Goldman's Law: user generated content à pornography (whatever

advertisement
Threshold
Inquiries

Contracts


(third party
beneficiary?)

Trespass to 
Chattels

(spam, bots,
privacy)
For IAPs, not
individuals
Copyright
(fed)



(porn, file
sharing, web
browsing)

TM (fed)
(domain names,
meta tags, ads,
phishing)





Publication 
Torts

(social
networks)
+ Personal
injury caused by
3rd party
content
Privacy
Spam
Porn




Does the state have PJx over D?
 Should you settle?
o General/consent or
o Are potential damages worth the costs?
o Specific:
o Which party is more sympathetic?
 In rem (over domain name)
o Is technology too new in adoption cycle?
 Zippo sliding scale (disfavored)
 Is the law constitutional under the DCC?
 Toys ‘R’ Us minimum contacts
 What’s your story? Is the Internet exceptional?
Would the judgment be enforceable?
Does this case affect the future of the Internet?
Formation (NEED KNOWLEDGE)
o Conspicuous Mandatory Non-Leaky Click Through / Specht knowledge
Use to make
o Restatement Contracts §69 (Register.com)
synthetic IP rights
Amendments
o Can’t reserve the right to unilaterally modify (but see TheGlobe.com)
o Need notice, consideration, and a savings clause (Blockbuster.com)
Common Law (hardest for P to get post-Hamidi, so statutes trump in practice)
o Intentional use that causes or threatens to cause computer damage (Hamidi and Register.com)
CFAA 18 USC §1030(a)(5)
o (A) = knowingly transmit info causing certain harms
o (B)-(C) = intentionally access w/out authorization (e.g. violate K or browsewrap license)
causing certain harms (Ticketmaster)
CA Penal Code §502(c) = knowingly/without permission access or use, causing any damage/loss
Valid copyright = original work of authorship fixed in a tangible medium of expression (register for $)
Infringement if violated §106 right to reproduce, distribute, derivative works, or public performance
o Direct (need volitional action [argue users, not IAP], so not in Cablevision or Field)
o Secondary (NEED A DIRECT INFRINGER 1st)
 Contributory =induces, causes or materially contributes to known specific infringement
 Inducement is a variant that applies to mixed-use technologies (Grokster)
 Vicarious = right/ability to supervise and direct financial interest in infringer’s acts
Defenses
o Fair Use (nature of use, nature of work, amount taken, market effect)
o License (express [e.g. in TOS], compulsory, or implied [e.g. want to be seen]) (Ticketmaster)
o 17 USC §512 Safe Harbors (Veoh and Viacom)
 §512(c) = no damages for hosting user content (follow notice & take down formalities)
Purposes = limit consumer confusion and incentivize producers (tension)
Valid TM = distinctive (inherently or via secondary meaning)
Infringement (P’s priority and D’s use in commerce +)
o Direct if likelihood of consumer confusion (Sleekcraft)
 Initial interest confusion (Falwell) is now merged into this (Network Automation)
o Contributory (NEED A DIRECT INFRINGER 1st)
 Intentionally induce others to infringe or
 Continue to supply product with actual/constructive knowledge used to infringe
o Defenses = nominative use and descriptive fair use
Dilution of famous marks if D used it in commerce after it was famous and blurring/tarnishment
o Defenses = fair use, news reporting, noncommercial use
ACPA and UDRP/URS for domain names
Defamation, Prosser’s 4 privacy torts, and harmful/inaccurate information
But Promissory Estoppel if you
promise to edit…
Secondary liability (aka for 3rd party content)
o Offline = publishers liable for content within their editorial discretion
o Online = CDA applies to all COA except federal crimes, federal IP laws (© and TM), and ECPA
 47 USC §230(c)(1) = websites aren’t liable for 3rd party user content unless they
encourage or require illegal content b/c then part creators (Roommates.com)
 47 USC §230(c)(2) = websites aren’t liable for filtering decisions
Look at FTC Act (FIPs), ECPA, COPPA (kids), CFAA, state laws (e.g. contract, §502, identity theft)
Beware of PII and Article III Standing
Look at CAN-SPAM Act , TM law, CFAA, non-preempted state laws, and technological controls
Can be obscenity (Miller), indecency (Pacifica or CDA), harmful to minors, child porn (Ferber & toxic)
------------------------------------------------------INTRODUCTION------------------------------------------------------
1. The Internet
a. Definitions (subject to evolution)
i. Functional approach = every machine that communicates using TCP/IP (voluntary
protocol of packet switching) or has an IP address (and is therefore part of the network)
1. The technological boundaries of the network
2. But really separate Internets (since govs. block access to certain domain names)
ii. Relationship approach = universe of IAPs who trade packets with each other (all about
contractual privity)
iii. Activity approach = activities mediated by an electronic network (overinclusive)
b. How it works
i. International Web of linked open and closed networks and computers capable of:
1. Rapidly transmitting communications without direct human involvement
2. The automatic ability to re-route communications if any links are damaged and
3. Subdividing individual messages into smaller packets sent independently so if a
computer gets overloaded the packets can be re-routed (aka packet switching)
a. IP addresses = geographic information assigned by network operators
(statically or dynamically) (controlled by IANA)
b. Domain name = pneumonic device for the computer associated with
corresponding IP address
ii. Connect with an Internet Access Provider (cable or phone company, wireless…)
1. But by selling access to the Internet, which definition are they providing?
iii. No single entity administers the Internet
iv. Multiple methods of communication
1. One-to-one (email)
3. Real time communication (chat)
2. One-to-many (listserv)
4. Remote info retrieval (e.g. FTP, WWW)
c. History
i. Internet created in 1969 by the US Defense Department (ARPANet)
1. Goal = make network that could survive nuclear war by multiplying choke points
2. Benefits:
a. Network stability (it survives as long as one link remains)
b. Operational efficiency (so small messages don’t get stuck behind big ones)
c. Easy to join and leave, just need to follow TCP/IP
ii. WWW developed at CERN in 1990 (uses common language--HTML and HTTP--to
access documents via hyperlinks over the Internet)
2. Internet Exceptionalism
a. Should we just apply given laws to it, or does it demand its own better/worse laws?
