Tuesday, September 4, 2007

Get Sued By Competitors for Lying On Your Privacy Policy

Many sites put up privacy policies without giving them much thought. Once up, they are often forgotten about even if the policy is later changed. This can lead to disaster as one recent case showed.
You probably are not surprised to learn that lying in your privacy policy can get you into trouble. You will definitely be surprised to learn, however, that your competitors could be the parties suing you. Even worse, they could sue you for millions and win! How could this be? It all boils down to competition. In this case, claims of unfair competition.
The Lanham Act is a federal law that established rules related to unfair competition. Part of the language of the Act prohibits businesses from using false statements that a consumer may use in deciding to use the business instead of a competitor. This can include your privacy policy. If you state in your privacy policy that you do not share visitor information with third parties, but then do so, you are making the false statement called for in the Lanham Act.
For this to get you in trouble, however, the false statement must give you an advantage over competitors, to wit, your competitors admit they give visitor information to others. Making the determination in court is a question of fact, which means a jury will decide. Regardless, it is a risky proposition.
Getting rid of the technical legal jargon, the use of the Lanham Act in relation to privacy policies on sites is all about privacy. Between phishing, email and other online scams, many people are nervous about providing their personal information to sites. Along with this heightened public awareness comes a new unique selling position for sites – assuring privacy! Simply put, more people are likely to use a site that does not share their information with third parties than one that admits it does. If false assurances are given, the advantage is gained without merit, which is where a claim under the Lanham Act comes in.
Ultimately, you need to have a privacy policy on your site. Make sure it is accurate and updated as required so that you do not run into a situation where a competitor actually sues you.

What is Cybersquatting and What Can Be Done About It? ACPA or UDRP?

Have you ever had a third party register a domain name that is either exactly the same or very similar to your trademark? If so, it may be a Cybersquatting issue. Cybersquatting is registering, trafficking in, or using a domain name with a bad-faith intent to profit from the goodwill of a trademark belonging to someone else. To address this issue, Congress enacted what is known as the Anticybersquatting Consumer Protection Act ("ACPA"). The ACPA amended the Lanham Act by providing trademark owners with a civil remedy against cybersquatting.
If you’re not sure how this may affect your business, let’s run through some examples. The typical scenario is that the name of your product, or your company name is a registered trademark (or a strong common law trademark). However, you failed to register the domain name for whatever reason. Joe Schmo cybersquatter decides to beat you to the punch and registers the domain name of your trademark. He may have even registered plural versions or misspellings of your trademark as well (this is known as typosquatting). Joe Schmo cybersquatter is simply holding the domain name for ransom hoping to sell it back to you for a nice profit, or he may decide to keep domain name knowing that he will get a lot of traffic to his websites. The cybersquatter may sell products similar to yours or is simply engaged in affiliate marketing and makes money off of the clicks on his website. These situations can obviously cause consumer confusion and can easily cause lost profits to your company and dilution of your trademark(s) as well.
One avenue of recourse is filing an ACPA claim in federal court. The Plaintiff in an Anti-Cybersquatting suit must establish:
1. The Defendant has a bad faith intent to profit from the mark, including a defendant name which is protected as a mark; 2. registers, traffics in, or uses a domain name that--
(I) in the case of a mark that is distinctive at the time of registration of the domain name, is identical or confusingly similar to that mark;
(II) in the case of a famous mark that is famous at the time of registration of the domain name, is identical or confusingly similar to or dilutive of that mark; or
(III) is a trademark, word, or name protected by reason of 18 U.S.C. § 706 (the Red Cross, the American National Red Cross or the Geneva cross) or 36 U.S.C. § 220506
It’s important to distinguish cases in which the cybersquatter is obviously acting in bad faith, from situations in which the individual simply registered the domain name with the intent of doing something else with it that is unrelated to trademark owner’s goods and/or services.
The ACPA excludes a finding of bad faith where the domain name holder reasonably believed that the use was “fair use” or otherwise lawful. Accordingly, bad faith is the biggest component in an ACPA claim. So what is bad faith? There are several elements the federal courts will consider such as:
The trademark ownership rights held by the mark owner; The closeness of the domain name and the cybersquatter’s name; The cybersquatter’s commercial use of the domain name for access to a web site; The cybersquatter’s intent to divert web traffic from the mark owner; The cybersquatter’s offer to sell the domain name to the mark owner; Whether the cybersquatter gave misleading information in registering the domain name; and Similar or repeated cybersquatting on other marks.
For example, in Hasbro Inc. v. Clue Computing Inc. [66 F. Supp.2d 177 (D. Mass 2000)], the district court held that Clue Computing’s use of its registered domain name clue.com, was in fair use, despite Hasbro’s existing registration of the trademark “Clue” for its famous board game. The two company’s fields in which the names were used were not related; Clue Computing had registered the disputed domain name first, used it in legitimate commerce, and not attempted to sell the domain name to Hasbro.
UDRP or ACPA?
So if you’ve concluded that someone has cybersquatted one of your trademarks, should you file a ACPA lawsuit? Before doing so, you should consult with your intellectual property attorney about other avenues such as the Uniform Domain Name Dispute Resolution Policy (“UDRP“). UDPR is an ICANN-approved arbitration that resolves domain name disputes submitted to ICANN for resolution. Very often (nearly 75% of UDRP cases) results in the cancellation of the cybersquatter’s domain name registration. The standards to establish cybersquatting in UDRP cases for wrongful registration is very similar to ACPA’s standards. Furthermore, UDRP proceedings are typically much less expensive and quicker (about 2-3 months total compared to ACPA which is federal litigation and may take years if not settled before trial). Another advantage with the UDRP is that it’s well suited for international domain name disputes because the hearings are ex parte (based only on filed documents; no witnesses or parties are present). UDRP can be used in addition to an ACPA litigation or possibly done before or after an ACPA ruling because UDRP rulings are not binding upon the courts. Also, UDRP findings may be appealed. This is a departure from most arbitration practice (www.icann.org/udrp).
However, the remedies in UDRP proceedings are limited to only transfers of the domain name. Compared to an ACPA litigation, the Plaintiff may obtain monetary damages, attorney’s fees and costs (in exceptional cases), and/or an injunction, in addition to the cancellation or transfer of the improper web domain name to the original owner. Furthermore, under ACPA the Plaintiff has the option of suing for statutory damages for $1,000 to $100,000, as the court deems just under the circumstances.

