Welcome to the Weintraub Resources section. Here, you can find our Blogs, Videos, and Podcasts, in which Weintraub attorneys regularly provide insights and updates on legal developments. You can also find upcoming Weintraub Events, as well as firm and client News.


Weintraub Genshlea Chediak Hosts Celebrating Differences Reception

Download: Celebrating Differences Press Release.pdf

SACRAMENTO, Calif., July 2, 2007 –Weintraub Genshlea Chediak, a Sacramento-based business law and business litigation firm was proud to host “Celebrating Differences” reception on June 28, 2007.

This reception celebrated the diversity programs sponsored by the No Glass Ceiling Task Force of Sacramento and the Sacramento County Bar Association’s Diversity Hiring and Retention Committee. The keynote speakers, the Honorable Tani Cantil-Sakauye, Third District Court of Appeal; Stacy Boulware-Eurie, Office of the Attorney General; and Louis Gonzalez, Jr., Shareholder with Weintraub Genshlea Chediak were all warmly received by over 80 enthusiastic law students and attorneys. These three exceptional speakers shared their stories of challenges and successes in the legal profession.

Judge Cantil-Sakauye inspired the audience with her story of overcoming her traditional Fillipino background of quiet respect to law school graduate, strong prosecuting attorney and presiding judge of the Third Court of Appeal.

Stacy Boulware-Eurie, supervising deputy district attorney and recently named as Sacramento County Superior Court judge gave an

Louis Gonzales, Jr. shareholder with Weintraub Genshlea Chediak offered his encouragement to the audience that you can achieve your goals and overcome adversity even as a minority. He spoke on his experience as a first-generation American and first-generation

The mission of the No Glass Ceiling Task Force is to encourage local law firms, corporate legal departments, governmental agencies to make work environments more family-friendly and promote more women up the ranks. For more information about the task force, please visit www.womenlawyers-sacramento.org/noglassceiling.cfm.

The Sacramento County Bar Association established the Diversity Hiring and Retention Committee in 1990 with the mission of our encouraging firms to introduce first-year minority and disadvantaged law students to the work and culture of private law firms. For more information about the committee, please visit www.sacbar.org.

The 11th Circuit Reminds All That Copyright Protection For Databases Is Alive And Well

Under contemporary Copyright Law, a database is a “compilation.” A compilation is defined under the Copyright Act as “a work formed by the collection and assembling of preexisting materials or of data….” While the inclusion of a compilation as a protectable work was statutorily introduced in The Copyright Act of 1976, compilations were protected as “books” as early as the Copyright Act of 1790.

In 1991 in Feist Publications, Inc. v. Rural Tel. Serv. Co, the Supreme Court resolved a split among the circuits regarding the elements of a compilation that entitle it protection under the Copyright Act. Certain circuits had adopted what was known as the “sweat of the brow” doctrine which looked at the compiler’s effort – his own expense, skill, labor or money – as the critical contribution justifying protection. Other circuits moved away from the labor/investment approach of the sweat of the brow doctrine, and granted protection to those compilations that were sufficiently original to be considered protectable works of authorship.

In Feist, the United States Supreme Court held that an alphabetical telephone directory of all people living in a particular area lacks sufficient originality and, therefore, was not copyrightable. This decision ended grants of protection based solely on the compiler’s own effort. In addressing the issue of the protectability of compilations of facts, understanding the practical implications of its decision, the court stated:

“[This decision] inevitably means that the copyright of a factual compilation is thin, not withstanding a valid copyright, a subsequent compiler remains free to use the facts compiled in another’s publication to aid in preparing a competing work, so long as the competing work does not feature the same selection and arrangement.”

Although copyright protection for a database may be “thin,” protection still exists. While the data itself, in most cases, escapes protection under copyright, protection is granted to the selection and arrangement of the data. The 11th Circuit recently reminded us that, although thin, copyright protection for a compilation of factual data is alive and well.

In BUC International Corp., v International Yacht Council Limited, the 11th Circuit addressed the plaintiff’s claim that the defendant infringed certain elements of its yacht listing service. The plaintiff obtained information about yachts for sale from yacht brokers, who would fill out a form which plaintiff had created. This information was then compiled into a listing database, searchable by a variety of yacht characteristics and features. The plaintiff made the yacht listing database available to brokers pursuant to a license.

In June of 2000, the defendant began taking steps to create an online multiple listing service which would compete with plaintiff’s service. Like the plaintiff, the defendant solicited listings from brokers. Many of these brokers were licensees of plaintiff’s service. In sending listings to the defendant, many of the brokers would simply copy the listing they had submitted to the plaintiff and the defendant would, in turn, place the listing on its website. Additionally, the defendant had surreptitiously secured passwords to the plaintiff’s service and culled and posted listings, word for word, directly from plaintiff’s service.

