Update on Trade Secret Law

Update on Trade Secret Law

* by James Pooley **

* © Copyright 2008 Morrison & Foerster LLP.

The views expressed in this article are those of the author only, are intended to be general in nature, and are not attributable to Morrison & Foerster

LLP or any of its clients. The information provided herein may not be applicable in all situations and should not be acted upon without specifi c legal advice based on particular situations.

** James Pooley is a partner in the Palo Alto offi ce of Morrison & Foerster LLP.

I. Introduction

Despite the widespread adoption of the Uniform Trade Secrets Act, trade secret principles continue to develop primarily through the common law. It is this reliance on a few broadly stated rules, whether from the Uniform Act or from the Restatement (of Torts or, since 1995, of Unfair Competition), that distinguishes trade secret law from the other three main forms of intellectual property, each of which is based on a federal statute. That reliance also refl ects the policy tension, present in most trade secret cases, between the need to support investment in useful data and the need to respect an individual’s right to pursue his or her career. As the information age continues to unfold, we can expect the stream of case law to continue.

What follows is a sampler of developments during the last year, with cases reported through February 2008. The cases chosen are those which seem to provide useful clarifi cation of issues likely continued on page 2

ISSUE NO. 142

October 2008

Letter from the Editor ...........1

Update on Trade

Secret Law .............................1

Changes to CAN-SPAM

Regulations ............................6

New Connecticut Privacy Law

Imposes Up to $500,000 in

Civil Penalties for Misuse of

Personal Information ............7

Gov’t Rummaging Through

Your Laptop’s Contents?

No Problem If You’re

Re-Entering USA, Says

Ninth Circuit ..........................9

Dear Subscribers:

In this issue of Intellectual Property Counselor, we are very pleased to provide a number of concise, informative articles discussing a range of topics, including trade secrets, CAN-SPAM regulations, Connecticut’s new privacy law, Custom’s right to look at your computer’s content when crossing the border, and the good faith defense to Lanham Act claims based on false patent infringement allegations. We thank all of these authors and their law fi rms for allowing us to share their articles with our subscribers.

Very truly yours,

Jeanne D. Wertz

Senior Attorney Editor

Ninth Circuit Adopts Good

Faith Defense for Lanham

Act Claims Premised on

Allegedly False Patent

Infringement Allegations

Made to Third Parties .........10

UPDATES ..............................12

40598756

Board of Advisers

Stephen A. Becker

McDermott, Will & Emery

Washington, DC

James L. Bikoff

Silverberg, Goldman & Bikoff, L.L.P.

Washington, DC

Emerson V. Briggs III

Hunton & Williams

Washington, DC

H. Ward Classen

Computer Sciences Corporation

Hanover, MD

Donald A. Cohn

DuPont Legal

Wilmington, DE

Stephen J. Czarnik

Rosen, Einbinder & Dunn, P.C.

New York, NY

William D. Durkee

Howrey Simon Arnold & White, LLP

Houston, TX

Richard S. Florsheim

Foley & Lardner LLP

Milwaukee, WI

Steven J. Glassm an

Kaye Scholer LLP

New York, NY

Fred M. Greguras

Fenwick & West LLP

Mountain View, CA

Alan Gutterman

Consultant

San Francisco, CA

R. Mark Halligan

Welsh & Katz, Ltd.

Chicago, IL

David L. Hayes

Fenwick & West LLP

San Francisco, CA

Mark Snyder Holmes

PatentBridge LLC

San Francisco, CA

Karl F. Jorda

Franklin Pierce Law Ctr.

Concord, NH

David M. Kelly

Finnegan, Henderson, Fara bow,

Garrett & Dunner, L.L.P.