Legal Music Downloading

Internet Music downloads have come a long way in a small amount of time. Just a few years ago music companies and individual artist were in an uproar over music download sites. Music download sites such as Napster allowed online users to share and download music for free. Many individual citizens that would never consider doing something illegal figured it was okay to get the music for free and stopped buying it in stores!.
The trend became so popular record sales took a nose dive and companies and artist were out of millions in potential revenue. The music industry fought back and Napster as well as similar sites were accused of stealing music, and forced to close up their businesses.
They may have been down but they were not out for the count! Napster and similar websites revamped and came back this time offering one hundred percent legal music downloads and still free to join.
Legal music downloads are becoming more and more popular due to the rise of the MP3 player. The digital revolution made buying legal music downloads a must for many people. People no longer feel its okay to get music for free especially with the risk of persecution. This new attitude has helped the industry continue to expand. Some people still choose to get free music downloads through illegal means but more often than not they pay the price.
There are still many Internet sites that offer music for free. But as the old adage goes you get what you pay for. This “free” music comes with a very heavy price. Most of it is littered with spyware and viruses that could cause permanent damage to your computer. Every single time you download music from such sites you are putting your computer at risk and you could even have charges filed against you for stealing music.

iPhone Download Services - Are They Legal?

Since Napster revolutionized the file sharing industry in 1999, peer to peer services have been popping up all over. Movie sharing services were soon to follow with services such as Bittorrent as broadband capabilities spread. With the recent introduction of the iPhone, many iPhone peer to peer networks have come about. The question lingering in many consumers minds is... are these iPhone download services legal? In the following paragraphs, we'll discuss what is legal and what isn't, as well as why.
Ok, so getting to the initial point of the article, are these iPhone download services legal? In short, there is a lot of recent precedence that says they're not illegal. So now you're saying, "but I thought file sharing was a huge no-no?" Well that depends on a couple of things, how you use the technology, as well as the topology of the file sharing network. Liabilities fall on different parties in each case. You may have noticed the hype, the buzz, the hoopla, of peer to peer filing sharing has calmed down recently. Why?
Over the past few years, there have been several lawsuits involving file sharing software such as Morpheus, Grokster, Kazaa, the list goes on. Because of this, now there is plenty of legal precedence stating that the software itself is not illegal. How can this be? To answer this question, we have to explore how this software works, and compare it to how peer to peer used to work.
So, what's legal and what isn't? With the case of the aforementioned Napster, their network was set up in a way where a centralized server, or a central point where every search goes, was responsible for all song requests. The server would then send back a list of references where the user could download his or her music. Since the Napster assets were involved in every search, they were actively participating in the file sharing process. This got them in a lot of trouble. This is not how the iPhone download services at set up.
Now you're saying, ok ... so what's the legal way to do it? Here's your answer. A decentralized file sharing network is a peer to peer network not unlike a centralized network, with one KEY difference. As the name suggests, there is no central server, which means, if the software developer turns of his or her computer, the network can continue to run seamlessly, because the software does not rely on the centralized server to operate. The computers in the peer to peer network that have the software running send out the file references. This is way around the above problem. There have been many court cases in recent years citing that this type of file sharing network does nothing illegal.
The iPhone download services in question are all developed using the decentralized peer to peer file sharing topology described above, meaning the software is 100% legal for the company to distribute. There is one more question to answer however. How can YOU safely use the distributed software. Read on to find out.
The way to get in trouble with file sharing is by sharing hundreds or even thousands of different files. The reason behind this is because if you do that, everyone on the entire network has access to your shares, which means a lot of distributed material from your IP address. How do you stay safe with these iPhone download services? Simple. Disable your file sharing, or if your software won't allow it, simply move your downloads to a different folder. This will make sure you are not sharing all of your files with the rest of the peer to peer network and you'll be in the clear.
You'll also want to run a virus check on the files you download. With peer to peer networks, the developers don't have much control over what files are shared on their networks so sometimes an occasional spyware or trojans will be implanted in the media files. Run virus checks before installing your files on your brand new iPhone.
Take the above precautions and you'll have no trouble with iPhone download services and you'll be well on your way to making your iPhone that much better! I hope this answered any questions you may have had. To find out more about these services, check out the link below. Thanks for reading!

