Cengage advantage books essentials of the legal environment 4th edition miller solutions manual

Page 1

Cengage Advantage Books Essentials of the Legal Environment 4th Edition Miller Solutions Manual Visit to download the full and correct content document: https://testbankdeal.com/dow nload/cengage-advantage-books-essentials-of-the-legal-environment-4th-edition-mille r-solutions-manual/



Chapter 8

Intellectual Property and Internet Law INTRODUCTION Laws protecting patents, trademarks, and copyrights are designed to protect and reward inventive and artistic creativity. These laws limit the economic freedom of some individuals, but they protect the freedom of others to enjoy the fruits of their labors—in the form of profits. The study of intellectual property law is important because intellectual property is of increasing importance in the United States and internationally. Television shows, movies, and software are forms of intellectual property. The protection of intellectual property relating to computers posed difficulties for the courts because the legislators who drafted patent, trademark, and copyright laws did not envision computers. Previous laws have had to be amended, or new laws created, to serve the needs of a computer generation.

ADDITIONAL RESOURCES —

VIDEO SUPPLEMENTS The following video supplements relate to topics discussed in this chapter—

Business Law Digital Video Library The Business Law Digital Video Library at www.cengage.com/blaw/dvl offers a variety of videos for group or individual review. Clips on topics covered in this chapter include the following. •

Drama of the Law

Intellectual Property: Trade Name: Rally Round the Trade Name—The name of your business is an important intellectual property right. When the name of your business is subject to confusion with another business, a dispute may occur. •

Legal Conflicts in Business

Choosing a Business Name and a Domain Name: Wizard for Hire dot com—A start-up software company finds that

181 © 2014 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.


182

UNIT TWO: THE PUBLIC ENVIRONMENT

there are others who have similar business and domain names. What options do they have for resolving the conflict? Intellectual Property: Permissions in Cyberspace: Deep Linking Just Good Business?—The software company has set up a web site that uses deep links to another site. Do they need permission from the linked site to put them into a frame? •

Ask the Instructor

Intellectual Property: Patents and Trade Secrets: What's the Difference between a Patent and a Trade Secret?— Both patents and trade secrets are forms of intellectual property. A patent is a right, granted by the government, to exclusive use of an invention. As a government granted right, the details of a patent are part of the public record. Trade secrets, on the other hand, consist of valuable unique processes, formulas, or ideas that are protected by virtue of the fact that they are kept confidential. •

Real World Legal

Jack’s Restaurant, Scene 2—A restaurant owner prepares to sell his business to two employees. Tempers flare when the owner asks for a confidentiality agreement for his "trade secret" recipes and the employees asks the owner to sign a non-compete agreement. The scene explores issues in contract negotiation as well as intellectual property rights. Pharzime Corporation, Scene 4—A marketing vice president at a pharmaceutical company tries to gain the support of a vice president of regulatory affairs for his marketing strategy for a new drug use. The scene considers the pressure of patent expiration, the regulatory approval process, and legal and ethical strategies for new drug use. •

LawFlix

The Jerk—Intellectual Property—The Invention.

VIDEO QUESTIONS & ANSWERS LawFlix— The Jerk 1. In the video, Navin (Steve Martin) creates a special handle for Mr. Fox’s (Bill Macy’s) glasses. Can Navin obtain a patent or a copyright protecting his invention? Explain your answer. Navin should obtain a patent on his invention. Copyrights are reserved for literary or artistic productions. Patents are used for inventions, discoveries, processes, or designs that are genuine, novel, useful and not obvious in light of current technology. 2. Suppose that after Navin legally protects his idea, Fox steals it and decides to develop it for himself, without Navin’s permission. Has Fox committed infringement? If so, what kind: trademark, patent, or copyright? Fox has committed patent infringement. Patent infringement occurs when one uses or sells another’s patented design, product, or process without the patent owner’s permission. © 2014 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.


CHAPTER 8: INTELLECTUAL PROPERTY AND INTERNET LAW

183

3. Suppose that after Navin legally protects his idea, he realizes he doesn’t have the funds to mass-produce the special handle. Navin therefore agrees to allow Fox to manufacture the product. Has Navin granted Fox a license? Explain. Yes, Navin has granted Fox a license because he has given Fox permission to use his property (the patented idea) for a certain purpose (manufacturing the product). 4. Assume that Navin is able to manufacture his invention. What might Navin do to ensure that his product is identifiable and can be distinguished from other products on the market? Navin could affix a distinctive mark or emblem as a trademark on his invention in order to help consumers identify his product and vouch for its origin.

ANSWER TO LEARNING OBJECTIVE/FOR REVIEW QUESTION NO. 1 What is intellectual property? Intellectual property is property resulting from intellectual, creative processes: information, software, music, and movies, for example.

ANSWER TO LEARNING OBJECTIVE/FOR REVIEW QUESTION NO. 2 (Note that your students can find the answers to the even-numbered For Review questions in Appendix E at the end of the text. We repeat these answers here as a convenience to you.) Why is the protection of trademarks important? As stated in Article I, Section 8, of the Constitution, Congress is authorized “[t]o promote the Progress of Science and useful Arts, by securing for limited Times to Authors and Inventors the exclusive Right to their respective Writings and Discoveries.” Laws protecting trademarks, as well patents and copyrights, are designed to protect and reward inventive and artistic creativity.

CHAPTER OUTLINE I.

Trademarks and Related Property A trademark is a distinctive word, symbol, sound, or design that identifies the manufacturer as the source of particular goods and distinguishes it products from those made or sold by others.

CASE SYNOPSIS—

Case 8.1: Coca-Cola Co. v. Koke Co. of America © 2014 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.


184

UNIT TWO: THE PUBLIC ENVIRONMENT

Coca-Cola Co. sought to enjoin Koke Co. of America and other beverage companies from, among other things, using the word Koke for their products. Koke contended that the Coca-Cola trademark was a fraudulent representation and that Coca-Cola was thus not entitled to an injunction. Koke alleged that Coca-Cola, by its use of the Coca-Cola name, represented that the beverage contained cocaine (from coca leaves). The court granted the injunction against Koke, but an appellate court reversed. Coca-Cola appealed to the United States Supreme Court. The United States Supreme Court upheld the trial court’s decision. The Supreme Court acknowledged that before 1900 Coca-Cola’s good will was enhanced by the presence of a small amount of cocaine, but that the cocaine had long been eliminated from the drink. The Court underscored that Coca-Cola was not “a medicine” and that its attraction did not lay in producing “a toxic effect.” Since 1900 sales had increased. The name had come to characterize a well known beverage to be had almost anywhere “rather than a compound of particular substances.” The Court noted that before this suit was brought Coca-Cola had advertised that the public would not find cocaine in Coca-Cola. “[I]t would be going too far to deny the plaintiff relief against a palpable fraud because possibly here and there an ignorant person might call for the drink with the hope for incipient cocaine intoxication.” .................................................................................................................................................. Notes and Questions Until 1903, the amount of active cocaine in each bottle of Coke was equivalent to one “line” of cocaine, and, “many years before this suit was brought,” as the Supreme Court put it, Coca-Cola was advertised as an “ideal nerve tonic and stimulant.” In the first part of this century, the word Dope was understood to mean Coke. If a customer asked for a “Dope,” he or she was given a Coke. Koke attempted to associate the word with its product, and Coca-Cola also sought to stop this, arguing that people would be confused if they ordered a Dope, expecting a Coke, and got something else. The Supreme Court refused relief, concluding that Dope was not a sufficiently descriptive term. The court found that the word had no clear connection to Coke. The name “Coke” was not registered as a trademark until 1945. What, if any, harm could the Coca-Cola Company have suffered as a result of the Koke Company’s use of the Name “Koke” to market its products? The use of the name “Koke” may have created confusion in the mind of customers who could not distinguish “Koke” from “Coca-Cola.” Such confusion could result in lost sales for Coca-Cola. Confusion could also damage the reputation and goodwill associated with the Coca-Cola Company. Suppose that the trial court had found that 25 percent of all adult Coca-Cola drinkers believed that Coca-Cola contained cocaine, despite the fact that cocaine was not listed among the soft drink’s ingredients. In that situation, should the court deny Coca-Cola’s request for an injunction against Koke? Probably not. Proving that many customers have a mistaken belief regarding a product is not the same as proving that the seller has fraudulently misrepresented the product. Should the principles applied in this case to the confusingly similar product of a domestic manufacturer also apply to the goods of foreign producers? Why or why not? Yes, particularly if they are sold in the United States, where those principles apply under the law, and especially now, when products are easily imported, often at lower prices than similar goods can be obtained domestically, the same rules should be applied to all goods to insure a “level playing © 2014 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.


CHAPTER 8: INTELLECTUAL PROPERTY AND INTERNET LAW

185

field” in the marketplace. No, different rules should apply to products made in different places, particularly if they are not sold in the United States or in any other locale in which those principles might apply, and with due consideration to the cultural and economic characteristics of those locales.

ANSWER TO “WHAT IF THE FACTS WERE DIFFERENT?” IN CASE 8.1 Suppose that Coca-Cola had been trying to make the public believe that its product contained cocaine. Would the result in the case likely have been different? Explain your answer. Yes. The product in this case did not actually contain cocaine. To advertise that it did would be to commit fraud. A court will refuse to grant relief to a complaining party who commits fraud.