b. Effect on speech
i. Operating costs are low, so fewer barriers to publish (less power to incumbents)
ii. May speak and listen interchangeably, blurring the distinction
iii. Harder to tell where speech is coming from
iv. So much easier to find information and form borderless communities
c. Effect on discrimination
i. Internet is not a place of public accommodation (Noah = chat rooms are not physical places, so
not covered by the Civil Rights Act so harassment that is not ok offline is ok online)
1. So legal privilege to online over offline businesses (who incur policing costs)
ii. Harder to discriminate b/c can’t see physical characteristics
iii. Reduced risk of violence, and less shame in leaving an online community (easier, too)
3. Goldman’s Tips
a. Apply hornbook law, but Internet cases are usually decided based on who you’re more
sympathetic to (and remember: we hate spam more than even porn)
i. Pro: self regulate (even if you fail to get it all) and self help (don’t use courts first) (Veoh)
ii. Con: monopolists controlling expression, spammers, crazies (even worse than
spammers), stealth tech./bad business practices (Ticketmaster)
b. Always think about cost/benefit analysis for the company you represent (is it worth suing?)
c. Argue that if you lose the Internet will be over b/c things like Google will be illegal (Field)
d. Go through every cause of action available
e. DO NOT:
i. Use the term “Internet Service Provider” b/c covers Internet Access Providers and
service/content providers
ii. Use the terms clickwrap (instead say MNLCT) or browsewrap (which isn’t a contract)
iii. Talk about the DMCA as a standalone thing b/c it had 5 very different sections
1. We talk about §1201-02 and §512
----------------------------------------------PERSONAL JURISDICTION---------------------------------------------1. Is PJx proper?
a. General Jx?
i. Physical presence or systematic and continuous contacts as if physically there
b. If not, then consent to Jx in the forum (e.g via contract)?
c. If not, then specific Jx?
i. State long arm statute (CA = DPC) and
ii. DPC alternative tests
1. Minimum contacts:
a. Minimum contacts with the forum
i. = Purposeful availment
b. Where Jx comports w/ traditional notions of fair play & substantial justice
i. = Reasonably anticipate being hailed in to court (contact  COA)
(Hemi = fair to have PJx over website that sells cigarettes to Il. In violation of
state law b/c shipped to every state except NY so elected to do businesses with
them and knew it could opt out [explicitly rejects Zippo, but really like it + de
minimis exception])
2. Effects: D expressly aims intentional tort at the state and causes foreseeable harm
3. In rem (15 USC §1125(d)(2)): suing the property (online = domain names)
4. Online
a. Zippo Sliding Scale (where contacts = commercial activity, P favorable)
i. High = entity conducts business online, so Jx (even without
contacts to that state)
Essentially expanding
purposeful availment
prong of the Minimum
Contacts test
ii. Middle = “interactive” websites (depends on level of interactivity
and commercial nature of exchange)
iii. None = entity passively publishes content, so no Jx
b. Toys ‘R’ Us Test (implicitly rejects Zippo, which is generally disfavored)
i. Directly targeting website to the state
ii. Knowingly interacting with forum residents via website or
iii. Sufficient other related contacts (= website not aimed at NJ or even US
but may still have sufficient non-Internet contacts, so look!)
c. ALS Scan Test:
i. Direct electronic activity into the state
ii. Manifested intent of engaging in business/interactions w/ state
iii. Activity creates the cause of action
d. Is the judgment enforceable? If not, it’s a waste of time (if no people/property there to seize…)
2. The Geography of Internet Regulation
a. Who should regulate the borderless Internet?
i. International bodies (good b/c track’s network’s footprint, but no enforcement)
1. So ignore international laws unless there’s a risk they’re enforceable b/c you have
assets they can grab there, you want to travel there, or US may enforce it (Toys)
ii. Nations (makes the most sense, but no power over rogue nations and Congress sucks)
iii. States (experimentation, but inconsistent, dumb ppl, and doesn’t match net. boundaries)
1. Plus, Dormant Commerce Clause (negative implications of CC) problem:
a. SS (per se violation) for state laws that facially discriminate against outof-staters OR have an extraterritorial effect
i. Goldman thinks all state Internet laws fail b/c no way to know
where packets are going or prevent them from leaving the state
ii. Reality = state porn laws fail, but state spam laws succeed (even
though it’s harder to tell where email is coming from…)
b. Balancing test for nondiscriminatory state laws that burden IC
i. Ex. inconsistent regulatory burdens between states
iv. Self-governance (responsive, but some wrongs can’t be fixed online)
b. Reality = all of the above with no coordination (aka anarchy)
3. Locating Users
a. How (can do anything with enough time and money!)
i. Self-reporting (e.g. mailing address, credit card authentication)
ii. Third party authentication (like a driver’s license…not popular in the marketplace)
iii. Automatically reported by a device (e.g. GPS or triangulation)
iv. IP address (geolocation = matching IP address to zip code of owner via ARIN database)
b. Difficulties
i. No accuracy test (limit of tech)
iv. May just get owner’s location, not users (e.g.