On appeal from a district court’s judgment of infringement, the 11th Circuit, discussed Feist and its progeny, and its application to the instant case. With regard to compilations of fact, the court noted that it is the “creatively original selection of facts” that garners protection; the standard for copyright infringement of factual compilations hinges on distinguishing original elements of creative authorship from components in the public domain.

Not all changes or additions to a public domain work is substantial enough to be considered original. In the 2nd Circuit case of Matthew Bender and Company v. West Publishing Company, the court addressed whether the changes West made to the text of federal judicial opinions, namely the “star pagination” feature, was copyrightable. The court found that the changes were insubstantial, unoriginal and uncreative and, therefore, not copyrightable. In coming to this conclusion, the court noted that most of West’s choices were “inevitable, typical, dictated by legal convention, or at best, binary.”

In BUC International, the 11th Circuit considered the way in which the plaintiff selected, categorized, and presented certain factual information about yachts listed for sale, and determined that this was entitled to protection under the Copyright Act. And while the defendant may have been entitled to the underlying information, it could not arrange, organize or display this information in a manner that was substantially similar to the way in which plaintiff arranged, organized and displayed the same information. Because the defendant listed the data in the exact same way, and in the exact same manner as plaintiff, the 11th Circuit upheld the trial courts finding of infringement and a damage award in excess of one million dollars.

While this case does not offer a new twist on Feist, it does serve as a good reminder of the extent of protectability of factual complications. Under Feist a third party may copy and freely use any factual information contained in a database, as long as the third party does not use the same selection and arrangement.

Copyright Infringement and the Internet: A Closer Look at Perfect 10 v. Google and Amazon

By Andrea Anapolsky

On May 16, 2007, the 9th U.S. Circuit Court of Appeals sent a mixed message to search engines everywhere – publishing thumbnail images is legal, but a search engine may still be liable if it links customers to other sites that publish certain thumbnail images without authorization. (Perfect 10, Inc. v. Amazon.com, Inc., CV-05-04753-AHM (9th Cir. May 16, 2007) With this ruling, what’s next in the battle between advocating for the free flow of information on the Internet and protecting copyrighted material?

Perfect 10, Inc. (“Perfect 10”) an adult entertainment company that allows subscribers access to nude photos on-line, sued Google, Inc. (“Google”) in 2004 for publishing its photos as tiny images known as “thumbnails” which appear in a user’s search results. When a Google user types in a search and clicks on the resulting thumbnail, the page splits into two frames – the top of the page has the thumbnail with a warning it may be subject to copyright, and the bottom of the page has a full-size image from a third-party website. Perfect 10 alleged Google infringed its copyrights by using its images in thumbnails and by linking users to websites that re-published their photos without authorization.

A U.S. District Court judge last year issued a preliminary injunction against Google, finding that the search engine directly violated Perfect 10’s copyrights by displaying the thumbnail, but noted that Google could not be held liable for a user who is directed to a site that contains illegal copies of Perfect 10’s photos. The 9th Circuit’s opinion overturned this earlier ruling. The Court ruled the display of a thumbnail was considered “fair use” under copyright law, but that search engines could possible be held liable when they act as a intermediary between a user and a website that contains illegal copies. The Court remanded the case on this second issue.

Due to Google’s worldwide reputation, this case received substantial attention; however, it is clear that the 9th Circuit was simply following precedent. In 2003, the 9th Circuit decided Kelly v. Arriba Soft Corporation, a similar case to Perfect 10 v. Google. (Kelly v. Arriba Soft Corporation, 280 F.3d 934 (CA9 2002)) In the Kelly case, the plaintiff (Kelly) was a photographer who had copyrighted many of his photos; the defendant (Arriba Soft Corporation) was an internet search engine. Arriba displayed its results in the form of thumbnails and Kelly sued when he discovered that his photographs were part of the search engine’s database. The Court held that Arriba’s thumbnails were considered fair use and that Arriba did not violate Kelly’s copyright.

The 9th Circuit used much of its reasoning and analysis from Kelly in the Perfect 10 v. Google decision. In determining that Google did not infringe on Perfect 10’s copyrights, the Court stated that Google’s images fell under the fair use defense, which allows for the use of copyrighted works without the copyright owner’s permission in certain situations. Using the statutory factors for fair use set out in 17 U.S.C. § 107, the Court emphasized that the use of thumbnails was “highly transformative” and that the search engine provides important social and public benefits. The Court further held that Google did not directly infringe on Perfect 10’s copyrights by displaying full-size images – Google simply provides HTML instructions to a user’s browser that direct the browser to the images on the third party website. “[P]roviding these HTML instructions is not equivalent to showing and housing a copy.” The Court leaves no doubt that the use of such full-size images and thumbnails on websites is legal and permissible under the United States Copyright Act, Title 17, United States Code.

