|
[back to notice text] Question: What defines a service provider under Section 512 of the Digital Millennium Copyright Act (DMCA)?
Answer: A service provider is defined as "an entity offering transmission, routing, or providing connections for digital online communications, between or among points specified by a user, of material of the user's choosing, without modification to the content of the material as sent or received" or "a provider of online services or network access, or the operator of facilities thereof." [512(k)(1)(A-B)] This broad definition includes network services companies such as Internet service providers (ISPs), search engines, bulletin board system operators, and even auction web sites. In A&M Records, Inc. v. Napster Inc., the court refused to extend the safe harbor provisions to the Napster software program and service, leaving open the question of whether peer-to-peer networks also qualify for safe harbor protection under Section 512. There are four major categories of network systems offered by service providers that qualify for protection under the safe harbor provisions:
- Conduit Communications include the transmission and routing of information, such as an email or Internet service provider, which store the material only temporarily on their networks. [Sec. 512(a)]
- System Caching refers to the temporary copies of data that are made by service providers in providing the various services that require such copying in order to transfer data. [Sec. 512(b)]
- Storage Systems refers to services which allow users to store information on their networks, such as a web hosting service or a chat room. [Sec. 512(c)]
- Information Location Tools refer to services such as search engines, directories, or pages of recommended web sites which provide links to the allegedly infringing material. [Sec. 512(d)]
[back to notice text] Question: What rights are protected by copyright law?
Answer: The purpose of copyright law is to encourage creative work by granting a temporary monopoly in an author's original creations. This monopoly takes the form of six rights in areas where the author retains exclusive control. These rights are: (1) the right of reproduction (i.e., copying), (2) the right to create derivative works, (3) the right to distribution, (4) the right to performance, (5) the right to display, and (6) the digital transmission performance right. The law of copyright protects the first two rights in both private and public contexts, whereas an author can only restrict the last four rights in the public sphere. Claims of infringement must show that the defendant exercised one of these rights. For example, if I create unauthorized videotape copies of Star Trek II: The Wrath of Khan and distribute them to strangers on the street, then I have infringed both the copyright holder's rights of reproduction and distribution. If I merely re-enact The Wrath of Khan for my family in my home, then I have not infringed on the copyright. Names, ideas and facts are not protected by copyright. Trademark law, in contrast, is designed to protect consumers from confusion as to the source of goods (as well as to protect the trademark owner's market). To this end, the law gives the owner of a registered trademark the right to use the mark in commerce without confusion. If someone introduces a trademark into the market that is likely to cause confusion, then the newer mark infringes on the older one. The laws of trademark infringement and dilution protect against this likelihood of confusion. Trademark protects names, images and short phrases. Infringement protects against confusion about the origin of goods. The plaintiff in an infringement suit must show that defendant's use of the mark is likely to cause such a confusion. For instance, if I were an unscrupulous manufacturer, I might attempt to capitalize on the fame of Star Trek by creating a line of 'Spock Activewear.' If consumers could reasonably believe that my activewear was produced or endorsed by the owners of the Spock trademark, then I would be liable for infringement. The law of trademark dilution protects against confusion concerning the character of a registered trademark. Suppose I created a semi-automatic assault rifle and marketed it as 'The Lt. Uhura 5000.' Even if consumers could not reasonably believe that the Star Trek trademark holders produced this firearm, the trademark holders could claim that my use of their mark harmed the family-oriented character of their mark. I would be liable for dilution.
[back to notice text] Question: What kinds of things are copyrightable?
Answer: In order for material to be copyrightable, it must be original and must be in a fixed medium. Only material that originated with the author can support a copyright. Items from the public domain which appear in a work, as well as work borrowed from others, cannot be the subject of an infringement claim. Also, certain stock material might not be copyrightable, such as footage that indicates a location like the standard shots of San Francisco in Star Trek IV: The Voyage Home. Also exempted are stock characters like the noisy punk rocker who gets the Vulcan death grip in Star Trek IV. The requirement that works be in a fixed medium leaves out certain forms of expression, most notably choreography and oral performances such as speeches. For instance, if I perform a Klingon death wail in a local park, my performance is not copyrightable. However, if I film the performance, then the film is copyrightable. Single words and short phrases are generally not protected by copyright, even when the name has been "coined" or newly-created by the mark owner. Logos that include original design elements can be protected under copyright or under trademark. Otherwise, words, phrases and titles may be protected only by trademark, however.