ADDITIONAL CASES ADDRESSING THIS ISSUE — Recent cases involving a sufficient likelihood of confusion to support an injunction against a non-owner’s use or alteration of a trademark include the following. • Zino Davidoff SA v. CVS Corp., 571 F.3d 238 (2d Cir. 2009): The owner of the trademark “cool water” for fragrances would suffer irreparable harm in the absence of a preliminary injunction against a retail drugstore chain's sales of its product with the unique production code (UPC) removed, which increased the risk that consumers would unwittingly buy a counterfeit or defective product. • TGI Friday’s Inc. v. Great Northwest Restaurants, Inc., __ F.Supp.2d __ (N.D. Tex. 2009): Restaurant franchisees cannot use “TGI Friday's” trade and service marks after the termination of their franchise agreement, even if franchisees continued to meet standards that franchisor required, because it is inevitable that customers will be confused into believing that they are dining at such restaurants. • Productive People LLC v. Ives Design, __ F.Supp.2d __ (D. Ariz. 2009): A preliminary injunction is appropriate because there is complete identity between the allegedly infringing “www.namedrop.com” and the company's use of “namedrop” as a trademark when both parties use the Web as their primary marketing channel. • Red Head Inc. v. Fresno Rock Taco LLC, __ F.Supp.2d __ (N.D. Cal. 2009): A corporation was entitled to a preliminary injunction barring a restaurant from further use of the corporation's trademarks, trade dress, and the name and likeness of musician Sammy Hagar after the restaurant breached their license agreement by, among other things, failing to pay royalties.

A.

TRADEMARK PROTECTION AND TRADEMARK DILUTION •

Statutory protection of trademarks and related property is provided at the federal level by the Lanham Trademark Act of 1946 (amended by the Federal Trademark Dilution Act of 1995), which incorporates the common law of trademarks. Many states also have trademark statutes.

© 2014 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.


186

UNIT TWO: THE PUBLIC ENVIRONMENT

The dilution cause of action protects certain marks from unauthorized use regardless of a showing of competition or a likelihood of confusion. ADDITIONAL BACKGROUND—

The Federal Trademark Dilution Act Congress passed the Federal Trademark Dilution Act in 1995 as an amendment to 15 U.S.C. § 1125. The following is the complete statute (15 U.S.C.A. § 1125), as amended, with some of the historical notes, as the statute appears on Westlaw. UNITED STATES CODE TITLE 15. COMMERCE AND TRADE CHAPTER 22—TRADEMARKS SUBCHAPTER III—GENERAL PROVISIONS § 1125. False designations of origin and false descriptions forbidden (a) Civil action (1) Any person who, on or in connection with any goods or services, or any container for goods, uses in commerce any word, term, name, symbol, or device, or any combination thereof, or any false designation of origin, false or misleading description of fact, or false or misleading representation of fact, which-(A) is likely to cause confusion, or to cause mistake, or to deceive as to the affiliation, connection, or association of such person with another person, or as to the origin, sponsorship, or approval of his or her goods, services, or commercial activities by another person, or (B) in commercial advertising or promotion, misrepresents the nature, characteristics, qualities, or geographic origin of his or her or another person’s goods, services, or commercial activities, shall be liable in a civil action by any person who believes that he or she is or is likely to be damaged by such act. (2) As used in this subsection, the term “any person” includes any State, instrumentality of a State or employee of a State or instrumentality of a State acting in his or her official capacity. Any State, and any such instrumentality, officer, or employee, shall be subject to the provisions of this chapter in the same manner and to the same extent as any nongovernmental entity. (b) Importation Any goods marked or labeled in contravention of the provisions of this section shall not be imported into the United States or admitted to entry at any customhouse of the United States. The owner, importer, or consignee of goods refused entry at any customhouse under this section may have any recourse by protest or appeal that is given under the customs revenue laws or may have the remedy given by this chapter in cases involving goods refused entry or seized. (c) Remedies for dilution of famous marks © 2014 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.


CHAPTER 8: INTELLECTUAL PROPERTY AND INTERNET LAW

187

(1) The owner of a famous mark shall be entitled, subject to the principles of equity and upon such terms as the court deems reasonable, to an injunction against another person’s commercial use in commerce of a mark or trade name, if such use begins after the mark has become famous and causes dilution of the distinctive quality of the mark, and to obtain such other relief as is provided in this subsection. In determining whether a mark is distinctive and famous, a court may consider factors such as, but not limited to-(A) the degree of inherent or acquired distinctiveness of the mark; (B) the duration and extent of use of the mark in connection with the goods or services with which the mark is used; (C) the duration and extent of advertising and publicity of the mark; (D) the geographical extent of the trading area in which the mark is used; (E) the channels of trade for the goods or services with which the mark is used; (F) the degree of recognition of the mark in the trading areas and channels of trade used by the marks’ owner and the person against whom the injunction is sought; (G) the nature and extent of use of the same or similar marks by third parties; and (H) whether the mark was registered under the Act of March 3, 1881, or the Act of February 20, 1905, or on the principal register. (2) In an action brought under this subsection, the owner of the famous mark shall be entitled only to injunctive relief unless the person against whom the injunction is sought willfully intended to trade on the owner’s reputation or to cause dilution of the famous mark. If such willful intent is proven, the owner of the famous mark shall also be entitled to the remedies set forth in sections 1117(a) and 1118 of this title, subject to the discretion of the court and the principles of equity. (3) The ownership by a person of a valid registration under the Act of March 3, 1881, or the Act of February 20, 1905, or on the principal register shall be a complete bar to an action against that person, with respect to that mark, that is brought by another person under the common law or a statute of a State and that seeks to prevent dilution of the distinctiveness of a mark, label, or form of advertisement. (4) The following shall not be actionable under this section: (A) Fair use of a famous mark by another person in comparative commercial advertising or promotion to identify the competing goods or services of the owner of the famous mark. (B) Noncommercial use of a mark. (C) All forms of news reporting and news commentary. (July 5, 1946, c. 540, Title VIII, s 43, 60 Stat. 441.) (As amended Nov. 16, 1988, Pub.L. 100-667, Title I, s 132, 102 Stat. 3946; Oct. 27, 1992, Pub.L. 102-542, s 3(c), 106 Stat. © 2014 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.


188

UNIT TWO: THE PUBLIC ENVIRONMENT

3568; Jan. 16, 1996, Pub.L. 104-98, s 3(a), 109 Stat. 985.) HISTORICAL AND STATUTORY NOTES Derivation. Act Mar. 19, 1920, c. 104, s 3, 41 Stat. 534. References in Text. Acts March 3, 1881, and February 20, 1905, referred to in subsec. (c)(1)(H), (3), are acts Mar. 3, 1881, c. 138, 21 Stat. 502 and Feb. 20, 1905, c. 592, 33 Stat. 724, which were repealed insofar as inconsistent with this chapter by act July 5, 1946, c. 540, s 46(a), 60 Stat. 444. Act Feb. 20, 1905, was classified to sections 81 to 109 of this title. 1996 Amendments. Subsec. (c). Pub.L. 104-98, s 3(a), added subsec. (c). 1992 Amendments. Subsec. (a). Pub.L. 102-542, s 3(c), redesignated existing provisions as par. (1) and, in par. (1), as so redesignated, substituted “(A)” and “(B)” for “(1)” and “(2)”, respectively, and added par. (2). 1988 Amendment. Subsec. (a). Pub.L. 100-667, s 132, substituted provisions which related to liability in civil action for any person who uses in commerce any word, term, name, symbol, or device, or any false designation of origin, false or misleading description of fact or false or misleading representation of fact in manner likely to cause confusion, or mistake, or deceive as to affiliation of such person with another person, for provisions which related to false designations of origin and false descriptions.

B.

TRADEMARK REGISTRATION •

To register for federal protection, an application must be filed with the U.S. Patent and Trademark Office in Washington, D.C. A mark can be registered (1) if it is currently in commerce or (2) if the applicant intends to put the mark into commerce within six months.

Registration is renewable between the fifth and sixth years after the initial registration and every ten years thereafter (twenty years for marks registered before 1990).

C.

TRADEMARK INFRINGEMENT When a trademark is copied to a substantial degree or used in its entirety by another, it has been infringed. A person need not have registered a trademark to sue for trademark infringement, but registration is proof of the date of inception of the trademark’s use.

D.

DISTINCTIVENESS OF THE MARK Only trademarks deemed sufficiently distinctive from competing trademarks are protected. 1.

Strong Marks Fanciful, suggestive, and arbitrary (common words not ordinarily associated with the product) trademarks are generally considered to be the most distinctive.

2.

Secondary Meaning

© 2014 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.


CHAPTER 8: INTELLECTUAL PROPERTY AND INTERNET LAW

3.

E.

F.

189

Descriptive terms, geographical terms, and personal names are not inherently distinctive and do not receive protection until they acquire a secondary meaning (such as “London Fog” for coats with “London Fog” labels).

Whether a secondary meaning becomes attached to a term or name depends on how extensively the product is advertised, the market for the product, the number of sales, and other factors.

Generic Terms Generic terms, such as bicycle or computer, cannot be trademarked, even if they acquire secondary meanings (but they still cannot be used to deceive consumers).

SERVICE, CERTIFICATION, AND COLLECTIVE MARKS •

Service mark—Distinguishes the services of one person or company from those of another (such as the mark of each airline that distinguishes it from other airlines).

Certification mark—Applied to goods or services by someone other than the owner to certify the region, materials, mode of manufacture, quality, or accuracy of those products (such as the “Good Housekeeping Seal of Approval”).

Collective mark—A certification mark used by members of a cooperative, association, or other organization (such as the union seals in movie credits).

TRADE DRESS AND TRADE NAMES •

Trade dress—The image and overall appearance of a product is subject to the same protection as trademarks. As in common-law trademark infringement cases, a major consideration is whether consumers are likely to be confused by the allegedly infringing use.

Trade name—A trade name indicates all or part of a business’s name. A trade name may be protected at common law (if it is unusual or fanciful), but it is not protected under federal statutes and cannot be registered with the federal government—unless it is of course the same as the business’s trademarked product (such as Coca-Cola).

© 2014 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.


190

UNIT TWO: THE PUBLIC ENVIRONMENT

G.

