Chapter 11 Intellectual Property and Cyberlaw Chapter Objectives 1. Summarize the laws protecting trademarks, patents, and copyrights. 2. Describe how trade secrets are protected by the law. 3. Discuss what is meant by the term virtual property. 4. Indicate what legal protection exists for trademarks, copyrights, and other intellectual property existing in digital form. 5. Give examples of how technological developments are affecting the laws governing intellectual property. 2 What Is Intellectual Property? Intellectual property is that which results from intellectual, creative processes of one’s mind. Forms of intellectual property include: Trademarks and service marks Patents Copyrights Trade secrets 3 Case 11.1 Coca-Cola Co. v. Koke Co. of America Koke alleged that since Coca-Cola no longer contained cocaine, the trademark was fraudulent, and not entitled to protection. (Koke wanted to use the name “Koke” for its product.) On appeal, the U.S. Supreme Court held that since few, if any, would now be led to believe Coca-Cola contained cocaine, there was no fraud and the trademark was valid. How can a court determine when a particular nickname for a branded product has entered into common use? 4 Trademarks and Related Property Definition: A trademark is a distinctive mark, motto, device, or implement that a manufacturer stamps, prints, or otherwise affixes to the goods it produces so that they may be identified in the market and their origins made known. Duration of Protection: Trademark protection is renewable indefinitely. 5 Trademark Infringement Trademark infringement occurs when one uses the protected trademark, service mark, or trade name of another without permission when marketing goods or services. 6 Case 11.2 America Online, Inc. v. At&T Corp. In the 1960s and early 1970s, AT&T Corp. developed UNIX, a computer operating system facilitating communications over the Internet. When a user connects to UNIX, if the user has e-mail, the system displays a phrase similar to “You have mail.” In the 1980s, America Online started using “You have mail” in its e-mail notification service for its members. AT&T provides Internet service through its Worldnet service and has “You have mail!” on its homepage. AOL filed a suit claiming it owned the phrase. The court ruled that “You have mail” is a generic expression and therefore cannot be owned by AOL. Generic marks will not be protected as trademarks even if they have acquired secondary meanings. Can you see any reason for this principle of trademark law? 7 Patents Definition: A grant from the government that gives an inventor the exclusive right to make, use, and sell an invention for a specified period. Duration of Protection: Twenty years from the date of filing the application for a patent. 8 Patent Infringement Occurs when one uses or sells another’s patented design, product, or process without the patent owner’s permission. 9 Patents for Software Although computer software is most often protected by copyrights, it may also be patented. A patent may be obtained for computer software if: It is part of a process or procedure That process or procedure itself is patentable 10 Patents for Cyberproducts Cyberproducts, such as data-compression software, encryption systems and various other network software are particularly difficult to protect on the Internet. One of the best ways to protect such property is through a licensing agreement, which permits the licensee to make, sell, or use the patented item. Because the Internet has no geographical boundaries, such an agreement should consider all U.S., foreign, and international laws. 11 Copyrights Definition: An intangible property right granted by federal statute to the author or originator of a literary or artistic production of a specified types. Duration of Protection: Copyright begins at the moment of creation, and lasts for the life of the author plus 50 years. Copyrights owned by publishing houses may last longer. 12 Copyright Infringement Occurs whenever the form or expression of an idea is copied without the permission of the copyright holder. An exception applies if the copying is deemed a “fair use.” Fair use includes: Criticism, comment, news reporting Teaching, scholarship, or research 13 “Fair Use” Section 107 of the Copyright Act gives four factors to consider in determining whether something is fair use: The purpose and character of the use The nature of the copyrighted work The amount and substantiality of the portion used The effect of the use upon the potential market 14 Case 11.3 Repp v. Webber Ray Repp wrote and published more than 120 musical compositions in over 30 years, including “Till You,” which was copyrighted in 1987. Andrew Lloyd Webber wrote the musical Phantom of the Opera in 1983-84. Repp claimed one of the songs in Phantom of the Opera infringed on the copyright of “Till You,” and filed a suit against Webber and others. Webber denied knowing about Repp or “Till You.” The court issued a summary judgment for Webber. The case was remanded in the appellate court. Considering that there are a limited number of musical notes and a limited number of works into which those notes can be composed, should the fact that infringement might be “subconscious” affect liability in a copyright suit? 15 Trade Secrets Definition: Any formula, pattern, device, or compilation of information that give a business an advantage over competitors who do not know the information or processes. Duration of Protection: Indefinitely, as long as the party adequately protects his or her trade secrets from disclosures. 