The Case of the Uniform Domain Name Dispute Resolution Policy

Total Page:16

File Type:pdf, Size:1020Kb

The Case of the Uniform Domain Name Dispute Resolution Policy William & Mary Law Review Volume 43 (2001-2002) Issue 1 Article 7 October 2001 Designing Non-National Systems: The Case of the Uniform Domain Name Dispute Resolution Policy Laurence R. Helfer Graeme B. Dinwoodie [email protected] Follow this and additional works at: https://scholarship.law.wm.edu/wmlr Part of the International Law Commons, and the Science and Technology Law Commons Repository Citation Laurence R. Helfer and Graeme B. Dinwoodie, Designing Non-National Systems: The Case of the Uniform Domain Name Dispute Resolution Policy, 43 Wm. & Mary L. Rev. 141 (2001), https://scholarship.law.wm.edu/wmlr/vol43/iss1/7 Copyright c 2001 by the authors. This article is brought to you by the William & Mary Law School Scholarship Repository. https://scholarship.law.wm.edu/wmlr DESIGNING NON-NATIONAL SYSTEMS: THE CASE OF THE UNIFORM DOMAIN NAME DISPUTE RESOLUTION POLICY LAURENCE R. HELFER & GRAEME B. DINwoODIE* TABLE OF CONTENTS INTRODUCTION ..................................... 144 I. HYBRID NON-NATIONAL SYSTEMS: THE EXAMPLE OF THE UDRP ...................... 154 A FramingTrademark-Domain Name Conflicts ........ 154 B. The Evolution of Non-NationalDispute Settlement for Cybersquatting ..................... 157 1. The gTLD-Mo U's Administrative Challenge Panels (ACPs) ................................ 158 a. The gTLD-Mo U's Authority for Creatingthe ACPs .......................... 159 b. The Hybrid Nature of ACP Dispute Settlement .... 160 c. Narrowing the Scope of EligibleDisputes ....... 163 2. The WIPO Domain Name Consultative Process ..... 164 a. Authority for WIPO Consultations and Proposals .............................. 166 b. The Scope and Hybrid Nature of Dispute Settlement Under WIPO's Proposals ............ 171 (1) WIPO's Interim Report .................... 171 * Larry Helfer is Professor of Law at Loyola Law School, Los Angeles, and Graeme Dinwoodie is Professor of Law at the Chicago-Kent College ofLaw. Copyright 2001, Laurence R. Helfer and Graeme B. Dinwoodie. Thanks to Robert Mnookin, Judith Resnik, Hal Krent, MichaelVan Alstine, Brian Havel, Paul Stephan, and Roger Alford for reviewing early drafts of this Article or discussing aspects of these fascinating issues with us. We also benefitted greatly from presentation of the ideas contained herein in a variety of fora, including the Stanford-Yale Junior Faculty Forum, the Ninth Annual Fordham Law School Conference on International IntellectualProperty Law and Policy, the Chicago-Kent College of Law Faculty Mini-Roundtable, the Forum on Private International Law organized by the World Intellectual Property Organization, and the International Law Weekend West Conference at Pepperdine University School of Law. Work on this Article was supported by fellowships from Chicago-Kent College of Law and Loyola Law School, Los Angeles. WILLIAM AND MARY LAW REVIEW [Vol. 43:141 (2) WIPO's FinalReport ...................... 174 c. Assessment of the WIPO Process ............... 177 3. ICANN's Review and Implementation of the UDRP ................................ 178 a. Expedited Implementation Timetable ........... 178 b. ICANN's Authority for Creating the UDRP ....... 180 c. Narrowingthe Scope of Eligible Disputes While Maintaininga Hybrid Dispute Settlement Model.. 182 4. The UDRP in Practice ......................... 187 II. CHECKING FUNCTIONS IN THE UDRP ................. 189 A. The Values of Hybridization in Non-National Systems ........................... 191 B. Checking Functions in InternationalArbitration and in the UDRP .................................. 193 1. Checking Functions in InternationalArbitration .... 193 2. Misplaced and Inadequate Arbitral Checking Functionsin the UDRP ................ 