Welcome to the Weintraub Resources section. Here, you can find our Blogs, Videos, and Podcasts, in which Weintraub attorneys regularly provide insights and updates on legal developments. You can also find upcoming Weintraub Events, as well as firm and client News.


Host A Website And Get Sued For Trademark Infringement- Possible Under California’s Model Trademark Law

According to the Department of Commerce, losses to U.S. businesses from the counterfeiting of trademarked consumer products are estimated at $200 billion a year. A model trademark law proposed by the International Trademark Association and currently winding its way through the legislative process in California includes a provision which appears to be an attempt to slow this ever growing enterprise.

The proposed new trademark law provides that the owner of a state registered mark may bring an action for infringement against any persons that “knowingly facilitate, enable, or otherwise assist a person to manufacture, use, distribute, display, or sell any goods or services bearing any reproduction, counterfeit, copy, or colorable imitation of a mark registered under this chapter, without the consent of the registrant.” Under the new trademark law, a person is presumed to have acted knowingly if that person continues to engage in the complained of activity following delivery and receipt of a cease and desist demand letter containing certain language and information.

In the case of brick and mortar commerce, this provision appears to be entirely reasonable. If a landlord leasing retail space to a business receives a cease and desist letter from a mark owner, the landlord has the ability to visit the property and investigate the claim. Likewise, a swap meet operator receiving such a cease and desist letter can investigate the claim and, presumably after personally inspecting the complained of goods, would have the ability to determine whether the goods are infringing or legitimate. Given the ability to reasonably investigate any such infringement claims, it is reasonable that persons akin to landlords and swap meet operators bear some responsibility for merchandise sold on their premises. However, the question being posed now by Internet activists such as the Electronic Frontier Foundation is how such a provision will play out in cyberspace.

While companies such as Google, Yahoo and eBay have a large enough legal department to handle the predicted onslaught of cease and desist letters, smaller providers would be hard pressed to deal with the receipt a significant number of cease and desist letters in a cost efficient manner. Rather than face litigation and any possible adverse judgment, its likely that a smaller provider would rather terminate service to the alleged infringer.

Cease and desist letters sent under California’s proposed new trademark law appear somewhat related in function to the “takedown notices” under the Digital Millennium Copyright Act. The takedown provisions of the DMCA essentially compels an internet service provider to disable access to material allegedly infringing the complainant’s copyright or otherwise face the loss of immunity from claims of contributory infringement. Similarly, under the proposed trademark law, an ISP who receives a cease and desist demand could face a trademark infringement claim if it continues to provide access for the infringer or otherwise continues to facilitate the infringing activity.

What about if the alleged infringer is not engaged in any infringing activity, or the complaining party is compelled by a desire to hobble its competition? Under the DMCA, the alleged infringer may send the ISP a counter notice claiming non-infringement. If the ISP receives a proper counter notice the ISP is prevented from disabling access to the complained of material and maintains its immunity from contributory infringement. However, under the proposed trademark law if the alleged infringer insists that it is not engaged in any infringing activity the ISP is stuck between the proverbial rock and a hard place; the ISP is left to decide what it must do. If the ISP believes the alleged infringer, who may also be the ISP’s customer, but later turns out to be wrong, the ISP could face infringement liability. If the ISP terminates service to its customer and it is later determined that its customer was not engaging in any infringing activity, the ISP could possibly face a breach of contract claim. Even if the ISP has language in its contract which allows it to terminate the customer’s contract, firing a customer is not good for business.

Given the prospect of litigation or the fallout from firing a customer, ISPs and other service providers would rather terminate a contract then face litigation. An unscrupulous brand owner could take advantage of this by sending cease and desist letters to end truthful but unfavorable comparative advertising or other non-infringing uses of its marks. Unless the California legislature further amends its proposed trademark law to address the untenable position ISPs and service providers would be placed in, brand owner bullying is certain to occur.

Interactive Websites May Lose Protection Under the Communications Decency Act

On May 15, 2007, the 9th U.S. Circuit Court of Appeals created a significant exception to the immunity granted to a website operator under 47 U.S.C. § 230 “The Communications Decency Act” (“CDA”). The court held that Roommate.com can be held liable for publishing content from member questionnaires created by using drop-down menus and distributing member profiles, but is immune from liability for publishing users’ responses to open-ended fields or questions. (Fair Housing Council of San Fernando Valley v. Roommate.com, LLC, 2007 WL 1412650 (9th Cir.). With this recent ruling, website operators will need to determine when the protection provided by the CDA for Internet services applies to its site.

Roommate.com (“Roommate”) operates an online roommate matching website which helps people find roommates based on the descriptions and living preferences they provide. Roommate offers free membership, and members must simply provide answers to drop-down menus about themselves and the characteristics they are looking for in a potential roommate. The website also allows for “Additional Comments” by members in an open-ended box. The website then creates member profiles and sends e-mails to potential matches which then allows for members to view each other’s profiles and “Additional Comments.”

The Fair Housing Council of San Fernando Valley sued Roommate for violating the Fair Housing Act (“FHA”) and other state laws because it requires individuals to complete its questionnaires in order to qualify for its housing service, and allows individuals to state housing preference based on age, sex, sexual orientation, and presence of children in its drop-down menus (and presumably any other qualification the user posts in its “Additional Comments” about race, religion, etc.). The U.S. District Court for the Central District of California ruled that the protection given by the CDA barred the plaintiff’s claim of FHA violations, and granted summary judgment to Roommate.

On appeal, the Court reviewed whether Roommate qualified for CDA immunity from liability for publishing its membership questionnaires; for publishing and distributing member profiles; and for publishing content provided by members in the “Additional Comments” portion of the profiles. (The Court noted that at this stage of the proceedings it was not ruling on whether Roommate violated FHA, but whether it was immune from liability.) For each category, the question is “whether Roommate is ‘responsible, in whole or in part, for the creation or development of the information.’” Under the CDA, Congress provided immunity for website operators who passively publish content provided by others when the party would otherwise face liability under state or federal laws as a result of publishing the material. However, if an operator is “responsible, in whole or in part, for the creation or development of the information”, the operator moves from being an interactive computer service to an information content provider and loses immunity.