ii. Can anonymize with a proxy
corporation’s HQ)
iii. Caching
v. Privacy pushback
c. Why
i. Police click, financial and identity fraud
ii. Target ads and content
iii. Restrict content (b/c contractual/legal limits on what can be sold where) (Yahoo = had
yahoo.fr to comply with French laws but made no effort to restrict French access to yahoo.com. Since they
could have with 70% accuracy, they should have)
d. The more you know about your users, to more likely you’ll be subject to Jx
---------------------------------------------------------CONTRACTS---------------------------------------------------------
1. General Contract Law
a. Voluntary exchanges
b. Objective manifestation of mutual assent (aka intent to be bound shown through overt words/act)
i. Offer, acceptance and consideration = attempts to validate this
c. Invisible hand
d. Can synthetically manufacture the equivalent of IP rights in data through contracts
e. Formation  Interpretation  Defenses  Remedies
2. Crisis Online?
a. Form contracts are ubiquitous online, but no one really believes clicking = consent b/c:
i. No one reads it (and if they did they wouldn’t be able to understand it)
ii. No ability to negotiate
iii. They just want the payoff
b. So why do we have giant EULAs?
i. Because no robust set of default rules so you have to make them yourself! (see below)
c. Or do contracts online just show us how much crap we tolerate in contracts offline?
d. Offline analogies are garbage and ruin online contract law
3. Governing Laws
a. UCC Article II = sale of physical goods (so applies to buying things online for delivery)
b. CL = everything else
c. UCITA (aka “UCC for the Internet”), but only enacted in Maryland and Virginia
i. Unpopular b/c codified existing law which angered consumer advocates and is overbroad
4. Contracts online
a. Changes from offline:
i. Offline the edges of the paper mean something, but online you can link forever (no staple
to communicate beginning or end)
ii. More unconscionability attacks
1. Arbitration clauses for class actions are often unconscionable b/c means D wins
iii. Special rules for SOF (e.g. electronic signatures are contracts are ok)
iv. Special “Mailbox Rule” over electronic networks
v. Increased parole evidence available when Internet negotiations are involved
b. Main difference = formation
i. Foolproof way of obtaining sufficient assent online = Mandatory Non-Leaky Click
Through Agreement (where overt act shows intent to be bound) (Specht = also needs to be
above the fold/conspicuous b/c that’s the only way a RP user would know of the agreement prior to acting)
1. Good to also include terms (not just a link) and require checking “I read this” box
2. So easy! But the Bermuda Triangle makes it hard to implement…
a. No one talks to each other because:
i. Marketers oversell
ii. Engineers under-deliver and think they can intuit the law
iii. Lawyers just say no (should say “sure, but you’ll be sued blind”)
b. Prevent this by:
i. Training
ii. Embedding lawyers to catch problems early
iii. Make pre-approved forms
3. Industry practice is often indefensible, so don’t just copy the big players!
4. Make sure it’s a bundled bootscreen license so third=party install sites won’t
leave you exposed
ii. Specht knowledge
1. Assent = when user objectively manifests an intent to be bound through overt acts
or words, which can only happen if RPP would have known about the terms
a. This is all you need, so Specht is a minimum (MNLCT guarantees it)
iii. Restatement Contracts §69 = contract forms when the offeree takes the benefit knowing
the terms and has a reasonable opportunity to reject but doesn’t (apple stand analogy)
1. About equity, but if the court goes here it’s reaching (Register.com = D’s robot
submitted numerous queries, each time receiving notice of the terms, so it was bound b/c there’s a
human at the end of the robot and it had to know, too)
2. Why isn’t this inconsistent with Specht?
a. Need actual knowledge (can’t be obscured) and repeat player, so “assent”
b. Courts are also less forgiving of businesses and spammers
c. Amendments
i. Need adequate consideration or else illusory (Blockbuster = can’t just reserve the right to modify it
at will, put notice on the website, and apply changes immediately even though this is industry standard)
BUT SEE (TheGlobe.com = MySpace got away with a unilateral amendment clause that applied
retroactively b/c we hate spammers and they were just trying not to purchase ads)
ii. Options:
1. MNLCT every time (but this is annoying and doesn’t solve legacy problem)
2. Spam users to notify them of changes (but huge bounce back rate)
3. Have a Savings Clause so it doesn’t apply retroactively (not enough in 9th Cir.)
-----------------------------------------------------------TRESPASS-----------------------------------------------------------
1. Trespass to real property
a. = any intrusion is actionable, whether or not there’s actual damages (n/a online)
2. Conversion and theft
a. = protects personal property from permanent deprivation (usually n/a online)
3. Trespass to chattels (probably only direct liability)
a. = personal property is damages but not taken away completely forever
i. Ignored for years, but applicable to the Internet b/c packets move through our personal,
physical property (servers, wires, routers, etc.)
b. Linked to net neutrality
c. Can synthetically manufacture the equivalent of IP rights in data by restricting access
d. Common law
i. Majority (Register.com = bots consumed a significant portion of P’s computer system’s capacity which
did not incapacitate it, but would if others were allowed to devise similar systems, which is likely)
1.
2.
3.
4.
System use
Damage (as defined below in the chart)
Actual or constructive notice that use is unpermitted
Self-help attempt requirement (or else judge will ask why you’re here…)
ii. CA (Hamdi = Intel gripper’s messages are minuscule and no threat of a larger scale operation by others, so
no real damage and can’t win on this. But can stop him technologically or with other COAs)
1. System use
2. Causes or threatens to cause
3. Measureable loss to computer system resources (Hamdi = lost employee time and self
help to block emails don’t count because not a harm to the chattel itself)
e. Statutes (see below)
i. Apply all 3 and both CL (see above)!
