the presentation
Transcription
the presentation
“The New Frontier” of Brand Enforcement on the Internet: A U.S. Perspective Steven J. Wadyka, Jr. Shareholder Greenberg Traurig, LLP Washington, D.C. USA (202) 331-3105 [email protected] GREENBERG TRAURIG, LLP n ATTORNEYS AT LAW n WWW.GTLAW.COM ©2011. All rights reserved. Overview of Internet Brand Enforcement Ø Challenges/costs/benefits Ø Internet marketing, search engines and keyword advertising Ø Secondary liability for online service providers Ø Brand enforcement in social media Ø Remedies against “rogue” websites Ø Conclusions and predictions Challenges Facing Brand Owners in Internet Enforcement Ø Potential IP rights violators • Search engines selling trademarks as “keywords” (Google, Yahoo!, Bing) • Domain name registrars (GoDaddy) • Social networking sites (Facebook, Twitter, LinkedIn) • “Rogue” websites/online counterfeiters • Auction sites (eBay) • Web hosting providers/ISPs • Payment processors (PayPal) Challenges Facing Brand Owners in Internet Enforcement Ø Jurisdictional issues • How to subject offshore (and often anonymous) IP rights violator to the courts and laws of the U.S. and obtain relief that can be enforced against the violator? Ø Cost considerations • Private investigators • Monitoring/watching services • Legal fees Ø Efficiency and effectiveness • Identify and choose targets wisely Ø Deterrence and Return on Investment • Substantial relief may provide disincentive to would-be violators and help brand owner recoup losses and cost outlays Challenges Facing Brand Owners in Internet Enforcement Ø Secondary liability • Hold online service providers responsible for the infringing acts of others • Hold brand owners responsible for the actions of third parties • Two theories: – Vicarious infringement: Principal liable for acts of its agent – Contributory infringement: Analogous to aiding and abetting Search Engines & Keyword Advertising Rosetta Stone v. Google, 676 F.3d 144 (4th Cir. 2012) Ø Rosetta Stone sued Google for trademark infringement based on sale of keywords consisting of Rosetta Stone’s trademark to trigger ads for competitors’ and counterfeit products Ø District court granted summary judgment for Google on Rosetta Stone’s direct and contributory infringement claims Search Engines & Keyword Advertising Rosetta Stone v. Google Ø Direct trademark infringement • Disputed issues of fact regarding Google’s intent; evidence showed that Google expected uptick in litigation due to AdWords policy change • District court ignored evidence of actual confusion as to sponsorship • Sophistication of consumers – internal Google study showed seasoned Internet users were confused by Google’s sponsored links • Functionality doctrine inapplicable – Irrelevant that Google’s computer program functioned better by use of Rosetta Stone’s mark Search Engines & Keyword Advertising Rosetta Stone v. Google Ø Contributory trademark infringement • Insufficient for service provider to have general knowledge that some percentage of purchasers use the service to engage in infringing activities • Must provide service to identified individuals that it knows or has reason to know are engaging in trademark infringement • District court improperly weighed conflicting evidence regarding Google’s allowance of known counterfeiters to bid on Rosetta Stone keywords Search Engines & Keyword Advertising Ø 1-800 CONTACTS, Inc. v. Lens.com, Inc., 722 F.3d 1229 (10th Cir. 2013) • Lens.com used an “affiliate network,” managed through an aggregator, to assist with online marketing • Affiliates purchased keywords containing 1-800’s mark • Some impressions displayed 1-800’s mark • 1-800 argued “initial interest confusion” • Sued Lens.com based on theories of vicarious and contributory infringement Search Engines & Keyword Advertising Ø 1-800 CONTACTS, Inc. v. Lens.com, Inc. • Relevant issue for consumer confusion is not what keyword was purchased, but what language was used in the ad generated by keyword • Likelihood of confusion existed as to impressions containing plaintiff’s mark • No vicarious liability s Affiliate had no authority to act on behalf of defendant and thus was not an “agent” • BUT, there was contributory liability s Lens.com could have stopped use of infringing ads by requiring its aggregator to send e-mail blast to affiliates forbidding such use Domain Name Registrars Ø Petroliam Nasional Berhad (Petronas) v. GoDaddy, 737 F.3d 546 (9th Cir. 2013) • A third party registered “petronastower.net” and “petronastowers.net” and used GoDaddy’s domain forwarding service to direct users to a porn site • Petronas sued GoDaddy for contributory cybersquatting under the federal anti-cybersquatting statute (ACPA) • Appeals court held that neither the plain text nor purpose of the ACPA supports a claim for contributory cybersquatting • Would saddle registrars with nearly impossible task of “divining the intent of their customers” • Issue may soon be before US Supreme Court Auction Sites & Online Marketplaces Ø Tiffany v. eBay, 600 F.3d 93 (2d Cir. 2010) • First U.S. case to apply contributory trademark