II.

COUNTERFEIT GOODS •

Counterfeit goods copy or imitate trademarked goods but are not genuine.

The Stop Counterfeiting in Manufactured Goods Act makes it a crime to intentionally traffic in counterfeit goods or services, or use a counterfeit mark on or in connection with goods or services. This covers counterfeit labels, stickers, packaging, and similar items, whether or not they are attached to any goods.

Penalties include fines of up to $2 million and imprisonment of up to ten years (more for repeat offenders).

Cyber Marks Cybersquatting and domain names have been contentious issues . A.

DOMAIN NAMES The chief conflict that arises with respect to domain names involves parties who attempt to profit through the use of a name that is the same or similar to another party’s domain. The Internet Corporation for Assigned Names and Numbers (ICANN) oversees the Internet domain name system and facilitates the resolution of domain name disputes.

ANSWER TO CRITICAL ANALYSIS QUESTION IN THE FEATURE— ONLINE DEVELOPMENTS If the courts had allowed Forchion to change his name to NJweedman.com, what, if any, complications would this present to the ICANN system of assigning domain names? Discuss. Most likely, there would be an increase in the number of trademark disputes as the variety of domains would expand to accommodate the demands of others to change their names. Companies and individuals might find themselves embroiled in a considerable amount of litigation over the same issues noted in the feature. Settlements could be expensive.

B.

CYBERSQUATTING AND META TAGS •

The Anticybersquatting Consumer Protection Act (ACPA) of 1999 amended the Lanham Act to make it illegal to register, traffic in, or use a domain name if— 1. 2.

The name is identical or confusingly similar to another’s mark. The person registering, trafficking in, or using a domain has a “bad faith” intent to profit.

Businesses register thousands of misspelled names to protect genuine marks from cybersquatters or typosquatters (registrants of misspelled marks that they do not own).

Meta tags are words in a Web site’s key-word field that determine when the site is listed in response to a search engine query. Using others’ marks as tags without permission may constitute trademark infringement.

© 2014 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.


CHAPTER 8: INTELLECTUAL PROPERTY AND INTERNET LAW

C.

191

TRADEMARK DILUTION IN THE ONLINE WORLD Dilution occurs when a mark is used, without permission, in a way that diminishes its distinctive quality. Techrelated cases have concerned the use of marks as domain names (such as “Candyland”) and spamming under another’s logo. To be diluted, however, a mark must be famous when the alleged infringement occurs.

CASE SYNOPSIS—

Case 8.2: Hasbro, Inc. v. Internet Entertainment Group, Ltd. Hasbro, Inc., the maker of Candyland, owns the Candyland trademark. Brian Cartmell and the Internet Entertainment Group (IEG), Ltd., used “candyland.com” as a domain name for a sexually explicit Internet site. Any person who performed an online search for “candyland” was directed to this adult Web site. Hasbro filed a trademark dilution claim in a federal court against Cartmell and IEG. The court ordered the defendants to remove all content from the candyland.com site and to stop using the Candyland mark. Hasbro showed that the defendants’ use of the mark and the domain name candyland.com in connection with their site was causing irreparable injury to Hasbro. Hasbro demonstrated a likelihood of prevailing on its claims that defendants violated the applicable federal and state statutes against trademark dilution. .................................................................................................................................................. Notes and Questions Suppose that the site using candyland.com had not been sexually explicit but had sold candy. Would the result have been the same? Probably. In this circumstance, Hasbro could most likely demonstrate a likelihood of prevailing on a claim that the defendant violated the applicable federal and state statutes against trademark dilution. The Hasbro is famous, the defendant would presumably be using it without permission, and that use would arguably diminish the quality of the Hasbro mark.

ANSWER TO “THE ECONOMIC DIMENSION” IN CASE 8.2 How can companies protect themselves from others who create Web sites that have similar domain names, and what limits each company’s ability to be fully protected? To protect themselves from others who reate Web sites that have similar domain names, companies can be vigilant and act quickly and forcefully to enforce their rights. A company’s ability to be fully protected is limited chiefly by its resources and by the skill of the persons on whom the company relies to protect it.

ENHANCING YOUR LECTURE—

© 2014 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.


192

UNIT TWO: THE PUBLIC ENVIRONMENT

A BOOK IS A BOOK IS A BOOK— BUT IS IT AN “E-BOOK”?

One of the significant issues raised by the cyber age has to do with whether copyrights in printed materials extend to the same materials presented in digital form over the Internet. A related issue involving licensing agreements came before a federal district court in 2001. The case was brought by the well-known publishing firm Random House, Inc., against Rosetta Books, LLC, with which several authors had arranged to publish works electronically. At issue in the case was the following question: Did contracts in which the authors had licensed Random House to “print, publish and sell” their works in “book form” include the right to publish their works in electronic formats (as “e-books”) as well? In evaluating the issue, the court looked to the letter of the law, as decided by other court cases, but found little guidance. Hence, it looked to the words of the contract and to the definition of the term book given by the Random House Webster’s Unabridged Dictionary. That dictionary defines a “book” as “a written or printed work of fiction or nonfiction, usually on sheets of paper fastened or bound together within covers.” The court ultimately concluded that a book is not an e-book and therefore refused to grant Random House’s motion to enjoin (prohibit) Rosetta Books from publishing the authors’ works as e-books.a THE BOTTOM LINE To avoid litigation, anyone signing a licensing contract should make sure that the specific wording in the contract makes very clear what rights are or are not being conveyed. a. Random House, Inc. v. Rosetta Books, LLC, 150 F.Supp.2d 613 (S.D.N.Y. 2001).

D.

III.

LICENSING Licensing (permitting the use of a mark for certain purposes) is one way around many intellectual property dilemmas. A license in this context is defined and the parties involved are noted in the text. Use of a mark for other than licensed purposes—which may need to include the maintenance of quality to protect the licensor’s rights—is a breach of the license agreement.

Patents •

A patent gives an inventor the exclusive right to make, use, and sell an invention for a period of twenty years and a design for fourteen years. To qualify, an applicant must satisfy the U.S. Patent and Trademark Office (USPTO) that the invention, discovery, process, or design is genuine, novel, useful, and not obvious in light of current technology.

Like most other countries, the United States grants a patent for an invention to the first person to file a patent application (with a nine-month limit to challenges).

A.

WHAT IS PATENTABLE?

© 2014 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.


CHAPTER 8: INTELLECTUAL PROPERTY AND INTERNET LAW

193

Almost anything—including plants that are reproduced asexually, genetically engineered (or cloned) microorganisms, and animals—is patentable except for— • • • B.

The laws of nature. Natural phenomena. Abstract ideas (including algorithms).

PATENT INFRINGEMENT •

A firm that makes, uses, or sells another’s patented design, product, or process without the patent owner’s permission commits patent infringement. Because litigation is costly, a patent holder will often license use of the patented design, product, or process rather than sue.

If a patent is infringed, the owner can obtain damages for royalties and lost profits. To obtain an injunction against the infringer, a patent holder must show that it will suffer irreparable damage and that the public interest will not be disserved by the injunction.

ANSWER TO LEARNING OBJECTIVE/FOR REVIEW QUESTION NO. 3 How does the law protect patents? A firm that makes, uses, or sells another’s patented design, product, or process without the patent owner’s permission commits patent infringement. If a patent is infringed, the owner can obtain an injunction against the infringer and damages for royalties and lost profits, as well as attorneys’ fees and costs. If the infringement was willful, the amount of damages may be tripled (treble damages).

IV.

Copyrights •

A copyright is an intangible right granted by federal statute (the Copyright Act of 1976) to the author or originator of certain literary or artistic productions. The right is granted automatically (registration is not required).

Protection lasts for the life of the author plus 70 years. Copyrights owned by publishing houses expire 95 years from the date of publication or 120 years from the date of creation, whichever is first. For works by more than one author, the copyright expires 70 years after the death of the last surviving author.

ANSWER TO LEARNING OBJECTIVE/FOR REVIEW QUESTION NO. 4 (Note that your students can find the answers to the even-numbered For Review questions in Appendix E at the end of the text. We repeat these answers here as a convenience to you.) What laws protect authors’ copyrights in the works they generate? Copyright law protects the rights of the authors of certain literary or artistic productions. Currently, the Copyright Act of 1976, as amended, covers these rights.

© 2014 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.


194

UNIT TWO: THE PUBLIC ENVIRONMENT

A.

WHAT IS PROTECTED EXPRESSION? •

To be copyrighted, a work must be “fixed in a durable medium” from which it can be perceived, reproduced, or communicated. Copyright law protects works that are original and fall into one of the following categories— 1. 2. 3. 4. 5.

B.

Literary and musical works. Dramatic works, as well as pantomimes and choreographic works. Pictorial, graphic, and sculptural works. Films and other audiovisual works. Sound recordings, architectural works, and computer software.

Protection is not available for any “idea, procedure, process, system, method of operation, concept, principle, or discovery, regardless of the form in which it is described, explained, illustrated, or embodied.” Ideas may be freely used by anyone—what can be copyrighted is the way in which an idea is expressed. If an idea and its expression are inseparable, the expression cannot be copyrighted.

Compilations of facts are copyrightable. A compilation is “a work formed by the collection and assembling of preexisting materials of data that are selected, coordinated, or arranged in such a way that the resulting work as a whole constitutes an original work of authorship.”

COPYRIGHT INFRINGEMENT Copyright infringement occurs when the form or expression of an idea is copied in substantial part (a copy does not have to mirror the original or reproduce it entirely). 1.

Remedies for Copyright Infringement Penalties and remedies range from actual damages, plus the infringer’s profits, or statutory damages not exceeding $150,000 imposed at the discretion of the court, to criminal proceedings for willful violations, which may result in fines or imprisonment. A permanent injunction is also possible.