The Court held that Roommate does not qualify for CDA immunity for the publication of the questionnaires and member profiles, but is immune under the CDA from liability for publishing the content members provide in “Additional Comments.” The Court easily disposed of the questionnaire issue, finding that because Roommate created or developed the questionnaire and its answer choices, it was an information content provider under the CDA and could potentially be liable for their publication. The Court had a more lengthy debate about whether Roommate qualified for CDA immunity for publishing and distributing the member profiles. Ultimately the Court focused on how Roommate did not “merely publish information it solicits from its members. . . [but] also categorizes, channels and limits the distribution of users’ profiles.” Roommate “created or developed an additional layer of information” by allowing members to search only the profiles of members who have compatible living preferences, and therefore it loses immunity under the CDA from liability for publishing such information.

On the third issue of immunity for publishing the material in members’ “Additional Comments”, the Court held that Roommate was not involved enough to make it information content provider under the CDA and lose immunity. Because this section has an open-ended question, Roommate did not “prompt, encourage or solicit any of the inflammatory information provided by some of its members, [nor] does Roommate use the information in the ‘Additional Comments’ section to limit or channel access to listings.” Therefore, Roommate is immune from liability for publishing any response by members in “Additional Comments.” The Court reversed and remanded to the District Court to determine whether Roommate violated FHA by publishing the questionnaire and member profiles since the website was not immune under the CDA for that material.

Because of its wide reach, this decision will likely make many websites apprehensive about whether they may be liable for content published on their sites. As it is read now, any search engine or website that channels a user’s data to produce search results, such as Google or Monster, loses immunity under the CDA from liability. As a result, some website operators may choose to provide open-ended questions or fields for users, which will make searches less efficient but which are squarely in the Court’s analysis of conduct that does not lose CDA immunity.

This decision also presents more questions as to the scope of liability immunity under the CDA. The 9th Circuit previously decided Carafano v. Metrosplash.com, Inc. in which an individual created a fraudulent profile for Carafano, an actress, on an on-line dating service with defamatory statements in the profile. Similar to Roommate, the dating website required users to answer questionnaires using drop-down menus with prepared responses and open-ended essay questions. There, the Court held that the dating service was immune under the CDA from liability for publishing this false information. In Roommate, the Court distinguished Carafano by stating that the dating service requested information about the user and not a third party (i.e. a potential roommate) and that the dating service did not request the untrue information that the party submitted about Carafano. Lower courts and website operators may have a difficult time determining when a dispute fits into the Carafano analysis or the Roommate analysis. Additionally, many analysts have argued the 9th Circuit erred in not following what appeared to be precedent in Carafano when it decided Roommate.

Does this decision mean the Internet has to restrict information previously available to users because of increased liability? It appears the answer is no. However, the decision does put pressure on Internet service providers to structure their websites appropriately in order to avoid liability for publishing its users’ content.

The 11th Circuit Reminds All That Copyright Protection For Databases Is Alive And Well

Under contemporary Copyright Law, a database is a “compilation.” A compilation is defined under the Copyright Act as “a work formed by the collection and assembling of preexisting materials or of data….” While the inclusion of a compilation as a protectable work was statutorily introduced in The Copyright Act of 1976, compilations were protected as “books” as early as the Copyright Act of 1790.

In 1991 in Feist Publications, Inc. v. Rural Tel. Serv. Co, the Supreme Court resolved a split among the circuits regarding the elements of a compilation that entitle it protection under the Copyright Act. Certain circuits had adopted what was known as the “sweat of the brow” doctrine which looked at the compiler’s effort – his own expense, skill, labor or money – as the critical contribution justifying protection. Other circuits moved away from the labor/investment approach of the sweat of the brow doctrine, and granted protection to those compilations that were sufficiently original to be considered protectable works of authorship.

In Feist, the United States Supreme Court held that an alphabetical telephone directory of all people living in a particular area lacks sufficient originality and, therefore, was not copyrightable. This decision ended grants of protection based solely on the compiler’s own effort. In addressing the issue of the protectability of compilations of facts, understanding the practical implications of its decision, the court stated:

“[This decision] inevitably means that the copyright of a factual compilation is thin, not withstanding a valid copyright, a subsequent compiler remains free to use the facts compiled in another’s publication to aid in preparing a competing work, so long as the competing work does not feature the same selection and arrangement.”

Although copyright protection for a database may be “thin,” protection still exists. While the data itself, in most cases, escapes protection under copyright, protection is granted to the selection and arrangement of the data. The 11th Circuit recently reminded us that, although thin, copyright protection for a compilation of factual data is alive and well.

In BUC International Corp., v International Yacht Council Limited, the 11th Circuit addressed the plaintiff’s claim that the defendant infringed certain elements of its yacht listing service. The plaintiff obtained information about yachts for sale from yacht brokers, who would fill out a form which plaintiff had created. This information was then compiled into a listing database, searchable by a variety of yacht characteristics and features. The plaintiff made the yacht listing database available to brokers pursuant to a license.

In June of 2000, the defendant began taking steps to create an online multiple listing service which would compete with plaintiff’s service. Like the plaintiff, the defendant solicited listings from brokers. Many of these brokers were licensees of plaintiff’s service. In sending listings to the defendant, many of the brokers would simply copy the listing they had submitted to the plaintiff and the defendant would, in turn, place the listing on its website. Additionally, the defendant had surreptitiously secured passwords to the plaintiff’s service and culled and posted listings, word for word, directly from plaintiff’s service.