Washington, DC

V. Scott Killingsworth

Powell Goldstein LLP

Atlanta, GA

Marc R. Paul

Baker & McKenzie

Washington, DC

A. James Richardson

Brinks, Hofer, Gilson & Lione

Indianapolis, IN

Kenneth D. Suzan

Hodgson Russ LLP

Buffalo, NY

Jody R. Westby

Global Cyber Risk LLC

Washington, DC

Jay T. Westermeier

DLA Piper Rudnick Gray Cary US LLP

Reston, VA

Members of the Board of Advisers to INTELLECTUAL PROPERTY COUNSELOR call our attention to items they believe will be of interest to our subscribers. Unless specifi cally noted, no statement in this newsletter should be attributed to a specifi c adviser, and adviser’s fi rm or company, or the Board of Advisers as a whole.

to come up repeatedly in the intellectual property lawyer’s caseload.

II. Uniform Act Preemption (or

“Displacement”) of Alternative

Claims

One of the most interesting and meaningful issues considered by courts is the extent to which the Uniform Trade

Secrets Act preempts—or “displaces” in the statutory terminology—other theories of state law that might apply to misappropriation of information. This is based on section 7 of the UTSA which, with some variation among the states, provides that the statute “displaces confl icting tort law, restitutionary law and any other law . . . providing a civil remedy for misappropriation of a trade secret.” Most courts dealing with the question have applied section

7 rigorously to achieve the Uniform Act objective of providing a single cause of action to replace an unnecessary variety of claims.

We can expect continuing developments in this critically important, but controversial, aspect of the Uniform

Act. A recent split decision by the

Wisconsin Supreme Court, in Burbank

Grease Services, LLC v. Sokolowski, 717

N.W.2d 781 (Wis. 2006), gave preemption a narrow reading, allowing plaintiffs the option of pursuing alternative claims where trade secrets cannot be proved.

The early response has been to brand this approach as a “minority view” and wrong. Chatterbox, LLC v. Pulsar

Ecoproducts, LLC, 2007 WL 1388183 at *3 (D. Idaho 2007) (reviewing case law). See also Patriot Homes, Inc. v.

Forest River Housing, Inc., 489 F. Supp.

2d 865 (N.D. Ind. 2007) (plaintiff has no

Copyright 2008 Thomson Reuters/West. All rights reserved. INTELLECTUAL PROPERTY COUNSELOR (ISSN 1092-

5864) is published monthly by Thomson Reuters/West, 610 Opperman Drive, P.O. Box 64526, St. Paul, MN 55164-

0526. Subscription Price: $663.00 annually. This publication is sold with the understanding that the publisher is not engaged in rendering legal, accounting, or other professional advice. If legal advice or other expert assistance is required, the service of a

competent professional should be sought. The information contained herein is based upon sources believed to be accurate and reliable—including secondary sources. Where cases, statutes, or other offi cial materials have been reprinted, we have attempted to provide materials as close to the originals as possible, but we do not purport to publish any documents verbatim. While we have exercised reasonable care to ensure the accuracy of the information presented, no representation or warranty is made as to such accuracy. Readers should check primary sources where appropriate and use the traditional legal research techniques to make sure that the information has not been affected or changed by recent developments.

2 Intellectual Property Counselor

“election” to pursue alternative claims where Uniform Act applies).

III. Proving Trade Secrets

One essential element of a plaintiff’s burden to prove trade secret misappropriation is that the information provides competitive value. This is true whether the controlling law is the Uniform Trade Secrets Act or the common law as expressed in the 1939 Restatement of

Torts or the 1995 Restatement of Unfair Competition.

In practice, however, plaintiffs sometimes overlook the need to provide specifi c evidence on this issue, with severe consequences. See, for example, Yield Dynamics, Inc. v.

TEA Systems Corp., 154 Cal. App. 4th 547, 66 Cal. Rptr.

3d 1 (Cal. App. 2007) (affi rming judgment for defendant; in software dispute, plaintiff failed to address the specifi c routines allegedly misappropriated by demonstrating that their “net value” to defendant—after accounting for the ineffi ciency of the appropriation—was more than trivial).