Chattel Interference (always
met online)
Intentional use or physical
contact
Common Law
*Hardest for P
to get post
Hamidi, so
statutes trump in
practice*
Knowingly transmit
18 USC
§1030(a)(5)(A) program/info/code/command
Computer
Fraud and
Abuse Act
18 USC
§1030(a)(5)(B)
& (C)
Intentional access without
authorization (Ticketmaster =
unauthorized access and/or exceeded
authorized access in browsewrap
(don’t need MNLCT)
Damage (no scienter required)




Physically dispossessed temporarily
Impaired condition/quality/value
Lost use (not access) for substantial time period or
Bodily harm or harm to legally protected interest
(CompuServe = customer goodwill) (Bidders Edge = potential for
other spammers to imitate D and impair access)
Intentionally impair integrity/availability of data/program/
system/info without authorization causing:
 Loss of $5k/year (including remediation and costs/lost
revenues from service interruption) = EASY
o Split whether you can aggregate microharms
 Medical harm or physical injury
 Threat to public health/safety
 Damage to government computer
 Damage to 10+ computers/year (probably includes
anything connected to the network)
Same as above (but no intentionality requirement)
(B) = reckless impairment
(C) = requires “loss”
Knowingly without permission: Any damage or loss (including verification expenses)
(2) access and take/copy/use
data from a comp. system/ net.
 Why this is the easiest for P
Civil COA, too (3) use computer services
(7) access computer system/ net
f. What is “authorization”?
i. If you haven’t restricted or expressly revoked access you have impliedly allowed it
ii. Can revoke permission via a “browsewrap” = not a contract, but enough for §1030 claim
g. Includes “misuse” of computer services like Lori Drew and the MySpace suicide (must still
establish requisite damage)
CA Penal
§502(c)
---------------------------------------------INTELLECTUAL PROPERTY---------------------------------------------
1. Copyright
a. Elements of a Valid Copyright
i. Original works of authorship
1. = distinction between ideas and facts (not protected) and expression (protected)
ii. Fixed in a tangible medium of expression (broad)
1. = things like writing down, recording…as opposed to spontaneous conversation
2. It’s only a copy if it’s fixed, and it’s only fixed if it’s embodied in a tangible
medium of expression for more than transitory duration (Cablevision = keeping a copy
of a TV show for 1.2 seconds before sending it to personal storage for each user doesn’t count.
And since the users take the volitional conduct to make the copy by pressing the button, they’re
the only ones directly liable [Kinko’s comparison])
iii. Protection commences upon fixation, but must register to sue
1. Register within 3 months to get statutory damages and attorney’s fees (or else you
won’t get anything for online infringement b/c often no real damages)
b. Copyright Holder’s Rights (in US):
i. Exclusive under §106 right to:
1. Reproduce (but you can make a copy of things you own for personal use)
2. Distribute
3. Derivative works
4. Publicly/digitally perform/display
ii. Within:
1. Life of author + 70 years (if joint work then 70 years after last surviving)
2. Work for hire = lesser of 95 years from publication or 120 from creation
a. If made within scope of employment or specially ordered under statute
3. Pre 1923 = PUBLIC DOMAIN
iii. Can transfer as a personal property right via writing
1. Can terminate after 35 years by serving written notice
c. COA = Infringement
i. Direct = violate §106 rights (no intent/knowledge required) (Veoh = even if service provider
manipulates user files to make them workable within its site’s system, they’re still the user’s file b/c he
originated the upload)
1.
Must be volitional (Cablevision = user pressed the button to access shows on demand, so
cable company can only be secondarily liable…threw users under the bus!) (Field = user clicks on
link to get cached copy, so Google can only be secondarily liable)
And must be fixed (Cablevision = only transitory duration so not a copy)
ii. Secondary liability (ALWAYS NEED TO FIND DIRECT FIRST)
1. Contributory = with knowledge of the infringing activity, induces, causes or
materially contributes to the infringing activity of another (aider/abettor)
2. Vicarious = right/ability to supervise infringer’s acts (not just by hosting content
per Veoh) and a direct financial interest in those acts
iii. Criminal 17 USC §506(a) = willful infringement and commercial advantage, $1k worth
of infringement in 180 days or publishing pre-release work online
1. Everyone has done this, so we’re all saved by prosecutorial discretion
d. Defenses/Exceptions
2.
i. Fair Use §107 (it’s all a spectrum, and really working backwards to result you want)
1. Nature of use
Don’t build a business on
a. - Commercial ? + Transformative?
If last copy is fair
this b/c it’s very uncertain.
2. Nature of work
use, all prior are
Denial of it is a moral
a. + Facts? +Published?
excused as well
vote, and better for
3. Amount/substantiality of portion taken
(Perfect 10 v. Amazon)
individuals than companies
a. - Large %? - The heart?
(Ticketmaster = no fair use b/c
4. Market effect
violated browsewrap/contract)
a. - Substitutes for each other? - Profit?
ii. Licenses (implied, express, or compulsory licenses for music streaming, covers, etc.)
(Field = Google had implied license to crawl and cache a webpage b/c can easily tell it not to in code)
1. Express EULA/TOS should negate implied license
e. Online Issues
i. DMCA
1. 17 USC §1201-02 (doesn’t really apply because market has rejected DRM)
a. Can’t (Ticketmaster = can’t circumvent CAPTCHA with bots. See case for elements):
i. Design/produce a product primarily for circumvention
ii. Make one available despite only limited legitimate commercial
significance or
iii. Market one for use in circumvention of a controlling technological
measure
b. Protects copyright management information, so can’t remove/modify
attribution from a file
2. 17 USC §512 Safe Harbors (enacted in 1998, so pretty much a relic)
a. = safe harbor for transmitting data (rarely litigated)
b. = safe harbor for caching (no longer relevant for how IAPs cache today)
c. = safe harbor for hosting user content (notice and takedown)
Specify which safe harbor
i. Affirmative defense to damages (not injunction) if:
you’re talking about!
1. Service provider (broad; ok to modify content [Veoh])
2. Adopted a policy to terminate repeat infringers
3. Reasoanbly implment policy (Veoh = good faith, not 100%
success)
If these formalities aren’t met,
then revert back to normal
infringement analysis
4.