On appeal from a district court’s judgment of infringement, the 11th Circuit, discussed Feist and its progeny, and its application to the instant case. With regard to compilations of fact, the court noted that it is the “creatively original selection of facts” that garners protection; the standard for copyright infringement of factual compilations hinges on distinguishing original elements of creative authorship from components in the public domain.

Not all changes or additions to a public domain work is substantial enough to be considered original. In the 2nd Circuit case of Matthew Bender and Company v. West Publishing Company, the court addressed whether the changes West made to the text of federal judicial opinions, namely the “star pagination” feature, was copyrightable. The court found that the changes were insubstantial, unoriginal and uncreative and, therefore, not copyrightable. In coming to this conclusion, the court noted that most of West’s choices were “inevitable, typical, dictated by legal convention, or at best, binary.”

In BUC International, the 11th Circuit considered the way in which the plaintiff selected, categorized, and presented certain factual information about yachts listed for sale, and determined that this was entitled to protection under the Copyright Act. And while the defendant may have been entitled to the underlying information, it could not arrange, organize or display this information in a manner that was substantially similar to the way in which plaintiff arranged, organized and displayed the same information. Because the defendant listed the data in the exact same way, and in the exact same manner as plaintiff, the 11th Circuit upheld the trial courts finding of infringement and a damage award in excess of one million dollars.

While this case does not offer a new twist on Feist, it does serve as a good reminder of the extent of protectability of factual complications. Under Feist a third party may copy and freely use any factual information contained in a database, as long as the third party does not use the same selection and arrangement.

Copyright Infringement and the Internet: A Closer Look at Perfect 10 v. Google and Amazon

By Andrea Anapolsky

On May 16, 2007, the 9th U.S. Circuit Court of Appeals sent a mixed message to search engines everywhere – publishing thumbnail images is legal, but a search engine may still be liable if it links customers to other sites that publish certain thumbnail images without authorization. (Perfect 10, Inc. v. Amazon.com, Inc., CV-05-04753-AHM (9th Cir. May 16, 2007) With this ruling, what’s next in the battle between advocating for the free flow of information on the Internet and protecting copyrighted material?

Perfect 10, Inc. (“Perfect 10”) an adult entertainment company that allows subscribers access to nude photos on-line, sued Google, Inc. (“Google”) in 2004 for publishing its photos as tiny images known as “thumbnails” which appear in a user’s search results. When a Google user types in a search and clicks on the resulting thumbnail, the page splits into two frames – the top of the page has the thumbnail with a warning it may be subject to copyright, and the bottom of the page has a full-size image from a third-party website. Perfect 10 alleged Google infringed its copyrights by using its images in thumbnails and by linking users to websites that re-published their photos without authorization.

A U.S. District Court judge last year issued a preliminary injunction against Google, finding that the search engine directly violated Perfect 10’s copyrights by displaying the thumbnail, but noted that Google could not be held liable for a user who is directed to a site that contains illegal copies of Perfect 10’s photos. The 9th Circuit’s opinion overturned this earlier ruling. The Court ruled the display of a thumbnail was considered “fair use” under copyright law, but that search engines could possible be held liable when they act as a intermediary between a user and a website that contains illegal copies. The Court remanded the case on this second issue.

Due to Google’s worldwide reputation, this case received substantial attention; however, it is clear that the 9th Circuit was simply following precedent. In 2003, the 9th Circuit decided Kelly v. Arriba Soft Corporation, a similar case to Perfect 10 v. Google. (Kelly v. Arriba Soft Corporation, 280 F.3d 934 (CA9 2002)) In the Kelly case, the plaintiff (Kelly) was a photographer who had copyrighted many of his photos; the defendant (Arriba Soft Corporation) was an internet search engine. Arriba displayed its results in the form of thumbnails and Kelly sued when he discovered that his photographs were part of the search engine’s database. The Court held that Arriba’s thumbnails were considered fair use and that Arriba did not violate Kelly’s copyright.

The 9th Circuit used much of its reasoning and analysis from Kelly in the Perfect 10 v. Google decision. In determining that Google did not infringe on Perfect 10’s copyrights, the Court stated that Google’s images fell under the fair use defense, which allows for the use of copyrighted works without the copyright owner’s permission in certain situations. Using the statutory factors for fair use set out in 17 U.S.C. § 107, the Court emphasized that the use of thumbnails was “highly transformative” and that the search engine provides important social and public benefits. The Court further held that Google did not directly infringe on Perfect 10’s copyrights by displaying full-size images – Google simply provides HTML instructions to a user’s browser that direct the browser to the images on the third party website. “[P]roviding these HTML instructions is not equivalent to showing and housing a copy.” The Court leaves no doubt that the use of such full-size images and thumbnails on websites is legal and permissible under the United States Copyright Act, Title 17, United States Code.

However, the ruling does leave open the possibility that search engines could be liable for linking users to websites that illegally display full-size images of copyrighted works. The Court remanded the case for determination of whether Google could be held liable for infringement on Perfect 10’s full-size images. The Court, drawing on its rulings in previous cases, held that “a computer system operator can be held contributorily liable if it ‘has actual knowledge that specific infringing materials are available using its system’, and can ‘take simple measures to prevent further damage’ to copyrighted works, yet continues to provide access to infringing works.” While the District Court is charged with determining Google’s liability, the 9th Circuit may have suggested its preference by stating that “there is no dispute that Google substantially assists web sites to distribute their infringing copies to a worldwide market and assists a worldwide audience of users to access infringing material. . . and we cannot discount the effect of such a service on copyright owners.”

A decision in favor of Perfect 10 would significantly alter the manner in which search engines operate, and could easily expose other websites to similar liability issues. Due to the popularity of Google and other search engines, it is possible that the U.S. Supreme Court may have the final word on this matter. In the meantime, search engines may consider taking preventative measures by adding additional warnings in its search results when a search engine includes protected thumbnail images that link to third-party websites.

Is That Expensive Custom Computer Program Really Yours?