However, the ruling does leave open the possibility that search engines could be liable for linking users to websites that illegally display full-size images of copyrighted works. The Court remanded the case for determination of whether Google could be held liable for infringement on Perfect 10’s full-size images. The Court, drawing on its rulings in previous cases, held that “a computer system operator can be held contributorily liable if it ‘has actual knowledge that specific infringing materials are available using its system’, and can ‘take simple measures to prevent further damage’ to copyrighted works, yet continues to provide access to infringing works.” While the District Court is charged with determining Google’s liability, the 9th Circuit may have suggested its preference by stating that “there is no dispute that Google substantially assists web sites to distribute their infringing copies to a worldwide market and assists a worldwide audience of users to access infringing material. . . and we cannot discount the effect of such a service on copyright owners.”

A decision in favor of Perfect 10 would significantly alter the manner in which search engines operate, and could easily expose other websites to similar liability issues. Due to the popularity of Google and other search engines, it is possible that the U.S. Supreme Court may have the final word on this matter. In the meantime, search engines may consider taking preventative measures by adding additional warnings in its search results when a search engine includes protected thumbnail images that link to third-party websites.

Is That Expensive Custom Computer Program Really Yours?

Custom and customized computer programs create unique challenges under the Copyright Act. More and more companies have custom software written by outside programmers to automate the company’s unique business processes. Great care should be taken when a company uses outside vendors, rather than its own employees, to create the custom computer programs. Written agreements are essential. Many companies have been surprised to discover, after spending dearly for a custom software program, that the outside programmer retained the copyrights in the software and could repackage the software for sale to others simply because there was no written copyright assignment. Custom programming contracts must be carefully negotiated in order to protect a company’s investment in the newly created computer program as well as its proprietary business processes and trade secrets.

Copyright laws were designed to protect the authors of creative works from having those works stolen or misused by others. An author’s copyright ownership of the work cannot be transferred to another, absent a written agreement. Oral agreements to transfer copyright ownership are unenforceable and the traditional concepts of estoppel or waiver do not apply.

Outside software programmers are becoming very sophisticated and often desire to retain all copyrights in any of the work they create. Those who use outside programmers must become equally sophisticated to protect their rights. One critical way to facilitate protection is to insist that the written engagement agreement specifically provide that all copyrights in the custom or customized software are expressly assigned to the company. Outside consultants and programmers often do not readily agree to a blanket assignment of all copyrights to a customer because much of the source code to be utilized in the project may have existed before the engagement, or may relate to the consultant’s fundamental ability to write code for others. This tension between the programmer’s interests and the client’s interests can be especially problematic if the custom software project is part of a business reengineering process and the consultant believes he contributes unique elements to the reengineered business processes.

Computer programs contain both literal and non-literal aspects. The literal component of computer software is the actual source code itself, which provides instructions to the computer. The non-literal aspects of the copyright include components such as screen design and the structure, sequence and engagement of the user interface. Non-literal elements of the program must be reduced to some tangible expression – not just a concept – to be copyrightable. Although source code itself is generally recognized to be copyrightable because it is normally an original and tangible work, non-literal elements of the program are more difficult to establish. Most likely, non-literal program aspects are supplied by the company as a result of active participation in defining and designing the user interface and actually outlining the steps and processes that the software is to complete. The absence of a clear written copyright assignment in the software will result in a confusing mix of multiple “authors” of the program, all of whom would theoretically have equal rights to use and sell the program with only a duty of accounting to other co-authors. Even though the company would have some authorship rights in the program, the outside programmer could still use, modify and resell the program to others to the detriment of the company that originally contracted for the work.

Computer consultants will often use outside independent contractors to perform the actual coding of the source code. Care must be taken to ensure that the outside consultant has obtained written assignments from any independent contractors used on the project. If not, a company may be confronted with a future problem where a programmer who was an independent contractor to the prime computer consultant appears seemingly out of nowhere and begins to market similar software in which the company believed it had the sole and exclusive right. Absent written copyright assignments from all programmers utilized by the outside consultant, there is a risk that the work for which the company has clearly paid will soon be available off the shelf to its competitors.

A company does have additional legal tools available to prevent the unwarranted disclosure or use of the custom program, even if there was no written assignment of the copyrights. Trade secret law continues to protect trade secrets that are incorporated into the program even without a written agreement. If the software contains the company’s trade secrets, effectively protecting those trade secrets may essentially prevent the author of the software from ever commercializing the program. The company will have the burden of establishing all the traditional elements of trade secret protection including that: the information constitutes knowledge not generally known in the industry; reasonable efforts were taken to maintain secrecy; the programmer had knowledge that the trade secrets were to remain confidential; and that the trade secrets had actual economic value.