5.
6.
7.
8.
Communicate policy to users
Accommodate “standard technical measures” (unclear…)
Designate agent to receive §512(c)(3) notices
Post agent’s contact info on website (usually in EULA)
No knoweldge of infringement OR awareness of red flags
of obvious infrnigement (Viacom = need actual knowledge of
identifiable infringement. Knowledge of prevalence of such activity
doesn’t count, and if you have to investigate then it’s not a red flag)
9. No right/ability to control infringment (Veoh = ability to control
the system ≠ ability to control activity b/c defeats purpose of §. Need
ability to control actual infringment by stopping it before it was
OR direct financial interest in it (aka where it
draws in users) and
10. Must expeditiously respond to §512(c)(3) notices
uploaded)
ii. §512(c)(3) takedown notices are valid if:
1. IDs the infringed work or a representative sample
2. IDs infringing copies so service provider can find them
a. Need specific URLs or something definitive
Often not required b/c service
b. Ps hate this because the burden is on them (Viacom =
providers allow automatic
have to give YouTube URLs, not tell them to look for stuff)
takedowns to avoid lawsuits
3. Must state they have a good faith belief use is unauthorized
4. Must state complaint is accurate & authorized by ©-owner
5. Must have signature of authorized person
6. Must have contact information to follow up
iii. Ambiguous… does it preclude all infringement, or just direct?
1. Veoh assumed all, so just go with that
d. = safe harbor for linking (rarely litigated, also notice and takedown)
e. = safe harbor for universities (rarely litigated)
f. = liability for sending bogus takedown notices
i. 9th Cir. subjective standard, so copyright holder can always win
g. = safe harbor for counter-notifications (aka “put-back requests”)
i. Usually ignored, so effectively worthless
h. = expedited process for identifying infringers (very powerful)
i. Automatic subpoena for the names from IAPs
ii. Web browsing (see right)
1. Presumed infringement b/c reproduction and
distribution of page templates
2. Defenses:
a. Implied license and/or
i. But these can be revoked explicitly via browsewrap (Ticketmaster =
direct infringement when D goes to the website to configure the robot and
caches a copy of it in RAM in violation of the Terms of Use)
b. Fair use (as a matter of public policy?)
iii. P2P file sharing (see right)
1. Subset of copyright law (since rulings don’t
make sense outside this context) (Viacom)
2. Infringers
a. B, C and D (no $, but can scare them)
i. Liable b/c reproduced w/ no
fair use (Gonzalez)
b. A offers a mixed-use technology (users choose whether to use it for
legitimate or illegitimate purposes) and has all the $ (Sony = if capable of
Could have long-term
value if copyright holders
just let it grow up…This
is an anti-start up doctrine
commercially significant noninfringing uses then can’t hold manufacturer liable based
solely on distribution, here VCRs)
i. Can be liable under inducement (Grokster = indirectly liable for
infringement by users b/c induced as shown by marketing itself as Napster,
profiting from ad space which was only demanded since users swapped
copyrighted work and making no effort to filter copyrighted material )
1. Prima facie case (all about D’s state of mind):
a. Distributing a device
b. With the object of promoting its use to infringe
c. As shown by clear expression or other affirmative
steps taken to foster infringement
2. Consequences:
a. Copyright holders litigate you to death
b. Every email is relevant, so never speak your mind
c. BitTorrent problem = C downloads a little from everyone, so hard to ID
d. Cyber lockers (Dropbox) and linking sites? Should covered by §512(c)
3. Only way not to get sued = strike deals with copyright holders to stream (Spotify)
4. Note: 17 USC §506 = criminal infringement if $1k of retail value in x days
5. Focus is not on Internet Access Providers’ graduated response
a. = automated system gives you warnings and eventually cuts your access to
the Internet, with the burden on the user to explain activity
b. Protected under §512(a), but this saves administrative costs and bandwidth
2. Trade secret
a. = valuable secret/information
b. Internet doesn’t change much, except there is a problem when misappropriated info is put online
3. Trademark (= word/symbol that designates product source)
a. Purposes (TENSION)
i. Limit consumer confusion and
ii. Protect producers so they keep investing
b. Elements of Valid TM (no registration needed, but benefits)
i. Ownership of valid TM that is distinctive
Duty to police your mark, but
1. Inherently if:
takes a lot of apathy for court
a. Arbitrary (ex. Apple)
to find you forfeited rights…
b. Fanciful (ex. Oreo)
c. Suggestive (ex. Greyhound)
2. Needs secondary meaning if descriptive (ex. Dress Barn)
3. Not if generic (ex. Kleenex)
c. Causes of Action
i. Infringement
1. Types
a. Direct
i. P’s priority
ii. D’s use in commerce
1. Interpretation 1: any activity covered by the CC
2. Interpretation 2: designating source in ad copy/packaging
3. Trend is to make this easy to satisfy by basically ignoring it
(Falwell = domain name acts as off-site marketing aid)




iii. Likelihood of consumer confusion about product source
1. Sleekcraft test, considering:
Strength of P’s mark
 D’s intent
D’s use of mark (related goods?)