[back to notice text] Question: What is copyright infringement? Are there any defenses?
Answer: Infringement occurs whenever someone who is not the copyright holder (or a licensee of the copyright holder) exercises one of the exclusive rights listed above. The most common defense to an infringement claim is "fair use," a doctrine that allows people to use copyrighted material without permission in certain situations, such as quotations in a book review. To evaluate fair use of copyrighted material, the courts consider four factors: - the purpose and character of the use
- the nature of the copyrighted work
- the amount and substantiality of copying, and
- the market effect.
(17 U.S.C. 107) The most significant factor in this analysis is the fourth, effect on the market. If a copier's use supplants demand for the original work, then it will be very difficult for him or her to claim fair use. On the other hand, if the use does not compete with the original, for example because it is a parody, criticism, or news report, it is more likely to be permitted as "fair use." Trademarks are generally subject to fair use in two situations: First, advertisers and other speakers are allowed to use a competitor's trademark when referring to that competitor's product ("nominative use"). Second, the law protects "fair comment," for instance, in parody.
[back to notice text] Question: Where can I find the text of the U.S. Copyright Act?
Answer: The federal Copyright Act may be found at http://www.loc.gov/copyright/title17/.
[back to notice text] Question: What can be protected as a trademark?
Answer:
You can protect
- names (such as company names, product names)
- domain names if they label a product or service
- images
- symbols
- logos
- slogans or phrases
- colors
- product design
- product packaging (known as trade dress)
[back to notice text] Question: What exactly are the rights a trademark owner has?
Answer: In the US, trademark rights come from actual use of the mark to label one's services or products or they come from filing an application with the Patent and Trademark Office (PTO) that states an intention to use the mark in future commerce. In most foreign countries, trademarks are valid only upon registration. There are two trademark rights: the right to use (or authorize use) and the right to register. The person who establishes priority rights in a mark gains the exclusive right to use it to label or identify their goods or services, and to authorize others to do so. According to the Lanham Act, determining who has priority rights in a mark involves establishing who was the first to use it to identify his/her goods. The PTO determines who has the right to register the mark. Someone who registers a trademark with the intent to use it gains "constructive use" when he/she begins using it, which entitles him/her to nationwide priority in the mark. However, if two users claim ownership of the same mark (or similar marks) at the same time, and neither has registered it, a court must decide who has the right to the mark. The court can issue an injunction (a ruling that requires other people to stop using the mark) or award damages if people other than the owner use the trademark (infringement). Trademark owners do not acquire the exclusive ownership of words. They only obtain the right to use the mark in commerce and to prevent competitors in the same line of goods or services from using a confusingly similar mark. The same word can therefore be trademarked by different producers to label different kinds of goods. Examples are Delta Airlines and Delta Faucets. Owners of famous marks have broader rights to use their marks than do owners of less-well-known marks. They can prevent uses of their marks by others on goods that do not even compete with the famous product.
[back to notice text] Question: Where can I find state trademark law?
Answer: Each state has its own laws governing use of trademarks within its borders. To locate the trademark laws of the 50 states, use the Legal Information Institute links. Both legislation and court opinions create trademark rights and remedies. If marks are used in interstate commerce, then federal law will also apply.
[back to notice text] Question: What about common words that are used for many purposes?
Answer: Common words and alphabetical letters can be protectable trademarks if they are used in arbitrary or unusual ways. One cannot trademark DIESEL to sell that generic type of fuel, otherwise no other diesel fuel dealer could use the word to identify the product. However, one could trademark DIESEL as a brand of ice cream. The owner of the ice cream mark can't use its rights to prevent fuel dealers from using the word on their station pumps nor can it prevent anyone else from using the word for non-trademark purposes, such as a website listing diesel fuel dealers. In general, the more a mark describes the good or service that it labels, the less strong the trademark protection it gets and the more freedom others have to use the same word for other purposes. See also this question on the strength of trademarks.
[back to notice text] Question: What is the difference between copyright and trademark?