199 a. CreationalChecking Functions ................ 199 b. External Checking Functions .................. 201 c. Internal Checking Functions .................. 210 C. Checking Functions in MinisterialDecision-Making Systems and in the UDRP ........................ 213 1. Checking Functions in MinisterialDecision-Making System s ..................................... 213 2. Misplaced and Inadequate Ministerial Checking Functions in the UDRP ................ 215 D. Checking Functions in InternationalAdjudication and in the UDRP ............................... 218 1. Checking Functions in InternationalAdjudication .. 218 2. Misplaced and InadequateAdjudicatory Checking Functionsin the UDRP ........................ 223 a. CreationalChecking Functions ................ 224 b. External Checking Functions .................. 225 c. Internal Checking Functions .................. 230 II. EXTENDING THE NON-NATIONAL MODEL OF LAWMAKING AND DISPUTE SETTLEMENT ............. 237 A. Replicating the UDRP:Are Technological Monopolies Essential? ........................... 238 2001] DESIGNING NON-NATIONAL SYSTEMS 143 B. Designing Checking Functionsfor Non-National Systems ........................... 242 1. The Importance of Legitimacy ................... 244 2. Deliberative Construction in a Non-NationalEra: The Case for Speed ............................ 245 3. InstitutionalReform: Refurbishing Non-National Lawmaking ........... 248 4. HorizontalNon-National Relations: Competitive Federalism ........................ 250 5. Vertical Non-NationalRelations: A UDRP Appellate Body? ....................... 251 6. Relations Between Non-Nationaland NationalSystems ............................. 253 a. Subsidiarityand Deference ................... 255 b. Choice of Law in Non-National Systems ......... 260 c. Relative Influence of Different National Legal Systems .............................. 266 7. Relations Between Non-National and International Systems ..................................... 268 CONCLUSION ....................................... 274 144 WILLIAM AND MARY LAW REVIEW [Vol. 43:141 INTRODUCTION The rapid development of digital technologies is profoundly altering the means by which transborder disputes are settled and, in turn, how rules governing transborder activity are developed. A defining characteristic of digital technologies is their ability to transcend territorial boundaries, thereby challenging the unfettered jurisdiction of any single nation-state and complicating the appli- cation and enforcement of existing legal rules. Disputes implicating such technologies account for an increasingly significant portion of commercial litigation, and digital commerce has become a central feature of contemporary economic activity. National governments and private parties have thus come under pressure to find new ways to cut through the complex, cross-border disputes of the type that digital technologies engender. Can existing lawmaking and dispute settlement mechanisms handle these growing pressures? The number of institutions operating outside the confines of national borders have become more numerous and heterogeneous in the last decades of the twentieth century. Indeed, their growth appears ex- ponential.1 Whether created by governments2 or by private 1. See ALAN REDFERN & MARTIN HUNTER, LAW AND PRACTICE OF INTERNATIONAL COMMERCIALARBrTRATION44-58 (1999) (discussing profusion of venues for institutional and ad hoc arbitration); Jonathan I. Charney, Is InternationalLaw Threatened by Multiple InternationalTribunals?, 271 RECUEILDES COURS 101, 121-23 [COLLECTED COURSES OFTHE HAGUE ACADEMY OF INTERNATIONAL LAW] (1999) (discussing recent growth in number of international courts and tribunals); Laurence R. Heifer, Forum ShoppingforHumanRights, 148 U. PA. L. REv. 285, 298-99 (1999) [hereinafter Heifer, Forum Shopping] (discussing expansion of fora in which international human rights claims can be reviewed). 