See also Global Water Group, Inc. v. Atchley, 244 S.W.3d

584 (Tex. App. 2008) (JMOL properly granted to set aside plaintiff jury verdict when plaintiff offered insuffi cient evidence to show that its claimed secret formula provided competitive value).

Value also matters in cases involving compilations of information, such as customer databases. One case has emphasized the difference between a simple list of customers and addresses, which may not qualify as a trade secret, and compilations of other customer-related data such as correspondence, historical costs, and the like. San

Jose Construction, Inc. v. S.B.C.C., Inc., 155 Cal. App. 4th,

67 Cal. Rptr. 3d 54 (Cal. App. 2007) (where the latter sort of information is concerned, the existence of a protectable trade secret is more likely to be a triable question of fact, precluding summary judgment). See also Lydall, Inc. v.

Ruschmeyer, 282 Conn. 209, 919 A.2d 421 (Conn. 2007)

(injunction against use or disclosure of entire combination secret is overbroad as to individual components which cannot qualify as trade secrets).

IV. Litigation Strategy

One important aspect of pre-litigation strategy is whether and when to send a letter to someone who might be misusing your technology. Among other things, you may risk triggering the running of a limitations period.

Recent signals from the courts on this issue are mixed.

Compare Epstein v. C.R. Bard, Inc., 460 F.3d 183 (1st

Cir. 2006) (complaint dismissed where in an early letter a licensor “wondered out loud” about the legitimacy of the licensee’s continued sales after expiration of the license) with the more forgiving attitude of the court in Porex Corp.

v. Haldopoulos, 284 Ga. App. 510, 644 S.E.2d 349 (Ga. App.

2007). There the plaintiff had sent two letters, the fi rst saying it had “strong reason to believe” a misappropriation had occurred, the other claiming it was “inconceivable” that the defendant had been able honestly to establish a competing business so quickly. The court denied summary judgment, noting that the plaintiff had only discovered the

“objective” facts indicating a misappropriation more than fi ve years later, when it toured the defendant’s facilities while considering a potential acquisition.

Of course, no matter how long you wait around while secret information is being misused, you may not have a fatal limitations problem if your state recognizes trade secret misappropriation as a “continuing tort,” allowing the plaintiff to recover damages at least for the limitations period. See Harry Miller Corp. v. Mancuso Chemicals Ltd.,

469 F. Supp. 2d 303, 318 (E.D. Pa. 2007).

Once you have sued, you would do well to continually assess the merits of your case, and be prepared to dismiss if the emerging facts belie your original, reasonable assumptions.

The consequence of forging ahead may be an attorneys’ fee award based on continued prosecution of a claim that was properly fi led at fi rst. See CRST Van Expedited, Inc.

v. Werner Enterprises, Inc., 479 F.3d 1099, 1112 (9th Cir.

2007) (trial court can infer bad faith when defendant warned plaintiff its claims were specious, plaintiff fi rst tried to get a release, and plaintiff ultimately withdrew its claims only after defendant was forced to fi le a motion to dismiss).

For those plaintiffs who would rather have their trade secret cases heard in federal court (often a dubious choice, given the generally greater availability of summary judgment), or who just want to maximize the number of claims arrayed against a defendant, an emerging tactic is to use the

Computer Fraud and Abuse Act, 18 U.S.C. §1030, which applies to “unauthorized” access and use of an employer’s computers. However, the courts seem to be interpreting the notion of authorization literally, and have refused to apply the statute where the employee hasn’t yet resigned, but is sending emails with confi dential information to his prospective employer. See, e.g., Shamrock Foods Co. v.

Gast, 535 F. Supp. 2d 962 (D. Ariz. 2008).

That doesn’t mean that a departing employee’s use of computers at work is without risk. In Banks v. Mario

Industries of Virginia, Inc., 650 S.E.2d 687 (Va. 2007), the court rejected an attorney/client privilege objection and admitted an employee’s communication to his attorney about his plans to resign. He had written the memorandum on his work computer and then erased it, but the employer’s forensic computer specialist had recovered the document.