Is It Legal to Hack Your Wireless Network?

Once upon a time there was no choice when it came to your phone service. Not only did you have to get your service through Bell Systems, you had to rent the equipment from them too. Yes, you had to actually rent the phone that was plugged into the RJ-45 on your wall. A 1968 case where Carter Electronics took on Bell Systems resolved that problem when a judge ruled that third party equipment can be plugged in and used on the network that Bell Systems maintained and provided service on. A whole new communications industry was born and consumers were free to choose which equipment they wanted to use for communications.
The Bell System companies dragged their feet for many years after the Carterphone decision, still requiring customers to rent their equipment up until consumers fought them well into the late 70's. Even through that battle, we are still retreating back to the era where our communications options are becoming increasingly controlled in other arenas. Consumers are forced into contracts they don't want to be locked into, and to use phones only supplied by our wireless providers, Shouldn't the 1968 Carterfone decision make a difference in the wireless industry? Because of this case, shouldn't I as a consumer have the ability to use whatever equipment I want on a wireless network? How about a cable network? The Internet?
In the Carterfone case, the FCC cited their decision which stated that a subscriber's right to use the network in ways which are "privately beneficial without being publicly detrimental" applied to ALL TYPES OF EQUIPMENT. What does this mean? It means that everybody who subscribes to a service is able to use their own equipment in a way that benefits the subscriber as long as no other subscribers are affected. Without the Hush-A-Phone or Carterfone decisions, companies like AOL may have tried to rent us "the only computer that will work on the Internet." Electric companies could make a case for dictating which light bulbs you use. Gas companies might force you to buy their brand of furnaces.
Still today, most cable companies require their subscribers to rent a cable box you could buy your own. SIM card technology provides the ability to switch wireless phones whenever a person wants to, yet providers such as Verizon and Alltell fail to embrace this technology, forcing consumers to sign a new contract or spend exorbitant amounts of money to simply switch
As consumers we need to start demanding better of our service providers. AT&T and Sprint allow us to use SIM cards with most of their phones. We can go online and purchase a phone off Ebay, pop in the SIM card from an old phone and you're ready to go! There is alternative equipment that can be used on cable networks, but nobody really challenges cable companies when it comes to actually using it. We all just keep our mouths shut, dig in our pockets and fork over the extra $5 a month to rent the box. We have come along way since 1969. There are multiple phone carriers, wireless companies, and cable companies to choose from. But we can do better than being roped into paying a subscription fee on items we can buy ourselves or signing 2 year contracts just to get the latest smartphone. Remember it's supply and demand. Ultimately it should come down to the consumers wants and needs. Not what the provider is willing to give us.