2. Dispute settlement institutions created bygovernments include permanentjuridical bodies expressly empowered to hear claims concerning violations of treaties and more informal quasi-judicial tribunals or review bodies, whose interpretive and remedial powers are more ambiguous. Compare, e.g., Statute of the International Court of Justice, Oct. 24, 1945, 59 Stat. 1055 (establishing International Court of Justice), and Understanding on Rules and Procedures Governing the Settlement of Disputes, Apr. 15, 1994, [hereinafter DSU], and Marrakesh Agreement Establishing the World Trade Organization [hereinafter WTO Agreement]; and Legal Instruments-Results of the Uruguay Round, Annex 2, LEGAL INSTRUMENTS-RESULTiS OF THE URUGUAY ROUND, 31, 33 I.L.M. 112 (1994) (establishing WTO dispute settlement panels and Appellate Body), and Convention for the Protection of Human Rights and Fundamental Freedoms as amendedbyProtocoINo. 11, Eur. T.S. No. 155 (establishing permanent European Court of Human Rights), with, e.g., Optional Protocol to the International Covenant on Civil and Political Rights, adopted Dec. 16, 1966, G.A. Res. 2001] DESIGNING NON-NATIONAL SYSTEMS 145 parties,' however, international dispute settlement mechanisms (broadly construed as encompassing classical international,4 supranational,' and anational6 mechanisms) share a common characteristic, one that might be termed "deliberative construction." International dispute settlement mechanisms do not spring up 2200,21 U.N. GAOR, Supp. No. 16, at 52, 59, U.N. Doc. A/6316, 999 U.N.T.S. 171 (entered into force Mar. 23, 1976) (establishing U.N. Human Rights Committee), and International Convention on the Elimination of All Forms of Racial Discrimination, opened for signature Mar. 7, 1966, 660 U.N.T.S. 195, 212-38 (entered into force Jan. 4, 1969) (establishing the Committee on the Elimination of Racial Discrimination). 3. Institutional and ad hoc
Recommended publications
  • Outcomes Report of the GNSO Ad Hoc Group on Domain Tasting
    GNSO Outcomes Report on Domain Tasting Doc. No.: Date: 2007/02/04 4 October, 2007 OUTCOMES REPORT OF THE GNSO AD HOC GROUP ON DOMAIN NAME TASTING 4 October 2007 Group Chair: Mike Rodenbaugh ICANN Staff: Olof Nordling, Patrick Jones STATUS OF THIS DOCUMENT This is the final version of the Outcomes Report from the GNSO ad hoc group on Domain Name Tasting, submitted to the GNSO Council on 4 October, 2007. GNSO Outcomes Report on Domain Tasting v1.6 Authors: Mike Rodenbaugh, [email protected] , Olof Nordling, [email protected] , Patrick Jones, [email protected], Page 1 of 144 GNSO Outcomes Report on Domain Tasting Doc. No.: Date: 2007/02/04 4 October, 2007 TABLE OF CONTENTS 1 EXECUTIVE SUMMARY 3 2 OBJECTIVE 5 3 BACKGROUND 7 4 OUTCOMES 10 5 NEXT STEPS 32 ANNEX 1 - SUBSCRIBERS TO THE DT LIST 33 ANNEX 2 - RFI RESPONSES 34 ANNEX 3 - EXPERIENCES FROM CCTLDS 97 ANNEX 4 - COMMENTS FROM UDRP PROVIDERS 104 ANNEX 5 – IPC CONSTITUENCY SUPPLEMENTAL RFI116 ANNEX 6 – REQUEST TO VERISIGN 144 GNSO Outcomes Report on Domain Tasting v1.6 Authors: Mike Rodenbaugh, [email protected] , Olof Nordling, [email protected] , Patrick Jones, [email protected], Page 2 of 144 GNSO Outcomes Report on Domain Tasting Doc. No.: Date: 2007/02/04 4 October, 2007 1 Executive summary 1.1 Background Following a request from the At-Large Advisory Committee in spring 2007, the GNSO Council called for an Issues Report on Domain Tasting from ICANN Staff in May 2007. This Issues Report, available at http://gnso.icann.org/issues/domain- tasting/gnso-domain-tasting-report-14jun07.pdf was discussed at the ICANN San Juan meeting, where the GNSO Council on 27 June 2007 (minutes at http://gnso.icann.org/meetings/minutes-gnso-27jun07.shtml) resolved to establish an ad hoc group for further fact-finding on the practice of domain tasting.