Custom and customized computer programs create unique challenges under the Copyright Act. More and more companies have custom software written by outside programmers to automate the company’s unique business processes. Great care should be taken when a company uses outside vendors, rather than its own employees, to create the custom computer programs. Written agreements are essential. Many companies have been surprised to discover, after spending dearly for a custom software program, that the outside programmer retained the copyrights in the software and could repackage the software for sale to others simply because there was no written copyright assignment. Custom programming contracts must be carefully negotiated in order to protect a company’s investment in the newly created computer program as well as its proprietary business processes and trade secrets.

Copyright laws were designed to protect the authors of creative works from having those works stolen or misused by others. An author’s copyright ownership of the work cannot be transferred to another, absent a written agreement. Oral agreements to transfer copyright ownership are unenforceable and the traditional concepts of estoppel or waiver do not apply.

Outside software programmers are becoming very sophisticated and often desire to retain all copyrights in any of the work they create. Those who use outside programmers must become equally sophisticated to protect their rights. One critical way to facilitate protection is to insist that the written engagement agreement specifically provide that all copyrights in the custom or customized software are expressly assigned to the company. Outside consultants and programmers often do not readily agree to a blanket assignment of all copyrights to a customer because much of the source code to be utilized in the project may have existed before the engagement, or may relate to the consultant’s fundamental ability to write code for others. This tension between the programmer’s interests and the client’s interests can be especially problematic if the custom software project is part of a business reengineering process and the consultant believes he contributes unique elements to the reengineered business processes.

Computer programs contain both literal and non-literal aspects. The literal component of computer software is the actual source code itself, which provides instructions to the computer. The non-literal aspects of the copyright include components such as screen design and the structure, sequence and engagement of the user interface. Non-literal elements of the program must be reduced to some tangible expression – not just a concept – to be copyrightable. Although source code itself is generally recognized to be copyrightable because it is normally an original and tangible work, non-literal elements of the program are more difficult to establish. Most likely, non-literal program aspects are supplied by the company as a result of active participation in defining and designing the user interface and actually outlining the steps and processes that the software is to complete. The absence of a clear written copyright assignment in the software will result in a confusing mix of multiple “authors” of the program, all of whom would theoretically have equal rights to use and sell the program with only a duty of accounting to other co-authors. Even though the company would have some authorship rights in the program, the outside programmer could still use, modify and resell the program to others to the detriment of the company that originally contracted for the work.

Computer consultants will often use outside independent contractors to perform the actual coding of the source code. Care must be taken to ensure that the outside consultant has obtained written assignments from any independent contractors used on the project. If not, a company may be confronted with a future problem where a programmer who was an independent contractor to the prime computer consultant appears seemingly out of nowhere and begins to market similar software in which the company believed it had the sole and exclusive right. Absent written copyright assignments from all programmers utilized by the outside consultant, there is a risk that the work for which the company has clearly paid will soon be available off the shelf to its competitors.

A company does have additional legal tools available to prevent the unwarranted disclosure or use of the custom program, even if there was no written assignment of the copyrights. Trade secret law continues to protect trade secrets that are incorporated into the program even without a written agreement. If the software contains the company’s trade secrets, effectively protecting those trade secrets may essentially prevent the author of the software from ever commercializing the program. The company will have the burden of establishing all the traditional elements of trade secret protection including that: the information constitutes knowledge not generally known in the industry; reasonable efforts were taken to maintain secrecy; the programmer had knowledge that the trade secrets were to remain confidential; and that the trade secrets had actual economic value.

Custom and customized computer programming issues are pushing the envelope of copyright law. Blending literal and non-literal aspects of custom computer software programs makes it difficult to identify the actual author of various components of the work. Alternative methods of writing source code to accomplish the same step or process, plus the various programming tools used by the programmers, makes isolating the author of each software component even more confusing and complicated. The only way to effectively protect the interests of both sides is to execute a complete and thoughtful written agreement clearly setting forth copyright ownership rights in the final product. As outside programmers and their clients continue to work together to create custom and customized software programs, the need for a clear written understanding of the rights and expectations of both parties must be established at the beginning of the relationship and continually evaluated as the relationship unfolds.

Collage Ads & Copyright Infringement

In Jarvis v. K2 Inc. (April 30, 2007), the Ninth Circuit held that a retailer’s use of collage advertisements containing copyrighted photos was not covered by the “collective works” privilege and, thus, the retailer could be liable for copyright infringement.

Jarvis, a professional photographer, and K2, a sporting goods maker, entered into a series of agreements from 1999 to 2002. Under these agreements, Jarvis submitted photographs to K2 in exchange for compensation. K2 could publish the images provided by Jarvis in its marketing materials and on its website so as to market its business. The agreement called for K2 to include an attribution credit for each use of Jarvis’ images. Under the last agreement between Jarvis and K2, K2’s rights to use the photos expired in May 2003.

Jarvis provided more than 4,000 slides to K2, the bulk of them during 2000-2001. 24 of Jarvis’ images were incorporated into four “collage” advertisements that were initially published as magazine inserts prior to May 2003. These collage ads combined edited versions of Jarvis’ images with other images, marketing graphics and promotional slogans.

The relationship between Jarvis and K2 eventually soured and K2’s contractual rights to use Jarvis’ images expired. Nevertheless, K2 scanned the previously used collage ads and displayed them on its website after May 2003. Jarvis filed a lawsuit against K2 alleging, among other things, copyright infringement for the use on its website of the 24 photographs in K2’s collage advertisements.

The trial court granted summary judgment in Jarvis’ favor as to most of his other claims and awarded him damages. However, the trial court ruled that the collage advertisements, which contained 24 images that would have otherwise infringed on Jarvis’ copyrights, constituted “collective works” and thus were privileged under 17 U.S.C. section 201(c). Jarvis appealed this finding to the Ninth Circuit.

Jarvis argued that a 2001 agreement with K2 applied to the images in the collage ads and did not permit the images to be used in any way by K2 after May 2003. He argued that the trial court erred in ruling that the collage ads were protected as “collective works.”