Custom and customized computer programming issues are pushing the envelope of copyright law. Blending literal and non-literal aspects of custom computer software programs makes it difficult to identify the actual author of various components of the work. Alternative methods of writing source code to accomplish the same step or process, plus the various programming tools used by the programmers, makes isolating the author of each software component even more confusing and complicated. The only way to effectively protect the interests of both sides is to execute a complete and thoughtful written agreement clearly setting forth copyright ownership rights in the final product. As outside programmers and their clients continue to work together to create custom and customized software programs, the need for a clear written understanding of the rights and expectations of both parties must be established at the beginning of the relationship and continually evaluated as the relationship unfolds.

Collage Ads & Copyright Infringement

In Jarvis v. K2 Inc. (April 30, 2007), the Ninth Circuit held that a retailer’s use of collage advertisements containing copyrighted photos was not covered by the “collective works” privilege and, thus, the retailer could be liable for copyright infringement.

Jarvis, a professional photographer, and K2, a sporting goods maker, entered into a series of agreements from 1999 to 2002. Under these agreements, Jarvis submitted photographs to K2 in exchange for compensation. K2 could publish the images provided by Jarvis in its marketing materials and on its website so as to market its business. The agreement called for K2 to include an attribution credit for each use of Jarvis’ images. Under the last agreement between Jarvis and K2, K2’s rights to use the photos expired in May 2003.

Jarvis provided more than 4,000 slides to K2, the bulk of them during 2000-2001. 24 of Jarvis’ images were incorporated into four “collage” advertisements that were initially published as magazine inserts prior to May 2003. These collage ads combined edited versions of Jarvis’ images with other images, marketing graphics and promotional slogans.

The relationship between Jarvis and K2 eventually soured and K2’s contractual rights to use Jarvis’ images expired. Nevertheless, K2 scanned the previously used collage ads and displayed them on its website after May 2003. Jarvis filed a lawsuit against K2 alleging, among other things, copyright infringement for the use on its website of the 24 photographs in K2’s collage advertisements.

The trial court granted summary judgment in Jarvis’ favor as to most of his other claims and awarded him damages. However, the trial court ruled that the collage advertisements, which contained 24 images that would have otherwise infringed on Jarvis’ copyrights, constituted “collective works” and thus were privileged under 17 U.S.C. section 201(c). Jarvis appealed this finding to the Ninth Circuit.

Jarvis argued that a 2001 agreement with K2 applied to the images in the collage ads and did not permit the images to be used in any way by K2 after May 2003. He argued that the trial court erred in ruling that the collage ads were protected as “collective works.”

The Ninth Circuit recognized that the 2001 agreement authorized K2 to “publish” Jarvis’ images and that K2 acted within its rights when it first used the collage ads prior to May 2003 for the magazine inserts. Although K2 conceded that its display of the collage ads after the May 2003 termination date was not authorized by the agreement, K2 argued that the collage ads fell under the “collective works” privilege of section 201(c).

Section 201(c) provides in pertinent part: “In the absence of an express transfer of the copyright or of any rights under it, the owner of copyright in the collective work is presumed to have acquired only the privilege of reproducing and distributing the contribution as part of that particular collective work, any revision of that collective work, and any later collective work in the same series.” The Ninth Circuit, however, rejected K2’s argument (and the finding of the trial court) and held that the ads were not “collective works,” but rather, improper “derivative works.”

The Ninth Circuit recognized that section 201(c) protects only collective works. A “collective work” is defined as “a work, such as a periodical issue, anthology, or encyclopedia, in which a number of contributions, constituting separate and independent works in themselves, are assembled into a collective whole.” (See 17 U.S.C. §101.) A “derivative work,” on the other hand, is defined as “a work based upon one or more preexisting works, such as a translation, musical arrangement . . . art reproduction, abridgment, condensation, or any other form in which a work may be recast, transformed, or adopted. A work consisting of editorial revisions, annotations, elaborations, and other modifications which, as a whole, represent an original work of authorship, is a `derivative work’.” (Id.)

Using these statutory definitions, the Ninth Circuit found that the collage ads were derivative in nature rather than collective works. Jarvis delivered all of his images to K2 in the form of identical square slides. K2’s collage ads did not merely compile these slides as a typical album might. Rather, K2 “shrank, expanded, distorted, overlaid and otherwise edited the original images, while also combining them with photos taken by other photographers, additional graphics, the K2 logo and marketing slogans.”

The Ninth Circuit found that the changes K2 made to Jarvis’ images were examples of “recasting, transforming or adopting” and “editorial revisions, annotations, elaborations or other modifications” that define “derivative works.” The Ninth Circuit recognized that Jarvis delivered the images to K2 in one form and they were subsequently used in the collage ads in a different (though still recognizable) form. K2’s ads did not simply compile or collect Jarvis’ images, but rather, altered and infused them with other images and artistic elements into new works that were based on, i.e., derivative, of Jarvis’ original images.

K2 attempted to argue that its collage ads “in no way transformed or altered [Jarvis’] preexisting photographs.” The Ninth Circuit rejected this argument by finding that “even a cursory look at the ads which `transformed or altered’ Jarvis’ photographs in a variety of ways, demonstrates the weakness of this claim.”

