<<

IP Insight

DEBORAH A. WILCOX AND COURTNI E. THORPE A Quick Fix for Online Infringement

rademark infringements are pervasive on the to restore the material to the website.1 Internet. One recent scam involves fake offers Many ISPs have voluntarily extended their DMCA Tfor free or discounted goods and services in policies and procedures to cover in addi- exchange for posting links and “liking” something tion to , and they will generally respond on Facebook. These scammers use the trademarks of to a takedown notice based on trademark rights by well-known companies in a variety of industries—from either removing the infringing material or disabling the airlines to restaurants—to publicize offers on websites website. This became commonplace in the wake of that look legitimate when they are not. The unauthor- the 2008 decision made by the Second Circuit Court of ized uses of the trademarks cause confusion Appeals in Tiffany (NJ) Inc. v. eBay Inc., 600 F.3d 93, among consumers and constitute trademark 94 U.S.P.Q.2d 1188 (2d Cir. 2010). In Tiffany v. eBay, infringement, among other things. Companies the Second Circuit held that ISPs charged with host- are taking action to protect their from ing websites that infringe on a third party’s trademark this kind of abuse. rights may face liability for contributory infringement if One of the most efficient and cost-effective they continue to provide server space to the infringer means of addressing these scams is by contact- despite knowing about the infringement. The district ing the Internet service providers (ISPs) to ask court found that eBay’s practice of promptly removing them to remove the content or otherwise dis- challenged listings after receiving notices of trademark able access to the sites where the infringements infringement protected it from contributory liability, occur. Many ISPs have developed acceptable and the Second Circuit Court of Appeals agreed. use policies that prohibit trademark infringe- ment and provide for infringing material to be Identification of the Correct Internet Service Provider taken down when trademark owners report The most difficult step in the takedown process violations. This article discusses best practices often may be locating the correct ISP that is providing for handling removal of material infringing on the hosting services and server space for the infringing trademarks from websites. site. The first step is to identify the IP address for the infringing site. The starting point should be the WHOIS The Digital Millennium Act: A Work- record for the domain name in question. Each regis- able Framework trar is required to maintain a WHOIS database, and There is no particular trademark law that there are some websites that search WHOIS records specifies how ISPs should react to notices of trade- across many registrars (www.betterwhois.com is one mark infringement. Although the Digital Millennium example). At a minimum, the WHOIS record should Copyright Act (DMCA) has been in effect since 1998 to provide the name of the registrar of the domain name address online and the liability and the name of the domain server. In some cases, the of ISPs hosting such content, no parallel legislation registrar may also be providing the hosting services for exists specifically to address these issues in the trade- the domain name. mark area. The DMCA procedure is instructive, though, The WHOIS record should also have the name and in establishing best practices for handling material that contact information for the owner of the domain name infringes a trademark. (the registrant), and the name and contact information Under the DMCA, every ISP has a duty to develop for an administrator and technical contact person for a policy and procedures for the removal of infringing the domain name. Because many owners of domain material from websites it controls and operates on its names are now using privacy services available servers. To comply with the DMCA, an ISP must take through the various registrars, instead of information down infringing material upon receiving proper notice for an individual or a company, the WHOIS record will from the copyright owner. Generally, upon receiving indicate that this information is privacy protected. The this notice, the ISP will take down the infringing mate- privacy services generally have terms of service that rial and forward the notice to the website owner, who permit the name and contact information to be dis- will then have an opportunity to present a counter- closed when infringement is alleged. For purposes of notice if it claims the material does not infringe copy- sending a takedown notice, it is not necessary to iden- right. Then, if the copyright owner does not file a tify the website owner. It is helpful, however, to have lawsuit to protect his or her rights, the ISP is required this information to establish a pattern of infringement