Answer: Copyright protects original expression in literary and artistic works such as plays, books, films, songs, software, performances, etc.). To qualify for copyright protection, a work must be an original creation of the author and not copied from any other source. In the U.S., copyright does not protect facts. Individual words cannot be copyrighted, and there is a gray area of protection for short phrases. Copyright owners have strong rights to prevent copying of their material, subject to the doctrine of "fair use." Copyrights arise when the work is fixed in a permanent form. Infringement consists of copying, publicly distributing, making changes to, or publicly distributing or performing the work without the author's permission. Trademark only protects names and logo images that are used to label goods or services. Trademark does not require originality; its purpose is to identify the source of goods. In the U.S., trademark rights arise only when there is actual use in commerce. Infringement consists of selling goods or services under the same or a confusingly similar name. Trademark has its own types of "fair uses" including use for product comparison and criticism, news reporting, and parody.
[back to notice text] Question: What is defamation?
Answer: Generally, defamation is a false and unprivileged statement of fact that is harmful to someone's reputation, and published "with fault," meaning as a result of negligence or malice. State laws often define defamation in specific ways. Libel is a written defamation; slander is a spoken defamation.
[back to notice text] Question: What is Section 43(a) of the Lanham Act?
Answer: The Lanham Act is the basic federal trademark and unfair competition law. Section 43(a) (15 U.S.C. 1125(a)) is intended to protect consumers and competitors against false advertising and false designations of origin. The law allows for suit against someone who makes false claims about its own or a competitor's products. Sec. 1125. False designations of origin, false descriptions, and dilution forbidden(a) Civil action (1) Any person who, on or in connection with any goods or services, or any container for goods, uses in commerce any word, term, name, symbol, or device, or any combination thereof, or any false designation of origin, false or misleading description of fact, or false or misleading representation of fact, which-- (A) is likely to cause confusion, or to cause mistake, or to deceive as to the affiliation, connection, or association of such person with another person, or as to the origin, sponsorship, or approval of his or her goods, services, or commercial activities by another person, or (B) in commercial advertising or promotion, misrepresents the nature, characteristics, qualities, or geographic origin of his or her or another person's goods, services, or commercial activities, shall be liable in a civil action by any person who believes that he or she is or is likely to be damaged by such act.
[back to notice text] Question: What are the elements of a defamation claim?
Answer:
The party making a defamation claim (plaintiff) must ordinarily prove four elements:
- a publication to one other than the person defamed;
- a false statement of fact;
- that is understood as
a. being of and concerning the plaintiff; and
b. tending to harm the reputation of plaintiff.
- If the plaintiff is a public figure, he or she must also prove actual malice.
[back to notice text] Question: What defenses may be available to someone who is sued for defamation?
Answer: There are ordinarily 6 possible defenses available to a defendant who is sued for libel (published defamatory communication.) 1. Truth. This is a complete defense, but may be difficult to prove. 2. Fair comment on a matter of public interest. This defense applies to "opinion" only, as compared to a statement of fact. The defendant usually needs to prove that the opinion is honestly held and the comments were not motivated by actual "malice." ( Malice means knowledge of falsity or reckless disregard for the truth of falsity of the defamatory statement.) 3. Privilege. The privilege may be absolute or qualified. Privilege generally exists where the speaker or writer has a duty to communicate to a specific person or persons on a given occasion. In some cases the privilege is qualified and may be lost if the publication is unnecessarily wide or made with malice. 4. Consent. This is rarely available, as plaintiffs will not ordinarily agree to the publication of statements that they find offensive. 5. Innocent dissemination. In some caes a party who has no knowledge of the content of a defamatory statement may use this defense. For example, a mailman who delivers a sealed envelope containing a defamatory statement, is not legally liable for any damages that come about from the statement. 6. Plaintiff's poor reputation. Defendant can mitigate (lessen) damages for a defamatory statement by proving that the plaintiff did not have a good reputation to begin with. Defendant ordinarily can prove plaintiff's poor reputation by calling witnesses with knowledge of the plaintiff's prior reputation relating to the defamatory content.
[back to notice text] Question: What is libel?
Answer: Libel is a false statement of fact expressed in a fixed medium, usually writing but also a picture, sign, or electronic broadcast. See What are the elements of a defamation claim?
[back to notice text] Question: What is the Digital Millennium Copyright Act?
Answer: The DMCA, as it is known, has a number of different parts. One part is the anticircumvention provisions, which make it illegal to "circumvent" a technological measure protecting access to or copying of a copyrighted work (see Anticircumvention (DMCA)). Another part gives web hosts and Internet service providers a "safe harbor" from copyright infringement claims if they implement certain notice and takedown procedures (see DMCA Safe Harbor).