The Legality Of P2P File Sharing Software

The legality of free p2p file sharing software has always been in question, and the p2p networks have been in the news again recently: when are they ever out of it! I have made my views known about those that make a fortune from us while breaking the law themselves with their drug-taking and other anti-social activities, but what exactly is the legal situation?
Peer to peer file sharing is not illegal. That is fact! A few friends sharing files online between themselves is no more illegal than them swapping CDs or DVDs. Where the confusion arises is the scale. At what scale of sharing does it become illegal, rather than just people swapping their belongings.
It is certainly illegal when individuals, or even companies, download material using p2p software in order to create CDs and DVDs for sale in the same way that is was illegal for these same people to copy audio tapes for sale. That is understandable and nobody could realistically condone such behaviour. It is no illegal, however, for you to allow others to copy files from your computer as long as you are not doing so for gain. However, if these files are copyrighted, it is illegal for the copier to copy them.
There appears to have been a distinction made between downloading other’s files and swapping their physical hardware. In other words, you can give your friend your Elton John album in exchange for his Prodigy album, but not for you to download a copy of his album, and he yours.
Perhaps rightly so, and I believe most would agree were it not for the double standards being operated, and the lack of firm direction on behalf of the artists themselves. Artists who are more than happy to have their work downloaded by interested listeners or viewers when they are trying to make their name, but take the opposite view once these same fans have promoted them to the position that they desired.
Actual court cases have been sending out mixed signals over the years, though it is a fact that breaking of copyright is illegal. P2P file sharing is not illegal as long as the files being shared are not copyrighted. However, most movies, videos and MP3s that are downloaded are done so illegally. The vast majority of P2P software is being used illegally, but if you consider the number of downloads compared to those actually prosecuted, you have a higher chance of being killed by a coconut falling on your head than you have of being prosecuted for an illegal download.
The important thing is that you don’t overdo it, and make a business of recording the downloads onto disks and selling them. These are the people the music and video companies are mostly after, though it is true that a few high school kids have also been fined. They are by far in the minority though.
You can reduce the risk if you download but do not share. If you own p2p software, then turn of the file-sharing option that allows others to access your hard disk while your computer is switched on. Just about every peer to peer file sharing software package allows you to switch this off. The authorities are looking for those who commercialize their downloads in a big way by compiling pirate albums, and those who share thousands of files on their computer with others throughout the internet.
In order not to break the law, do not download any music or video file that does not specifically give permission. Many artists, bands and new film makers do give this permission, if not in actual writing, then at least tacitly. This is especially true of those up and coming artists who want to have their work published throughout the internet. A lot of single tracks from albums are offered for free download in the hope that the listener or viewer will purchase the whole thing. If you decide to break the law, then the chance you take is minimal. But you never know . . .
However, it is ludicrous that drug-taking lawbreakers should be complaining about others breaking the law. These same people would have been delighted at having their work downloaded before they were famous, and that is one of the major benefits of file sharing to young or new artists. They get their work and their name known by offering their products free of charge to those that want to download it, and many do.
However, once they have made their name they rapidly pull the plug on the free downloads, and those who supported them when they were struggling suddenly find themselves breaking the law. Little wonder that the legal eagles the world over cannot agree on what is allowed and not allowed.
Certainly, copyright should not be infringed, but hypocrisy should not be allowed to prevail over people who wish to listen to single tracks that they would otherwise find impossible to access. There should surely be little wrong with an individual downloading a track otherwise unavailable, and then purchasing tickets to watch their idols (or perhaps ‘idles’?) playing or singing live.
In case anyone laughs at this interpretation of one of the main uses of file sharing, it is in fact what happens in many cases. Why should somebody have to purchase a complete album to determine whether or not a particular artist is worth listening to for a $100 ticket for a live show?
If used properly, peer to peer file sharing and downloading can be used to the advantage of the artist. Rather than complaining that high school kids can make better use of the internet than them, media moguls should waken up and realise that the second decade of the 21st century is only 3 years away while they are still living in the 20th.

Thursday, August 2, 2007

Why Site Owners Must Know California Internet Regulations

Most sites on the web are at least faintly familiar with the implementation of legal regulations related to their sites. Most, however, have never heard of the California Catch-22.
Most sites tend to view complying with legal regulations as a somewhat amorphous subject. You know you are supposed to do something, but are not particularly sure why or what to do. This leads to the rather humorous situation where many sites have terms and conditions that are completely inapplicable the what they are doing and also look startlingly similar to terms and conditions found on other sites. One might even imagine a bit of “cut and paste” was going on, but who am I to say!
Much of the confusion is understandable. It comes from the lack of clear legal directives by the federal government. In most areas, you get vague “suggestions” put forth by an impotent FTC.
Interestingly, one state has taken over for the federal government – California. Because the right of privacy is actually mentioned in the constitution of the state, unlike in the federal version, the state has passed numerous laws regulating how sites must handle visitors information from a privacy perspective, sales information, security efforts and so on. Frankly, it is a pretty amazing that a group of state politicians managed to pull it off. There are laws ranging from how a privacy policy must be set up to requirements that you disclose identify theft events to the media. This is why you see major companies issuing press releases about security breaches leading to identify theft.
As a site owner located outside of California, you are probably wondering why you should care about the laws of California. Well, you better be in compliance because California has a unique way of defining what sites the laws apply to. Nearly all of the relevant California legislation contains provisions defining jurisdiction by the visitor, not the site.
So, what does this mean in plain English? You must comply with the laws if you have any customers that are residents of California or from which you obtain certain types of information. If you make a sale to a California resident, you must comply. If you collect the name, email address and so on as part of creating a newsletter mailing list, you must comply!
Given the size of the California population, it is the rare site that never makes a sale or collects information from a California resident. In short, you need to comply with everything from the California Online Privacy Protect Act to the various identify theft prevention and notice regulations. Fail to do so, and it can come back to haunt you when things go wrong.