K2 also argued that the collage ads that appeared on its website were the same ones that had been used as original magazine inserts. The Ninth Circuit found this to be irrelevant since “a derivative work remains derivative when it is scanned and placed on line just as a collective work would remain collective if it were transferred from one medium to another.”

Having found that K2’s four collage ads were derivative rather than collective works, the Ninth Circuit ruled that K2 had infringed on Jarvis’ copyrights as to the 24 images that were used in K2’s collage ads. The Court remanded the matter to the trial court to determine the amount of Jarvis’ damages. The Ninth Circuit further noted that because some of the images used in the collage ads appeared to have been registered by Jarvis before their infringement, Jarvis may be entitled to statutory damages and attorney’s fees under sections 412 and 504(c)(1). Jarvis could also show that K2’s infringement was “willful” under section 504(c)(2) thereby increasing the amount of available statutory damages.

The Ninth Circuit’s ruling in the Jarvis case requires that advertisers pay special attention to their use of copyrighted images in “collage” type advertisements. If copyrighted images are modified, transformed or included with other artists images, the advertiser may be unable to take advantage of the collective works privilege of section 201(c). This could expose the advertiser to substantial damages for copyright infringement.

Local Law Firms Struggle to Improve Associate Retention

Sacramento Business Journal
May 18, 2007
By Kathy Robertson, Staff Writer

Attorney Darrin Menezes was quoted in this Sacramento Business Journal article about working at three different Sacramento law firms. Menezes grew up in the Sacramento area and was looking to find the right firm where he could grow his environmental litigation practice. He stated “you have to be happy where you are and I have been, luckily.”

Over Installing Software May Subject A Company to Liability for Copyright Infringement

Its that time again; time to upgrade your computer operating system and associated programs. Microsoft’s new operating system, Vista, is coming pre-installed on new computers and laptops, along with new versions of Microsoft Word, Excel and Outlook. Along with Vista, other business software manufactures are taking this opportunity to roll out upgrades and offer entirely new programs.

Anytime a company decides to upgrade or purchase a new program which has to be rolled out to a significant number of users, the company’s IT department faces a very big task – to install numerous copies of the program in as time efficient manner as possible. The IT department may face even greater challenges where users of a particular program are not assigned to one specific computer workstation but need to have access to the program on multiple computer work stations. To deal with this situation, instead of individually installing the program onto each machine, the IT department may use hard drive imaging-copying the complete content of a master hard drive on to the hard drive of individual computers. Where a company has purchased a limited number of licenses to a program, but must install it on a larger number of computer stations, an IT department may configure access to the program such that only a particular number of users have access to it at any one time. Depending on the type of software license the company acquired, this could be the prelude to a Copyright infringement lawsuit.

Software can be licensed to users in a variety of different manners. Some software companies license software for a flat fee and allow for an unlimited number of users on an unlimited number of computers. Others may supply the software for free but require the licensee to subscribe to a service contract. Others grant a license on a per user or per computer station basis. Where a company has acquired a license which allows the software to be installed on an unlimited number of computers, over installation is not an issue. Likewise, where a company has acquired a license which allows use by no more than a particular number of users at any one time, regardless of the number of computer stations on which the software is installed, as long as the software is configured to limit access accordingly, over installation may not be an issue. However, where a company is granted a license on a per computer station basis, over installation, regardless whether or not the program is configured to limit access, can be very problematic.

In Wall Data Incorporated v. Los Angeles County Sheriff’s Department the L.A. county Sheriff’s department faced a similar problem. It had acquired 3,663 licenses to a particular computer program for use in the jail facility. Because of the mobility of the officers working in the jail facility, the Sheriff’s department determined it needed to have the program installed on 6,007 computer stations. The Sheriff’s department configured the program such that only 3,663 users were allowed to access the program at any one time.

The license grant in the Sheriff’s license agreement provided as follows:

Wall Data … grants you (“You”), the end user, a non-exclusive license to use the enclosed software program … on a single Designated Computer for which the software has been activated. A “Designated Computer” is either (i) a stand-alone workstation, or (ii) a networked workstation which does not permit the Software to be shared with other networked workstations. You may not use the Software in any other multiple computer or multiple user arrangement. You may not use the Software other than on a Designated Computer, except that You may transfer the Software to another Designated Computer and reactivate it for use with such other Designated Computer not more than once every 30 days, provided that the Software is removed from the Designated Computer from which it is transferred.

On appeal, the Ninth Circuit upheld the lower court’s trial verdict of copyright infringement in favor of Wall Data. The Court found the license agreement to be very specific regarding the number of computers on which the program could be installed and that it did not allow for over installation. The Court stated that the Sheriff’s department should have negotiated for the flexibility it desired rather than buying a few licenses and installing the program on practically all its computers. The over installation of the program in violation of the terms of the license grant constituted indefensible copyright infringement.