[back to notice text] Question: What are the DMCA Safe Harbor Provisions?
Answer: In 1998, Congress passed the On-Line Copyright Infringement Liability Limitation Act (OCILLA) in an effort to protect service providers on the Internet from liability for the activities of its users. Codified as section 512 of the Digital Millennium Copyright Act (DMCA), this new law exempts on-line service providers that meet the criteria set forth in the safe harbor provisions from claims of copyright infringement made against them that result from the conduct of their customers. These safe harbor provisions are designed to shelter service providers from the infringing activities of their customers. If a service provider qualifies for the safe harbor exemption, only the individual infringing customer are liable for monetary damages; the service provider's network through which they engaged in the alleged activities is not liable.
[back to notice text] Question: What does a service provider have to do in order to qualify for safe harbor protection?
Answer: In addition to informing its customers of its policies (discussed above), a service provider must follow the proper notice and takedown procedures (discussed above) and also meet several other requirements in order to qualify for exemption under the safe harbor provisions. In order to facilitate the notification process in cases of infringement, ISPs which allow users to store information on their networks, such as a web hosting service, must designate an agent that will receive the notices from copyright owners that its network contains material which infringes their intellectual property rights. The service provider must then notify the Copyright Office of the agent's name and address and make that information publicly available on its web site. [512(c)(2)] Finally, the service provider must not have knowledge that the material or activity is infringing or of the fact that the infringing material exists on its network. [512(c)(1)(A)], [512(d)(1)(A)]. If it does discover such material before being contacted by the copyright owners, it is instructed to remove, or disable access to, the material itself. [512(c)(1)(A)(iii)], [512(d)(1)(C)]. The service provider must not gain any financial benefit that is attributable to the infringing material. [512(c)(1)(B)], [512(d)(2)].
[back to notice text] Question: How is the First Amendment affected by the DMCA?
Answer: The tension between the DMCA and the First Amendment is at the heart of several ongoing lawsuits. [Felten v. RIAA; Universal v. Corley] The mere posting of a link to a computer program that can be used to circumvent technical protection measures was held to be a violation of the DMCA. [Universal v. Corley (2d Ciruit cite)] The Recording Industry Association of America used the threat of a DMCA action to silence a professor whose research paper discussed circumvention of a technical protection measure. The professor subsequently mounted a legal challenge to the DMCA on First Amendment grounds and presented his paper. While courts in both of these cases have found in favor of the copyright industries, these cases are being appealed and the state of the law is yet to be determined.
[back to notice text] Question: Does a service provider have to notify its users about its policies regarding the removal of materials?
Answer: To qualify for exemption under the safe harbor provisions, the service provider must give notice to its users of its policies regarding copyright infringement and the consequences of repeated infringing activity. [512(i)(1)(A)] The notice can be a part of the contract signed by the user when signing up for the service or a page on the service provider's web site explaining the terms of use of their systems. While there are no specific rules about how this notice must be made, it must be "reasonably implemented" so that subscribers and account holders are informed of the terms. [512(i)(1)(A)]
[back to notice text] Question: What does a service provider have to do in order to qualify for safe harbor protection?
Answer: In addition to informing its customers of its policies (discussed above), a service provider must follow the proper notice and takedown procedures (discussed above) and also meet several other requirements in order to qualify for exemption under the safe harbor provisions. In order to facilitate the notification process in cases of infringement, ISPs which allow users to store information on their networks, such as a web hosting service, must designate an agent that will receive the notices from copyright owners that its network contains material which infringes their intellectual property rights. The service provider must then notify the Copyright Office of the agent's name and address and make that information publicly available on its web site. [512(c)(2)] Finally, the service provider must not have knowledge that the material or activity is infringing or of the fact that the infringing material exists on its network. [512(c)(1)(A)], [512(d)(1)(A)]. If it does discover such material before being contacted by the copyright owners, it is instructed to remove, or disable access to, the material itself. [512(c)(1)(A)(iii)], [512(d)(1)(C)]. The service provider must not gain any financial benefit that is attributable to the infringing material. [512(c)(1)(B)], [512(d)(2)].
[back to notice text] Question: What are the notice and takedown procedures for web sites?