 Similar marketing/advertising channels
Similarity (sight, sound, meaning)
 Purchaser’s degree of care (↑ if more $)
Actual confusion
 Likelihood of product expansion
2. Really just a way to answer the original question, and not
exhaustive (Network Automation = also consider labeling and
appearance of ads and context for search engines)
iv. Initial interest confusion (merged with above)
1. = idea that consumers see something that diverts their
attention and then choose to stay once they are no longer
confused (Falwell = domain name can’t do it along, need to look at
the website content, too. And if no profit then doesn’t apply to grippers
b/c don’t want to insulate markholder from criticism)
2. 9th Cir. regrets inventing this, so now must show likelihood
of confusion, not just diversion (Network Automation)
b. Contributory (NEED DIRECT 1st)
i. Intentionally induce 3rd party to infringe or
ii. Continue to supply the product with actual/constructive knowledge
it is being used to infringe
1. Ex. when service provider directly controls the
instrumentality used to infringe (only domain name
registration is safe)
c. Vicarious (very narrow set of agency principles)
2. Defenses
a. Nominative use (NKOTB), when:
i. D is using P’s TM to refer to P
ii. No good synonym to refer to P
iii. D took only so much of the mark as necessary to refer to P and
iv. D didn’t do anything to suggest sponsorship by P
b. Descriptive fair use
i. = D uses a descriptive TM to refer to its dictionary definition
ii. Dilution of Famous Marks (only direct, no contributory/vicarious)
1. Prima facie case:
a. Famous = widely recognized by general consuming public of US as
source indicator (consider ads, sales, surveys, registration…)
b. D used it in commerce after it became famous (assumed like above?)
c. Likelihood of dilution via:
i. Blurring = association that impairs distinctiveness
ii. Tarnishment = association that harms reputation
2. Defenses (not the same as for infringement, so could still be liable there):
a. Fair use (includes comparative advertising)
b. News reporting/commentary
c. Noncommercial use (so how did P meet prima facie case?!)
a. Online Issues
iii. Domain Names = pneumonic for IP addresses (these wars are just proxy wars for
content, so everyone but the lawyers lose!)
1. Besides infringement and dilution, can bring claims under:
a. ACPA 15 USC §1125(d) (aka Anti-Cybersquatting)
i. Prima facie case:
1. D has a bad faith and intent to profit (Falwell = no bad faith
intent to profit for griper, but yes for PETA.org) and
2. D registers, traffics in, or uses a domain name that:
a. Is identical/confusingly similar to distinctive TM or
b. Dilutes a famous TM
ii. Remedies:
1. Cancel or transfer registration
2. Damages < $100k and attorneys’ fees
b. Private adjudication within the domain name system via I-CANN
i. UDRP
1. Prima facie case:
a. Domain name is identical/confusing similar to TM
b. D has no legitimate interest in it
c. D engaged in bad faith (don’t need intent to profit)
2. Remedy = cancel/transfer registration
ii. URS (for easy cases)
1. = UDRP by “clear and convincing”
2. Remedy = suspend the registration (~TRO)
c. State domain name protection laws (no litigation; should void b/c DCC)
iv. Keyword Metatags (which are assumed to be a use in commerce)
1. Judges hate them (seem surreptitious) and you will lose, so don’t use them
(Promatek = ok to use P’s TM since D repairs P’s products, but can’t do it in metatag because
calculated to deceive consumers)
v. Search Engines and Competitor Keyword Ads (= use in commerce [Network Automation])
1. TM Owner vs. Advertiser
a. Google’s TM policy takes care of most of these
i. Blocks ads with TM in ad copy if TM owner asks except:
1. Descriptive/generic use
Cease and desist letters work,
2. Resellers, component/replacement part dealers
but risk declaratory judgment
3. Informational sites (not including parody or gripers)
ii. But doesn’t block TM-ed keywords (where the litigation is)
b. No likelihood of confusion so long as consumers understand the brands
and competition in the marketplace
i. Consider strength of mark, actual confusion, degree of care, and
labeling/context of the ad in results page (Network Automation)
ii. Litigation cost > value of ads, so waste of money!
2. TM Owner vs. Search Engine
a. Google always wins b/c consumers aren’t confused by their practice of
auctioning P’s TM to 3rd parties (Rosetta Stone)
b. Result of technology adoption cycle (came after Google was mainstream)
3. Takeaways
a. All depends on the story: surreptitious stealing or market competition?
b. Courts are split because purposes of TM law are in tension here
4. Hot news
a. = protects time-sensitive news (facts, so not copyrighted) (e.g. stock recommendations)
5. Utility Patents
a. = novel, useful, non-obvious ideas
b. Internet doesn’t change much except that people are patenting the way Internet companies work
6. Can synthetically manufacture IP rights via contract or trespass to chattels
------------------------------------------------------PORNOGRAPHY-----------------------------------------------------Goldman’s Law: user generated content  pornography (whatever that means)  copyright infringement
1. Obscenity
a. Outside the 1st Am. if it meets the Miller test:
i. Average person applying contemporary community standards would find the work taken
as a whole to appeal to the prurient interests
1. What is the “community” online?
ii. Depicts/describes in a patently offensive way sexual conduct specifically defined by the
applicable state law and
iii. Whole lacks serious literary, artistic, political or scientific value viewed by natl. standard
b. Goldman’s Rules:
i. Bestiality and child porn meet this every time
ii. Text should not be obscene
2. Indecency
a. FCC definition from Pacifica = language that describes in terms patently offensive as measured
by contemporary community standards for the broadcast medium, sexual or excretory activities
and organs, at times of the day when there is a reasonable risk that kids may be in the audience
b. CDA definition = any communication that in context depicts/describes in patently offensive
terms as measured by contemporary community standards sexual or excretory activities or
organs
3. Harmful to Minors
a. Patently offensive to prevailing standards in adult community as a whole with respect to what is
suitable for minors
b. Appeals to the prurient interests of minors and
c. Is utterly without redeeming social importance for minors
4. Child Pornography
a. Outside the 1st Am. if it meets the Ferber test:
i. Visually depicts sexual conduct by kids below a specified age where the conduct
proscribed is suitably limited and described by state statute (because harms kids)
b. Possession is illegal; service providers have to report it (Protection of Kids from Sexual Predators Act)
5. Statutes (since Congress hates porn) (states too, but ignore those b/c struck down on DCC grounds)
a. CDA = first attempt to address the Internet so they screwed up big time (Reno = can’t criminalize
dissemination of patently offensive/harmful to minors material online with definitions)
b. Child Online Protection Act = free teaser content behind a pay wall (Ashcroft = focus on
technological filtering, not banning. Burden on the readers, not content producers)
c.
d.
e.
f.
g.
h.