By using the employer’s facility to compose the document, the court held, the employee had waived the privilege.

V. Discovery

The widespread use of protective orders in all sorts of litigation (see next section) has led many lawyers to believe that all information is subject to discovery, and that the only dispute will be about the terms of the protective order.

That’s not so. In fact, in most states, there is a privilege

Issue No. 142 3

not to disclose secret information (and in federal court

Rule 26(c) provides an enforcement mechanism through protective orders). In practice, the privilege is usually easily overcome, particularly as to the parties in the litigation.

But not always. In Bridgestone Americas Holding, Inc. v.

Mayberry, 878 N.E.2d 189 (Ind. 2007), a products liability case, the defendant tire manufacturer resisted producing a rubber formula. The court applied a widely adopted threefactor test: is the information a trade secret; is it necessary to the requesting party’s case; and does the “balance of interests” favor production. Importantly, the fi rst factor is satisfi ed by only a prima facie (“minimal”) showing, while the second factor requires the requesting party to show that

“suitable substitutes” for the information are “completely lacking.” Since the defendant easily carried its burden on the fi rst factor and the plaintiff could not demonstrate the second, the court held that the third factor was irrelevant.

Thus, production was denied, even though the formula in question was no longer in use.

1

Pincheira v. Allstate Ins. Co., 142 N.M. 283, 164 P.3d

982, 993 (N.M. App. 2007) also applied the multi-step test, noting that as applied the test is less stringent in state courts, where good cause is presumed from establishing secrecy, than in federal courts, where the party resisting discovery under Rule 26 usually must show specifi c, serious harm.

VI. Protective Orders

Protective orders are critical to management of cases that involve the exchange of confi dential data, which is to say most civil litigation. So-called “two-tier” orders allow the most sensitive information to be produced in the fi rst instance only to counsel. They are typically entered in cases where the parties are direct competitors and the risk of misuse of discovery is most acute. See, e.g., A Major

Difference, Inc. v. Wellspring Products, LLC, 243 F.R.D. 415

(D. Colo. 2006). But where this is not true, and the fi eld of technology is narrow, so that a party must rely on its employed scientists for advice, a single tier of confi dentiality may be more appropriate. MGP Ingredients, Inc. v. Mars,

Inc., 245 F.R.D. 497 (D. Kan. 2007).

As more cases involve law fi rms that both litigate and prosecute patent applications, participation by patent lawyers in litigation becomes increasingly challenging.

Similarly, patent counsel (but not outside corporate counsel) was barred from receiving attorneys-only information in

Infosint S.A. v. H. Lundbeck A.S., 2007 WL 1467784 at *5

(S.D.N.Y. 2007) (“While Infosint’s desire to have its trusted counsel involved in the litigation is understandable, Lundbeck’s desire to keep its proprietary information protected is a superior interest.”). But see Avocent Redmond Corp.

v. Rose Electronics, Inc., 242 F.R.D. 574 (W.D. Wash. 2007)

(rejecting contrary case law and allowing access by patent prosecution counsel) and Intervet, Inc. v. Merial Ltd., 241

F.R.D. 55, 58 (D.C.D.C. 2007) (company’s inside IP counsel and its regular outside patent litigation counsel were not

“competitive decision-makers” and therefore could have access).

Whatever protective order you get, be careful about compliance with its procedural requirements, or it may become the means by which you lose your client’s trade secret rights. In In re Guidant Corp. Implantable Defi bril-

lators Products Liability Litigation, 245 F.R.D. 632 (D.

Minn. 2007), despite the existence of a protective order, at a hearing on motions for summary judgment no attorney asked to seal the courtroom, and certain confi dential documents and information were referred to. Because members of the press were present, that information lost protection.

And in Pettrey v. Enterprise Title Agency, Inc., 470 F. Supp.

2d 790, 795 (N.D. Ohio 2007), the court denied a motion to designate documents because it was not fi led within the required time period.