Answer: In order to have an allegedly infringing web site removed from a service provider's network, or to have access to an allegedly infringing website disabled, the copyright owner must provide notice to the service provider with the following information:
- The name, address, and electronic signature of the complaining party [512(c)(3)(A)(i)]
- The infringing materials and their Internet location [512(c)(3)(A)(ii-iii)], or if the service provider is an "information location tool" such as a search engine, the reference or link to the infringing materials [512(d)(3)].
- Sufficient information to identify the copyrighted works [512(c)(3)(A)(iv)].
- A statement by the owner that it has a good faith belief that there is no legal basis for the use of the materials complained of [512(c)(3)(A)(v)].
- A statement of the accuracy of the notice and, under penalty of perjury, that the complaining party is authorized to act on the behalf of the owner [512(c)(3)(A)(vi)].
Once notice is given to the service provider, or in circumstances where the service provider discovers the infringing material itself, it is required to expeditiously remove, or disable access to, the material. The safe harbor provisions do not require the service provider to notify the individual responsible for the allegedly infringing material before it has been removed, but they do require notification after the material is removed.
[back to notice text] Question: What is "notice"?
Answer: Notice is information concerning a fact, actually communicated to a person by an authorized person, or actually derived by him from a proper source.
[back to notice text] Question: What is "intellectual property"?
Answer: Intellectual property refers to the rights one has in the product of one's intellect. This includes copyright (rights in creative expression)and patents (rights in inventions, discoveries, methods, compositions of matter, etc.) which are granted by article I, section 8 clause 8 of the US Constitution which gives Congress the power to "To promote the Progress of Science and useful Arts, by securing for limited Times to Authors and Inventors the exclusive Right to their respective Writings and Discoveries." Related rights include trademark (rights in the names one uses to identify one's goods and services), trade secret (confidential business practices), unfair trade practice, passing off, trade libel, false advertising, misappropriation. Laws protecting most of these rights exist at both the state and federal level. "Proprietary rights" is just a general term meaning "one's own rights."
[back to notice text] Question: What constitutes notification to an ISP under the Digital Millennium Copyright Act?
Answer: For notification of claimed infringement to be effective under the DMCA it must be a written communication provided to the designated agent of a service provider that includes substantially the following: 1. A physical or electronic signature of a person authorized to act on behalf of the owner of an exclusive right that is allegedly infringed. 2. Identification of the copyrighted work(s) claimed to have been infringed. 3. Identification of the material that is claimed to be infringing and information reasonably sufficient to permit the service provider to locate the material. 4. Contact information for the complaining party. 5. A statement by the complaining party that it believes in good faith belief that use of the material is not authorized by the copyright owner, its agent, or the law. 6. A statement that the information in the notification is accurate, and under penalty of perjury, that the complaining party is authorized to act on behalf of the owner of an exclusive right that is allegedly infringed.
[back to notice text] Question: What constitutes copyright infringement?
Answer: Subject to certain defenses, it is copyright infringement for someone other than the author to do the following without the author's permission:
1. reproduce (copy) the work;
2. create a new work derived from the original work (for example, by translating the work into a new language, by copying and distorting the image, or by transferring the work into a new medium of expression);
3. sell or give away the work, or a copy of the work, for the first time (but once the author has done so, the right to sell or give away the item is transferred to the new owner. This is known as the "first sale" doctrine: once a copyright owner has sold or given away the work or a copy of it, the recipient or purchaser may do as she pleases with what she posesses.) 17 U.S.C. ?109(a);
4. perform or display the work in public without permission from the copyright owner. 17 U.S.C. ?106. It is also copyright infringement to violate the "moral rights" of an author as defined by 17 U.S.C. 106A. Moral rights are discussed here.
[back to notice text] Question: What is 17 U.S.C.
Answer: 17 U.S.C.A.
[back to notice text] Question: What is the Anti-Cybersquatting Consumer Protection Act (ACPA)?