The Ninth Circuit recognized that the 2001 agreement authorized K2 to “publish” Jarvis’ images and that K2 acted within its rights when it first used the collage ads prior to May 2003 for the magazine inserts. Although K2 conceded that its display of the collage ads after the May 2003 termination date was not authorized by the agreement, K2 argued that the collage ads fell under the “collective works” privilege of section 201(c).

Section 201(c) provides in pertinent part: “In the absence of an express transfer of the copyright or of any rights under it, the owner of copyright in the collective work is presumed to have acquired only the privilege of reproducing and distributing the contribution as part of that particular collective work, any revision of that collective work, and any later collective work in the same series.” The Ninth Circuit, however, rejected K2’s argument (and the finding of the trial court) and held that the ads were not “collective works,” but rather, improper “derivative works.”

The Ninth Circuit recognized that section 201(c) protects only collective works. A “collective work” is defined as “a work, such as a periodical issue, anthology, or encyclopedia, in which a number of contributions, constituting separate and independent works in themselves, are assembled into a collective whole.” (See 17 U.S.C. §101.) A “derivative work,” on the other hand, is defined as “a work based upon one or more preexisting works, such as a translation, musical arrangement . . . art reproduction, abridgment, condensation, or any other form in which a work may be recast, transformed, or adopted. A work consisting of editorial revisions, annotations, elaborations, and other modifications which, as a whole, represent an original work of authorship, is a `derivative work’.” (Id.)

Using these statutory definitions, the Ninth Circuit found that the collage ads were derivative in nature rather than collective works. Jarvis delivered all of his images to K2 in the form of identical square slides. K2’s collage ads did not merely compile these slides as a typical album might. Rather, K2 “shrank, expanded, distorted, overlaid and otherwise edited the original images, while also combining them with photos taken by other photographers, additional graphics, the K2 logo and marketing slogans.”

The Ninth Circuit found that the changes K2 made to Jarvis’ images were examples of “recasting, transforming or adopting” and “editorial revisions, annotations, elaborations or other modifications” that define “derivative works.” The Ninth Circuit recognized that Jarvis delivered the images to K2 in one form and they were subsequently used in the collage ads in a different (though still recognizable) form. K2’s ads did not simply compile or collect Jarvis’ images, but rather, altered and infused them with other images and artistic elements into new works that were based on, i.e., derivative, of Jarvis’ original images.

K2 attempted to argue that its collage ads “in no way transformed or altered [Jarvis’] preexisting photographs.” The Ninth Circuit rejected this argument by finding that “even a cursory look at the ads which `transformed or altered’ Jarvis’ photographs in a variety of ways, demonstrates the weakness of this claim.”

K2 also argued that the collage ads that appeared on its website were the same ones that had been used as original magazine inserts. The Ninth Circuit found this to be irrelevant since “a derivative work remains derivative when it is scanned and placed on line just as a collective work would remain collective if it were transferred from one medium to another.”

Having found that K2’s four collage ads were derivative rather than collective works, the Ninth Circuit ruled that K2 had infringed on Jarvis’ copyrights as to the 24 images that were used in K2’s collage ads. The Court remanded the matter to the trial court to determine the amount of Jarvis’ damages. The Ninth Circuit further noted that because some of the images used in the collage ads appeared to have been registered by Jarvis before their infringement, Jarvis may be entitled to statutory damages and attorney’s fees under sections 412 and 504(c)(1). Jarvis could also show that K2’s infringement was “willful” under section 504(c)(2) thereby increasing the amount of available statutory damages.

The Ninth Circuit’s ruling in the Jarvis case requires that advertisers pay special attention to their use of copyrighted images in “collage” type advertisements. If copyrighted images are modified, transformed or included with other artists images, the advertiser may be unable to take advantage of the collective works privilege of section 201(c). This could expose the advertiser to substantial damages for copyright infringement.

Over Installing Software May Subject A Company to Liability for Copyright Infringement

Its that time again; time to upgrade your computer operating system and associated programs. Microsoft’s new operating system, Vista, is coming pre-installed on new computers and laptops, along with new versions of Microsoft Word, Excel and Outlook. Along with Vista, other business software manufactures are taking this opportunity to roll out upgrades and offer entirely new programs.

Anytime a company decides to upgrade or purchase a new program which has to be rolled out to a significant number of users, the company’s IT department faces a very big task – to install numerous copies of the program in as time efficient manner as possible. The IT department may face even greater challenges where users of a particular program are not assigned to one specific computer workstation but need to have access to the program on multiple computer work stations. To deal with this situation, instead of individually installing the program onto each machine, the IT department may use hard drive imaging-copying the complete content of a master hard drive on to the hard drive of individual computers. Where a company has purchased a limited number of licenses to a program, but must install it on a larger number of computer stations, an IT department may configure access to the program such that only a particular number of users have access to it at any one time. Depending on the type of software license the company acquired, this could be the prelude to a Copyright infringement lawsuit.

Software can be licensed to users in a variety of different manners. Some software companies license software for a flat fee and allow for an unlimited number of users on an unlimited number of computers. Others may supply the software for free but require the licensee to subscribe to a service contract. Others grant a license on a per user or per computer station basis. Where a company has acquired a license which allows the software to be installed on an unlimited number of computers, over installation is not an issue. Likewise, where a company has acquired a license which allows use by no more than a particular number of users at any one time, regardless of the number of computer stations on which the software is installed, as long as the software is configured to limit access accordingly, over installation may not be an issue. However, where a company is granted a license on a per computer station basis, over installation, regardless whether or not the program is configured to limit access, can be very problematic.

In Wall Data Incorporated v. Los Angeles County Sheriff’s Department the L.A. county Sheriff’s department faced a similar problem. It had acquired 3,663 licenses to a particular computer program for use in the jail facility. Because of the mobility of the officers working in the jail facility, the Sheriff’s department determined it needed to have the program installed on 6,007 computer stations. The Sheriff’s department configured the program such that only 3,663 users were allowed to access the program at any one time.