2.

The “Fair Use” Exception •

The reproduction of copyrighted material is permitted without payment of royalties under the Copyright Act’s fair use doctrine. To determine whether a use is fair, courts consider— 1. 2. 3. 4.

• C.

The purpose of the use. The nature of the copyrighted work. How much of the original is copied. The effect of the use on the market for the copyrighted work.

Under the “first sale” doctrine, the owner of an authorized copy of a copyrighted work can sell, or otherwise dispose of, it however he or she sees fit.

COPYRIGHTS IN DIGITAL INFORMATION Copyright law is important in cyberspace in part because the nature of the Internet means that data is “copied” before being transferred online. Loading a file or program into a computer’s random access memory (RAM) is the

© 2014 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.


CHAPTER 8: INTELLECTUAL PROPERTY AND INTERNET LAW

195

making of a “copy.” If it is done without authorization, it is infringement. Criminal piracy includes persons who exchange unauthorized copies of copyrighted works, even for no profit. ADDITIONAL BACKGROUND—

Digital Millennium Copyright Act of 1998 The following is an excerpt from the Digital Millennium Copyright Act of 1998, downloaded from lcweb.loc.gov/copyright/penleg.html. Sec. 1201. Circumvention of copyright protection systems (a) VIOLATIONS REGARDING CIRCUMVENTION OF TECHNOLOGICAL MEASURES— (1)(A) No person shall circumvent a technological measure that effectively controls access to a work protected under this title. The prohibition contained in the preceding sentence shall take effect at the end of the 2-year period beginning on the date of the enactment of this chapter. (B) The prohibition contained in subparagraph (A) shall not apply to persons who are users of a copyrighted work which is in a particular class of works, if such persons are, or are likely to be in the succeeding 3-year period, adversely affected by virtue of such prohibition in their ability to make noninfringing uses of that particular class of works under this title, as determined under subparagraph (C). (C) During the 2-year period described in subparagraph (A), and during each succeeding 3-year period, the Librarian of Congress, upon the recommendation of the Register of Copyrights, who shall consult with the Assistant Secretary for Communications and Information of the Department of Commerce and report and comment on his or her views in making such recommendation, shall make the determination in a rulemaking proceeding on the record for purposes of subparagraph (B) of whether persons who are users of a copyrighted work are, or are likely to be in the succeeding 3year period, adversely affected by the prohibition under subparagraph (A) in their ability to make noninfringing uses under this title of a particular class of copyrighted works. In conducting such rulemaking, the Librarian shall examine— (i) the availability for use of copyrighted works; (ii) the availability for use of works for nonprofit archival, preservation, and educational purposes; (iii) the impact that the prohibition on the circumvention of technological measures applied to copyrighted works has on criticism, comment, news reporting, teaching, scholarship, or research; (iv) the effect of circumvention of technological measures on the market for or value of copyrighted works; and (v) such other factors as the Librarian considers appropriate. (D) The Librarian shall publish any class of copyrighted works for which the Librarian has determined, pursuant to the rulemaking conducted under subparagraph (C), that noninfringing uses by persons who are users of a copyrighted work are, or are likely to be, adversely affected, and the prohibition contained in subparagraph (A) shall not apply to such users with respect to such class of works for the ensuing 3-year period. © 2014 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.


196

UNIT TWO: THE PUBLIC ENVIRONMENT

(E) Neither the exception under subparagraph (B) from the applicability of the prohibition contained in subparagraph (A), nor any determination made in a rulemaking conducted under subparagraph (C), may be used as a defense in any action to enforce any provision of this title other than this paragraph. (2) No person shall manufacture, import, offer to the public, provide, or otherwise traffic in any technology, product, service, device, component, or part thereof, that— (A) is primarily designed or produced for the purpose of circumventing a technological measure that effectively controls access to a work protected under this title; (B) has only limited commercially significant purpose or use other than to circumvent a technological measure that effectively controls access to a work protected under this title; or (C) is marketed by that person or another acting in concert with that person with that person’s knowledge for use in circumventing a technological measure that effectively controls access to a work protected under this title. (3) As used in this subsection— (A) to `circumvent a technological measure’ means to descramble a scrambled work, to decrypt an encrypted work, or otherwise to avoid, bypass, remove, deactivate, or impair a technological measure, without the authority of the copyright owner; and (B) a technological measure `effectively controls access to a work’ if the measure, in the ordinary course of its operation, requires the application of information, or a process or a treatment, with the authority of the copyright owner, to gain access to the work. (b) ADDITIONAL VIOLATIONS— (1) No person shall manufacture, import, offer to the public, provide, or otherwise traffic in any technology, product, service, device, component, or part thereof, that— (A) is primarily designed or produced for the purpose of circumventing protection afforded by a technological measure that effectively protects a right of a copyright owner under this title in a work or a portion thereof; (B) has only limited commercially significant purpose or use other than to circumvent protection afforded by a technological measure that effectively protects a right of a copyright owner under this title in a work or a portion thereof; or (C) is marketed by that person or another acting in concert with that person with that person’s knowledge for use in circumventing protection afforded by a technological measure that effectively protects a right of a copyright owner under this title in a work or a portion thereof. (2) As used in this subsection— (A) to `circumvent protection afforded by a technological measure’ means avoiding, bypassing, removing, deactivating,

© 2014 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.


CHAPTER 8: INTELLECTUAL PROPERTY AND INTERNET LAW

197

or otherwise impairing a technological measure; and (B) a technological measure `effectively protects a right of a copyright owner under this title’ if the measure, in the ordinary course of its operation, prevents, restricts, or otherwise limits the exercise of a right of a copyright owner under this title. (c) OTHER RIGHTS, ETC., NOT AFFECTED— (1) Nothing in this section shall affect rights, remedies, limitations, or defenses to copyright infringement, including fair use, under this title. (2) Nothing in this section shall enlarge or diminish vicarious or contributory liability for copyright infringement in connection with any technology, product, service, device, component, or part thereof. (3) Nothing in this section shall require that the design of, or design and selection of parts and components for, a consumer electronics, telecommunications, or computing product provide for a response to any particular technological measure, so long as such part or component, or the product in which such part or component is integrated, does not otherwise fall within the prohibitions of subsection (a)(2) or (b)(1). (4) Nothing in this section shall enlarge or diminish any rights of free speech or the press for activities using consumer electronics, telecommunications, or computing products. (d) EXEMPTION FOR NONPROFIT LIBRARIES, ARCHIVES, AND EDUCATIONAL INSTITUTIONS— (1) A nonprofit library, archives, or educational institution which gains access to a commercially exploited copyrighted work solely in order to make a good faith determination of whether to acquire a copy of that work for the sole purpose of engaging in conduct permitted under this title shall not be in violation of subsection (a)(1)(A). A copy of a work to which access has been gained under this paragraph— (A) may not be retained longer than necessary to make such good faith determination; and (B) may not be used for any other purpose. (2) The exemption made available under paragraph (1) shall only apply with respect to a work when an identical copy of that work is not reasonably available in another form. (3) A nonprofit library, archives, or educational institution that willfully for the purpose of commercial advantage or financial gain violates paragraph (1)— (A) shall, for the first offense, be subject to the civil remedies under section 1203; and (B) shall, for repeated or subsequent offenses, in addition to the civil remedies under section 1203, forfeit the exemption provided under paragraph (1).

ENHANCING YOUR LECTURE— © 2014 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.


198

UNIT TWO: THE PUBLIC ENVIRONMENT

LEGAL ISSUES FACING BLOGGERS AND PODCASTERS Companies increasingly are using blogs (Web logs) and podcasts (essentially an audio blog, sometimes with video clips) internally to encourage communication among employees and externally to communicate with customers. Blogs offer many advantages, not the least of which is that setting up a blog and keep it current (making “posts”) costs next to nothing because so much easy-to-use free software is available. Podcasts, even those including video, require only a little more sophistication. Nonetheless, both blogs and podcasts also carry some legal risks for the companies that sponsor them. BENEFITS OF BLOGS AND PODCASTS Internal blogs used by a company’s employees can offer a number of benefits. Blogs provide an open communications platform, potentially allowing new ways of coordinating activities among employees. For example, a team of production workers might use a blog to move a new product idea forward: the team starts a blog, one worker posts a proposal, and other team members quickly post comments in response. The blog can be an excellent way to generate new ideas. Internal blogs also allow for team learning and encourage dialogue. When workers are spread out across the country or around the world, blogging provides a cheap means of communication that does require sophisticated project management software. Many companies are also creating external blogs, which are available to clients and customers. External blogs can be used to push products, obtain feedback from customers, and shape the image that the company presents to outsider. Even some company chief executive officers (CEOs) including the CEOs of McDonald’s, Boeing, and HewlettPackard have started blogs. POTENTIAL LEGAL RISKS Despite their many advantages, blogs and podcasts can also expose a company to a number of legal risks, including the following. Tort Liability Internal blogs and podcasts can lead to claims of defamation or sexual harassment if an employee posts racist or sexually explicit comments. At the same time, if a company monitors its employees’ blogs and podcasts, it may find itself facing claims of invasion of privacy (see Chapter 17 for a discussion of similar issues involving employees’ e-mail). Security of Information Blogs may also be susceptible to security breaches. If an outsider obtains access to an internal blog, a company’s trade secrets could be lost. Outsiders could also potentially gain access to blogs containing financial information and other financial data. Discovery Issues As explained in Chapter 3, litigation today frequently involves electronic discovery. This can extend to blog posts and comments as well as to e-mail. Thus, a company should be aware that anything posted on its blogs can be used as evidence during litigation. A company will therefore need to preserve and retain blog postings related to any dispute likely to go to trial.

© 2014 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.