Answer: The ACPA [codified as 15 USC 1125(d)] is aimed at people who register a domain name with the intention of taking financial advantage of another's trademark. For instance, if BURGER KING did not have a web site, and you registered www.BURGERKING.com with the intent of selling the site to BURGER KING for a royal ransom, you could be liable under ACPA. ACPA applies to people who: (1) have a bad faith intent to profit from a domain name; and (2) register, use or traffic in a domain name; (3) that is identical, confusingly similar, or dilutive of certain trademarks. The trademark does not have to be registered. ACPA provides that cyberpirates can be fined between $1,000 and $100,000 per domain name for which they are found liable, as well as being forced to transfer the domain name. Somewhat more broadly, the Act is meant to reduce consumers' confusion about the source and sponsorship of Internet web pages. The idea is to provide customers with a measure of reliability, so that when they visit www.burgerking.com, they will be able to find actual Burger King products, not something entirely different. It also protects mark owners from loss of customer goodwill that might occur if others used the trademark to market disreputable goods or services. See the module on ACPA to find out more about bad faith and legitimate defenses.
[back to notice text] Question: Who can use the ACPA?
Answer: The owner of any trademark protected under US federal law, whether registered or not, so long as the mark
- is distinctive at the time of registration of the domain name, or
- is a famous mark at the time of registration, or
- is a "mark, word or name" that is protected because it is reserved for use by the Red Cross or the U.S. Olympic Committee.
[back to notice text] Question: How does the ACPA apply to domain names?
Answer: It makes it illegal to register, "traffic in" or use a domain name is identical or confusingly similar to a distinctive or famous mark (or which dilutes a famous mark).
[back to notice text] Question: What does "distinctive" mean?
Answer: "Distinctive" is a term of art in trademark law and is determined by analyzing several factors. Essentially, a mark is distinctive when the consumers have come to recognize it as the source or origin of certain goods or services. Take the word "bronco": consumers recognize it as a brand of automobile; therefore it is distinctive as to automobiles. But it is not distinctive as to horses, where it would be generic, nor as to baby diapers since there is no one offering such goods under that label. Some words can never become distinctive as marks if they generically describe the very good or service for which they are used (i.e., one cannot trademark the word "basketball" to describe a brand of basketballs.) In general, if a word has been in substantially exclusive and continuous use as a mark in commerce for five years, it will be deemed distinctive as to those goods/services 15 USC 1052(f).
[back to notice text] Question: What does "traffics in" mean?
Answer: According to the ACPA, it refers to "transactions that include, but are not limited to, sales, purchases, loans, pledges, licenses, exchanges of currency," and any other transfer for payment. In other words, any transaction involving the domain name that generates value for the cybersquatter.
[back to notice text] Question: What are the possible penalties for violating the ACPA?
Answer: Normally, the domain name holder will not evaporate, and can be sued directly. In such a case, the court can order the cancellation or transfer of the domain registration, as well as require the payment of money damages to the plaintiff trademark owner. The trademark owner can recover (1) the domain holder's profits from use of the mark, (2) the trademark owner's damages resulting from harm to the value of mark, and (3) court costs as "actual damages." In determining the award to be paid, the court can choose to award up to three times the amount of actual damages. Attorney fees may be awarded in exceptional circumstances, such as when there was a willful and malicious violation. Instead of having to prove the amount of "actual" damages suffered as above, the mark owner can instead request payment of "statutory damages" from $1000 and $100,000 per domain name.
[back to notice text] Question: What exactly are the rights a trademark owner has?
Answer: In the US, trademark rights come from actual use of the mark to label one's services or products or they come from filing an application with the Patent and Trademark Office (PTO) that states an intention to use the mark in future commerce. In most foreign countries, trademarks are valid only upon registration. There are two trademark rights: the right to use (or authorize use) and the right to register. The person who establishes priority rights in a mark gains the exclusive right to use it to label or identify their goods or services, and to authorize others to do so. According to the Lanham Act, determining who has priority rights in a mark involves establishing who was the first to use it to identify his/her goods. The PTO determines who has the right to register the mark. Someone who registers a trademark with the intent to use it gains "constructive use" when he/she begins using it, which entitles him/her to nationwide priority in the mark. However, if two users claim ownership of the same mark (or similar marks) at the same time, and neither has registered it, a court must decide who has the right to the mark. The court can issue an injunction (a ruling that requires other people to stop using the mark) or award damages if people other than the owner use the trademark (infringement). Trademark owners do not acquire the exclusive ownership of words. They only obtain the right to use the mark in commerce and to prevent competitors in the same line of goods or services from using a confusingly similar mark. The same word can therefore be trademarked by different producers to label different kinds of goods. Examples are Delta Airlines and Delta Faucets. Owners of famous marks have broader rights to use their marks than do owners of less-well-known marks. They can prevent uses of their marks by others on goods that do not even compete with the famous product.