The lesson to be learned is not to brush aside the shrink wrap license agreement that comes with pre-packaged computer software, or click “OK” on the click wrap license agreement that comes with downloadable software. Be sure to read and understand them first before you take any action which you may later regret.

Departing Partners: Is Their Name a Protected Trademark

There always has been a few simple things to do when a named partner leaves a law firm: change the name of the firm, stationery and business cards, and send a notice to clients. Today, additional tasks include changing web page domain names, email addresses, and websites. Is that enough? One intellectual property attorney in Pennsylvania thought not and filed suit against his former firm alleging violation of federal and state unfair competition and trademark law and the federal Anti-Cybersquatting Consumer Protection Act, among other causes of action.

The plaintiff, and departing partner, was M. Kelly Tillery (“Tillery”). Tillery brought his suit against his former law firm, now renamed Leonard & Sciolla (the “Firm”). Tillery was once a named partner of the Firm. The Firm changed its name, letterhead, business cards, and advertisement. The Firm also changed its domain name to remove reference to Tillery and edited its website to remove Tillery’s name and delete the link to his resumé. Nevertheless, Tillery sued, claiming he had a protectable trademark in his name and that the Firm infringed his trademark because the Firm retained the old domain name “leonardtillery.com.” Even though the Firm changed its domain name to “leonardsciolla.com,” it continued to maintain the domain name “leonardtillery.com,” but created a link redirecting users from that domain name to the new website with the new domain name. Tillery argued that continuing to utilize the domain name “leonardtillery.com” constituted a violation of his trademark rights. The source code of the Firm’s website still contained Tillery’s name, including in old press releases as well as cashed web pages stored by Google included his name and photographs.

Tillery brought a motion for preliminary injunction. The United States District Court, Eastern District of Pennsylvania denied the preliminary injunction on the grounds that Tillery did not prove a likelihood success, but addressed several issues of interest to practicing attorneys. (Tillery v. Leonard & Sciolla, 437 F.Supp.2d 312.)

Personal names can become protected trademarks, but are considered “descriptive” and, as such, the owner must be able to establish a showing of distinctiveness and secondary meaning. A name acquires secondary meaning “‘when the name and the business become synonymous in the public mind’ and secondary meaning ‘submerges the primary meaning of the name of the word identifying a purpose, in favor of its meaning as a word identifying that business.’” (Tillery, supra, 437 F.Supp.2d at 321, citing to McCarthy on Trademarks, 13.3.)

Tillery failed to satisfy his burden in connection with the motion for preliminary injunction. The evidence established that Tillery only used his name in conjunction with the names of his partners and never used his name alone to market his services. Tillery also had not submitted any survey evidence to establish evidence of secondary meaning. Tillery did not cite, and the court could not find, any authority granting trademark protection to a lawyer’s name used solely in connection with the provision of legal services.

The Court, in further analyzing Tillery’s claims of trademark protection, conducted the analysis required by Checkport Systems v. Checkpoint Software Tech., 269 F.3d 270, 280 (Third Cir., 2001) to analyze the likelihood of confusion. These factors are similar to the factors described by the Ninth Circuit in AMF Incorporated v. Sleekcraft Boats, 599 F.2d 341, 348-49 (Ninth Cir., 1979). The Court’s analysis of those factors further established that Tillery did not have a likelihood of success.

The Court further determined that Tillery had failed to establish any irreparable harm. In fact, in the balancing of the equities, the Court found that the Firm’s continued maintenance of the domain name “leonardtillery.com” as well as redirecting any emails sent to its employees at that same extension would burden the Firm far greater than any burden upon Tillery. Tillery could not explain how he was harmed when an employee of the Firm received an email addressed to that person ending with “@leonardtillery.com.”

The Court’s decision in Tillery v. Leonard & Sciolla provides guidance to law firms in the ever-changing area of law firm management concerning appropriate steps to take upon the departure of a named partner and what, if any, residual rights it may have in its past use of domain names and email extensions. The California Rules of Professional Conduct address the issues related to the use of a former partner’s name in the firm name, but are silent as to the more modern uses in connection with websites and domain names. Care should be taken to promptly evaluate these issues upon the departure of a named partner.

David Adams Joins Weintraub Genshlea Chediak as Shareholder

Download: David Adams Press Release.pdf

For Immediate Release

SACRAMENTO, Calif., May 3, 2007 — Weintraub Genshlea Chediak, a leading Sacramento-based business and litigation law firm with one of the largest corporate and securities practices in the region, recently added David C. Adams as a shareholder. Adams, a prominent corporate securities lawyer in the area, will join the firm’s corporate, securities and intellectual property practice group.

“This is a terrific addition to our firm,” said Gary Bradus, Weintraub’s managing partner. “Welcoming David back to the firm is particularly exciting. His experience at both larger and smaller firms has given him extensive experience and knowledge in the corporate and securities law areas as well as corporate operations.”