    [Show full text]
  • July 2017 Your Property Sale Agreement: Be Careful How It’S Worded!
    With Compliments Upper Ground Level Tel: 011 880 3300 8 Arnold Road Fax: 011 880 9128 Rosebank Email: [email protected] 2196 Website: www.hirschowitz-flionis.co.za Forward email Online Printable Version July 2017 Your Property Sale Agreement: Be Careful How It’s Worded! The bond clause and the better offer YOUR PROPERTY SALE AGREEMENT: BE CAREFUL HOW IT’S WORDED! One clause, two interpretations “In war and litigation, both A hard lesson for the sides suffer” (old Roman seller proverb) Is Your Domain Name at Risk Here’s yet another reminder from our from “Drop Catching”? courts on how important it is – if you want to avoid the trials of litigation - for What is “domain drop you to have your property sale catching”? agreement drawn up professionally. An administrative One thing it must do, as the case in oversight takes a website question clearly shows, is record the down; and a price-tag of terms of your agreement precisely and R200k to get it back without any room for argument. Don’t let that happen to your business! This High Court case revolved around a “bond clause” in a sale agreement. A bond clause is a standard protection for any buyer who needs finance in order to pay the purchase price. It’s a “suspensive” clause that means the sale agreement only Trusts: New Directive on becomes enforceable if and when it is fulfilled. Independent Trustees The bond clause and the better offer Evicting Your Troublesome Tenant: More Problems with The bond clause in an agreement of sale required the buyers, within 30 PIE days, to obtain from a bank a loan offer, quotation and pre-agreement.
    [Show full text]
  • The Truth in Domain Names Act of 2003 and a Preventative Measure to Combat Typosquatting, 89 Cornell L
    Cornell Law Review Volume 89 Article 3 Issue 6 September 2004 The rT uth in Domain Names Act of 2003 and a Preventative Measure to Combat Typosquatting Christopher G. Clark Follow this and additional works at: http://scholarship.law.cornell.edu/clr Part of the Law Commons Recommended Citation Christopher G. Clark, The Truth in Domain Names Act of 2003 and a Preventative Measure to Combat Typosquatting, 89 Cornell L. Rev. 1476 (2004) Available at: http://scholarship.law.cornell.edu/clr/vol89/iss6/3 This Note is brought to you for free and open access by the Journals at Scholarship@Cornell Law: A Digital Repository. It has been accepted for inclusion in Cornell Law Review by an authorized administrator of Scholarship@Cornell Law: A Digital Repository. For more information, please contact [email protected]. NOTE THE TRUTH IN DOMAIN NAMES ACT OF 2003 AND A PREVENTATIVE MEASURE TO COMBAT TYPOSQUATTING Christopher G. Clarkt INTRODUCTION ................................................. 1477 I. CYBERSQUATTING AND TYPOSQUATTING ON THE INFORMATION SUPERHIGHWAY ............................ 1482 A. The Structure of the Internet: A Brief Overview .... 1482 B. Reserving Your Space in Cyberspace: The Domain Name Registration Process .......................... 1485 C. Typosquatting and Cybersquatting: Profit by D eception .......................................... 1487 D. The Case of the Notorious Typosquatter ............ 1491 II. LIVING IN A TYPOSQUATrER'S PARADISE: LIMITED DETERRENCE THROUGH FRAGMENTED LITIGATION AND INEFFECTIVE ARBITRATION ............................... 1492 A. The Mid-to-Late 1990s: The Federal Trademark D ilution Act ........................................ 1493 B. 1999-2003: The Anticybersquatting Consumer Protection Act ...................................... 1496 C. ICANN and Arbitration Under the Uniform Domain Name Resolution Policy .................... 1501 D. The Return of the Notorious Typosquatter ........