The license grant in the Sheriff’s license agreement provided as follows:

Wall Data … grants you (“You”), the end user, a non-exclusive license to use the enclosed software program … on a single Designated Computer for which the software has been activated. A “Designated Computer” is either (i) a stand-alone workstation, or (ii) a networked workstation which does not permit the Software to be shared with other networked workstations. You may not use the Software in any other multiple computer or multiple user arrangement. You may not use the Software other than on a Designated Computer, except that You may transfer the Software to another Designated Computer and reactivate it for use with such other Designated Computer not more than once every 30 days, provided that the Software is removed from the Designated Computer from which it is transferred.

On appeal, the Ninth Circuit upheld the lower court’s trial verdict of copyright infringement in favor of Wall Data. The Court found the license agreement to be very specific regarding the number of computers on which the program could be installed and that it did not allow for over installation. The Court stated that the Sheriff’s department should have negotiated for the flexibility it desired rather than buying a few licenses and installing the program on practically all its computers. The over installation of the program in violation of the terms of the license grant constituted indefensible copyright infringement.

The lesson to be learned is not to brush aside the shrink wrap license agreement that comes with pre-packaged computer software, or click “OK” on the click wrap license agreement that comes with downloadable software. Be sure to read and understand them first before you take any action which you may later regret.

Departing Partners: Is Their Name a Protected Trademark

There always has been a few simple things to do when a named partner leaves a law firm: change the name of the firm, stationery and business cards, and send a notice to clients. Today, additional tasks include changing web page domain names, email addresses, and websites. Is that enough? One intellectual property attorney in Pennsylvania thought not and filed suit against his former firm alleging violation of federal and state unfair competition and trademark law and the federal Anti-Cybersquatting Consumer Protection Act, among other causes of action.

The plaintiff, and departing partner, was M. Kelly Tillery (“Tillery”). Tillery brought his suit against his former law firm, now renamed Leonard & Sciolla (the “Firm”). Tillery was once a named partner of the Firm. The Firm changed its name, letterhead, business cards, and advertisement. The Firm also changed its domain name to remove reference to Tillery and edited its website to remove Tillery’s name and delete the link to his resumé. Nevertheless, Tillery sued, claiming he had a protectable trademark in his name and that the Firm infringed his trademark because the Firm retained the old domain name “leonardtillery.com.” Even though the Firm changed its domain name to “leonardsciolla.com,” it continued to maintain the domain name “leonardtillery.com,” but created a link redirecting users from that domain name to the new website with the new domain name. Tillery argued that continuing to utilize the domain name “leonardtillery.com” constituted a violation of his trademark rights. The source code of the Firm’s website still contained Tillery’s name, including in old press releases as well as cashed web pages stored by Google included his name and photographs.

Tillery brought a motion for preliminary injunction. The United States District Court, Eastern District of Pennsylvania denied the preliminary injunction on the grounds that Tillery did not prove a likelihood success, but addressed several issues of interest to practicing attorneys. (Tillery v. Leonard & Sciolla, 437 F.Supp.2d 312.)

Personal names can become protected trademarks, but are considered “descriptive” and, as such, the owner must be able to establish a showing of distinctiveness and secondary meaning. A name acquires secondary meaning “‘when the name and the business become synonymous in the public mind’ and secondary meaning ‘submerges the primary meaning of the name of the word identifying a purpose, in favor of its meaning as a word identifying that business.’” (Tillery, supra, 437 F.Supp.2d at 321, citing to McCarthy on Trademarks, 13.3.)

Tillery failed to satisfy his burden in connection with the motion for preliminary injunction. The evidence established that Tillery only used his name in conjunction with the names of his partners and never used his name alone to market his services. Tillery also had not submitted any survey evidence to establish evidence of secondary meaning. Tillery did not cite, and the court could not find, any authority granting trademark protection to a lawyer’s name used solely in connection with the provision of legal services.

The Court, in further analyzing Tillery’s claims of trademark protection, conducted the analysis required by Checkport Systems v. Checkpoint Software Tech., 269 F.3d 270, 280 (Third Cir., 2001) to analyze the likelihood of confusion. These factors are similar to the factors described by the Ninth Circuit in AMF Incorporated v. Sleekcraft Boats, 599 F.2d 341, 348-49 (Ninth Cir., 1979). The Court’s analysis of those factors further established that Tillery did not have a likelihood of success.

The Court further determined that Tillery had failed to establish any irreparable harm. In fact, in the balancing of the equities, the Court found that the Firm’s continued maintenance of the domain name “leonardtillery.com” as well as redirecting any emails sent to its employees at that same extension would burden the Firm far greater than any burden upon Tillery. Tillery could not explain how he was harmed when an employee of the Firm received an email addressed to that person ending with “@leonardtillery.com.”

The Court’s decision in Tillery v. Leonard & Sciolla provides guidance to law firms in the ever-changing area of law firm management concerning appropriate steps to take upon the departure of a named partner and what, if any, residual rights it may have in its past use of domain names and email extensions. The California Rules of Professional Conduct address the issues related to the use of a former partner’s name in the firm name, but are silent as to the more modern uses in connection with websites and domain names. Care should be taken to promptly evaluate these issues upon the departure of a named partner.

The Ninth Circuit Clarifies the “Safe Harbor” Provisions of the Digital Millennium Copyright Act

On March 29, 2007, the Ninth Circuit issued its opinion in the case Perfect 10, Inc. v. CCBill LLC, et al. in which it attempted to clarify when immunity is available to internet service providers for copyright infringement under the Digital Millennium Copyright Act (“the DMCA”), 17 U.S.C §512. Perfect 10, the publisher of an adult magazine and a related subscription website, brought a lawsuit claiming that CCBill and CWIE violated copyright laws by providing services to other websites that posted images stolen from Perfect 10’s magazine and website. CWIE provides web hosting and related internet connectivity services to the owners of various websites. CCBill allows customers to use credit cards or checks to pay for subscriptions or memberships to various websites. The U.S. District Court granted summary judgment in favor of CCBill and CWIE as to the copyright claims finding that they qualified for the “safe harbor” provisions from copyright infringement liability under the DMCA.