[back to notice text] Question: What are the limits of trademark rights?
Answer:
There are many limits, including:
- Fair Use
There are two situations where the doctrine of fair use prevents infringement:
- The term is a way to describe another good or service, using its descriptive term and not its secondary meaning. The idea behind this fair use is that a trademark holder does not have the exclusive right to use a word that is merely descriptive, since this decreases the words available to describe. If the term is not used to label any particular goods or services at all, but is perhaps used in a literary fashion as part of a narrative, then this is a non-commercial use even if the narrative is commercially sold.
- Nominative fair use
This is when a potential infringer (or defendant) uses the registered trademark to identify the trademark holder's product or service in conjunction with his or her own. To invoke this defense, the defendant must prove the following elements:
- the product or service cannot be readily identified without the mark
- he/she only uses as much of the mark as is necessary to identify the goods or services
- he/she does nothing with the mark to suggest that the trademark holder has given his approval to the defendant
- Parody Use
Parodies of trademarked products have traditionally been permitted in print and other media publications. A parody must convey two simultaneous -- and contradictory -- messages: that it is the original, but also that it is not the original and is instead a parody.
- Non-commercial Use
If no income is solicited or earned by using someone else's mark, this use is not normally infringement. Trademark rights protect consumers from purchasing inferior goods because of false labeling. If no goods or services are being offered, or the goods would not be confused with those of the mark owner, or if the term is being used in a literary sense, but not to label or otherwise identify the origin of other goods or services, then the term is not being used commercially.
- Product Comparison and News Reporting
Even in a commercial use, you can refer to someone else?s goods by their trademarked name when comparing them to other products. News reporting is also exempt.
- Geographic Limitations
A trademark is protected only within the geographic area where the mark is used and its reputation is established. For federally registered marks, protection is nationwide. For other marks, geographical use must be considered. For example, if John Doe owns the mark Timothy's Bakery in Boston, there is not likely to be any infringement if Jane Roe uses Timothy's Bakery to describe a bakery in Los Angeles. They don't sell to the same customers, so those customers aren't confused.
- Non-competing or Non-confusing Use
Trademark rights only protect the particular type of goods and services that the mark owner is selling under the trademark. Some rights to expansion into related product lines have been recognized, but generally, if you are selling goods or services that do not remotely compete with those of the mark owner, this is generally strong evidence that consumers would not be confused and that no infringement exists. This defense may not exist if the mark is a famous one, however. In dilution cases, confusion is not the standard, so use on any type of good or service might cause infringement by dilution of a famous mark.
[back to notice text] Question: What is a "distinctive trademark"?
Answer: Distinctive trademarks are those which assume a secondary meaning by indentifying a source of goods or services. They include words, phrases, logos, symbols, slogans or other things that identify the source of the product and make it distinctive. A trademark can either be inherently distinctive, or it can gain its distinctiveness over a period of time by being associated with a particular product or service (for instance, the Nike swoosh).
[back to notice text] Question: What is "goodwill"?
Answer: Goodwill is a business or trademark owner's image, relationship with customers and suppliers, good reputation, and expectation of repeat patronage. It is the value a trademark owner builds in a brand.
[back to notice text] Question: What is 15 U.S.C.
Answer: 15 U.S.C.
[back to notice text] Question: What is trademark tarnishment?
Answer: Trademark "tarnishment," a kind of dilution, can occur if a non-owner uses the mark in connection with shoddy or unsavory products or services, illegal activity, or activity that is likely to offend the average person. For example, using a Walt Disney trademark on a website filled with pornography could be claimed to tarnish the reputation of the Disney mark in the minds of viewers who saw this material. Tarnishment is not always actionable -- it might be non-commercial or parody use.
[back to notice text] Question: What is WHOIS information?
Answer: WHOIS is a searchable database maintained by registries and registrars that contains information about domain name registrations in the com, net, org, edu, and ISO 3166 country code top-level domains. Also, the protocol, or set of rules, that describes the application used to access the database. Registrants involved in malfeasance will often provide false information for their listings on WHOIS. So will registrants concerned with privacy who do not wish to make their home addresses, telephone numbers, or email addresses public.
|