CHAPTER 8: INTELLECTUAL PROPERTY AND INTERNET LAW

199

Compliance Issues Many corporations are regulated by one or more agencies and required to comply with various statutes. Laws that require compliance may also apply to blog postings. For example, the Securities and Exchange Commission (SEC) has regulations establishing the information a company must disclose to potential investors and the public in connection with its stock. A company regulated by the SEC will find that these rules apply to blogs. The same is true for companies regulated under the Sarbanes-Oxley Act. Copyright Infringement Blogs can also expose a company to charges of copyright infringement. Suppose, for example, that an employee posts a long passage from a magazine article on the company’s blog, either internal or external, without the author’s permission. Similarly, photos taken from other blogs or Web sites cannot be posted without prior permission. Note, also, that copyright infringement can occur even if the blog was created without any pecuniary motivation. Typically, though, a blogger can claim “fair use” if she or he posts a passage from someone else’s work with an electronic link to the complete version External blogs carry most of the same risks as internal blogs and others as well. Not only can external blogs lead to charges of invasion of privacy, defamation, or copyright infringement related to what the company and its employees post, but they can also expose the company to liability for what visitors post. If a company’s blog allows visitors to post comments and a visitor makes a defamatory statement, the company that created the blog could be held liable for publishing it. Thus, any company considering establishing blogs and podcasts, whether internal or external, should be aware of the risks and take steps to guard against them. FOR CRITICAL ANALYSIS Do individuals who create blogs face the same risks as companies that use blogs? Explain. a. 111 F.Supp.2d 294 (S.D.N.Y. 2000). b. Universal City Studios, Inc. v. Corley, 273 F.3d 429 (2d Cir. 2001). c. DVD Copy Control Association v. Bunner, 113 Cal.Rptr.2d 338 (2001). Note that in 2002, the California Supreme Court agreed to review this case.

ENHANCING YOUR LECTURE—

COPYRIGHT LAW VERSUS FREE SPEECH

Since the ratification of the First Amendment to the U.S. Constitution in 1791, Congress has been prohibited from making any law “abridging the freedom of speech.” Clearly, at that time the framers did not anticipate radio, television, the movies, computers, computer programs, or the Internet. As radio, television, and the movies became important at the beginning and middle of the twentieth century, they gave rise to free speech issues. As the Internet moves into virtually everyone’s home and place of work in the twenty-first century, First Amendment issues have arisen and will continue to arise. A major contemporary legal debate today concerns free speech rights in the context of intellectual property in digital form that is encrypted to prevent its unauthorized copying and use. More specifically, the courts are now

© 2014 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.


200

UNIT TWO: THE PUBLIC ENVIRONMENT

addressing the tension between movie studios, which are encrypting their DVDs, and “hackers” who have posted codecracking programs on the Internet so that DVDs can be copied numerous times. APPLYING THE DIGITAL MILLENNIUM COPYRIGHT ACT OF 1998 Almost as soon as encryption technology was used to safeguard the contents of DVDs, the code was cracked by a group of hackers, including nineteen-year-old Norwegian John Johansen. His decryption program, called DeCCS, was quickly made available at various sites on the Internet including 2600.com, owned by Ed Corly. Almost immediately after DeCCS was posted, a group of movie companies, including Disney and Twentieth Century-Fox, filed suit. In what was seen as a victory for the motion picture industry, a federal district court ruled, in Universal City Studios, Inc. v. Reimerdes,a that DeCCS violated the Digital Millennium Copyright Act (DMCA) of 1998. As noted elsewhere, among other things the DMCA prohibits the circumvention (by decryption programs, for example) of encryption systems that are embedded in intellectual property to protect the property from piracy, or unauthorized use. The court noted that since the posting of DeCCS, along with a separate video-compression program known as Divx, the pirating of movies had become increasingly common on the Internet. The defendants argued that software programs designed to break encryption schemes were a form of constitutionally protected speech. The court, however, rejected the free speech argument. “Computer code is not purely expressive any more than assassination of a political figure is purely a political statement . . . . The Constitution, after all, is a framework for building a just and democratic society. It is not a suicide pact,” stated the court. A federal appellate court affirmed the trial court’s decision.b A DIFFERENT APPROACH In November 2001, a California appellate court reviewed a case brought by a trade association of movie industry businesses against Internet Web site operators who made DeCCS programs available from their Web sites. The trade association asked the court to enjoin the defendants from copying, distributing, publishing, or otherwise marketing the DeCCS computer program because, by doing so, the defendants were, by necessity, disclosing or using the trade secrets contained in the encryption programs. The California appellate court weighed in on the side of free speech and refused to grant the injunction. In contrast to the Universal City Studios decision, the court reasoned that the DeCCS program was a form of “pure speech.” Furthermore, stated the court, the “scope of protection of trade secrets does not override the protection offered by the First Amendment. The California legislature is free to enact laws to protect trade secrets, but these provisions must bow to the protections offered by the First Amendment.” The court labeled any attempt at blocking the future use of computer programs “an impermissible prior restraint” on Web site operators’ First Amendment rights.c THE DEBATE CONTINUES If you buy a book, you can read it, throw it away, give it to someone else, or sell it to a used bookstore. Once you have bought it, you can legally do just about anything with it except make copies for resale. There is no way that the owner of the intellectual property contained in that book can insert an encryption system to prevent you from letting someone else read it. In contrast, any form of digitized intellectual property can contain an encryption system. In principle, the 1998 DMCA protects all such encryption systems from being circumvented by “code cracking.”

© 2014 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.


CHAPTER 8: INTELLECTUAL PROPERTY AND INTERNET LAW

201

Understandably, the movie industry is urging the courts to interpret the DMCA’s provisions against circumvention narrowly. Yet some argue that several passages in the act would seem to allow for a broader interpretation—one that would allow constitutional challenges to succeed. Ultimately, the controversy may have to be decided by the United States Supreme Court. WHERE DO YOU STAND? At issue in the twenty-first century is the trade-off between the necessity of writers, musicians, artists, and movie studios to profit from their work and the free flow of ideas for the public’s benefit. Movie (and music) industry participants claim that encryption programs are necessary to prevent piracy. Others, however, including the defendants in cases such as those discussed above, argue that the law should at least allow purchasers of movies, music, and books in digital form to make limited copies for fair use. Which side of this debate do you support? Is it possible to strike an appropriate balance between the rights of both groups on this issue? a. 111 F.Supp.2d 294 (S.D.N.Y. 2000). b. Universal City Studios, Inc. v. Corley, 273 F.3d 429 (2d Cir. 2001). c. DVD Copy Control Association v. Bunner, 113 Cal.Rptr.2d 338 (2001). Note that in 2002, the California Supreme Court agreed to review this case.

D.

V.

MP3 AND FILE-SHARING TECHNOLOGY •

File sharing over the Internet can be done through peer-to-peer (P2P) networking.

A newer method of file sharing via the Internet is cloud computing. Cloud computing can deliver a single application through a browser to multiple users, or it may be a utility program to pool resources and provide data storage and servers that can be accessed on demand.

1.

Sharing Stored Music Files MP3 file compression and music file sharing over the Internet through peer-to-peer (P2P) networking is generally illegal—a violation of copyright law.

2.

The Evolution of File-Sharing Technologies Companies that distribute file-sharing software intending it to be used to violate copyright laws can be liable for users’ copyright infringement..

Trade Secrets Some business processes and information that cannot be patented, copyrighted, or trademarked are protected against appropriation by a competitor as trade secrets. Customer lists, plans, research and development, pricing information, marketing techniques, production techniques, formulas, and generally anything that makes an individual company unique and that would have value to a competitor constitute trade secrets. A.

STATE AND FEDERAL LAW ON TRADE SECRETS Theft of trade secrets is a violation of the common law, some states’ statutes (some based on the Uniform Trade Secrets Act), and a federal crime (under the Economic Espionage Act of 1996).

© 2014 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.


202

UNIT TWO: THE PUBLIC ENVIRONMENT

B.

TRADE SECRETS IN CYBERSPACE The nature of technology (especially e-mail) undercuts a firm’s ability to protect its confidential information, including trade secrets.

ANSWER TO LEARNING OBJECTIVE/FOR REVIEW QUESTION NO. 5 What are trade secrets, and what laws offer protection for this form of intellectual property? Trade secrets are business processes and information that are not or cannot be patented, copyrighted, or trademarked. Trade secrets consist of generally anything that makes an individual company unique and that would have value to a competitor. The Uniform Trade Secrets Act, the Economic Espionage Act, and the common law offer trade secrets protection.

ENHANCING YOUR LECTURE—

HOW CAN YOU PROTECT YOUR TRADE SECRETS? Most successful businesses have trade secrets. The law protects trade secrets indefinitely, provided that the information is not generally known, is kept a secret, and has commercial value. Sometimes, of course, a business needs to disclose secret information to a party in the course of conducting business. For example, a company may need to hire a consultant to revamp a computer system, an engineer to design a manufacturing system, or a marketing firm to implement a sales program. All of these individuals may need access to some of the company’s trade secrets. One way to protect against the unauthorized disclosure of such information is through confidentiality agreements. CONFIDENTIALITY AGREEMENTS In a confidentiality agreement, one party promises not to divulge information about the other party to anyone else or to use the other party’s confidential information for his or her own benefit. Confidentiality agreements are often included in licensing and employment contracts, but they can also be separate contracts. The key is to make sure that the agreement adequately protects the trade secrets and applies to any related transactions between the parties. For instance, if you execute a separate confidentiality agreement with a marketing firm, you need to make sure that it refers to any other contracts you have made with that firm prior to the confidentiality agreement. Also, subsequent contracts with the firm should either refer back to the confidentiality agreement or include a new confidentiality provision. DEFINING THE SCOPE OF THE AGREEMENT Confidentiality agreements must be reasonable. Businesspersons should consider what information needs to be protected and for how long. Make certain to define what you mean by confidential information in the agreement. Do you want to protect just your customer list or all financial, technical, and other business information? Think ahead, cover the bases, and be specific.