The Ninth Circuit began by recognizing that the DMCA created specific “safe harbors” to “provide protection from liability for: (1) transitory digital network communications; (2) system caching; (3) information residing on systems or networks at the direction of users; and (4) information location tools.” While the safe harbor provisions limit liability, they “do not affect the question of ultimate liability under the various doctrines of direct, vicarious and contributory liability.” The Ninth Circuit recognized that to be eligible for any of the four safe harbor provisions, a service provider must first meet the threshold requirements set out in section 512(i). Specifically, a service provider such as CCBill or CWIE must have “adopted and reasonably implemented, and informed subscribers and account holders, of . . . a policy that provides for the termination in appropriate circumstances of subscribers and account holders . . . who are repeat infringers.” (17 U.S.C. § 512(i)(1)(A).)

The Ninth Circuit observed that the DMCA does not define “reasonably implemented,” but held that “a service provider ‘implements’ a policy if it has a working notification system, a procedure for dealing with DMCA – compliant notifications, and if it does not actively prevent copyright owners from collecting information needed to issue such notifications.” While the DMCA allows a service provider to implement a variety of procedures, a policy implementation is reasonable if under “appropriate circumstances” the service provider “terminates users who repeatedly or blatantly infringe copyright.”

In turning its attention to these factors, the Ninth Circuit addressed Perfect 10’s claim that CCBill and CWIE prevented the implementation of their policies by failing to track webmasters who repeatedly infringed. The Ninth Circuit disagreed and found that CCBill/CWIE had implemented a policy of tracking repeated infringers. The Court recognized that CCBill and CWIE posted a “DMCA Log” which attempted to identify those webmasters who were repeat infringers. The DMCA Log, although having some gaps, indicated the email address and/or name of those webmasters who routinely infringed. Therefore, there was no triable issue of fact that CCBill and CWIE implemented a repeat infringer policy.

As to the issue of reasonableness, the Ninth Circuit recognized that “[a] service provider reasonably implements its repeat infringer policy if it terminates users when ‘appropriate’.” The Ninth Circuit again recognized that the DMCA does not define when it is “appropriate” for service providers to act. The Court emphasized, however, that service providers do not need to “affirmatively police its users for evidence of repeat infringement.” This is premised on the fact that the DMCA provides that a service provider is not liable for monetary relief “if it does not know of infringement.” The Court also observed that the DMCA provides that a service provider is not liable “if it acts ‘expeditiously to remove, or disable access to, the material’ when it (1) has actual knowledge, (2) is aware of facts or circumstances from which infringing activity is apparent, or (3) has received notification of claimed infringement meeting the requirements of § 512(c)(3).”

The Ninth Circuit found that Perfect 10’s claimed notice of infringement did not give rise to a triable issue of fact since it did not substantially comply with the notice requirements of section 512(c)(3). The Ninth Circuit ruled that compliance is not “substantial” if the notice complies with only some of the requirements of § 512(c)(3)(A). The Court held that the DMCA requires “substantial compliance with all of section 512(c)(3)’s clauses, not just some of them.” The Court rejected Perfect 10’s claims that it had substantially complied with 512(c)(3) since it claimed that its notices were provided in a “combination of three sets of documents.” The Ninth Circuit recognized that each of these communications contained more than mere technical errors, rather, one or more of the required elements were entirely absent from the notices. The Ninth Circuit recognized that substantial compliance with section 512(c)(3) is necessary because of the drastic consequences of accusations of alleged infringement: i.e., a user could have content removed or may have his access terminated entirely. Since Perfect 10 did not provide effective notice, the Ninth Circuit held that actual knowledge of infringement could not be imputed to CCBill/CWIE based on Perfect 10’s communications.

In granting summary judgment, the District Court had held that notices of infringement sent to CCBill and CWIE by other, non-party copyright holders were not relevant to the issue of Perfect 10’s claims of copyright infringement. However, the Ninth Circuit disagreed and ruled that CCBill/CWIE’s actions toward copyright holders who were not parties to the litigation was “relevant in determining whether they reasonably implemented their repeat infringer policy.” The Ninth Circuit recognized that a “policy is unreasonable only if the service provider fails to respond when it had knowledge of an infringement.” Thus, the Ninth Circuit held that the District Court on remand must consider whether CCBill and/or CWIE “implemented its repeat infringer policy in an unreasonable manner with respect to any copyright holder other than Perfect 10.”

Finally, the Ninth Circuit held that a service provider “may lose immunity if it fails to take action with regard to infringing material when it is ‘aware of facts or circumstances [“red flags”] from which infringing activity is apparent.’” Perfect 10 argued that CCBill/CWIE were aware of a number of “red flags” since it provided service to various websites such as illegal.net and stolencelebritypics.com. The Ninth Circuit rejected this argument, however, ruling that there was nothing in these titles to put CCBill/CWIE on notice of apparent infringing activity since these “titillating” titles “may be an attempt to increase their salacious appeal rather than an admission that the photographs are actually illegal or stolen.”

Perfect 10 also argued that CCBill was not entitled to immunity because it interfered with “standard technical measures” by blocking Perfect 10’s access to CCBill-affiliated websites in order to prevent Perfect 10 from discovering whether those websites infringed on Perfect 10’s copyrights. The Ninth Circuit remanded to the District Court to determine “whether access to a website is a ‘standard technical measure’ and if so whether CCBill interfered with [Perfect 10’s] access.”