16 | The Federal Lawyer | July 2012 perpetrated by one individual (some ISPs will disable asserts trademark rights and does not run afoul of the infringer’s account in cases of repeat offenders) or § 512(f) by citing the DMCA as the authority for the to follow up with a cease-and-desist letter directly to notice. To the extent the infringement entails content the individual. that infringes both trademark and copyright, it may A Domain Information Groper (DIG) search can be prudent to send two separate notices, one dealing be conducted on the domain name in order to obtain just with the trademark issues and one that is strictly a an IP address for an infringing website.2 Free DIG DMCA notice addressing the copyright infringement. searches are available for individual use at www.kloth. net. Once the IP address is identified, searching the Conclusion American Registry for Internet Numbers (ARIN) data- Sending a takedown notice can be a quick and easy base at www.arin.net will provide the name and con- way to stop trademark infringement on a particular tact information for the ISP that has been assigned that website. This technique is likely to be most effective particular range of IP addresses. Usually an address or against an infringer who is new to Internet marketing e-mail address for reporting abuse is available from and lacks an understanding of the serious nature of ARIN; however, the information available on ARIN is trademark rights in the United States. When dealing not always current and accurate. with professional infringers who make their living by Another option is to search the list of DMCA- conducting this type of activity, it can be harder to stop designated agents on file at the U.S. Copyright office, them with one takedown notice; it may take several available at www.copyright.gov/onlinesp/list/a_agents. rounds of notices as well as cease-and-desist letters to html. As noted above, the DMCA-designated agent obtain the desired result. As always, keeping a detailed often will also be the person who will handle trade- record of the infringing websites and the steps taken mark infringement claims for the ISP, or at least the against the infringers will assist if litigation becomes person who would be in a better position to process necessary. TFL the notice than others in the company. Deborah A. Wilcox is a partner and office coordinator Content of the Trademark Takedown Notice for Baker Hostetler LLP’s Intellectual , Technol- Once the proper ISP is identified, the next step is ogy and Media Practice in Cleveland, Ohio. SHe man- to review the ISP’s trademark policies, which are fre- ages complex copyright, trademark, and e-commerce quently part of the ISP’s Acceptable Use Policy (AUP), litigation and counsels clients on trademark and copy- Terms of Service (TOS), or Terms of Use. Usually right registration and licensing, anticounterfeiting there will be a heading or subheading for Intellectual strategies, and digital media and advertising matters. Property, Copyright, or Trademark Infringement. Many She is currently serving as the president of the Cleve- ISPs have simply added trademark claims under the land Intellectual Association. Courtni umbrella of their DMCA policy. E. Thorpe is an associate in the As for the content of the takedown notice, if not Group at Baker Hostetler LLP in Cleveland, Ohio, where otherwise specified in the ISP’s policy, trademark own- she handles disputes involving online trademark and ers should provide all the information typically found copyright infringement, counsels clients on IP portfolio in a DMCA notice: management, prosecutes trademark applications, and assists with IP ligitagion. © 2012 Deborah A. Wilcox and Courtni E. Thorpe. All rights reserved. • the name, contact information, and electronic signa- ture of the person giving notice; Endnotes • the URL of the infringing website; 1It is important to note that the DMCA is limited • information sufficient to identify the infringing to copyright protection, and the law prohibits send- material; ing false notices requesting the takedown of material • a recitation stating a good faith belief that the use that is not protected by copyright or is not infringing of the infringing material is not authorized by the copyright. Case law is still developing in this area, but copyright owner or the law; and improperly asserting trademark infringement under the • a certification under penalty of perjury that the DMCA might be considered an abusive copyright claim information in the notice is accurate and that the under § 512(f) of the DMCA. See Online Policy Group person submitting the notice is either the copyright v. Diebold Inc., 72 U.S.P.Q.2d 1200 (N.D. Cal. 2004) owner or the owner’s authorized agent. (sending takedown notices to ISPs when the defendant knew the material in question was not protected by The notice should also include the basis for dem- copyright found to be abusive copyright claims under onstrating trademark rights, including any registration DMCA). numbers or serial numbers assigned by the U.S. 2As explained on www.kloth.net, “The DIG utility and Trademark Office. It is also helpful to reference (domain information groper) is a Unix tool, which can the ISP’s specific policy that is being violated. be used to gather information from the Domain Name Another best practice is to be sure to word the System servers.” trademark takedown notice carefully so that it clearly

July 2012 | The Federal Lawyer | 17