© 2014 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.


CHAPTER 8: INTELLECTUAL PROPERTY AND INTERNET LAW

203

The duration of the agreement usually depends on the nature of the information. Very important secret information should remain confidential for a longer time than less important secrets. Sometimes, as with an advertising campaign, the time period for confidentiality may be self-evident (if the campaign ends in six months, for example). Tailor the agreement to your needs as much as possible. If the party to whom you are disclosing information will no longer need the information after a certain date—such as when the project is completed—include a provision requiring the return of confidential information after that date. This will alleviate concerns that your confidential trade secrets might later fall into the hands of a stranger. CHECKLIST FOR THE OWNER OF TRADE SECRETS 1.

Determine what your trade secrets are and who may need access to them.

2. Make sure that confidentiality agreements define, in an all-inclusive manner, what information should be considered confidential.

VI.

3.

Specify a time period that is reasonable under the circumstances.

4.

Identify the agreements to which the confidentiality provisions apply.

5.

Require that the confidential materials be returned to you.

6.

Create a mechanism to enforce the policy.

International Protection for Intellectual Property A. THE BERNE CONVENTION International copyright agreements include the Berne Convention. If an American writes a book, every country that has signed the convention must recognize his or her copyright in the book. Also, if a citizen of a country that has not signed the convention first publishes a book in a country that has signed, all other countries that have signed the convention must recognize that author’s copyright.

CASE SYNOPSIS—

Case 8.3: Golan v. Holder Under the Uruguay Round Agreements Act (URAA), which was enacted by Congress in 1994, copyright protection extends to many foreign works that were once in the public domain. A group of musicians, conductors, publishers, and others filed a suit, claiming that Congress exceeded its authority under the copyright clause in passing the URAA. The court ruled against the plaintiffs, who appealed. The United States Supreme Court affirmed. The copyright clause empowers Congress to protect authors’ exclusive rights to their works for “limited times.” The clause does not require that a “time prescription, once set, becomes forever fixed or inalterable.” Thus, works can be removed from the public domain by being granted protection for a limited time. © 2014 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.


204

UNIT TWO: THE PUBLIC ENVIRONMENT

.................................................................................................................................................. Notes and Questions What is meant by the term “public domain”? This term means “not in copyright.” Why is this significant to musicians, conductors, publishers, and others? Works in the public domain can be used by anyone without permission and without the payment of royalties.

ANSWER TO “THE GLOBAL DIMENSION” IN CASE 8.3 What does the Court’s decision in this case mean for copyright holders in the United States who want copyright protection in other countries? Will other nations be more or less inclined to protect U.S. authors? Explain. The Supreme Court’s decision can only help U.S. authors seeking copyright protection in other countries. If the Court found the URAA unconstitutional, the United States could not fully comply with the Berne Convention by treating domestic and foreign works alike. Other countries might be inclined to also violate the Berne Convention, meaning that U.S. authors might not enjoy full copyright protection abroad. After Golan, other countries will be far less tempted to retaliate against the United States for discriminating against foreign authors.

ADDITIONAL BACKGROUND—

The Berne Convention International protection of copyright is provided by international treaties, including the Berne Convention, which the United States signed in 1989. If a work is protected by copyright law, permission must be granted by the author or publisher before the work can be copied for commercial purposes. The following are excerpts from the first five articles of the Berne Convention. BERNE CONVENTION FOR THE PROTECTION OF LITERARY AND ARTISTIC WORKS OF SEPTEMBER 9, 1886 * * * * (Source of Text: Paris Act of July 24, 1971, as amended on October 2, 1979, provided by the World Intellectual Property Organization, Geneva, 1987.) The countries of the Union, being equally animated by the desire to protect, in as effective and uniform a manner as possible, the rights of authors in their literary and artistic works, * * * have agreed as follows: Article 1

© 2014 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.


CHAPTER 8: INTELLECTUAL PROPERTY AND INTERNET LAW

205

* * * * The countries to which this Convention applies constitute a Union for the protection of the rights of authors in their literary and artistic works. Article 2 * * * * (1) The expression ‘literary and artistic works’ shall include every production in the literary, scientific and artistic domain, whatever may be the mode or form of its expression, such as books, pamphlets and other writings; lectures, addresses, sermons and other works of the same nature; dramatic or dramatic-musical works; choreographic works and entertainments in dumb show; musical compositions with or without words; cinematographic works to which are assimilated works expressed by a process analogous to cinematography; works of drawing, painting, architecture, sculpture, engraving and lithography; photographic works to which are assimilated works expressed by a process analogous to photography; works of applied art; illustrations, maps, plans, sketches and three-dimensional works relative to geography, topography, architecture or science. * * * * (3) Translations, adaptations, arrangements of music and other alterations of a literary or artistic work shall be protected as original works without prejudice to the copyright in the original work. (4) It shall be a matter for legislation in the countries of the Union to determine the protection to be granted to official texts of a legislative, administrative and legal nature, and to official translations of such texts. (5) Collections of literary or artistic works such as encyclopedias and anthologies which, by reason of the selection and arrangement of their contents, constitute intellectual creations shall be protected as such, without prejudice to the copyright in each of the works forming part of such collections. (6) The works mentioned in this Article shall enjoy protection in all countries of the Union. This protection shall operate for the benefit of the author and his successors in title. (7) Subject to the provisions of Article 7(4) of this Convention, it shall be a matter for legislation in the countries of the Union to determine the extent of the application of their laws to works of applied art and industrial designs and models, as well as the conditions under which such works, designs and models shall be protected. Works protected in the country of origin solely as designs and models shall be entitled in another country of the Union only to such special protection as is granted in that country to designs and models; however, if no such special protection is granted in that country, such works shall be protected as artistic works. (8) The protection of this Convention shall not apply to news of the day or to miscellaneous facts having the character of mere items of press information. Article 2[b] * * * * (1) It shall be a matter for legislation in the countries of the Union to exclude, wholly or in part, from the protection © 2014 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.


206

UNIT TWO: THE PUBLIC ENVIRONMENT

provided by the preceding Article political speeches and speeches delivered in the course of legal proceedings. (2) It shall also be a matter for legislation in the countries of the Union to determine the conditions under which lectures, addresses and other works of the same nature which are delivered in public may be reproduced by the press, broadcast, communicated to the public by wire and made the subject of public communication as envisaged in Article 11[b](1) of this Convention, when such use is justified by the informatory purpose. (3) Nevertheless, the author shall enjoy the exclusive right of making a collection of his works mentioned in the preceding paragraphs. Article 3 * * * * (1) The protection of this Convention shall apply to: (a) authors who are nationals of one of the countries of the Union, for their works, whether published or not; (b) authors who are not nationals of one of the countries of the Union, for their works first published in one of those countries, or simultaneously in a country outside the Union and in a country of the Union. (2) Authors who are not nationals of one of the countries of the Union but who have their habitual residence in one of them shall, for the purposes of this Convention, be assimilated to nationals of that country. (3) The expression ‘published works’ means works published with the consent of their authors, whatever may be the means of manufacture of the copies, provided that the availability of such copies has been such as to satisfy the reasonable requirements of the public, having regard to the nature of the work. The performance of a dramatic, dramatico-musical, cinematographic or musical work, the public recitation of a literary work, the communication by wire or the broadcasting of literary or artistic works, the exhibition of a work of art and the construction of a work of architecture shall not constitute publication. (4) A work shall be considered as having been published simultaneously in several countries if it has been published in two or more countries within thirty days of its first publication. Article 4 * * * * The protection of this Convention shall apply, even if the conditions of Article 3 are not fulfilled, to: (a) authors of cinematographic works the maker of which has his headquarters or habitual residence in one of the countries of the Union; (b) authors of works of architecture erected in a country of the Union or of other artistic works incorporated in a building or other structure located in a country of the Union. Article 5 * * * * (1) Authors shall enjoy, in respect of works for which they are protected under this Convention, in countries of the © 2014 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.


CHAPTER 8: INTELLECTUAL PROPERTY AND INTERNET LAW

207

Union other than the country of origin, the rights which their respective laws do now or may hereafter grant to their nationals, as well as the rights specially granted by this Convention. (2) The enjoyment and the exercise of these rights shall not be subject to any formality; such enjoyment and such exercise shall be independent of the existence of protection in the country of origin of the work. Consequently, apart from the provisions of this Convention, the extent of protection, as well as the means of redress afforded to the author to protect his rights, shall be governed exclusively by the laws of the country where protection is claimed. (3) Protection in the country of origin is governed by domestic law. However, when the author is not a national of the country of origin of the work for which he is protected under this Convention, he shall enjoy in that country the same rights as national authors. (4) The country of origin shall be considered to be: (a) in the case of works first published in a country of the Union, that country; in the case of works published simultaneously in several countries of the Union which grant different terms of protection, the country whose legislation grants the shortest term of protection; (b) in the case of works published simultaneously in a country outside the Union and in a country of the Union, the latter country; (c) in the case of unpublished works or of works first published in a country outside the Union, without simultaneous publication in a country of the Union, the country of the Union of which the author is a national, provided that: (i) when these are cinematographic works the maker of which has his headquarters or his habitual residence in a country of the Union, the country of origin shall be that country, and (ii) when these are works of architecture erected in a country of the Union or other artistic works incorporated in a building or other structure located in a country of the Union, the country of origin shall be that country.

B.

THE TRIPS AGREEMENT More significant than the Berne Convention is the agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPS). TRIPS was part of the agreement creating the World Trade Organization (WTO). TRIPS established standards for the international protection of intellectual property rights, including patents, trademarks, and copyrights for movies, computer programs, books, and music. Generally, each member country must provide broad intellectual property rights and effective remedies (including civil and criminal penalties) for violations of those rights.