“This is a great gain for us. David is one of the few high impact corporate attorneys in town,” said Chris Chediak, head of the firm’s corporate practice group. “In recent years he has represented many of the leading public and private companies in the area and worked with companies on major transactions, such as last year’s $300 million acquisition of International Display Works by Flextronics. He advises companies in a wide range of industries including life sciences and alternative energy technologies, which we see as growth areas for the region. He’s a perfect fit for our established finance and public company practice.”

“We’re fortunate to have been able in the last few years to attract some great lateral attorneys into the corporate group including Kevin Kelso and Mike DeAngelis, who together had practiced over 25 years in the Bay Area with some of the top corporate firms in the country,” said Bradus. “We also have a progressive and growing intellectual property and entertainment/media practice. With the addition of David, we’re continuing our plan of high quality growth.”

Adams was previously an associate attorney with Weintraub in the 1990s. Before returning to Weintraub, Adams was a shareholder at the Sacramento office of Bullivant Houser Bailey PC, and was previously a shareholder at Bartel Eng & Schroeder, a corporate securities boutique firm, before that firm combined with Bullivant.

“Bullivant is a well-respected firm and it was a difficult decision to leave,” said Adams. “However, Weintraub’s corporate and IP group has been growing in exciting ways, and the opportunity to work with Chris, Gary, Kevin, Mike, Scott Hervey and the others in the group was too good to pass up.”

Adams garnered extensive experience in the biotechnology sector during his employment with ThermoGenesis, a Rancho Cordova-based public biotech company specializing in biomedical research and biomaterials. He served as general counsel and vice president of corporate development. During his time with the company he managed all legal services while also developing and implementing corporate initiatives that resulted in $50 million dollars of new equity funding. He also led efforts to obtain certifications, initiated clinical trials for submission to the U.S. Food and Drug Administration, and developed strategic partnering, licensing and investor relations efforts.

“It’s great to be back and continuing the partnership with Weintraub that began long ago,” said Adams. “This firm is firing on all cylinders right now, has a great group of people and is a terrific place to work.”

Weintraub Genshlea Chediak is a leading full-service Sacramento business and litigation law firm with one of the largest corporate practices in the region. Major practice areas include litigation, real estate, corporate, securities, banking, intellectual property, licensing and distribution, nonprofit law, entertainment, labor and employment, fiduciary abuse, tax, trusts and estates.

The Ninth Circuit Clarifies the “Safe Harbor” Provisions of the Digital Millennium Copyright Act

On March 29, 2007, the Ninth Circuit issued its opinion in the case Perfect 10, Inc. v. CCBill LLC, et al. in which it attempted to clarify when immunity is available to internet service providers for copyright infringement under the Digital Millennium Copyright Act (“the DMCA”), 17 U.S.C §512. Perfect 10, the publisher of an adult magazine and a related subscription website, brought a lawsuit claiming that CCBill and CWIE violated copyright laws by providing services to other websites that posted images stolen from Perfect 10’s magazine and website. CWIE provides web hosting and related internet connectivity services to the owners of various websites. CCBill allows customers to use credit cards or checks to pay for subscriptions or memberships to various websites. The U.S. District Court granted summary judgment in favor of CCBill and CWIE as to the copyright claims finding that they qualified for the “safe harbor” provisions from copyright infringement liability under the DMCA.

The Ninth Circuit began by recognizing that the DMCA created specific “safe harbors” to “provide protection from liability for: (1) transitory digital network communications; (2) system caching; (3) information residing on systems or networks at the direction of users; and (4) information location tools.” While the safe harbor provisions limit liability, they “do not affect the question of ultimate liability under the various doctrines of direct, vicarious and contributory liability.” The Ninth Circuit recognized that to be eligible for any of the four safe harbor provisions, a service provider must first meet the threshold requirements set out in section 512(i). Specifically, a service provider such as CCBill or CWIE must have “adopted and reasonably implemented, and informed subscribers and account holders, of . . . a policy that provides for the termination in appropriate circumstances of subscribers and account holders . . . who are repeat infringers.” (17 U.S.C. § 512(i)(1)(A).)

The Ninth Circuit observed that the DMCA does not define “reasonably implemented,” but held that “a service provider ‘implements’ a policy if it has a working notification system, a procedure for dealing with DMCA – compliant notifications, and if it does not actively prevent copyright owners from collecting information needed to issue such notifications.” While the DMCA allows a service provider to implement a variety of procedures, a policy implementation is reasonable if under “appropriate circumstances” the service provider “terminates users who repeatedly or blatantly infringe copyright.”