High profi le litigation often attracts the press or other third parties who would like to gain access to information sealed under protective orders. In Ford Motor Co. v. Man-

ners, 239 S.W.3d 583 (Mo. 2007), the order classifi ed some information as “non-sharing,” meaning that the plaintiff could not distribute the discovery to lawyers representing other potential plaintiffs. Following settlement, plaintiff successfully moved to modify the order because its rationale

(facilitation of discovery) was no longer applicable. The appellate court reversed, holding that defendant’s reliance on the non-sharing provision was controlling. Similarly, the court in Massachusetts v. Mylan Labs., Inc., 246 F.R.D. 87

(D. Mass. 2007) refused modifi cation to allow the plaintiff to distribute discovery materials to authorities in all 49 other states and the federal government. Absent some specifi c threat to public health, the court held, each potentially interested entity would be required to seek intervention pursuant to Rule 24.

A number of states have established procedural rules to govern requests for sealing information in court. One of these states, California, recently confronted the interpretation of a provision that applies the rules to documents used as the basis of a court’s “adjudication of a substantive matter.” In Mercury Interactive Corp. v. Klein, 158 Cal.

App. 4th 60, 70 Cal. Rptr. 3d 88 (Cal. App. 2007), the court held that this threshold did not apply to documents attached as exhibits to a complaint, which could therefore remain sealed.

VII. Misappropriation

The “taking” that is necessary to demonstrate misappropriation need not be physical, but can be accomplished through memorization. In Al Minor & Assoc., Inc. v.

Martin, 117 Ohio St.3d 58, 881 N.E.2d 850 (Ohio 2008), the

Ohio Supreme Court overruled a pre-UTSA decision by an intermediate appellate court joining the majority of states that consider memorization of secret data (here, customer information) as a means of misappropriation.

4 Intellectual Property Counselor

But in the end, it is often the use (or lack thereof) by the defendant that drives the result. In Cintas Corp. v. Perry, 517

F.3d 459 (7th Cir. 2008), the former employee had brought confi dential reports to his new job, but only used them to establish a format for reporting to his new employer. In upholding summary judgment for defendant, the court reasoned that the format could not be claimed as a secret, and there was no evidence that he used the contents.

VIII. Injunctions

In pursuing injunctive relief against misappropriation of a “combination” secret, where some aspects of the secret may consist of publicly known information, one needs to focus on exactly what behavior is restrained. It is error for a court to enjoin use of well-known concepts merely because they happen to form part of an overall process or plan. Lydall, Inc. v. Ruschmeyer, 282 Conn. 209, 241, 919

A.2d 421 (Conn. 2007). And because of the overriding concern that injunctions be suffi ciently specifi c to inform the defendant what behavior is prohibited, it is error to phrase the order in general terms such as “plaintiff’s trade secrets.” See Patriot Homes, Inc. v. Forest River Housing,

Inc., 512 F.3d 412 (7th Cir. 2008).

Preliminary injunctive relief requires that the plaintiff demonstrate a substantial risk of irreparable harm. Where disclosure of a trade secret is threatened, this is virtually presumed. However, in a customer list case, where damages will be limited to lost revenue, it is very diffi cult to make the required showing unless the defendant’s behavior threatens to destroy the plaintiff’s business. See, e.g., Ajilon

Professional Staffi ng, PLC v. Kubicki, 503 F. Supp. 2d 358

(D.D.C. 2007).

In opposing injunctive relief, defendants sometimes neglect to present specifi c evidence of the harm that would result from an improper restraint; also courts sometimes refuse to take that evidence into account, instead refl exively setting a “nominal” amount for an injunction bond. This approach led to reversal in Atwood Agency v. Black, 374

S.C. 68, 646 S.E.2d 882 (S.C. 2007) (the order “erroneously assumes the injunction is proper instead of providing an amount suffi cient to protect appellants in the event the injunction is ultimately deemed improper”).