    [Show full text]
  • Plenty of Phish in the Sea: Analyzing Potential Pre-Attack Surfaces
    Plenty of Phish in the Sea: Analyzing Potential Pre-Attack Surfaces Tobias Urban13[0000−0003−0908−0038], Matteo Große-Kampmann123, Dennis Tatang3, Thorsten Holz3, and Norbert Pohlmann1 1 Institute for Internet-Security, Westphalian University of Applied Sciences, Germany 2 Aware7 GmbH, Germany 3 Ruhr-Universit¨atBochum, Germany Abstract. Advanced Persistent Threats (APTs) are one of the main challenges in modern computer security. They are planned and performed by well-funded, highly-trained and often state-based actors. The first step of such an attack is the reconnaissance of the target. In this phase, the adversary tries to gather as much intelligence on the victim as possible to prepare further actions. An essential part of this initial data collection phase is the identification of possible gateways to intrude the target. In this paper, we aim to analyze the data that threat actors can use to plan their attacks. To do so, we analyze in a first step 93 APT reports and find that most (80 %) of them begin by sending phishing emails to their victims. Based on this analysis, we measure the extent of data openly available of 30 entities to understand if and how much data they leak that can potentially be used by an adversary to craft sophisticated spear phishing emails. We then use this data to quantify how many employees are potential targets for such attacks. We show that 83 % of the analyzed entities leak several attributes of uses, which can all be used to craft sophisticated phishing emails. Keywords: advanced persistent threats · phishing · OSINT · reconnais- sance · MITRE · cyber kill chain · measurement study.
    [Show full text]
  • Property Rights As a Bulwark Against Dns Censorship
    MASTERS OF THEIR OWN DOMAINS: PROPERTY RIGHTS AS A BULWARK AGAINST DNS CENSORSHIP NICHOLAS NUGENT* It is increasingly becoming the practice of domain name system (DNS) intermediaries to seize domain names used by lawful websites for violating acceptable use policies related to offensive content or hate speech. Website hosting companies and social media platforms, entities that use but do not operate core Internet infrastructure, have long reserved and exercised their rights to gate their offerings, leaving booted speakers free to migrate to other providers. But registrants deprived of their domain names lack similar options to maintain their presence in cyberspace. The loss of a domain name inexorably results in the takedown of any website that uses the domain name, even if hosted elsewhere, and leaves a potentially invaluable asset essentially free for the taking by another. Proponents of Internet freedom have therefore argued that companies that operate foundational Internet infrastructure, such as the DNS, should play no role in policing content, no matter how deplorable, and that DNS censorship, once normalized, could easily spread to other minority groups and viewpoints. Acknowledging that DNS intermediaries—the companies that offer domain names and make them operational on the Internet— are private actors whose actions are not subject to First Amendment constraints, critics of DNS censorship seem to tacitly concede that DNS intermediaries may take whatever actions are permitted under their terms of service, appealing instead to policy arguments or calls to enact new protective legislation. But I argue that registrants already possess the legal means to protect themselves from domain name seizure through the property rights they acquire in their domain names.
    [Show full text]
  • Plenty of Phish in the Sea: Analyzing Potential Pre-Attack Surfaces
    Plenty of Phish in the Sea: Analyzing Potential Pre-Attack Surfaces Tobias Urban13[0000−0003−0908−0038], Matteo Große-Kampmann123, Dennis Tatang3, Thorsten Holz3, and Norbert Pohlmann1 1 Institute for Internet-Security, Westphalian University of Applied Sciences, Germany 2 Aware7 GmbH, Germany 3 Ruhr-Universit¨atBochum, Germany Abstract. Advanced Persistent Threats (APTs) are one of the main challenges in modern computer security. They are planned and performed by well-funded, highly-trained, and often state-based actors. The first step of such an attack is the reconnaissance of the target. In this phase, the adversary tries to gather as much intelligence on the victim as pos- sible to prepare further actions. An essential part of this initial data collection phase is the identification of possible gateways to intrude the target. In this paper, we aim to analyze the data that threat actors can use to plan their attacks. To do so, we analyze in a first step 93 APT reports and find that most (80 %) of them begin by sending phishing emails to their victims. Based on this analysis, we measure the extent of data openly available of 30 entities to understand if and how much data they leak that can potentially be used by an adversary to craft sophisticated spear- phishing emails. We then use this data to quantify how many employees are potential targets for such attacks. We show that 83 % of the analyzed entities leak several attributes of uses, which can all be used to craft sophisticated phishing emails. Keywords: advanced persistent threats · phishing · OSINT · reconnais- sance · MITRE · cyber kill chain · measurement study.