infringement standard to online marketplace • Tiffany claimed that eBay was liable for contributory trademark infringement by supplying its services to sellers of counterfeit Tiffany goods while knowing or having reason to know that such sellers were infringing Tiffany’s marks • District court ruled in favor of eBay; Tiffany appealed Auction Sites & Online Marketplaces Ø Tiffany v. eBay • Affirms judgment in favor of eBay • For contributory trademark infringement, a service provider must have more than a general knowledge or reason to know that its service is being used to sell counterfeit goods s Some contemporary knowledge of which particular listings are infringing or will infringe in the future is necessary s Tiffany’s generalized allegations of counterfeiting failed to provide eBay with the required knowledge • eBay’s extensive anti-piracy efforts – Trust & Safety Dept., fraud engine to detect listings for counterfeit goods, VeRO Program providing rights owners with “notice and takedown” remedies – all were critical to a finding of no liability Web Hosting Providers Ø Louis Vuitton v. Akanoc Solutions, 658 F.3d 936 (9th Cir. 2011) • Defendants provided web hosting services to sites that sold counterfeit Louis Vuitton products • LV made several demands that defendants either remove infringing content or require their customers to do so; No response from defendants; sites continued to operate • LV sued for contributory trademark infringement s Argued that defendants had actual knowledge of sites’ activities, knowingly avoided learning full extent of those activities, and deliberately disregarded LV’s demands, thereby knowingly enabling the infringing conduct by hosting the sites • Jury found for LV, awarded statutory damages totaling $31.5 million Web Hosting Providers Ø Louis Vuitton v. Akanoc Solutions • Affirmed on appeal as to liability • Issue: Whether defendants exercised direct control of third party’s “means of infringement” • Defendants: The websites selling counterfeit goods were to sole means of infringement • Appeals court held that defendants physically host websites on their servers and route Internet traffic to and from those sites • “The Internet equivalent of leasing real estate.” • Defendants had direct control over the “master switch” that kept the sites online and available • Reduced statutory damage award to $10.5 million Payment Processors Ø Theory of liability • Contributory infringement s Intentional inducement s Actual knowledge or willful blindness, while having sufficient control over the instrumentality used to infringe Ø Divergent case holdings • Perfect 10 v. Visa, 494 F.3d 788 (9th Cir. 2007) s allegation that credit card processors can decide to stop processing payments to sites dealing in counterfeits was insufficient to state a claim (Judge Kozinski dissenting) • Gucci v. Frontline Processing, 721 F.Supp.2d 228 (SDNY 2010) s “control” sufficiently alleged because credit card processing services are a necessary element for the transaction of counterfeit goods online; “knowingly provide a financial bridge between buyers and sellers of counterfeit products” Social Media Ø Presents opportunities and challenges for brand owners • Opportunities: s Build brand strength/loyalty by creating official company page and fan page s Register usernames consisting of your company’s brands s Use social media pages commercially to provide new ways to reach consumers s Spread branding message instantaneously across numerous platforms Social Media • Challenges: s Improper suggestions of affiliation/sponsorship – Brand appears in usernames pointing to sites containing false information about the company’s products s Counterfeiting - Username points to sites selling counterfeit goods s “Username squatting” - New FB account created solely to take advantage of grabbing a username s Dilution - Blurring and tarnishment s Imposters - Possible parody defense; permissible on Twitter provided parody is clear Social Media Ø Enforcement strategies in social media sites • Assessment of infringing activity s Balance the need for brand protection vs. potential alienation of customers – Must always be mindful of duty to police your marks – How much of an issue does the activity create for your business? – Does it interfere with any ongoing advertising or promotional campaigns? – Is it an isolated, ephemeral instance or a concerted attack? Social Media Ø Enforcement strategies in social media sites • Consider free speech issues and potential public backlash of enforcement effort – First Amendment to U.S. Constitution grants broad protection to political speech/ commentary/criticism, less protection to commercial speech – Keep in mind that cease and desist letter may well be posted on social media sites to generate negative exposure for the brand » Adjust tone of enforcement depending on whether infringer is willful or simply innocent or misguided Social Media Ø Enforcement strategies in social media sites • Become familiar with the site’s Complaint and Takedown Policies, Community Guidelines, and Terms of Use • Develop takedown strategy