IX. Contracts

Although trade secret misappropriation is a tort, contracts are often relevant. Nondisclosure contracts defi ne the nature of the confi dential relationship and the kind of information that will be protected, and noncompete covenants frequently require careful attention and interpretation.

Because they are in restraint of trade, post-employment noncompete covenants entered into after employment begins must be supported by “fresh” consideration. Continued employment of an at-will employee is insuffi cient.

Access Organics, Inc. v. Hernandez, 341 Mont. 73 175 P.3d

899 (Mont. 2008). And noncompete covenants will not be enforced where they are not supported by a legitimate business interest such as shared goodwill or trade secret information. Merely providing business-enabling assistance is not enough to support a covenant between two corporations. See Guardian Fiberglass, Inc. v. Whit Davis Lumber

Co., 509 F.3d 512 (8th Cir. 2007). On the other hand, a covenant not to compete for 18 months after termination of a patent and know-how license will be judged under a rule of reason, and may be enforceable. See County Materials

Corp. v. Allan Block Corp., 502 F.3d 730 (7th Cir. 2007).

Sometimes an overbroad agreement can be saved when courts apply a variation on the “blue pencil rule” (allowing offensive provisions to be stricken) and essentially rewrite the agreement, for example to set a shorter time period or narrower geographic coverage. However, by asking for such discretionary modifi cation, the benefi ciary may be held to admit that the contract as drafted was not reasonable, justifying the court’s refusal to modify or enforce it. Cintas

Corp. v. Perry, 517 F.3d 459 (7th Cir. 2008).

A broad “no-hire” clause in an engagement agreement between a consulting company and its client was held unenforceable in VL Systems, Inc. v. Unisen, Inc., 152 Cal. App.

4th 708, 61 Cal. Rptr. 3d 818 (Cal. App. 2007). Reversing a trial court award of liquidated damages against the former client that hired away the consultant’s employee, the court emphasized that the provision was not narrowly drawn to protect legitimate interests, but could be applied (as the consultant had tried to do here) to employees who had never worked on the former client’s project. The opinion relied to a great extent on California’s strong public policy favoring employee mobility and disfavoring agreements in restraint of competition. The same policy was at work in Alliance

Payment Systems, Inc. v. Walczer, 152 Cal. App. 4th 620, 61

Cal. Rptr. 3d 789 (Cal. App. 2007), where the court held that a settlement agreement resolving litigation between partners was partially unenforceable because it required each to forfeit to the other any revenue received from the other’s assigned customers, regardless of whether there was solicitation. Finally, we can expect a decision soon from the

California Supreme Court in the case of Edwards v. Arthur

Andersen LLP, which will address the Ninth Circuit’s socalled “narrow restraint exception” to California’s statutory prohibition on noncompete agreements.

X. Damages and Attorneys’ Fees

Although a secret plan by trusted managers to raid their union employer in favor of another union was not accomplished by misappropriation of trade secrets, it was held to be a breach of fi duciary duty, justifying a damage award consisting of the salary and benefi ts that had been paid to the employees during the time they hatched and executed their plan. Service Employees Int’l Union v. Colcord, 160 Cal.

App. 4th 362, 72 Cal. Rptr. 3d 763 (Cal. App. 2008).

Issue No. 142 5

Under the Uniform Trade Secrets Act, attorneys’ fees are recoverable by the plaintiff in the event of a willful and malicious misappropriation, or by the defendant in the case of a claim that turns out to have been prosecuted without justifi cation. Where a defendant employee has been indemnifi ed by his new employer who paid for his successful defense, he may still recover fees under the statute because they were “incurred.” Cintas Corp. v. Perry, 517 F.3d 459

(7th Cir. 2008).