    [Show full text]
  • Evolving Property Rights in Domain Names Jeffrey R
    Seton Hall University eRepository @ Seton Hall Law School Student Scholarship Seton Hall Law 2010 Evolving Property Rights in Domain Names Jeffrey R. Wiedmann Seton Hall Law Follow this and additional works at: https://scholarship.shu.edu/student_scholarship Part of the Internet Law Commons, and the Property Law and Real Estate Commons Recommended Citation Wiedmann, Jeffrey R., "Evolving Property Rights in Domain Names" (2010). Law School Student Scholarship. 86. https://scholarship.shu.edu/student_scholarship/86 Jeffrey Wiedmann EVOLVING PROPERTY RIGHTS IN DOMAIN NAMES Jeffrey Weidmann May 1, 2009 PART I: INTRODUCTION Unless you have been living under a rock for the past fifteen years you have undoubtedly noticed that internet commerce has blossomed into a driving engine in the economy.1 Property rights have been rapidly evolving thanks in large part to the birth of the internet, and the accompanying technological and intellectual property creations that were created as a result. With this new technology came savvy businesspeople that looked to the internet to turn a profit. Forward thinking internet users registered domain names early on in hopes of selling for profit. Creditors have utilized domain names as security for debts. This comment will focus on property rights in domain names, namely that of a creditor. Property is a legal creation that has been viewed as “an abstract right or legally- constructed relationship among people with respect to things”2 or “a bundle of rights, powers, 1 Internet World Stats: Usage and World Population Statistics, http://www.internetworldstats.com/emarketing.htm (last visited April 1, 2010) (The number of users on the internet has gone from 16 million, or .4% of the world’s population in 1995 to 1.8 billion, or roughly 26.6% of the world’s population in December 2009).
    [Show full text]
  • Cybersquatting, Typosquatting, and Domaining
    CYBERSQUATTING, TYPOSQUATTING, AND DOMAINING: TEN YEARS UNDER THE ANTI-CYBERSQUATTING CONSUMER PROTECTION ACT By: Carl C. Butzer and Jason P. Reinsch In Leviathan (1651), Thomas Hobbes described the natural state of the human condition as “solitary, poor, nasty, brutish, and short.” The solution to this chaos, he argued, was government and the rules of civil law. In the 1800s, America’s “Wild West” (including outlaws like the notorious Texas gunfighter, John Wesley Hardin)1 tested existing laws and government. History has proven that the challenges posed by America’s last “new frontier” were not insurmountable. The turmoil observed by Hobbes and the Texas Rangers2 seems to pale in comparison to the disorder caused by the Internet over the past 15 years. A senior IBM consultant was recently quoted as saying “The Internet has finally taken on the characteristics of the Wild West where no one is to be trusted.” http://news.techworld.com/security/3201556/the-internet-is-the-new-wild- west-reports-ibm-consultant/ (last visited September 21, 2009). It is no secret that legislators, jurists, and organizations – despite many years of effort – continue to search for solutions to the complex legal issues spawned by the World Wide Web, a technological forum that allows billions of people to communicate almost instantaneously. 1 Hardin (1853-95), who reportedly shot 30 men, was so mean he once killed a man for snoring too loudly. Hardin later complained: “They tell lots of lies about me. They say I killed six or seven men for snoring. Well, it ain’t true, I only killed one man for snoring.” Trachtman, Paul (1974).
    [Show full text]