CCBill argued that, because it provides a hyperlink so that a user may access a client website after it processes that user’s credit card, it fell under the “information location tools” safe harbor of section 512(d). The Ninth Circuit found that even if the hyperlink provided by CCBill could be viewed as “information location tool,” the majority of CCBill’s activities fall outside of the safe harbor. The Ninth Circuit recognized that section 512(b) provided immunity only for the infringement “by reason of the provider referring or linking users to an online location containing infringing material or infringing activity.”

The Ninth Circuit’s opinion in Perfect 10 requires copyright holders to remain vigilant and observe strict compliance with the notice of infringement requirements in the DMCA. Otherwise, a service provider can claim that it did not have actual knowledge of the infringing activity because of the defective notice. A copyright holder then risk being thrown out of court for failing to comply with these notice requirements if a service provider can establish immunity under the “safe harbor” provisions of the DMCA.

The YouTube Question

By now, everyone has heard about the One Billion dollar copyright infringement lawsuit Viacom filed against YouTube and its owner, Google. The lawsuit stems from the fact that clips from a number of Viacom’s programs are regularly appearing on the YouTube website.

YouTube allows its users to post video clips onto the YouTube website, and categorize the clip by providing terms which enable the clip to be displayed when a viewer conducts a search. While some users post videos clips they themselves create, other users are posting clips from television programs and motion pictures, including programs owned by Viacom such as Sponge Bob Square Pants, The Daily Show with Jon Stewart, The Colbert Report, South Park, and MTV Unplugged.

One of Viacom’s chief complaints is that YouTube has not instituted filtering technologies to prevent the uploading of clips from Viacom’s programs despite promises from its executives. Viacom also complains that because YouTube users are able to re-post removed clips almost as soon as they come down. This and other factors cause Viacom to lament that “no matter how much a copyright owner expends to protect their rights, there will always be a vast collection of infringing videos available on YouTube to draw users to its site.”

As an attorney who regularly represents content owners, I understand Viacom’s concerns. Viacom believes that if clips from one or more of its programs are available to users for free on YouTube, this may lessen the demand for those programs on either Apple’s iTunes or on one of Viacom’s own sites. Is YouTube taking advantage of some loopholes in the now 9 year old Digital Millennium Copyright Act (“DMCA”), or is the DMCA doing what its supposed to do and content owners are trying to run rough shot over what may be fair use.

Under the DMCA, a “Service Provider” may be entitled to immunity from claims of copyright infringement in four areas: 1) transitory communications; 2) system caching; 3) storage of information on systems or networks at direction of users; and 4) information location tools. While each area would appear to have some application to YouTube’s business, the information storage category is likely to be of primary focus if Viacom’s suit progresses.

Under the information storage safe harbor, the Service Provider:

  1. Must not have actual knowledge that the material is infringing;
  2. Must not aware of facts or circumstances in which they would be aware of that the material is an infringement;
  3. Upon becoming aware of the existence of such infringement material, acts promptly to remove or disable access to the infringing material.

In addition, in order to be entitled to copyright infringement immunity under this provision, the Service Provider must not receive a financial benefit directly attributable to the infringing material where it has the right and ability to control it. Additionally, the Service Provider must, upon notification of a claim of infringement, quickly removes or disables access to the infringing material.

The areas that will receive the most attention in determining whether or not YouTube should be entitled to the protections of this safe harbor is whether YouTube receives a financial benefit directly attributable to the infringing material, and YouTube’s knowledge that the material is, in fact, infringing.

YouTube sells advertising on its site, and reaps a financial benefit from high user traffic. However, as far as this writer is aware, YouTube does not include advertisements either before, after or within the video clips themselves. Rather, YouTube runs banner ads where YouTube gets paid based on the number of times any particular ad is viewed. Under Ninth Circuit case law this may be enough to establish a “financial interest.” (See, A&M Records, Inc. v. Napster, Inc; Fonovisa, Inc. v. Cherry Auctions, Inc. See also Perfect 10 v. Google, Inc.)

Does YouTube know that material on its system is infringing. Viacom claims that YouTube does. In an Op-ed piece in the Washington Post, Viacom’s general counsel claims that YouTube users use the site to view infringing material and “[i]f the public knows what’s there, then YouTube’s management surely does.” Other critics claim that YouTube must be aware that infringing material is on its system and this generally knowledge should strip it of safe harbor protection. While it would be safe to presume that YouTube knows that there is some content on its system which infringes the copyright held by a third party. However, its almost certain that YouTube does not know which of each piece of content stored on its system is infringing and which is not.

Viacom and others insist that YouTube could install filtering software that would flag files which contain certain keywords tending to be associated with clips from television shows such as “The Daily Show” or “The Colbert Report.” However, if YouTube did install such filters, it would then have to manually review each file to determine whether or not fair use or some other applicable exemption would be applicable. Not to mention the resources YouTube would have to devote to this, what if YouTube’s definition of fair use deviated from that of its users. Why should the fight about fair use be between the user and YouTube.

As a result of YouTube and other similar companies, content owners are required to be extra vigilant in policing their rights. That vigilance comes with a price tag. However, at the end of the day, content owners can have infringing content removed from YouTube very quickly. (Based on personally experience, YouTube is by far the quickest to respond to a take down notice.)

The DMCA is performing as its supposed to do. Content owners have the ability to initiate the removal of allegedly infringing content, the posting party has the ability prevent its removal by claiming fair use or some other exception, and if the content owner still feels strongly about removing the content, the DMCA allows the content owner to take the poster to court. It may be somewhat expensive for a content owner to patrol sites like YouTube and send out take down notices, but if the burden were on YouTube, posts like the pro Barack Obama clip incorporating Apple’s 1984 Super Bowl television ad might not have made it up. (Oor the various clips responding in kind)

Protecting the public’s right to use a third party’s material for criticism or comment are the hallmarks of fair use, and must be protected. The question the Viacom litigation poses is who will bear the price associated with protecting this right.