ENDNOTE

1. The result might be different in states that have not yet adopted the

Uniform Trade Secrets Act. See, e.g., Portfolioscope, Inc. v. I-Flex

Solutions Limited, 473 F. Supp. 2d 252 (D. Mass. 2007), where the court dismissed with prejudice a trade secret misappropriation claim because there was no allegation that the plaintiff was currently using the software, a requirement for trade secrecy under the 1939

Restatement of Torts. The court acknowledged the different rule of the modern (1995) Restatement of Unfair Competition, but concluded that Massachusetts law had not changed.

Changes to CAN-SPAM Regulations

* by Alan Charles Raul, Edward R. McNicholas, and Hans B. Leaman **

* © Copyright 2008 Sidley Austin LLP. All rights reserved. Reprinted with permission. This article has been prepared by Sidley Austin LLP for informational purposes only and does not constitute legal advice.

This information is not intended to create, and receipt of it does not constitute, a lawyer-client relationship. Readers should not act upon this without seeking advice from professional advisers.

** Alan Charles Raul and Edward R. McNicholas are partners in the

Washington, D.C. offi ce of Sidley Austin LLP. Mr. Raul has a broad litigation and counseling practice that covers government regulation, enforcement and administrative law, corporate compliance, privacy and information law. Mr. McNicholas focuses his practice on clients facing complex information technology, constitutional and privacy issues in civil and white-collar criminal matters. Mr. Leaman is an associate in the fi rm’s Washington, D.C. offi ce. His practice focuses on civil, criminal, and constitutional litigation.

The Federal Trade Commission (FTC) has released four new interpretations of key aspects of the Controlling the

Assault of Non-Solicited Pornography and Marketing Act of 2003 (CAN-SPAM Act), 15 U.S.C. §§ 7701-7713. Any company that uses email to communicate with its customers should be aware of these rules and have a compliance program in place to ensure that actual practices conform to corporate privacy policies.

In general terms, the CAN-SPAM Act requires that all

“commercial” e-mail messages include an “opt-out” statement informing recipients how to avoid receiving further email solicitations from the sender. It further requires that a sender honor such opt-out requests within ten business days. 15 U.S.C. § 7704. “Commercial” e-mail messages are messages whose primary purpose is to advertise or promote products or services, including an Internet Web site. 15

U.S.C. § 7702. There is no bright-line test for commercial messages. The FTC discerns the “primary purpose” of an e-mail message according to factors such as the promotional nature of the message’s subject heading and the prominence of advertising material in the body of the message. 16

C.F.R. § 316.3(a).

The new FTC interpretation helps to clarify some key issues that have created uncertainty for e-mailers. They clarify (1) that an e-mail recipient cannot be required to take any steps other than sending a reply e-mail message or visiting a single Internet Web page to opt out of receiving e-mail from a sender; (2) that a “person” under the CAN-SPAM Act includes all organizations, including all businesses, unincorporated entities and non-profits; (3) that one “sender” may be designated even when multiple persons promote their products or services in the same commercial email; and (4) that a sender may use a post office box or valid commercial mail box to satisfy its obligation to display a “valid physical postal address” in the e-mail. Additionally, the

FTC expressed its interpretation of the application of the CAN-SPAM Act to forward-to-a-“friend” e-mail marketing campaigns, and it further described the kinds of “transactional or relationship” messages that are exempt from the CAN-SPAM Act’s requirements.

Deadline for Honoring an Opt-Out Request

The rules may be most signifi cant for what they did not change. Despite notice that it was considering shortening the length of time within which senders must honor opt-out requests down to a mere three days, the FTC decided, after signifi cant industry mobilization, to leave the original statutory ten business day deadline in place.

Prohibition on Imposing Additional Requirements on Those Who Wish to Opt Out

In an effort to combat overly complex opt-out schemes, the FTC has added a provision that prohibits some specifi c, overly burdensome practices. Recipients who wish to opt out may not be required to pay any fees, provide any information other than the recipient’s electronic mail address and opt-out preferences, or take any other steps except sending a reply electronic mail message or visiting a single Internet

Web page. 16 C.F.R. § 316.4.

6 Intellectual Property Counselor