TEACHING SUGGESTIONS 1. It could be pointed out that disputes arising in the areas covered in this chapter are among the most volatile and most extensively—and expensively—litigated disputes in the law. 2. One of the issues raised in this chapter is whether an instructor should be allowed to photocopy (has the common use of the brand name “Xerox” to refer to photocopying rendered the brand name generic?) all or part of one or more copyrighted works to hand out to a class of students. Should a single student be allowed to photocopy a chapter of a library book for later study? Would students feel differently if they owned the rights to the work and would receive royalties if the work were purchased instead of copied? The same questions can be raised in connection with the boot-

© 2014 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.


208

UNIT TWO: THE PUBLIC ENVIRONMENT

legging of other products protected by intellectual property law, including compact discs, cassette tapes, videocassettes, and laserdiscs. Should copying computer software be treated any differently than copying cassettes? Why? 3. To help students analyze problems that focus on topics in this chapter, you might outline the following three steps. First, it should be determined if the party who is bringing the suit has a protectible interest (that is, whether the subject matter of the plaintiff’s interest is appropriate for copyright protection, parent protection, trademark protection, or whatever the case may be). Second, it should be determined whether the other party—the defendant—has interfered with those rights. Third, it should be considered what remedy is appropriate.

Cyberlaw Link Questions that students might be asked include the following. •

Is linking to a Web site without authorization an infringement of the site’s copyright? Is it a violation of trademark law? Would it make any difference if the URL included a person’s name or a trademark?

Is framing another’s site a violation of any of the laws that protect intellectual property?

Is caching a violation of copyright law?

Should a company be entitled to monitor the use of its copyrighted software after it’s been sold? If so, should it be a crime to resist this monitoring?

DISCUSSION QUESTIONS 1. Would the use of a purported trademark solely on a Web site satisfy the “use in commerce” requirement for trademark protection? The use of a purported mark on a Web site alone would likely qualify as “use in commerce,” assuming of course that the use was sufficiently prominent. Together with other uses of the mark—displays in stores and catalogues, for example—the use of a mark on a Web site that includes pictures and descriptions of certain products would constitute the circumstances that meet the test. 2. Why is it important to allow those who have applied for trademark protection to defend preemptively against the use of the mark by another party? Policy considerations, especially the promotion of certainty in business transactions by fixing an applicant's priority right as of the date of its filing an application, and the encouragement and reward of early filing so as to put claims to marks on the public record as soon as possible. 3. What are service, certification, and collective marks? A service mark distinguishes services rather 4han goods. A certification mark is used by one or more persons, other than the owner, to certify the region, materials, mode of manufacture, quality, or accuracy of the owner’s goods or services. When used by members of a cooperative, association, or other organization, the mark is a collective mark. The same policies and restrictions that apply to trademarks apply to service, certification, and collective marks. 4. What is a trade name? A trade name is all or part of a business’s name. Words must be unusual or fancifully used to be protected as trade names.

© 2014 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.


CHAPTER 8: INTELLECTUAL PROPERTY AND INTERNET LAW

209

5. Why don’t all software products qualify for patent protection? Software products often do not meet the “novel” and “not obvious” requirements because much software only automates procedures that can be performed manually. Also, the basis for a computer program is often a mathematical equation or formula, which is not patentable. 6. What does a copyright protect? A copyright does not protect any “idea, procedure, process, system, method of operation, concept, principle or discovery, regardless of the form in which it is described, explained, illustrated, or embodied.” A copyright does protect the way in which an idea is expressed. If the idea and its expression are inseparable, no copyright will be granted. Generally, anything that is not original does not qualify; compilations of facts do. 7. Discuss the fair use doctrine and what factors are considered in determining whether a use is fair. Reproduction of copyrighted works is permitted without payment of royalties under the fair use doctrine. The factors used in determining whether a use qualifies as fair are (1) the purpose and character of the use, including whether it is of a commercial nature or is for nonprofit educational purposes; (2) the nature of the copyrighted work; (3) the amount and substantiality of the portion used in relation to the work as a whole; and (4) the effect of the use on the potential market for or value of the copyrighted work. 8. What copyright protection is available for software? Under the Computer Software Copyright Act of 1980, Copyright Act protection was extended to computer programs. The act defined a computer program as a “set of statements or instructions to be used directly or indirectly in a computer in order to bring about a certain result.” A program’s source code was clearly included. The courts have also extended protection to the binary object code. Program structure, sequence, and organization have been held copyrightable—there may be infringement even if there is no substantial similarity between programs’ literal elements. Protection may extend to programs’ “look and feel.” In at least one case, menu command structure was held to be copyrightable. 9. Why is copyright the most important form of intellectual property protection on the Internet? What is the protection for copyrighted works online? Copyright law is probably the most important form of intellectual property protection on the Internet, in part because much of the material on the Internet consists of works of authorship (multimedia presentations, software, database information, etc.). These works are the traditional focus of copyright law. Copyright law is also important because the nature of the Internet requires that data be “copied” to be transferred online. Loading a file or program into a computer’s random access memory, or RAM, constitutes the making of a “copy” for purposes of copyright law. 10. What is a trade secret and how is it protected? Trade secrets are customer lists, plans, research and development, pricing information, marketing techniques, production techniques, formulas, and generally anything that makes a company unique and that would have value to a competitor. They cannot be patented, copyrighted, or trademarked, but they are protected from appropriation by the common law and in some states by the Uniform Trade Secrets Act. The protection extends to ideas and their expression. There are no registration or filing requirements.

ACTIVITY AND RESEARCH ASSIGNMENTS 1. News reports of local, national, and international controversies involving the subjects considered in this chapter can often be found and may be used effectively in discussing this material. Events that are currently widely publicized involve cyberlaw controversies and their resolutions. Have students keep an eye out for these and discuss them in class.

© 2014 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.


210

UNIT TWO: THE PUBLIC ENVIRONMENT

2. In discussing trademarks, trade names, service marks, and collective marks, ask students to bring to class an example of each. Discuss as a large group whether the examples are properly identified. 3. Ask students to research online how the design of a Web site can be protected. Here is one possibility: (1) Register it with the U.S. Copyright Office. This is not necessary but it establishes (a) a public record of your design in case a claim is filed and (b) prima facie evidence in court of the validity of the copyright. Additional damages and attorney fees may be available in a court action if the registration occurs before a claim is filed. (2) Put a copyright mark on the page. This is not required either, but it prevents an infringer from claiming “innocent infringement.” What is not copyrightable? Probably features that are merely functional, that are commonly used by others, that are directed by whatever software is used to create the site, or that are required by the Web, the Internet, or the ISP. What other protection is needed (for instance, for software that can be downloaded from the site) and what is available? Who owns the copyright—the owner of the site or the developer? Put it in writing. 4. Ask students to research online the following question: how does a business choose and protect a domain name? (1) Find out if a name is taken (there are firms that run global searches). (2) Register the name. (3) Consider: (a) the risks of not registering in countries other than the United States (for instance, do you do business abroad? do you have foreign competitors? etc.); (b) the costs of registering elsewhere (about $250 per country, with as many as two hundred countries in which to register); and (c) the complications of registering elsewhere (technical and regulatory subjects to deal with in each country—requirements, fees, language translations, currency conversion, etc.). (4) Hire a professional registration service to do everything. 5. More than most of the other chapters in this textbook, the material in this chapter can be researched online. As of this writing, most, if not all, of the cases set out in this chapter can also be found at more than one Web site. Ask students to go online and update any of the individual cases or topics discussed in the text. Ask students, when undertaking this research, to evaluate the sources of the material that they find on the Web. How do you know when a source is reliable?

EXPLANATIONS OF SELECTED FOOTNOTES IN THE TEXT Footnote 6: George V Restauration S.A. and others owned the “Buddha Bar Paris,” a restaurant in Paris, France. Little Rest Twelve, Inc., paid royalties to use the Buddha Bar trademark and concept in New York City under the name “Buddha Bar NYC.” Little Rest advertised its affiliation with Buddha Bar Paris on its Web site and in the media. When a dispute arose, the owners of Buddha Bar Paris withdrew their permission for Buddha Bar NYC’s use of their mark, but Little Rest continued its use. The owners of the mark filed a suit in a New York state court against Little Rest, alleging infringement. The court denied the plaintiffs’ motion for a preliminary injunction. They appealed. In George V Restauration S.A. v. Little Rest Twelve, Inc., a state intermediate appellate court reversed, granted the motion, and remanded. A licensee is not entitled to continue using a mark after its owner terminates the license. In a trademark infringement action, a showing of a likelihood of confusion establishes that the owners of the mark are likely to succeed in their cause and that they would suffer “irreparable harm” if a preliminary injunction were not issued. Irreparable harm occurs when a former licensee’s use of a mark creates “an increased danger that consumers will be confused and believe that the former licensee is still an authorized representative of the trademark holder.” In this case, likely confusion is shown by the strength of the Buddha Bar mark and the plaintiffs’ ability to license it to others, the media’s references to the mark, Little Rest’s use of the identical mark, Buddha Bar NYC’s previous association with Buddha Bar Paris in ad campaigns and on its Web site, and Little Rest’s use of the mark in the same manner as the plaintiffs.

© 2014 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.