16 International Protection for Intellectual Property International protection for intellectual property exists under various international agreements, including: Berne Convention (1886)—every country that has signed the convention must recognize copyrights granted to authors in all others. TRIPS (Trade-Related Aspects of Intellectual Property Rights) Agreement 17 Copyright Protection for Software The Computer Software Copyright Act of 1980 specifically classifies computer programs as “literary works” thus giving them full protection under U.S. copyright law. The No Electronic Theft Act of 1997 now provides criminal penalties for copyright infringement of software, even where there is no intent on the part of the infringer to make a profit. 18 Case 11.4 Playboy Enterprises v. Welles Playboy Enterprises, Inc. (PEI), maintains websites to promote Playboy magazine and PEI models. Terri Welles was featured as “Playmate of the Year” in June 1981. She maintains a website titled “Terri Welles— Playmate of the Year 1981.” As meta tags, Welles uses the terms “Playboy” and “Playmate,” among others. PEI filed a suit against her asking the court to order her to stop using those terms as meta tags. The court held that Welles was entitled to the “fair use” of the “Playboy” and “Playmate” marks as tags. Why would PEI encourage its models to use its own marks outside cyberspace but attempt to block such uses within cyberspace? 19 Domain Name Registration Since 1995, Network Solutions, Inc. (NSI) has required any party seeking to register a domain name to state the following: that the party’s use of the name will not infringe on the intellectual property rights of any other party that the party intends to use the name on “a regular basis on the Internet” that the party’s use of the name will not be unlawful 20 Cyberlaw: Protecting Intellectual Property in Cyberspace Because of the unique nature of the Internet, its use creates unique legal questions and issues, particularly with respect to intellectual property rights. Such issues include: Trademark Protection and Domain Names Patents for Cyberproducts Copyrights in Cyberspace 21 Trademark Protection and Domain Names Although trademark law allows multiple parties to use the same mark (as long as it is used in connection with different products or services and doesn’t create confusion), only one party can use a particular domain name. A domain name is a series of letters and symbols used to identify a site on the Internet. (Also called Internet “address.”) 22 Case 11.5 Tasini v. New York Times Co. Magazines and newspapers, including the New York Times, buy and publish articles written by freelance writers. They also sell the contents to e-publishers for inclusion in online and other electronic databases. Jonathon Tasini and other freelancers filed a suit against the New York Times and other publishers (including e-publishers) contending that the e-publication of the articles violated the copyright act. The court ruled in favor of the publishers When technology creates a situation in which rights such as those in this case are more valuable than originally anticipated, should the law be changed to redistribute the economic benefit of those rights? 23 Copyrights in Cyberspace Uploading, downloading, browsing—any of these activities conducted in cyberspace can infringe on a copyright owner’s rights. 24 Uniform Copyright Laws One of the main problems for the international online community is that copyright protection varies among jurisdictions. The U.S. does not recognize moral rights, but other countries, like France, enforce these rights. In Great Britain, authors have paternity rights to their copyrighted works. Although the WIPO Copyright Treaty and the DMCA of 1998 have been implemented, there are still many cyberspace copyright issues unsolved. Should there be a different copyright law solely for cyberspace? If so, what rights should it include? 25 The Digital Millennium Copyright Act of 1998 Copyright works can be pirated and distributed all over the world quickly and efficiently. To curb this crime, the World Intellectual Property Organization (WIPO) enacted two treaties in 1996 to upgrade global standards of copyright protection, particularly for the Internet. In 1998, Congress implemented the provisions of these treaties to update U.S. copyright law. The Digital Millennium Copyright Act of 1998 created civil and criminal penalties for anyone who circumvents encryption software or other technological anti-piracy protection. Also prohibited are the manufacture, import, sale, or distribution of devices or services for circumvention. How will the Digital Millennium Copyright Act of 1998 spur the growth of commerce online? 26 For Review 1. What is intellectual property? How does the law protect intellectual property? 2. What is a trade secret? How are trade secrets protected by law? 3. What is virtual property? 4. What legal protection is there for intellectual property existing in digital form? 5. Generally, how has technology affected intellectual property rights? 27