other companies’<br />

and their own.<br />

—❖—<br />

On the Web at:<br />

www.ljnonline.com<br />

*Offer valid to new subscribers only<br />

Publisher’s Guarantee! You may cancel your subscription at any time, for any reason, and receive a full refund for all unmailed issues.<br />

3038-2007<br />

June 2007

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!