CHAPTER 8: INTELLECTUAL PROPERTY AND INTERNET LAW

211

Why didn’t Little Rest simply stop its use of the Buddha Bar mark when its owners withdrew their permission? Reasons that Little Rest did not stop using the Buddha Bar mark might include a belief that the parties could resolve their dispute amicably and in a short time. Most likely, too, Little Rest’s use of the mark represented an investment of capital, labor, and time. To stop that use would have meant a further investment. If the restaurant had been successful, changing its brand might also undercut that success and cause a reduction in business. Suppose that Little Rest had never had the permission of the owners of the Buddha Bar mark to use it. Would an injunction against that use have been proper? An injunction would have been proper, but it might not have been as compelling, because consumers might not have confused the two businesses as readily as when their association had been legitimate and publicized. In the latter situation, in the words of the court, “a finding of irreparable harm is automatic.” Could Little Rest prevent confusion between the Buddha Bars in New York City and Paris by posting a disclaimer on Buddha Bar NYC’s Web site? Would such a disclaimer be effective? Explain your answer. No. The association and the likelihood of confusion between the Buddha Bars in New York and Paris could not be undone by a simple disclaimer on a Web site. The confusion could be undone only by the former licensee’s ceasing to use the mark and associated concept in its restaurant and advertising, including its Web site. Of course, a disclaimer might represent part of that effort.

Footnote 13: Bridgeport Music, Inc., and Westbound Records, Inc., own the copyright to “Get Off Your Ass and Jam,” which opens with a three-note solo guitar riff that lasts four seconds. The rap song “100 Miles and Runnin” contains a twosecond sample from the guitar solo, at a lower pitch, looped and extended to sixteen beats, in five places in the song, with each looped segment lasting about seven seconds. “100 Miles” was included in the sound track of the movie I Got the Hook Up, which was distributed by No Limit Films. Bridgeport, Westbound, and others filed a suit in a federal district court against No Limit and others, alleging copyright infringement. The court issued a summary judgment in the defendants’ favor. Westbound appealed. In Bridgeport Music, Inc. v. Dimension Films, the U.S. Court of Appeals for the Sixth Circuit reversed. Digitally sampling a copyrighted sound recording of any length is copyright infringement. “[A] sound recording owner has the exclusive right to ‘sample’ his own recording.” In other words, “the world at large is free to imitate or simulate the creative work fixed in the recording so long as an actual copy of the sound recording itself is not made. . . . Get a license or do not sample,” because “even when a small part of a sound recording is sampled, the part taken is something of value. “ Suppose that instead of a sound recording, this case had involved three seconds of a copyrighted movie, which the defendants pirated off the Internet and incorporated as background in a music video production. Would this court’s holding be different? The result probably would have been the same, based on the same reasoning. The owner of the copyright in a film has the exclusive right to its use. Licensing is always possible. Who is most likely to perceive the holding in this case—which arguably sets out a new rule—to “stifle creativity”? The court stated, “Since digital sampling has become so commonplace and rap music has become such a significant part of the record industry, it is not surprising that there are probably a hundred articles dealing with sampling and its ramifications. It is also not surprising that the viewpoint expressed in a number of these articles appears driven by whose ox is being gored. As is so often the case, where one stands depends on where one sits. For example, the sound recording copyright holders favor this interpretation as do the studio musicians and their labor organization. On the other hand, many of the hip hop artists may view this rule as stifling creativity. The record companies and performing artists are not all of one mind, however, since in many instances, today’s sampler is tomorrow’s sample. The incidence of ‘live and let live’ has been relatively high, which explains why so many instances of sampling go unprotested and why so many sampling controversies have been settled.” How can artists sample others’ works and avoid liability for infringement? The court explained, “[M]any artists and record companies have sought licenses as a matter of course. Since there is no record of those instances of sampling that either go © 2014 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.


212

UNIT TWO: THE PUBLIC ENVIRONMENT

unnoticed or are ignored, one cannot come up with precise figures, but it is clear that a significant number of persons and companies have elected to go the licensing route. Also there is a large body of pre-1971 sound recordings that is not protected and is up for grabs as far as sampling is concerned. Additionally, just as many artists and companies choose to sample and take their chances, it is likely that will continue to be the case.” Suppose that rather than taking a few notes from another’s musical composition, No Limit had played the exact same notes in the studio when recording. In other words, the band did not “sample” the copyrighted work of another. How would this change the outcome of the case? Could Bridgeport and Westbound still prove copyright infringement? The result might have been the same, based on the same reasoning. The owner of the copyright to a song has the exclusive right to its use. Licensing is always possible. No Limit might have avoided liability if it could have proved that it had never heard the copyrighted piece.

REVIEWING—

INTELLECTUAL PROPERTY AND INTERNET LAW Two computer science majors, Trent and Xavier, have an idea for a new video game, which they propose to call “Hallowed.” They form a business and begin developing their idea. Several months later, Trent and Xavier run into a problem with their design and consult with a friend, Brad, who is an expert in designing computer source codes. Before Hallowed is marketed, however, the video game “Halo 2” is released for both the Xbox and Game Cube systems. Halo 2 uses the same source codes as Hallowed and imitates its overall look and feel. Ask your students to answer the following questions, using the information presented in the chapter. 1. Would the name Hallowed receive protection as a trademark or as trade dress? The video game, “Hallowed,” would not receive protection as either a trademark or trade dress because game had not been released to the general public for use. The law protects only trademarks that are in use. Trade dress applies to a product’s distinct image and appearance, but only once the distinctiveness of a product’s appearance has been established. 2. If Trent and Xavier had obtained a patent on Hallowed, would the release of Halo 2 infringe on their patent? Why or why not? No, because all steps of a patented process must be copied to constitute infringement and these two games contain different features. For infringement of a business process patent to exist, all steps or their equivalent must be copied. In this scenario, while Halo 2 uses some of the same source codes as Hallowed, not all features alike, so it does not infringe on Hallowed’s patent. 3. Based only the facts described above, could Trent and Xavier sue the makers of Halo 2 for copyright infringement? Why or why not? Yes, because Halo 2 copies the source codes of Hallowed. Whenever the form or expression of an idea is copied, an infringement of copyright occurs. The courts generally hold that copying the source codes of copyrighted software is infringement. Because Halo 2 used similar source codes as Hallowed, Trent and Xavier can sue for copyright infringement. 4. Suppose that Trent and Xavier discover that Brad took the idea of Hallowed and sold it to the company that produced Halo 2. Which type of intellectual property issue does this raise? The fact that Brad took and sold Trent and Xavier’s idea to another company raises a trade secret issue, because Brad wrongfully disclosed the idea of a new video game to a competing company. Unlike copyright and trademark protection, protection of trade secrets extends both to

© 2014 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.


CHAPTER 8: INTELLECTUAL PROPERTY AND INTERNET LAW

213

ideas and their expression.

DEBATE THIS Congress has amended copyright law several times. Copyright holders now have protection for many decades. Was Congress right in extending these copyright time periods? Why or why not? Obviously, copyright holders whose copyrights were about to run out benefited from the time-period extensions legislated by Congress. Hence, they certainly believe that Congress acted correctly. (It’s not surprising that major copyright holders such as large movie companies, record labels, and publishing houses did most of the lobbying that led to extensions of copyright protection periods.) In general, one can argue that more effort will go into the creation of intellectual property the longer the period of copyright protection for intellectual property. In other words, for the creation of new original works, the term extension of the copyright protection incentivizes creators of such works to extend more effort. Not everyone is so enamored of the term extensions for copyright protection. In Article I, Section 8, Clause 8, of the Constitution, Congress is given the task of making laws for the protection of copyrights and patents “To promote the progress of science and useful arts, by securing for limited times to authors and inventors the exclusive right to their respective writings and discoveries.” What is a limited time? Today it can last over a hundred years! That hardly seems very limited. Moreover, the term extension for existing works makes no significant contribution to an author’s economic incentive to create, because the additional compensation was granted after the relevant investment had already been made.

LINKING THE LAW TO MARKETING—

TRADEMARKS AND SERVICE MARKS The U.S. Patent and Trademark Office requires that a trademark or service mark that is registered must actually be put into commercial use within three years after the application has been granted. Why do you think the federal government put this restriction into place? In the online world, there is something called cybersquatting. Someone registers a domain name that a large company might want to use in the future in this situation. The owner then “squats” on this domain Internet address until he or she is offered a large enough price to transfer it to a company that can actually make use of it. The U.S. Patent and Trademark Office clearly is trying to prevent what we could call trademark squatting and service mark squatting. In other words, the federal government wants to make sure that once a trademark or service mark is created, the owner has either to “use it or lose it.” This “use it or lose it” regulation avoids lawsuits in the future, sometimes in the distant future, when someone else creates the same or a similar trademark or service mark. If a registered trademark or service mark is never put into commerce, it is difficult for others to determine that it exists. They might inadvertently use a trademark or service mark that is similar and then face a lawsuit. This would be an inefficient use of resources, particularly for our judicial system. © 2014 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.


214

UNIT TWO: THE PUBLIC ENVIRONMENT

EXAMPREP—

ISSUE SPOTTERS 1. Global Products develops, patents, and markets software. World Copies, Inc., sells Global’s software without the maker’s permission. Is this patent infringement? If so, how might Global save the cost of suing World for infringement and at the same time profit from World’s sales? This is patent infringement. A software maker in this situation might best protect its product, save litigation costs, and profit from its patent by the use of a license. In the context of this problem, a license would grant permission to sell a patented item. (A license can be limited to certain purposes and to the licensee only.) 2. In 2000, Eagle Corporation began marketing software under the mark “Eagle.” In 2011, Eagle.com, Inc., a different company selling different products, begins to use eagle as part of its URL and registers it as a domain name. Can Eagle Corporation stop this use of eagle? If so, what must the company show? Explain. Yes. This may be an instance of trademark dilution. Dilution occurs when a trademark is used, without permission, in a way that diminishes the distinctive quality of the mark. Dilution does not require proof that consumers are likely to be confused by a connection between the unauthorized use and the mark. The products involved do not have to be similar. Dilution does require, however, that a mark be famous when the dilution occurs.

© 2014 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.


Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.