Child Porn Prevention Act = can’t create simulated child porn (SCOTUS overturned)
Children’s Internet Protection Act = publicly funded computers need filters (ok to condition $)
Dot Kids implementation and Efficiency Act = what kind of sites can be on .kids.us
Truth in Domain Names Act = can’t have domain names to attract kids and lead them to porn
18 USC §2257 = internet pornographers need to keep records/make disclosures
Adam Walsh Child Protection and Safety Act = sex offender registry
-------------------------------------------------PUBLICATION TORTS-------------------------------------------------Also personal injury caused by third party content (Moreno = intervening tortfeasor, Myspace = 230 immunity)
1. Defamation
a. Prima Facie Case
i. [False] statement of fact
ii. Published (i.e. communicated) to someone else
iii. Injurious to reputation (unless per se defamatory)
iv. No scienter required
b. Defenses
i. Truth
ii. Opinion
iii. P didn’t demand a retraction when statutorily required or
iv. 1st Amendment if:
1. Relates to a matter of public concern and
a. What is “public concern” on the Internet with niche communities?
2. D lacked minimum scienter:
a. In regards to public individuals = need actual malice
b. In regards to private individuals = need negligence
c. Single publication rule = publication (upload online) sets SOL unless there is republication
2. Miscellaneous
a. Prosser’s 4 Privacy Torts
i. False Light = offensive publication of true fact that recklessly puts person in a false light
ii. Public Disclosure of Private Acts = publicize true but private fact w/out sufficient
public interest (about expectation of privacy, even after subsequent postings)
iii. Intrusion into Seclusion = offensive intrusion into private place (ex. photos in backyard)
iv. Publicity Right = use of person’s name/likeness for commercial advantage (STATE IP)
b. Harmful/Inaccurate Information (ex. saying mushroom isn’t poisonous)
i. Negligence standard
c. All subject to 1st Am. limits
3. Online = Change to Secondary Liability via CDA (original party may still be liable)
a. Offline, publishers often liable for 3rd party content w/in their editorial discretion, but not online
i. Ps hate this law because it’s a break from tort law and there’s no way around it, but try:
1. Showing D was a content provider “in part” ala Roommates.com by encouraging
or requiring input of illegal content (aka not a “neutral tool”)
2. Try to bring federal IP claims
3. If you have a promise and detrimental reliance, do promissory estoppel
b. 47 USC §230(c)(1)
i. Policy:
1. Don’t want to disincentivize efforts to regulate material!
ii. Language (dated):
1. “No provider or user of an interactive computer service…
Internet
a. = anyone online sued in their publishing/editorial/screening capacity (Doe
Exceptionalism
= can’t have fancy pleading to make it premises liability)
at its finest
2. …Shall be treated as the publisher or speaker… (which any claim for 3rd party
content/actions does)
3. …Of any information provided by another information content provider”
a. = any person that is responsible, in whole or in part, for creation of info
(Roommates.com = pull down tools weren’t neutral, and requiring input which violates
the FHA makes the website part content provider. But free text boxes are ok)
4. Excluding information that violates federal crimes, [federal] IP laws, and ECPA
a. In 9th Cir. this also preempts state IP laws like publicity rights
5. Even if they have notice the content was harmful (Zeran = AOL not liable for
defamation on its messages boards even after it was asked to take it down)
6. And even if they exercise editorial discretion (= decisions to publish, withdraw,
postpone or alter content)
a. But edits can’t cause illegality to newly arise
iii. Effect = websites are not liable for 3rd party users’ content unless they encourage
illegal content or design the site to require users to input illegal content (RARE: even
cases citing Roommates.com did so for D, so bring motion to dismiss)
c. 47 USC §230(c)(2)
i. = No provider of an ICS shall be held liable on account of any action voluntarily taken in
good faith to restrict access to or availability of material that the provider or user
considers to be objectionable (excluding information that violates federal crimes,
[federal] IP laws, and ECPA)
ii. Used for website filtering decisions, ex. Google de-indexing websites, anti-spam vendor
classifications, etc.
1. So website’s own activity leads to immunity
d. Compare to Copyright (17 USC §512(c))
i. 47 USC §230 is waaaaay easier for Ds. See:
47 USC §230 (Publication)
ICS provider/user (so everyone)
Who
Everything buy [federal] IP, federal
Claims covered
crimes, ECPA
Duty upon notice None (Zeran said this would be bad)
Effect of scienter None (unless you encourage or demand
input of illegal content, which is RARE)
None: automatically applies
Prerequisites
17 USC §512(c) (Copyright)
Online service provider (so everyone)
Copyright
Expeditious take down (notice-based liability)
No safe harbor if you have actual knowledge
or red flags (infringement is apparent on face)
Registration and other formalities (so tons)
-----------------------------------------------------------PRIVACY------------------------------------------------------------
1. Definitions
a.
b.
c.
d.
Decisional
Freedom from government surveillance
Freedom from private snooping
Freedom from unwanted marketing
2. No privacy claim if no expectation of privacy (i.e. posting online)
3. Laws
a. FTC Act: unfair/deceptive trade practices
i. Fair information principles (FIPs):
1. Notice
2. Choice (beyond thumbs up/down)
3. Access (to what they know about you)
4. Security
ii. Applies to every business in the country, but only test and egregious cases are brought
b. ECPA (aka The Wiretap Act)
i. No one understands it and doesn’t translate well online
ii. Applies to:
1. Intentional (Pharmatrak = no consent b/c companies required assurances no PII was taken and
consumers didn’t know—did knowledge to consent—and yes interception b/c contemporaneous,
but not intentional b/c not conscious objective [inadvertence/mistake isn’t enough])
2. Interception of private communications while in transit
3. Access to stored communications (e.g. voicemail)
4. Disclosure of transactional information to the government (= metadata)
a. Need subpoenas, etc.