and assess requirements s Copyright Infringement (DMCA) s Trademark Infringement s Unauthorized Impersonation s Repeat Offenders s Harassment, defamation, theft of confidential material • Keep in mind that policies and requirements my change over time Social Media Ø Enforcement strategies in social media sites s Expand your internal monitoring program to include social media sites s Develop consistent monitoring and enforcement procedures s Use search engines to find infringing/harmful content – Google.com/alerts (generates alerts for use of company names and brands on the Web, blogs, news, discussion groups) s Consider vendors and software tools with social media monitoring capability s Keep tabs on what is being said about your brand in “real time” “Rogue” Websites Ø What is a “rogue” website? • A site that traffics in stolen movies, TV shows and music, or counterfeit goods • Located throughout the world • Appear legitimate by featuring brands and advertising of reputable companies and accepting major credit cards • Enable site operators to profit from brands and other IP they had no role in creating • “A Web site that is set up to spread a virus, collect names for spammers or for some other illicit or repugnant purpose” (PC Magazine Encyclopedia) “Rogue” Websites Ø What type of threat do they present to brands? • The counterfeit business model is shifting toward use of “rogue” websites s Seizures by U.S. Customs & Border Patrol jumped 24% in 2011, but overall value of goods seized decreased by 5% from previous year s Proliferation of rogue sites in part responsible s Difficult to stop counterfeit goods from entering US if purchased through rogue website s Hard to locate or identify operators of sites s Lack of any lasting remedy since sites are easily reestablished A Rogue Website Case Study: Tory Burch An example of how brand owners can combat the sale and distribution of counterfeit goods through “rogue” websites under current U.S. laws A Rogue Website Case Study: Tory Burch Ø Tory Burch brought suit in Dec. 2010 in SDNY against an interrelated group of anonymous counterfeiters Ø Defendants established over 200 websites to sell counterfeit Tory Burch products Ø The sites were in English, accept major credit cards, copy Tory Burch marks, designs and photos Ø Sites established at URLs containing the Tory Burch marks so they would rank highly web searches for “Tory Burch” name Ø Defendants used multiple fake names and addresses and submitted false WHOIS data to avoid detection Ø New sites quickly set up once existing sites disabled A Rogue Website Case Study: Tory Burch A Rogue Website Case Study: Tory Burch Ø Court granted Tory Burch’s motion for default judgment and permanent injunction (Order dated May 13, 2011) • Court had personal jurisdiction over the defendants based on their operation of fully-interactive websites through which they sold Tory Burch counterfeits s Recent 2d Cir. case upholding jurisdiction over nonresident counterfeiter based on sale/shipment of at least 1 counterfeit handbag into NY and its operation of highly-interactive website (Chloe v. Queen Bee (2d Cir. 2010)) • Found that defendants “went to great lengths to conceal themselves and their ill-gotten proceeds from Tory Burch’s and this Court’s detection by using multiple false identities and addresses as well as purposefully deceptive contact information” • Permanently enjoined 3rd party service providers (ISPs, registries, registrars, online marketplaces) from providing any services to defendants • Awarded Tory Burch $164 million in damages A Rogue Website Case Study: Tory Burch Ø Court also granted ongoing injunctive relief tailored to suit the unique challenges presented by the anonymity of defendants and ease by which they are able to establish new sites Ø Order enables Tory Burch • to disable additional rogue sites as they are established by defendants and discovered by Tory Burch • To freeze and recover any additional newly-discovered financial accounts used in connection with defendants’ operation, such funds to be applied toward satisfaction of $164 million judgment • To obtain transfers of additional domain names associated with any newly-discovered rogue sites Ø Ongoing mechanism avoids the need to institute a separate action each time a new rogue site is established Conclusions and Predictions Ø The legality of using trademarks in keyword advertising is still unsettled Ø Greater challenges for brand owners in seeking to hold online service providers liable for trademark infringement, creating greater need for remedies against direct infringers, wherever located Ø Competitors will become more aggressive in marketing through social media sites, resulting in trademark disputes that will test adequacy of traditional trademark law in the social media context Ø Rogue websites will become more sophisticated in their operation and more difficult to identify Questions? GREENBERG TRAURIG, LLP n ATTORNEYS AT LAW n WWW.GTLAW.COM ©2011. All rights reserved. Thank You! GREENBERG TRAURIG, LLP n ATTORNEYS AT LAW n WWW.GTLAW.COM ©2011. All rights reserved.