In turning its attention to these factors, the Ninth Circuit addressed Perfect 10’s claim that CCBill and CWIE prevented the implementation of their policies by failing to track webmasters who repeatedly infringed. The Ninth Circuit disagreed and found that CCBill/CWIE had implemented a policy of tracking repeated infringers. The Court recognized that CCBill and CWIE posted a “DMCA Log” which attempted to identify those webmasters who were repeat infringers. The DMCA Log, although having some gaps, indicated the email address and/or name of those webmasters who routinely infringed. Therefore, there was no triable issue of fact that CCBill and CWIE implemented a repeat infringer policy.

As to the issue of reasonableness, the Ninth Circuit recognized that “[a] service provider reasonably implements its repeat infringer policy if it terminates users when ‘appropriate’.” The Ninth Circuit again recognized that the DMCA does not define when it is “appropriate” for service providers to act. The Court emphasized, however, that service providers do not need to “affirmatively police its users for evidence of repeat infringement.” This is premised on the fact that the DMCA provides that a service provider is not liable for monetary relief “if it does not know of infringement.” The Court also observed that the DMCA provides that a service provider is not liable “if it acts ‘expeditiously to remove, or disable access to, the material’ when it (1) has actual knowledge, (2) is aware of facts or circumstances from which infringing activity is apparent, or (3) has received notification of claimed infringement meeting the requirements of § 512(c)(3).”

The Ninth Circuit found that Perfect 10’s claimed notice of infringement did not give rise to a triable issue of fact since it did not substantially comply with the notice requirements of section 512(c)(3). The Ninth Circuit ruled that compliance is not “substantial” if the notice complies with only some of the requirements of § 512(c)(3)(A). The Court held that the DMCA requires “substantial compliance with all of section 512(c)(3)’s clauses, not just some of them.” The Court rejected Perfect 10’s claims that it had substantially complied with 512(c)(3) since it claimed that its notices were provided in a “combination of three sets of documents.” The Ninth Circuit recognized that each of these communications contained more than mere technical errors, rather, one or more of the required elements were entirely absent from the notices. The Ninth Circuit recognized that substantial compliance with section 512(c)(3) is necessary because of the drastic consequences of accusations of alleged infringement: i.e., a user could have content removed or may have his access terminated entirely. Since Perfect 10 did not provide effective notice, the Ninth Circuit held that actual knowledge of infringement could not be imputed to CCBill/CWIE based on Perfect 10’s communications.

In granting summary judgment, the District Court had held that notices of infringement sent to CCBill and CWIE by other, non-party copyright holders were not relevant to the issue of Perfect 10’s claims of copyright infringement. However, the Ninth Circuit disagreed and ruled that CCBill/CWIE’s actions toward copyright holders who were not parties to the litigation was “relevant in determining whether they reasonably implemented their repeat infringer policy.” The Ninth Circuit recognized that a “policy is unreasonable only if the service provider fails to respond when it had knowledge of an infringement.” Thus, the Ninth Circuit held that the District Court on remand must consider whether CCBill and/or CWIE “implemented its repeat infringer policy in an unreasonable manner with respect to any copyright holder other than Perfect 10.”

Finally, the Ninth Circuit held that a service provider “may lose immunity if it fails to take action with regard to infringing material when it is ‘aware of facts or circumstances [“red flags”] from which infringing activity is apparent.’” Perfect 10 argued that CCBill/CWIE were aware of a number of “red flags” since it provided service to various websites such as illegal.net and stolencelebritypics.com. The Ninth Circuit rejected this argument, however, ruling that there was nothing in these titles to put CCBill/CWIE on notice of apparent infringing activity since these “titillating” titles “may be an attempt to increase their salacious appeal rather than an admission that the photographs are actually illegal or stolen.”

Perfect 10 also argued that CCBill was not entitled to immunity because it interfered with “standard technical measures” by blocking Perfect 10’s access to CCBill-affiliated websites in order to prevent Perfect 10 from discovering whether those websites infringed on Perfect 10’s copyrights. The Ninth Circuit remanded to the District Court to determine “whether access to a website is a ‘standard technical measure’ and if so whether CCBill interfered with [Perfect 10’s] access.”

CCBill argued that, because it provides a hyperlink so that a user may access a client website after it processes that user’s credit card, it fell under the “information location tools” safe harbor of section 512(d). The Ninth Circuit found that even if the hyperlink provided by CCBill could be viewed as “information location tool,” the majority of CCBill’s activities fall outside of the safe harbor. The Ninth Circuit recognized that section 512(b) provided immunity only for the infringement “by reason of the provider referring or linking users to an online location containing infringing material or infringing activity.”

The Ninth Circuit’s opinion in Perfect 10 requires copyright holders to remain vigilant and observe strict compliance with the notice of infringement requirements in the DMCA. Otherwise, a service provider can claim that it did not have actual knowledge of the infringing activity because of the defective notice. A copyright holder then risk being thrown out of court for failing to comply with these notice requirements if a service provider can establish immunity under the “safe harbor” provisions of the DMCA.