Consent
c. COPPA
=
i. Applies to commercial websites that market to, or knowingly collect data from, kids ≤12
defense
1. So do everything you can not to be governed by it, including:
a. Don’t collect personal data
b. If you do, don’t collect age information or kick kids out
c. If you need ages, have a pull down menu saying “under 18” so don’t know
ii. If you are covered, need to:
1. Post COPPA-compliant privacy policy (notice)
2. Obtain verifiable parental consent before data collection, use, disclosure (choice)
3. Let parents review collected data and restrict future collection/use (access)
4. Use reasonable security procedures (security)
5. Not condition participation in sweepstakes on unnecessary data disclosure
iii. But contracts by kids under 18 are void anyway…
d. CFAA 18 USC §1030
i. (a)(4)-(5) = trespass to chattels (see above)
ii. (a)(2) = intentionally accessing computer to remove information from it (Specht)
e. Industry-specific regulations
f. State laws (shouldn’t even exist because of DCC…)
i. Trade secret
ii.
iii.
iv.
v.
vi.
vii.
viii.
Prosser’s 4 Privacy Torts (see above)
False advertising/consumer protection law
Computer crime laws (ECPA equivalents) like CA §502 (see above)
Contract breach
Data breach notification laws (all states have different requirements)
Obligation to display privacy policies
Identity theft laws/”e-personation” (would have applied to Rolando if better timing)
1. E.g. CA Penal Code §528.5
2. E.g. §530.5(a) willfully obtaining PII and using it for an unlawful purpose (In re
Rolando= willfully obtained email password when he was given it and remembered it, then
defamed P by exposing her to hatred by posting lewd things on others walls using her FB account)
ix. CA Reader Privacy
4. Personally Identifiable Information
a. Laws treat PII differently, so try not to collect it or be aware of the extra requirements
b. Definitions
i. Narrow = something you can use to contact or ID a person without any other info (in CA
a zip code is enough)
ii. Broad = something that, if put with another database, is enough (what COPPA is moving
towards)
iii. Takeaway: don’t say you don’t collect it b/c it’s impossible to know (Pharmatrak)
5. Article III Standing
a. To access federal courts must have:
i. Injury-in-fact
1. Concrete and particularized
2. Actual or imminent (not conjectural or hypothetical)
ii. Causation
iii. Redressability
b. Problem for privacy cases
i. Breach of contract is not a standalone harm
ii. Is violating a statute? (case pending)
--------------------------------------------------------------SPAM--------------------------------------------------------------1990s problem, with illusory harms already addressed by existing laws, technology, and the marketplace
1. CAN-SPAM Act (enforced by FTC, but also limited private COAs for IAPs (which includes ISPs
per TheGlobe.com)
a. Definition = unsolicited electronic message the primary purpose of which is the commercial
advertisement or promotion of a commercial product or service (both over and under inclusive)
i. Broad! (TheGlobe.com = applies to internal messaging systems like MySpace even though doesn’t
follow tech specs of “email” b/c otherwise would subvert Congressional intent)
ii. Murky area that frustrates Congress’ purpose:
1. Texts, IMs, wall postings and pop-up ads?
2. Law firm newsletters and unsolicited resumes?
b. Goal = to preempt confusing state landscape, especially CA’s opt-in law
c. Restrictions:
i. No materially false/misleading header information (e.g. name, address, IP)
1. Advertisers are liable if (different from offline):
a. Reckless
b. Receive economic benefit and
c. Don’t take reasonable steps to prevent/report it
ii. No misleading subject line
iii. Must include a working and clear/conspicuous opt-out mechanism
iv. Must label it as advertising and show a valid physical postal address
v. If sexually explicit, but label as such in the subject line
vi. Aggravations (i.e. enhanced penalties) for:
1. Email harvesting from a website with a restrictive privacy policy
2. Dictionary/random attacks (TheGlobe.com)
3. Automatic registrations of email accounts to send spam
4. Knowingly relaying unpermitted spam
d. Supplements CFAA
2. TM law (e.g. covers phishing)
3. CFAA (Note: Hamidi wasn’t covered by CAN-SPAM b/c not promoting a commercial product)
4. Private regulation/technological controls (e.g. block lists, collaborative filtering, sender auth.)
5. State laws (probably unconstitutional under DCC, but may give individuals a COA)
a. Preempted:
i. Any law that expressly regulates the use of email to send commercial messages, except to
the extent the law prohibits falsity/deception (most say must rise to level of fraud)
b. Not preempted:
i. State laws not specific to email (e.g. contracts, torts)
ii. Other state laws to the extent they relate to acts of fraud or computer crime (e.g.
consumer protection, trespass to chattels)
------------------------------------------------SOCIAL NETWORKING-------------------------------------------------
1. Takeaways
a. Exceptionalism: regulation of social networking sites differs not only from offline enterprises,
but from other websites as well
b. It’s publishing content even if it feels private (seductive)
i. So have to stand behind your words b/c no reasonable expectation to privacy (Moreno)
ii. CDA applies and you won’t get to sue the ISP (Doe)
c. Litigators should always raid social media sites, and if evidence of duplicity then can get
discovery (Zimmerman = social network is non-privileged so can’t hide relevant information behind selfregulated privacy settings since he chose to disclose it and those who receive it aren’t limited in what they can do
with it, so other side gets his password b/c feels like there’s a spoliation problem [judge obviously knows nothing
about FB])
Download